Searched refs:password (Results 301 - 325 of 636) sorted by relevance

<<11121314151617181920>>

/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_mschapv2.c374 sm->user->password,
380 sm->user->password,
400 pw_hash = sm->user->password;
402 if (nt_password_hash(sm->user->password,
488 if (sm->user == NULL || sm->user->password == NULL) {
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sake.c71 const u8 *identity, *password; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
99 password + EAP_SAKE_ROOT_SECRET_LEN,
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_mschapv2.c374 sm->user->password,
380 sm->user->password,
400 pw_hash = sm->user->password;
402 if (nt_password_hash(sm->user->password,
488 if (sm->user == NULL || sm->user->password == NULL) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_sake.c71 const u8 *identity, *password; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
99 password + EAP_SAKE_ROOT_SECRET_LEN,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_mschapv2.c374 sm->user->password,
380 sm->user->password,
400 pw_hash = sm->user->password;
402 if (nt_password_hash(sm->user->password,
488 if (sm->user == NULL || sm->user->password == NULL) {
/external/chromium/googleurl/src/
H A Durl_parse_unittest.cc79 const char* password; member in struct:__anon2764::URLParseCase
199 // This case is a little weird. It will report that the password would
287 // ... "]" in the password field isn't allowed, but we tolerate it here...
340 EXPECT_TRUE(ComponentMatches(url, cases[i].password, parsed.password));
377 ExpectInvalidComponent(parsed.password);
431 EXPECT_TRUE(ComponentMatches(url, file_cases[i].password, parsed.password));
579 ExpectInvalidComponent(parsed.password);
H A Durl_canon_internal_file.h110 new_parsed->password = ParsedURL::Component(0, -1);
H A Durl_canon_mailtourl.cc50 new_parsed->password = url_parse::Component();
H A Durl_canon_pathurl.cc53 new_parsed->password.reset();
/external/chromium/net/socket_stream/
H A Dsocket_stream.cc203 const string16& username, const string16& password) {
215 // Update the username/password.
219 auth_identity_.password = password;
612 auth_identity_.password = entry->password();
627 &auth_identity_.password,
955 auth_identity_.password);
979 auth_identity_.password = entry->password();
202 RestartWithAuth( const string16& username, const string16& password) argument
[all...]
/external/webkit/Source/WebCore/platform/network/cf/
H A DSocketStreamHandleCFNet.cpp352 static bool getStoredCONNECTProxyCredentials(const ProtectionSpace& protectionSpace, String& login, String& password) argument
354 // Try system credential storage first, matching HTTP behavior (CFNetwork only asks the client for password if it couldn't find it in Keychain).
363 password = storedCredential.password();
400 String password; local
401 if (!m_sentStoredCredentials && getStoredCONNECTProxyCredentials(protectionSpace, login, password)) {
404 RetainPtr<CFStringRef> passwordCF(AdoptCF, password.createCFString());
/external/webkit/Source/WebCore/platform/network/mac/
H A DAuthenticationMac.mm270 password:coreCredential.password()
359 return Credential([macCredential user], [macCredential password], persistence);
/external/webkit/Source/WebKit/mac/Plugins/
H A Dnpapi.mm204 NPError NPN_GetAuthenticationInfo(NPP instance, const char* protocol, const char* host, int32_t port, const char* scheme, const char *realm, char** username, uint32_t* ulen, char** password, uint32_t* plen)
212 password:password passwordLength:plen];
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKeyStoreTest.java239 char[] password = new char[] {'a', 'b', 'c'};
240 KeyStore.PasswordProtection pp = new KeyStore.PasswordProtection(password);
241 assertNotSame(pp.getPassword(), password);
/external/chromium/chrome/browser/net/
H A Durl_fixer_upper_unittest.cc37 const url_parse::Component password; member in struct:segment_case
49 url_parse::Component(), // password
59 url_parse::Component(), // password
69 url_parse::Component(), // password
79 url_parse::Component(), // password
89 url_parse::Component(10, 7), // password
99 url_parse::Component(), // password
109 url_parse::Component(), // password
120 url_parse::Component(), // password
130 url_parse::Component(), // password
[all...]
/external/chromium/third_party/libjingle/source/talk/p2p/base/
H A Dport.h98 // authenticated with this username and password.
99 // Fills in the username fragment and password. These will be initially set
107 const std::string& password() const { return password_; } function in class:cricket::Port
108 void set_password(const std::string& password) { password_ = password; } argument
/external/webkit/Tools/DumpRenderTree/win/
H A DResourceLoadDelegate.cpp303 const char* password = gLayoutTestController->authenticationPassword().c_str(); local
305 printf("%S - didReceiveAuthenticationChallenge - Responding with %s:%s\n", descriptionSuitableForTestResult(identifier).c_str(), user, password);
310 credential->initWithUser(_bstr_t(user), _bstr_t(password), WebURLCredentialPersistenceForSession);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
H A DPKCS5S2ParametersGenerator.java106 F(password, salt, iterationCount, iBuf, out, (i - 1) * hLen);
113 * Generate a key parameter derived from the password, salt, and iteration
131 * the password, salt, and iteration count we are currently initialised
151 * Generate a key parameter for use with a MAC derived from the password,
/external/chromium/chrome/browser/chromeos/cros/
H A Dcryptohome_library.h122 // Returns whether device is being owned (Tpm password is generating).
125 // Returns Tpm password (if password was cleared empty one is returned).
126 // Return value is true if password was successfully acquired.
127 virtual bool TpmGetPassword(std::string* password) = 0;
132 // Clears Tpm password. Password should be cleared after it was generated and
149 // not the TPM password.
/external/chromium/chrome/browser/chromeos/login/
H A Donline_attempt.cc132 attempt_->password,
/external/chromium/chrome/browser/
H A Dkeychain_mock_mac.cc350 static char password[] = "my_password"; local
353 *passwordData = static_cast<void*>(password);
355 *passwordLength = strlen(password);
437 SetTestDataPasswordString(index, item_data.password);
/external/chromium/chrome/browser/sync/
H A Dprofile_sync_service_harness.cc91 const std::string& password,
99 password_(password),
119 const std::string& password) {
121 password_ = password;
88 ProfileSyncServiceHarness( Profile* profile, const std::string& username, const std::string& password, int id) argument
118 SetCredentials(const std::string& username, const std::string& password) argument
H A Dsync_setup_flow.h79 const std::string& password,
/external/chromium/chrome/browser/sync/protocol/
H A Dproto_value_conversions_unittest.cc147 SET_EXTENSION(password);
/external/chromium/chrome/common/net/gaia/
H A Dgaia_auth_fetcher.cc139 const std::string& password,
146 std::string encoded_password = UrlEncodeString(password);
254 const std::string& password,
268 password,
137 MakeClientLoginBody( const std::string& username, const std::string& password, const std::string& source, const char* service, const std::string& login_token, const std::string& login_captcha, HostedAccountsSetting allow_hosted_accounts) argument
252 StartClientLogin( const std::string& username, const std::string& password, const char* const service, const std::string& login_token, const std::string& login_captcha, HostedAccountsSetting allow_hosted_accounts) argument

Completed in 491 milliseconds

<<11121314151617181920>>