Searched refs:password (Results 26 - 50 of 636) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/src/eap_peer/
H A Dmschapv2.c37 const u8 *password, size_t password_len,
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
65 password, password_len);
68 password, nt_response) ||
70 password, peer_challenge, auth_challenge,
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
96 if (hash_nt_password_hash(password, password_hash_has
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c37 const u8 *password, size_t password_len,
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
65 password, password_len);
68 password, nt_response) ||
70 password, peer_challenge, auth_challenge,
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
96 if (hash_nt_password_hash(password, password_hash_has
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
[all...]
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/module/
H A DLoginModuleUtilsTest.java39 char[] password = LoginModuleUtils.getPassword(in);
40 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password));
44 password = LoginModuleUtils.getPassword(in);
45 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password));
49 password = LoginModuleUtils.getPassword(in);
50 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password));
54 password = LoginModuleUtils.getPassword(in);
55 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password));
59 password = LoginModuleUtils.getPassword(in);
61 assertTrue(Arrays.equals(expectedString.toCharArray(), password));
[all...]
/external/chromium/chrome/browser/password_manager/
H A Dencryptor_password_mac_unittest.cc11 // Test that if we have an existing password in the Keychain and we are
16 EncryptorPassword password(keychain);
17 EXPECT_FALSE(password.GetEncryptorPassword().empty());
22 // Test that if we do not have an existing password in the Keychain then it
27 EncryptorPassword password(keychain);
28 EXPECT_FALSE(password.GetEncryptorPassword().empty());
33 // Test that if get denied access by the user then we return an empty password.
38 EncryptorPassword password(keychain);
39 EXPECT_TRUE(password.GetEncryptorPassword().empty());
45 // password, an
[all...]
H A Die7_password.h21 // Encrypted data containing the username, password and some more undocumented
31 // Parses a data structure to find the password and the username.
34 std::wstring* password);
36 // Decrypts the username and password for a given data vector using the url as
40 std::wstring* username, std::wstring* password);
/external/webkit/Source/WebKit2/UIProcess/API/C/
H A DWKCredential.cpp40 WKCredentialRef WKCredentialCreate(WKStringRef username, WKStringRef password, WKCredentialPersistence persistence) argument
42 RefPtr<WebCredential> credential = WebCredential::create(toImpl(username), toImpl(password), toCredentialPersistence(persistence));
H A DWKCredential.h38 WK_EXPORT WKCredentialRef WKCredentialCreate(WKStringRef username, WKStringRef password, WKCredentialPersistence);
/external/grub/util/
H A Dgrub-md5-crypt3 # Encrypt a password in MD5 format
35 Encrypt a password in MD5 format.
67 # Prompt to enter a password.
69 read -r password
73 echo -n "Retype password: "
80 if test "x$password" = x; then
81 echo "Empty password is not permitted."
85 if test "x$password" != "x$password2"; then
94 $password
H A Dgrub-md5-crypt.in3 # Encrypt a password in MD5 format
35 Encrypt a password in MD5 format.
67 # Prompt to enter a password.
69 read -r password
73 echo -n "Retype password: "
80 if test "x$password" = x; then
81 echo "Empty password is not permitted."
85 if test "x$password" != "x$password2"; then
94 $password
/external/dropbear/
H A Dcli-authpasswd.c44 /* returns a statically allocated password from a helper app, or NULL
118 char* password = NULL; local
124 snprintf(prompt, sizeof(prompt), "%s@%s's password: ",
128 password = gui_getpass(prompt);
131 password = getpass_or_cancel(prompt);
146 buf_putstring(ses.writepayload, password, strlen(password));
149 m_burn(password, strlen(password));
/external/webkit/Source/WebCore/platform/network/
H A DCredential.cpp44 Credential::Credential(const String& user, const String& password, CredentialPersistence persistence) argument
46 , m_password(password.length() ? password : "")
56 , m_password(original.password())
81 const String& Credential::password() const function in class:WebCore::Credential
155 if (a.password() != b.password())
/external/openssh/openbsd-compat/
H A Dport-uw.c53 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
59 /* Just use the supplied fake password if authctxt is invalid */
62 /* Check for users with no password. */
63 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0)
66 /* Encrypt the candidate password using the proper salt. */
75 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
76 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
80 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
108 * fgetpwent() only reads from password file, so we know for certain
/external/chromium/chrome/browser/chromeos/login/
H A Dscreen_locker_tester.h32 // Injects MockAuthenticate that uses given |user| and |password|.
34 const std::string& password);
36 // Sets the password text.
