/external/chromium/chrome/browser/chromeos/login/ |
H A D | enterprise_enrollment_screen.cc | 40 const std::string& password, 50 auth_fetcher_->StartClientLogin(user, password, 39 Authenticate(const std::string& user, const std::string& password, const std::string& captcha, const std::string& access_code) argument
|
/external/chromium/chrome/browser/importer/ |
H A D | importer_unittest.cc | 219 // Importer should obtain this password form only. 353 // Sets up dummy password data. 453 std::wstring password; local 456 &password)); 458 EXPECT_EQ(L"abcdefghijkl", password); 461 &password)); 463 EXPECT_EQ(L"abcdefg", password); 498 const wchar_t* password; member in struct:PasswordList 593 EXPECT_EQ(WideToUTF16(p.password), form.password_value); 798 EXPECT_EQ(WideToUTF16(p.password), for [all...] |
/external/chromium/chrome/browser/printing/cloud_print/ |
H A D | cloud_print_setup_flow.cc | 234 const std::string& password, 251 authenticator_->StartClientLogin(user, password, 233 OnUserSubmittedAuth(const std::string& user, const std::string& password, const std::string& captcha, const std::string& access_code) argument
|
/external/chromium/chrome/browser/resources/picasaweb_uploader/js/ |
H A D | picasa_client.js | 159 * @param {string} password User password. 164 login: function(login, password, callback, opt_captcha) { 187 '&Passwd=' + password + '&service=lh2&source=ChromeOsPWAUploader';
|
H A D | upload_page.js | 50 this.passwordInput_ = document.getElementById('password-input'); 211 var password = this.passwordInput_.value; 214 this.client_.login(this.loginInput_.value, password,
|
/external/chromium/chrome/browser/sync/util/ |
H A D | cryptographer.cc | 14 // a username, and a password) by calling Permute on this string. Since the 114 params.password)) { 115 NOTREACHED(); // Invalid username or password. 153 params.password)) {
|
/external/chromium/chrome/common/ |
H A D | common_param_traits_unittest.cc | 44 EXPECT_EQ(input.password(), output.password());
|
/external/chromium/net/http/ |
H A D | http_cache_transaction.h | 106 const string16& password, 264 const string16& password);
|
H A D | http_stream_factory_impl_request.cc | 188 const string16& password) { 190 return bound_job_->RestartTunnelWithProxyAuth(username, password); 186 RestartTunnelWithProxyAuth( const string16& username, const string16& password) argument
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | socketadapters.h | 119 const std::string& username, const CryptString& password); 178 const std::string& username, const CryptString& password);
|
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
H A D | p2ptransport.cc | 183 if (candidate.password().size() > 0) 184 elem->SetAttr(QN_PASSWORD, candidate.password());
|
H A D | relayserver.h | 48 // All connections created with the same username/password are bound together. 200 const std::string& password, uint32 lifetime); 206 const std::string& password() { return password_; } function in class:cricket::RelayServerBinding
|
/external/chromium/third_party/libjingle/source/talk/p2p/client/ |
H A D | httpportallocator.cc | 215 std::string password = map["password"]; local 225 password,
|
/external/openssh/openbsd-compat/ |
H A D | port-aix.c | 174 sys_auth_passwd(Authctxt *ctxt, const char *password) argument 180 result = authenticate((char *)name, (char *)password, &reenter, 200 * Check if the user's password is expired. 210 case 0: /* password not expired */ 212 case 1: /* expired, password change required */ 327 * If we have setauthdb, retrieve the password registry for the user's
|
/external/openssl/crypto/des/ |
H A D | FILES0 | 25 rpw.c - Source for libdes.a testing password reading routines.
|
/external/ppp/pppd/ |
H A D | srp-entry.c | 186 (char *)pwval.pebuf.password.data, pwval.pebuf.password.len),
|
/external/webkit/Source/WebCore/bindings/js/ |
H A D | JSXMLHttpRequestCustom.cpp | 95 String password = valueToStringWithNullCheck(exec, exec->argument(4)); local 96 impl()->open(method, url, async, user, password, ec);
|
/external/webkit/Source/WebCore/plugins/ |
H A D | npapi.cpp | 191 NPError NPN_GetAuthenticationInfo(NPP instance, const char* protocol, const char* host, int32_t port, const char* scheme, const char* realm, char** username, uint32_t* ulen, char** password, uint32_t* plen) argument 193 return pluginViewForInstance(instance)->getAuthenticationInfo(protocol, host, port, scheme, realm, username, ulen, password, plen);
|
/external/webkit/Source/WebCore/xml/ |
H A D | XMLHttpRequest.idl | 70 [Custom] void open(in DOMString method, in DOMString url, in boolean async, in DOMString user, in DOMString password)
|
/external/webkit/Source/WebKit/mac/Plugins/ |
H A D | WebNetscapePluginView.h | 182 password:(char**)password passwordLength:(uint32_t*)passwordLength;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_gtc.c | 115 /* "RESPONSE=<user>\0<password>" */ 129 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 170 "EAP-GTC: Response password", 175 if (sm->user == NULL || sm->user->password == NULL || 177 wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not " 184 os_memcmp(pos, sm->user->password, rlen) != 0) {
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gtc.c | 109 /* "RESPONSE=<user>\0<password>" */ 123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 164 "EAP-GTC: Response password", 169 if (sm->user == NULL || sm->user->password == NULL || 171 wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not " 178 os_memcmp(pos, sm->user->password, rlen) != 0) {
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gtc.c | 109 /* "RESPONSE=<user>\0<password>" */ 123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 164 "EAP-GTC: Response password", 169 if (sm->user == NULL || sm->user->password == NULL || 171 wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not " 178 os_memcmp(pos, sm->user->password, rlen) != 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_gtc.c | 109 /* "RESPONSE=<user>\0<password>" */ 123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 164 "EAP-GTC: Response password", 169 if (sm->user == NULL || sm->user->password == NULL || 171 wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not " 178 os_memcmp(pos, sm->user->password, rlen) != 0) {
|
/external/zlib/src/contrib/minizip/ |
H A D | unzip.h | 338 const char* password)); 341 password is a crypting password 362 const char* password));
|