Searched refs:password (Results 276 - 300 of 636) sorted by relevance

<<11121314151617181920>>

/external/chromium/chrome/browser/sync/util/
H A Dcryptographer.h26 std::string password; member in struct:browser_sync::KeyParams
/external/chromium/chrome/browser/ui/login/
H A Dlogin_prompt_win.cc39 const std::wstring& password) OVERRIDE {
108 // (password manager) is owned by the view's parent TabContents,
111 // be deleted before the password manager.
/external/chromium/net/http/
H A Dhttp_auth_controller.h64 const string16& password);
103 // username:password. Returns true if an identity was found.
107 // URLRequestHttpJob can prompt for a username/password.
135 // |identity_| holds the (username/password) that should be used by
147 // True if we've used the username/password embedded in the URL. This
H A Dhttp_auth_handler_mock.h90 const string16* password,
H A Dhttp_stream_factory_impl_request.h83 const string16& password);
/external/chromium/net/websockets/
H A Dwebsocket_job.h53 const string16& password);
/external/chromium/third_party/libjingle/source/talk/examples/call/
H A Dcall_main.cc226 DEFINE_bool(plainserver, false, "Turn off tls and allow plain password.");
278 // parse username and password, if present
285 pass.password() = argv[2];
304 if (pass.password().empty() && !test_server) {
307 std::cin >> pass.password();
323 pass.password() = jid.node();
/external/quake/quake/src/QW/client/
H A Dquakedef.h123 extern cvar_t password;
/external/webkit/Source/WebKit/android/WebCoreSupport/
H A DWebUrlLoaderClient.h73 void setAuth(const std::string& username, const std::string& password);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap.h37 u8 *password; member in struct:eap_user
39 int password_hash; /* whether password is hashed with
H A Deap_mschapv2.c378 sm->user->password,
383 sm->user->password,
399 pw_hash = sm->user->password;
401 nt_password_hash(sm->user->password,
484 if (sm->user == NULL || sm->user->password == NULL) {
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap.h29 u8 *password; member in struct:eap_user
31 int password_hash; /* whether password is hashed with
/external/wpa_supplicant_8/src/eap_server/
H A Deap.h29 u8 *password; member in struct:eap_user
31 int password_hash; /* whether password is hashed with
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap.h29 u8 *password; member in struct:eap_user
31 int password_hash; /* whether password is hashed with
/external/zlib/src/contrib/minizip/
H A Dminizip.c174 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \
260 const char* password=NULL; local
291 password=argv[i+1];
419 if ((password != NULL) && (err==ZIP_OK))
457 password,crcFile, zip64);
/external/apache-http/src/org/apache/http/conn/ssl/
H A DSSLSocketFactory.java100 * For simplicity use the same password for the key as that of the keystore
244 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) argument
251 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
/external/chromium/chrome/browser/
H A Dbrowser_signin.cc203 std::string password; local
208 !result->GetString("pass", &password) ||
215 username, password, captcha, access_code);
/external/chromium/chrome/browser/password_manager/
H A Dpassword_store_win.cc115 // Delete the entry. If it's good we will add it to the real saved password
119 std::wstring password; local
122 &username, &password)) {
128 autofill->password_value = password;
132 // Add this PasswordForm to the saved password table. We're on the DB thread
/external/chromium/chrome/browser/ui/gtk/
H A Dcrypto_module_password_dialog.cc64 void GotPassword(const char* password) { argument
65 if (password)
66 password_ = password;
/external/openssh/
H A Dauth-krb5.c72 auth_krb5_password(Authctxt *authctxt, const char *password) argument
111 ccache, password, 1, NULL);
132 authctxt->krb5_user, (char *)password, NULL, NULL, 0, NULL, NULL);
192 debug("Kerberos password authentication failed: %s",
195 debug("Kerberos password authentication failed: %d",
/external/openssh/contrib/cygwin/
H A Dssh-host-config422 local password
461 password="${csih_PRIVILEGED_PASSWORD}"
462 if [ -z "${password}" ]
464 csih_get_value "Please enter the password for user '${run_service_as}':" "-s"
465 password="${csih_value}"
470 # $password is empty, or $run_service_as is some privileged user and
471 # (hopefully) $password contains the correct password. So, from here
472 # out, we use '-z "${password}"' to discriminate the two cases.
480 if [ -z "${password}" ]
[all...]
/external/chromium/crypto/
H A Dnss_util.cc104 // If we get asked for a password for the TPM, then return the
105 // well known password we use, as long as the TPM slot has been
119 std::string password = delegate->RequestPassword(PK11_GetTokenName(slot), local
124 char* result = PORT_Strdup(password.c_str());
125 password.replace(0, password.size(), password.size(), 0);
128 DLOG(ERROR) << "PK11 password requested with NULL arg";
405 // If we haven't initialized the password for the NSS databases,
406 // initialize an empty-string password s
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_sake.c76 const u8 *identity, *password; local
79 password = eap_get_config_password(sm, &password_len);
80 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
102 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
104 password + EAP_SAKE_ROOT_SECRET_LEN,
H A Deap_ttls.c645 const u8 *identity, *password; local
652 password = eap_get_config_password2(sm, &password_len, &pwhash);
653 if (identity == NULL || password == NULL)
694 mschapv2_derive_response(identity, identity_len, password,
730 const u8 *identity, *password; local
737 password = eap_get_config_password2(sm, &password_len, &pwhash);
738 if (identity == NULL || password == NULL)
777 challenge_response(challenge, password, pos); /* NT-Response */
778 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash",
779 password, 1
820 const u8 *identity, *password; local
880 const u8 *identity, *password; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sake.c71 const u8 *identity, *password; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
99 password + EAP_SAKE_ROOT_SECRET_LEN,

Completed in 465 milliseconds

<<11121314151617181920>>