/external/chromium/chrome/browser/sync/util/ |
H A D | cryptographer.h | 26 std::string password; member in struct:browser_sync::KeyParams
|
/external/chromium/chrome/browser/ui/login/ |
H A D | login_prompt_win.cc | 39 const std::wstring& password) OVERRIDE { 108 // (password manager) is owned by the view's parent TabContents, 111 // be deleted before the password manager.
|
/external/chromium/net/http/ |
H A D | http_auth_controller.h | 64 const string16& password); 103 // username:password. Returns true if an identity was found. 107 // URLRequestHttpJob can prompt for a username/password. 135 // |identity_| holds the (username/password) that should be used by 147 // True if we've used the username/password embedded in the URL. This
|
H A D | http_auth_handler_mock.h | 90 const string16* password,
|
H A D | http_stream_factory_impl_request.h | 83 const string16& password);
|
/external/chromium/net/websockets/ |
H A D | websocket_job.h | 53 const string16& password);
|
/external/chromium/third_party/libjingle/source/talk/examples/call/ |
H A D | call_main.cc | 226 DEFINE_bool(plainserver, false, "Turn off tls and allow plain password."); 278 // parse username and password, if present 285 pass.password() = argv[2]; 304 if (pass.password().empty() && !test_server) { 307 std::cin >> pass.password(); 323 pass.password() = jid.node();
|
/external/quake/quake/src/QW/client/ |
H A D | quakedef.h | 123 extern cvar_t password;
|
/external/webkit/Source/WebKit/android/WebCoreSupport/ |
H A D | WebUrlLoaderClient.h | 73 void setAuth(const std::string& username, const std::string& password);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap.h | 37 u8 *password; member in struct:eap_user 39 int password_hash; /* whether password is hashed with
|
H A D | eap_mschapv2.c | 378 sm->user->password, 383 sm->user->password, 399 pw_hash = sm->user->password; 401 nt_password_hash(sm->user->password, 484 if (sm->user == NULL || sm->user->password == NULL) {
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap.h | 29 u8 *password; member in struct:eap_user 31 int password_hash; /* whether password is hashed with
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap.h | 29 u8 *password; member in struct:eap_user 31 int password_hash; /* whether password is hashed with
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap.h | 29 u8 *password; member in struct:eap_user 31 int password_hash; /* whether password is hashed with
|
/external/zlib/src/contrib/minizip/ |
H A D | minizip.c | 174 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \ 260 const char* password=NULL; local 291 password=argv[i+1]; 419 if ((password != NULL) && (err==ZIP_OK)) 457 password,crcFile, zip64);
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 100 * For simplicity use the same password for the key as that of the keystore 244 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) argument 251 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
|
/external/chromium/chrome/browser/ |
H A D | browser_signin.cc | 203 std::string password; local 208 !result->GetString("pass", &password) || 215 username, password, captcha, access_code);
|
/external/chromium/chrome/browser/password_manager/ |
H A D | password_store_win.cc | 115 // Delete the entry. If it's good we will add it to the real saved password 119 std::wstring password; local 122 &username, &password)) { 128 autofill->password_value = password; 132 // Add this PasswordForm to the saved password table. We're on the DB thread
|
/external/chromium/chrome/browser/ui/gtk/ |
H A D | crypto_module_password_dialog.cc | 64 void GotPassword(const char* password) { argument 65 if (password) 66 password_ = password;
|
/external/openssh/ |
H A D | auth-krb5.c | 72 auth_krb5_password(Authctxt *authctxt, const char *password) argument 111 ccache, password, 1, NULL); 132 authctxt->krb5_user, (char *)password, NULL, NULL, 0, NULL, NULL); 192 debug("Kerberos password authentication failed: %s", 195 debug("Kerberos password authentication failed: %d",
|
/external/openssh/contrib/cygwin/ |
H A D | ssh-host-config | 422 local password 461 password="${csih_PRIVILEGED_PASSWORD}" 462 if [ -z "${password}" ] 464 csih_get_value "Please enter the password for user '${run_service_as}':" "-s" 465 password="${csih_value}" 470 # $password is empty, or $run_service_as is some privileged user and 471 # (hopefully) $password contains the correct password. So, from here 472 # out, we use '-z "${password}"' to discriminate the two cases. 480 if [ -z "${password}" ] [all...] |
/external/chromium/crypto/ |
H A D | nss_util.cc | 104 // If we get asked for a password for the TPM, then return the 105 // well known password we use, as long as the TPM slot has been 119 std::string password = delegate->RequestPassword(PK11_GetTokenName(slot), local 124 char* result = PORT_Strdup(password.c_str()); 125 password.replace(0, password.size(), password.size(), 0); 128 DLOG(ERROR) << "PK11 password requested with NULL arg"; 405 // If we haven't initialized the password for the NSS databases, 406 // initialize an empty-string password s [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 76 const u8 *identity, *password; local 79 password = eap_get_config_password(sm, &password_len); 80 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 102 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 104 password + EAP_SAKE_ROOT_SECRET_LEN,
|
H A D | eap_ttls.c | 645 const u8 *identity, *password; local 652 password = eap_get_config_password2(sm, &password_len, &pwhash); 653 if (identity == NULL || password == NULL) 694 mschapv2_derive_response(identity, identity_len, password, 730 const u8 *identity, *password; local 737 password = eap_get_config_password2(sm, &password_len, &pwhash); 738 if (identity == NULL || password == NULL) 777 challenge_response(challenge, password, pos); /* NT-Response */ 778 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash", 779 password, 1 820 const u8 *identity, *password; local 880 const u8 *identity, *password; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_sake.c | 71 const u8 *identity, *password; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 99 password + EAP_SAKE_ROOT_SECRET_LEN,
|