37 void SetPassword(const std::string& password);
39 // Gets the password text.
42 // Emulates entring a password.
43 void EnterPassword(const std::string& password);
H A Dscreen_locker_tester.cc35 const std::string& user, const std::string& password) {
38 new MockAuthenticator(ScreenLocker::screen_locker_, user, password));
41 void ScreenLockerTester::SetPassword(const std::string& password) { argument
44 pass->SetText(ASCIIToUTF16(password.c_str()));
53 void ScreenLockerTester::EnterPassword(const std::string& password) { argument
54 SetPassword(password);
34 InjectMockAuthenticator( const std::string& user, const std::string& password) argument
/external/webkit/Source/WebKit/win/
H A DWebURLCredential.h52 /* [in] */ BSTR password,
55 virtual HRESULT STDMETHODCALLTYPE password(
56 /* [out, retval] */ BSTR* password);
H A DWebURLCredential.cpp107 /* [in] */ BSTR password,
125 m_credential = Credential(String(user, SysStringLen(user)), String(password, SysStringLen(password)), corePersistence);
129 HRESULT STDMETHODCALLTYPE WebURLCredential::password( argument
130 /* [out, retval] */ BSTR* password)
132 BString str = m_credential.password();
133 *password = str.release();
105 initWithUser( BSTR user, BSTR password, WebURLCredentialPersistence persistence) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
H A DJDKPKCS12StoreParameter.java34 public void setPassword(char[] password) argument
36 this.protectionParameter = new KeyStore.PasswordProtection(password);
/external/openssh/
H A Dauth-passwd.c7 * the password is valid for the user.
77 * Tries to authenticate the user using password. Returns true if
81 auth_password(Authctxt *authctxt, const char *password) argument
93 if (*password == '\0' && options.permit_empty_passwd == 0)
98 int ret = auth_krb5_password(authctxt, password);
106 HANDLE hToken = cygwin_logon_user(pw, password);
116 return (sshpam_auth_passwd(authctxt, password) && ok);
125 result = sys_auth_passwd(authctxt, password);
144 pwwarntime = login_getcaptime(lc, "password-warn", TWO_WEEKS,
153 "Your password wil
167 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
192 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
[all...]
/external/apache-http/src/org/apache/http/impl/auth/
H A DNTLMEngine.java62 * @param password Password
71 String password,
69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
H A DOpenSSLPBEParametersGenerator.java36 * @param password password to use.
40 byte[] password,
43 super.init(password, salt, 1);
47 * the derived key function, the ith hash of the password and the salt.
58 digest.update(password, 0, password.length);
83 * Generate a key parameter derived from the password, salt, and iteration
102 * the password, salt, and iteration count we are currently initialised
123 * Generate a key parameter for use with a MAC derived from the password,
39 init( byte[] password, byte[] salt) argument
[all...]
/external/chromium/chrome/browser/ui/login/
H A Dlogin_model.h15 // Called by the model when a username,password pair has been identified
18 const std::wstring& password) = 0;
/external/openssh/contrib/aix/
H A Dpam.conf15 sshd password required /usr/lib/security/pam_aix
16 OTHER password required /usr/lib/security/pam_aix
/external/apache-http/src/org/apache/http/auth/
H A DNTCredentials.java52 private final String password; field in class:NTCredentials
58 * The constructor with the fully qualified username and password combined
61 * @param usernamePassword the domain/username:password formed string
66 throw new IllegalArgumentException("Username:password string may not be null");
72 this.password = usernamePassword.substring(atColon + 1);
75 this.password = null;
94 * @param password The password.
101 final String password,
109 this.password
99 NTCredentials( final String userName, final String password, final String workstation, final String domain) argument
[all...]
/external/webkit/Tools/Scripts/webkitpy/tool/steps/
H A Dcommit.py53 password = None
62 commit_text = scm.commit_with_message(self._commit_message, git_commit=self._options.git_commit, username=username, password=password, force_squash=force_squash, changed_files=self._changed_files(state))
78 password = self._tool.user.prompt_password("%s password for %s: " % (e.server_host, username), repeat=5)
79 if not password:
80 raise ScriptError("You need to specify the password for %s on %s to perform the commit." % (username, e.server_host))
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dms_funcs.h20 const u8 *password, size_t password_len,
27 void generate_authenticator_response(const u8 *password, size_t password_len,
37 void nt_challenge_response(const u8 *challenge, const u8 *password,
42 void nt_password_hash(const u8 *password, size_t password_len,
51 const u8 *password, size_t password_len,

Completed in 487 milliseconds

1234567891011>>