Searched refs:password (Results 351 - 375 of 636) sorted by relevance

<<11121314151617181920>>

/external/chromium/chrome/browser/chromeos/login/
H A Denterprise_enrollment_screen.cc40 const std::string& password,
50 auth_fetcher_->StartClientLogin(user, password,
39 Authenticate(const std::string& user, const std::string& password, const std::string& captcha, const std::string& access_code) argument
/external/chromium/chrome/browser/importer/
H A Dimporter_unittest.cc219 // Importer should obtain this password form only.
353 // Sets up dummy password data.
453 std::wstring password; local
456 &password));
458 EXPECT_EQ(L"abcdefghijkl", password);
461 &password));
463 EXPECT_EQ(L"abcdefg", password);
498 const wchar_t* password; member in struct:PasswordList
593 EXPECT_EQ(WideToUTF16(p.password), form.password_value);
798 EXPECT_EQ(WideToUTF16(p.password), for
[all...]
/external/chromium/chrome/browser/printing/cloud_print/
H A Dcloud_print_setup_flow.cc234 const std::string& password,
251 authenticator_->StartClientLogin(user, password,
233 OnUserSubmittedAuth(const std::string& user, const std::string& password, const std::string& captcha, const std::string& access_code) argument
/external/chromium/chrome/browser/resources/picasaweb_uploader/js/
H A Dpicasa_client.js159 * @param {string} password User password.
164 login: function(login, password, callback, opt_captcha) {
187 '&Passwd=' + password + '&service=lh2&source=ChromeOsPWAUploader';
H A Dupload_page.js50 this.passwordInput_ = document.getElementById('password-input');
211 var password = this.passwordInput_.value;
214 this.client_.login(this.loginInput_.value, password,
/external/chromium/chrome/browser/sync/util/
H A Dcryptographer.cc14 // a username, and a password) by calling Permute on this string. Since the
114 params.password)) {
115 NOTREACHED(); // Invalid username or password.
153 params.password)) {
/external/chromium/chrome/common/
H A Dcommon_param_traits_unittest.cc44 EXPECT_EQ(input.password(), output.password());
/external/chromium/net/http/
H A Dhttp_cache_transaction.h106 const string16& password,
264 const string16& password);
H A Dhttp_stream_factory_impl_request.cc188 const string16& password) {
190 return bound_job_->RestartTunnelWithProxyAuth(username, password);
186 RestartTunnelWithProxyAuth( const string16& username, const string16& password) argument
/external/chromium/third_party/libjingle/source/talk/base/
H A Dsocketadapters.h119 const std::string& username, const CryptString& password);
178 const std::string& username, const CryptString& password);
/external/chromium/third_party/libjingle/source/talk/p2p/base/
H A Dp2ptransport.cc183 if (candidate.password().size() > 0)
184 elem->SetAttr(QN_PASSWORD, candidate.password());
H A Drelayserver.h48 // All connections created with the same username/password are bound together.
200 const std::string& password, uint32 lifetime);
206 const std::string& password() { return password_; } function in class:cricket::RelayServerBinding
/external/chromium/third_party/libjingle/source/talk/p2p/client/
H A Dhttpportallocator.cc215 std::string password = map["password"]; local
225 password,
/external/openssh/openbsd-compat/
H A Dport-aix.c174 sys_auth_passwd(Authctxt *ctxt, const char *password) argument
180 result = authenticate((char *)name, (char *)password, &reenter,
200 * Check if the user's password is expired.
210 case 0: /* password not expired */
212 case 1: /* expired, password change required */
327 * If we have setauthdb, retrieve the password registry for the user's
/external/openssl/crypto/des/
H A DFILES025 rpw.c - Source for libdes.a testing password reading routines.
/external/ppp/pppd/
H A Dsrp-entry.c186 (char *)pwval.pebuf.password.data, pwval.pebuf.password.len),
/external/webkit/Source/WebCore/bindings/js/
H A DJSXMLHttpRequestCustom.cpp95 String password = valueToStringWithNullCheck(exec, exec->argument(4)); local
96 impl()->open(method, url, async, user, password, ec);
/external/webkit/Source/WebCore/plugins/
H A Dnpapi.cpp191 NPError NPN_GetAuthenticationInfo(NPP instance, const char* protocol, const char* host, int32_t port, const char* scheme, const char* realm, char** username, uint32_t* ulen, char** password, uint32_t* plen) argument
193 return pluginViewForInstance(instance)->getAuthenticationInfo(protocol, host, port, scheme, realm, username, ulen, password, plen);
/external/webkit/Source/WebCore/xml/
H A DXMLHttpRequest.idl70 [Custom] void open(in DOMString method, in DOMString url, in boolean async, in DOMString user, in DOMString password)
/external/webkit/Source/WebKit/mac/Plugins/
H A DWebNetscapePluginView.h182 password:(char**)password passwordLength:(uint32_t*)passwordLength;
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_gtc.c115 /* "RESPONSE=<user>\0<password>" */
129 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
170 "EAP-GTC: Response password",
175 if (sm->user == NULL || sm->user->password == NULL ||
177 wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not "
184 os_memcmp(pos, sm->user->password, rlen) != 0) {
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_gtc.c109 /* "RESPONSE=<user>\0<password>" */
123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
164 "EAP-GTC: Response password",
169 if (sm->user == NULL || sm->user->password == NULL ||
171 wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not "
178 os_memcmp(pos, sm->user->password, rlen) != 0) {
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_gtc.c109 /* "RESPONSE=<user>\0<password>" */
123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
164 "EAP-GTC: Response password",
169 if (sm->user == NULL || sm->user->password == NULL ||
171 wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not "
178 os_memcmp(pos, sm->user->password, rlen) != 0) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_gtc.c109 /* "RESPONSE=<user>\0<password>" */
123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
164 "EAP-GTC: Response password",
169 if (sm->user == NULL || sm->user->password == NULL ||
171 wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not "
178 os_memcmp(pos, sm->user->password, rlen) != 0) {
/external/zlib/src/contrib/minizip/
H A Dunzip.h338 const char* password));
341 password is a crypting password
362 const char* password));

Completed in 517 milliseconds

<<11121314151617181920>>