/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_mschapv2.c | 374 sm->user->password, 380 sm->user->password, 400 pw_hash = sm->user->password; 402 if (nt_password_hash(sm->user->password, 488 if (sm->user == NULL || sm->user->password == NULL) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_sake.c | 71 const u8 *identity, *password; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 99 password + EAP_SAKE_ROOT_SECRET_LEN,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_mschapv2.c | 374 sm->user->password, 380 sm->user->password, 400 pw_hash = sm->user->password; 402 if (nt_password_hash(sm->user->password, 488 if (sm->user == NULL || sm->user->password == NULL) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 71 const u8 *identity, *password; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 99 password + EAP_SAKE_ROOT_SECRET_LEN,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_mschapv2.c | 374 sm->user->password, 380 sm->user->password, 400 pw_hash = sm->user->password; 402 if (nt_password_hash(sm->user->password, 488 if (sm->user == NULL || sm->user->password == NULL) {
|
/external/chromium/googleurl/src/ |
H A D | url_parse_unittest.cc | 79 const char* password; member in struct:__anon2764::URLParseCase 199 // This case is a little weird. It will report that the password would 287 // ... "]" in the password field isn't allowed, but we tolerate it here... 340 EXPECT_TRUE(ComponentMatches(url, cases[i].password, parsed.password)); 377 ExpectInvalidComponent(parsed.password); 431 EXPECT_TRUE(ComponentMatches(url, file_cases[i].password, parsed.password)); 579 ExpectInvalidComponent(parsed.password);
|
H A D | url_canon_internal_file.h | 110 new_parsed->password = ParsedURL::Component(0, -1);
|
H A D | url_canon_mailtourl.cc | 50 new_parsed->password = url_parse::Component();
|
H A D | url_canon_pathurl.cc | 53 new_parsed->password.reset();
|
/external/chromium/net/socket_stream/ |
H A D | socket_stream.cc | 203 const string16& username, const string16& password) { 215 // Update the username/password. 219 auth_identity_.password = password; 612 auth_identity_.password = entry->password(); 627 &auth_identity_.password, 955 auth_identity_.password); 979 auth_identity_.password = entry->password(); 202 RestartWithAuth( const string16& username, const string16& password) argument [all...] |
/external/webkit/Source/WebCore/platform/network/cf/ |
H A D | SocketStreamHandleCFNet.cpp | 352 static bool getStoredCONNECTProxyCredentials(const ProtectionSpace& protectionSpace, String& login, String& password) argument 354 // Try system credential storage first, matching HTTP behavior (CFNetwork only asks the client for password if it couldn't find it in Keychain). 363 password = storedCredential.password(); 400 String password; local 401 if (!m_sentStoredCredentials && getStoredCONNECTProxyCredentials(protectionSpace, login, password)) { 404 RetainPtr<CFStringRef> passwordCF(AdoptCF, password.createCFString());
|
/external/webkit/Source/WebCore/platform/network/mac/ |
H A D | AuthenticationMac.mm | 270 password:coreCredential.password() 359 return Credential([macCredential user], [macCredential password], persistence);
|
/external/webkit/Source/WebKit/mac/Plugins/ |
H A D | npapi.mm | 204 NPError NPN_GetAuthenticationInfo(NPP instance, const char* protocol, const char* host, int32_t port, const char* scheme, const char *realm, char** username, uint32_t* ulen, char** password, uint32_t* plen) 212 password:password passwordLength:plen];
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStoreTest.java | 239 char[] password = new char[] {'a', 'b', 'c'}; 240 KeyStore.PasswordProtection pp = new KeyStore.PasswordProtection(password); 241 assertNotSame(pp.getPassword(), password);
|
/external/chromium/chrome/browser/net/ |
H A D | url_fixer_upper_unittest.cc | 37 const url_parse::Component password; member in struct:segment_case 49 url_parse::Component(), // password 59 url_parse::Component(), // password 69 url_parse::Component(), // password 79 url_parse::Component(), // password 89 url_parse::Component(10, 7), // password 99 url_parse::Component(), // password 109 url_parse::Component(), // password 120 url_parse::Component(), // password 130 url_parse::Component(), // password [all...] |
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
H A D | port.h | 98 // authenticated with this username and password. 99 // Fills in the username fragment and password. These will be initially set 107 const std::string& password() const { return password_; } function in class:cricket::Port 108 void set_password(const std::string& password) { password_ = password; } argument
|
/external/webkit/Tools/DumpRenderTree/win/ |
H A D | ResourceLoadDelegate.cpp | 303 const char* password = gLayoutTestController->authenticationPassword().c_str(); local 305 printf("%S - didReceiveAuthenticationChallenge - Responding with %s:%s\n", descriptionSuitableForTestResult(identifier).c_str(), user, password); 310 credential->initWithUser(_bstr_t(user), _bstr_t(password), WebURLCredentialPersistenceForSession);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | PKCS5S2ParametersGenerator.java | 106 F(password, salt, iterationCount, iBuf, out, (i - 1) * hLen); 113 * Generate a key parameter derived from the password, salt, and iteration 131 * the password, salt, and iteration count we are currently initialised 151 * Generate a key parameter for use with a MAC derived from the password,
|
/external/chromium/chrome/browser/chromeos/cros/ |
H A D | cryptohome_library.h | 122 // Returns whether device is being owned (Tpm password is generating). 125 // Returns Tpm password (if password was cleared empty one is returned). 126 // Return value is true if password was successfully acquired. 127 virtual bool TpmGetPassword(std::string* password) = 0; 132 // Clears Tpm password. Password should be cleared after it was generated and 149 // not the TPM password.
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | online_attempt.cc | 132 attempt_->password,
|
/external/chromium/chrome/browser/ |
H A D | keychain_mock_mac.cc | 350 static char password[] = "my_password"; local 353 *passwordData = static_cast<void*>(password); 355 *passwordLength = strlen(password); 437 SetTestDataPasswordString(index, item_data.password);
|
/external/chromium/chrome/browser/sync/ |
H A D | profile_sync_service_harness.cc | 91 const std::string& password, 99 password_(password), 119 const std::string& password) { 121 password_ = password; 88 ProfileSyncServiceHarness( Profile* profile, const std::string& username, const std::string& password, int id) argument 118 SetCredentials(const std::string& username, const std::string& password) argument
|
H A D | sync_setup_flow.h | 79 const std::string& password,
|
/external/chromium/chrome/browser/sync/protocol/ |
H A D | proto_value_conversions_unittest.cc | 147 SET_EXTENSION(password);
|
/external/chromium/chrome/common/net/gaia/ |
H A D | gaia_auth_fetcher.cc | 139 const std::string& password, 146 std::string encoded_password = UrlEncodeString(password); 254 const std::string& password, 268 password, 137 MakeClientLoginBody( const std::string& username, const std::string& password, const std::string& source, const char* service, const std::string& login_token, const std::string& login_captcha, HostedAccountsSetting allow_hosted_accounts) argument 252 StartClientLogin( const std::string& username, const std::string& password, const char* const service, const std::string& login_token, const std::string& login_captcha, HostedAccountsSetting allow_hosted_accounts) argument
|