/external/webkit/Tools/Scripts/webkitpy/common/checkout/ |
H A D | scm.py | 295 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None): 563 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None): 840 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None): 850 return self._commit_on_branch(message, 'HEAD', username=username, password=password) 858 return self._commit_on_branch(message, git_commit, username=username, password=password) 864 return self.push_local_commits_to_server(username=username, password=password) 866 def _commit_on_branch(self, message, git_commit, username=None, password [all...] |
/external/chromium/chrome/browser/sync/util/ |
H A D | user_settings.cc | 351 const string& password) { 352 // Save one-way hashed password: 359 md5.AddData(password.data(), password.size()); 391 const string& password) { 418 md5.AddData(password.data(), password.size()); 350 StoreHashedPassword(const string& email, const string& password) argument 390 VerifyAgainstStoredHash(const string& email, const string& password) argument
|
/external/openssh/ |
H A D | sshconnect1.c | 450 char *password; local 452 debug("Doing password authentication."); 458 password = read_passphrase(prompt, 0); 460 ssh_put_password(password); 461 memset(password, 0, strlen(password)); 462 xfree(password); 688 * needed (the user has no password). Otherwise the server responds 737 /* Try password authentication if the server supports it. */ 742 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStoreSpiTest.java | 165 public void engineLoad(InputStream stream, char[] password) { 167 assertNull(password);
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | enterprise_enrollment_view.cc | 147 const std::string& password, 150 controller_->Authenticate(user, password, captcha, access_code); 146 OnAuthSubmitted(const std::string& user, const std::string& password, const std::string& captcha, const std::string& access_code) argument
|
H A D | new_user_view.h | 29 // View that is used for new user login. It asks for username and password, 42 // User provided |username|, |password| and initiated login. 44 const std::string& password) = 0; 75 // Returns bounds of password field in screen coordinates. 88 void SetPassword(const std::string& password);
|
H A D | user_controller.h | 42 const string16& password) = 0; 120 const std::string& password) OVERRIDE; 202 // Input controls which are used for username and password.
|
H A D | wizard_controller.h | 175 const std::string& password); 213 void Login(const std::string& username, const std::string& password);
|
H A D | login_display.h | 45 // Sign in using |username| and |password| specified. 48 const std::string& password) = 0;
|
H A D | views_login_display.h | 53 virtual void Login(UserController* source, const string16& password) OVERRIDE;
|
/external/chromium/chrome/browser/ui/login/ |
H A D | login_prompt_gtk.cc | 51 const std::wstring& password) { 60 WideToUTF8(password).c_str()); 50 OnAutofillDataAvailable(const std::wstring& username, const std::wstring& password) argument
|
/external/chromium/chrome/common/net/gaia/ |
H A D | gaia_auth_fetcher.h | 42 // needed to complete authentication, the user provided the right password. 56 const std::string& password, 155 const std::string& password,
|
/external/chromium/crypto/ |
H A D | symmetric_key_mac.cc | 84 const std::string& password, 112 params.Passphrase = StringToData(password); 83 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
|
H A D | symmetric_key_unittest.cc | 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160)); 70 const char* password; member in struct:PBKDF2TestVector 95 test_data.password, test_data.salt, 112 "password", 120 "password", 128 "password", 138 "password", 150 "password", 158 "password", 166 "password", [all...] |
/external/chromium/net/http/ |
H A D | http_auth_sspi_win.h | 142 // obtained using |*username| and |*password|. If |username| and |password| 146 const string16* password, 156 int OnFirstRound(const string16* username, const string16* password);
|
/external/chromium/third_party/libjingle/source/talk/p2p/client/ |
H A D | basicportallocator.h | 174 std::string password; member in struct:cricket::PortConfiguration 189 const std::string& password,
|
/external/webkit/Source/JavaScriptCore/tests/mozilla/ecma_3/RegExp/ |
H A D | regress-85721.js | 80 str='<sql:connection id="conn1"> <sql:url>www.m.com</sql:url> <sql:driver>drive.class</sql:driver>\n<sql:userId>foo</sql:userId> <sql:password>goo</sql:password> </sql:connection>'; 81 re = /<sql:connection id="([^\r\n]*?)">\s*<sql:url>\s*([^\r\n]*?)\s*<\/sql:url>\s*<sql:driver>\s*([^\r\n]*?)\s*<\/sql:driver>\s*(\s*<sql:userId>\s*([^\r\n]*?)\s*<\/sql:userId>\s*)?\s*(\s*<sql:password>\s*([^\r\n]*?)\s*<\/sql:password>\s*)?\s*<\/sql:connection>/; 82 expect = Array("<sql:connection id=\"conn1\"> <sql:url>www.m.com</sql:url> <sql:driver>drive.class</sql:driver>\n<sql:userId>foo</sql:userId> <sql:password>goo</sql:password> </sql:connection>","conn1","www.m.com","drive.class","<sql:userId>foo</sql:userId> ","foo","<sql:password>goo</sql:password> ","goo");
|
/external/webkit/Tools/DumpRenderTree/mac/ |
H A D | ResourceLoadDelegate.mm | 188 const char* password = gLayoutTestController->authenticationPassword().c_str(); 189 NSString *nsPassword = [NSString stringWithFormat:@"%s", password ? password : ""]; 194 [[challenge sender] useCredential:[NSURLCredential credentialWithUser:nsUser password:nsPassword persistence:NSURLCredentialPersistenceForSession]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_md5.c | 111 if (sm->user == NULL || sm->user->password == NULL || 113 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " 127 chap_md5(id, sm->user->password, sm->user->password_len,
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_md5.c | 106 if (sm->user == NULL || sm->user->password == NULL || 108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " 122 if (chap_md5(id, sm->user->password, sm->user->password_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_md5.c | 106 if (sm->user == NULL || sm->user->password == NULL || 108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " 122 if (chap_md5(id, sm->user->password, sm->user->password_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_md5.c | 106 if (sm->user == NULL || sm->user->password == NULL || 108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " 122 if (chap_md5(id, sm->user->password, sm->user->password_len,
|
/external/chromium/chrome/browser/chromeos/cros/ |
H A D | cryptohome_library.cc | 149 bool TpmGetPassword(std::string* password) { argument 152 *password = password_buf; 292 // For testing password change. 375 bool TpmGetPassword(std::string* password) { argument 376 *password = "Stub-TPM-password";
|
/external/chromium/chrome/browser/password_manager/ |
H A D | password_store_mac_internal.h | 51 // Returns all keychain items of types corresponding to password forms. 54 // Creates a new keychain entry from |form|, or updates the password of an 59 // Removes the keychain password matching |form| if any. Returns true if a 102 // Changes the password for keychain_item to |password|; returns true if the 103 // password was successfully changed. 105 const std::string& password); 137 // becomes an issue, the password storage API will need to be refactored to 138 // allow the password to be retrieved later (accessing other fields doesn't 149 // Populates merged_forms by combining the password dat [all...] |
/external/chromium/chrome/browser/printing/cloud_print/ |
H A D | cloud_print_setup_flow.h | 101 const std::string& password,
|