Searched refs:password (Results 251 - 275 of 636) sorted by relevance

<<11121314151617181920>>

/external/webkit/Tools/Scripts/webkitpy/common/checkout/
H A Dscm.py295 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None):
563 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None):
840 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None):
850 return self._commit_on_branch(message, 'HEAD', username=username, password=password)
858 return self._commit_on_branch(message, git_commit, username=username, password=password)
864 return self.push_local_commits_to_server(username=username, password=password)
866 def _commit_on_branch(self, message, git_commit, username=None, password
[all...]
/external/chromium/chrome/browser/sync/util/
H A Duser_settings.cc351 const string& password) {
352 // Save one-way hashed password:
359 md5.AddData(password.data(), password.size());
391 const string& password) {
418 md5.AddData(password.data(), password.size());
350 StoreHashedPassword(const string& email, const string& password) argument
390 VerifyAgainstStoredHash(const string& email, const string& password) argument
/external/openssh/
H A Dsshconnect1.c450 char *password; local
452 debug("Doing password authentication.");
458 password = read_passphrase(prompt, 0);
460 ssh_put_password(password);
461 memset(password, 0, strlen(password));
462 xfree(password);
688 * needed (the user has no password). Otherwise the server responds
737 /* Try password authentication if the server supports it. */
742 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password
[all...]
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKeyStoreSpiTest.java165 public void engineLoad(InputStream stream, char[] password) {
167 assertNull(password);
/external/chromium/chrome/browser/chromeos/login/
H A Denterprise_enrollment_view.cc147 const std::string& password,
150 controller_->Authenticate(user, password, captcha, access_code);
146 OnAuthSubmitted(const std::string& user, const std::string& password, const std::string& captcha, const std::string& access_code) argument
H A Dnew_user_view.h29 // View that is used for new user login. It asks for username and password,
42 // User provided |username|, |password| and initiated login.
44 const std::string& password) = 0;
75 // Returns bounds of password field in screen coordinates.
88 void SetPassword(const std::string& password);
H A Duser_controller.h42 const string16& password) = 0;
120 const std::string& password) OVERRIDE;
202 // Input controls which are used for username and password.
H A Dwizard_controller.h175 const std::string& password);
213 void Login(const std::string& username, const std::string& password);
H A Dlogin_display.h45 // Sign in using |username| and |password| specified.
48 const std::string& password) = 0;
H A Dviews_login_display.h53 virtual void Login(UserController* source, const string16& password) OVERRIDE;
/external/chromium/chrome/browser/ui/login/
H A Dlogin_prompt_gtk.cc51 const std::wstring& password) {
60 WideToUTF8(password).c_str());
50 OnAutofillDataAvailable(const std::wstring& username, const std::wstring& password) argument
/external/chromium/chrome/common/net/gaia/
H A Dgaia_auth_fetcher.h42 // needed to complete authentication, the user provided the right password.
56 const std::string& password,
155 const std::string& password,
/external/chromium/crypto/
H A Dsymmetric_key_mac.cc84 const std::string& password,
112 params.Passphrase = StringToData(password);
83 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
H A Dsymmetric_key_unittest.cc53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160));
70 const char* password; member in struct:PBKDF2TestVector
95 test_data.password, test_data.salt,
112 "password",
120 "password",
128 "password",
138 "password",
150 "password",
158 "password",
166 "password",
[all...]
/external/chromium/net/http/
H A Dhttp_auth_sspi_win.h142 // obtained using |*username| and |*password|. If |username| and |password|
146 const string16* password,
156 int OnFirstRound(const string16* username, const string16* password);
/external/chromium/third_party/libjingle/source/talk/p2p/client/
H A Dbasicportallocator.h174 std::string password; member in struct:cricket::PortConfiguration
189 const std::string& password,
/external/webkit/Source/JavaScriptCore/tests/mozilla/ecma_3/RegExp/
H A Dregress-85721.js80 str='<sql:connection id="conn1"> <sql:url>www.m.com</sql:url> <sql:driver>drive.class</sql:driver>\n<sql:userId>foo</sql:userId> <sql:password>goo</sql:password> </sql:connection>';
81 re = /<sql:connection id="([^\r\n]*?)">\s*<sql:url>\s*([^\r\n]*?)\s*<\/sql:url>\s*<sql:driver>\s*([^\r\n]*?)\s*<\/sql:driver>\s*(\s*<sql:userId>\s*([^\r\n]*?)\s*<\/sql:userId>\s*)?\s*(\s*<sql:password>\s*([^\r\n]*?)\s*<\/sql:password>\s*)?\s*<\/sql:connection>/;
82 expect = Array("<sql:connection id=\"conn1\"> <sql:url>www.m.com</sql:url> <sql:driver>drive.class</sql:driver>\n<sql:userId>foo</sql:userId> <sql:password>goo</sql:password> </sql:connection>","conn1","www.m.com","drive.class","<sql:userId>foo</sql:userId> ","foo","<sql:password>goo</sql:password> ","goo");
/external/webkit/Tools/DumpRenderTree/mac/
H A DResourceLoadDelegate.mm188 const char* password = gLayoutTestController->authenticationPassword().c_str();
189 NSString *nsPassword = [NSString stringWithFormat:@"%s", password ? password : ""];
194 [[challenge sender] useCredential:[NSURLCredential credentialWithUser:nsUser password:nsPassword persistence:NSURLCredentialPersistenceForSession]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_md5.c111 if (sm->user == NULL || sm->user->password == NULL ||
113 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
127 chap_md5(id, sm->user->password, sm->user->password_len,
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_md5.c106 if (sm->user == NULL || sm->user->password == NULL ||
108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
122 if (chap_md5(id, sm->user->password, sm->user->password_len,
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_md5.c106 if (sm->user == NULL || sm->user->password == NULL ||
108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
122 if (chap_md5(id, sm->user->password, sm->user->password_len,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_md5.c106 if (sm->user == NULL || sm->user->password == NULL ||
108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
122 if (chap_md5(id, sm->user->password, sm->user->password_len,
/external/chromium/chrome/browser/chromeos/cros/
H A Dcryptohome_library.cc149 bool TpmGetPassword(std::string* password) { argument
152 *password = password_buf;
292 // For testing password change.
375 bool TpmGetPassword(std::string* password) { argument
376 *password = "Stub-TPM-password";
/external/chromium/chrome/browser/password_manager/
H A Dpassword_store_mac_internal.h51 // Returns all keychain items of types corresponding to password forms.
54 // Creates a new keychain entry from |form|, or updates the password of an
59 // Removes the keychain password matching |form| if any. Returns true if a
102 // Changes the password for keychain_item to |password|; returns true if the
103 // password was successfully changed.
105 const std::string& password);
137 // becomes an issue, the password storage API will need to be refactored to
138 // allow the password to be retrieved later (accessing other fields doesn't
149 // Populates merged_forms by combining the password dat
[all...]
/external/chromium/chrome/browser/printing/cloud_print/
H A Dcloud_print_setup_flow.h101 const std::string& password,

Completed in 509 milliseconds

<<11121314151617181920>>