Searched refs:password (Results 476 - 500 of 636) sorted by relevance

<<11121314151617181920>>

/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_wsc.c116 if (sm->user == NULL || sm->user->password == NULL) {
123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) "
127 cfg.pin = sm->user->password;
/external/chromium/googleurl/src/
H A Durl_canon_unittest.cc90 const char* password; member in struct:__anon2761::ReplaceCase
860 parsed.password,
879 parsed.password,
1318 SetupReplComp(&R::SetPassword, &R::ClearPassword, &r, cur.password);
1391 SetupReplComp(&R::SetPassword, &R::ClearPassword, &r, cur.password);
1431 SetupReplComp(&R::SetPassword, &R::ClearPassword, &r, cur.password);
1483 SetupReplComp(&R::SetPassword, &R::ClearPassword, &r, cur.password);
1771 a.password.begin == b.password.begin && a.password
[all...]
/external/zlib/src/contrib/minizip/
H A Dzip.c1060 const char* password, uLong crcForCrypting,
1071 if (password != NULL)
1122 if (password != NULL)
1244 if ((err==Z_OK) && (password != NULL))
1250 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/
1252 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
1270 const char* password, uLong crcForCrypting,
1278 password, crcForCrypting, versionMadeBy, flagBase, 0);
1286 const char* password, uLong crcForCrypting)
1293 password, crcForCryptin
1055 zipOpenNewFileInZip4_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase, int zip64) argument
1265 zipOpenNewFileInZip4(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase) argument
1281 zipOpenNewFileInZip3(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting) argument
1296 zipOpenNewFileInZip3_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, int zip64) argument
[all...]
H A Dunzip.c31 non-echoing password parts) were originally written in Europe. The
1473 int* level, int raw, const char* password)
1484 if (password != NULL)
1616 if (password != NULL)
1620 init_keys(password,s->keys,s->pcrc_32_tab);
1646 extern int ZEXPORT unzOpenCurrentFilePassword (unzFile file, const char* password) argument
1648 return unzOpenCurrentFile3(file, NULL, NULL, 0, password);
1472 unzOpenCurrentFile3(unzFile file, int* method, int* level, int raw, const char* password) argument
/external/chromium/chrome/browser/chromeos/cros/
H A Dnetwork_library.h546 std::string password; member in struct:chromeos::CellularNetwork::Apn
550 const std::string& username, const std::string& password)
552 username(username), password(password) {
708 // Erase cached credentials, used when "Save password" is unchecked.
549 Apn(const std::string& apn, const std::string& network_id, const std::string& username, const std::string& password) argument
/external/chromium/chrome/browser/sync/engine/
H A Dsyncer_util.cc340 } else if (specifics.HasExtension(sync_pb::password)) {
342 const sync_pb::PasswordSpecifics& password = local
343 specifics.GetExtension(sync_pb::password);
344 if (!cryptographer->CanDecrypt(password.encrypted())) {
/external/chromium/net/base/
H A Dnet_util.h65 // If set, any username and password are removed.
127 // Extracts the unescaped username/password from |url|, saving the results
128 // into |*username| and |*password|.
131 string16* password);
371 // - user name / password
/external/chromium/net/http/
H A Dhttp_auth_gssapi_posix.h236 // obtained using |*username| and |*password|. If |username| and |password|
239 const string16* password,
/external/chromium/net/socket_stream/
H A Dsocket_stream.h87 // is found in password database, or call Close() to close the connection.
138 const string16& password);
/external/chromium/net/url_request/
H A Durl_request_http_job.cc731 const string16& password) {
733 password_ = password;
764 // Ensure that we do not send username and password fields in the referrer.
948 const string16& password) {
959 RestartTransactionWithAuth(username, password);
729 RestartTransactionWithAuth( const string16& username, const string16& password) argument
947 SetAuth(const string16& username, const string16& password) argument
/external/chromium/third_party/libjingle/source/talk/base/
H A Dsocketadapters.cc254 const CryptString& password)
256 user_(username), pass_(password), force_connect_(false), state_(PS_ERROR),
520 const CryptString& password)
522 user_(username), pass_(password) {
250 AsyncHttpsProxySocket(AsyncSocket* socket, const std::string& user_agent, const SocketAddress& proxy, const std::string& username, const CryptString& password) argument
517 AsyncSocksProxySocket(AsyncSocket* socket, const SocketAddress& proxy, const std::string& username, const CryptString& password) argument
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.equinox.security_1.0.200.v20100503.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
/external/freetype/include/freetype/
H A Dt1tables.h152 FT_Long password; member in struct:PS_PrivateRec_
/external/openssh/
H A Dsshconnect.c1185 ssh_put_password(char *password) argument
1191 packet_put_cstring(password);
1194 size = roundup(strlen(password) + 1, 32);
1196 strlcpy(padded, password, size);
/external/openssl/apps/
H A Dapps.h221 const void *password; member in struct:pw_cb_data
H A Dgenrsa.c230 BIO_printf(bio_err, "Error getting password\n");
295 cb_data.password = passout;
/external/qemu/
H A Dvnc.h96 char *password; member in struct:VncDisplay
/external/webkit/Source/WebCore/html/
H A DInputType.h270 const AtomicString& password();
/external/webkit/Source/WebCore/platform/network/cf/
H A DResourceHandleCFNet.cpp127 static String encodeBasicAuthorization(const String& user, const String& password) argument
129 return base64Encode((user + ":" + password).utf8());
425 String authHeader = "Basic " + encodeBasicAuthorization(d->m_initialCredential.user(), d->m_initialCredential.password());
579 Credential webCredential(credential.user(), credential.password(), CredentialPersistenceNone);
/external/webkit/Source/WebCore/xml/
H A DXMLHttpRequest.h92 void open(const String& method, const KURL&, bool async, const String& user, const String& password, ExceptionCode&);
/external/webkit/Tools/DumpRenderTree/qt/
H A DLayoutTestControllerQt.h248 void authenticateSession(const QString& url, const QString& username, const QString& password);
/external/webkit/Source/WebCore/platform/network/mac/
H A DResourceHandleMac.mm166 static String encodeBasicAuthorization(const String& user, const String& password)
168 return base64Encode((user + ":" + password).utf8());
252 String authHeader = "Basic " + encodeBasicAuthorization(d->m_initialCredential.user(), d->m_initialCredential.password());
612 password:d->m_pass
691 Credential webCredential(credential.user(), credential.password(), CredentialPersistenceForSession);
/external/wpa_supplicant_8/hostapd/
H A Dconfig_file.c209 /* Lines: "user" METHOD,METHOD2 "password" (password optional) */
369 wpa_printf(MSG_ERROR, "Invalid EAP password "
375 user->password = os_malloc(pos - start);
376 if (user->password == NULL) {
378 "memory for EAP password");
381 os_memcpy(user->password, start, pos - start);
392 wpa_printf(MSG_ERROR, "Invalid password hash "
396 user->password = os_malloc(16);
397 if (user->password
[all...]
/external/webkit/Source/WebKit/mac/Plugins/
H A DWebBaseNetscapePluginView.mm999 CString& username, CString& password)
1037 password = [[credential password] UTF8String];
/external/chromium/chrome/browser/chromeos/login/
H A Deula_view.cc120 explicit TpmInfoView(std::string* password) argument
122 password_(password) {
154 // Holds pointer to the password storage.
240 // password is cleared after EULA is accepted.
241 LOG(ERROR) << "TPM returned an empty password.";

Completed in 464 milliseconds

<<11121314151617181920>>