/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_wsc.c | 116 if (sm->user == NULL || sm->user->password == NULL) { 123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) " 127 cfg.pin = sm->user->password;
|
/external/chromium/googleurl/src/ |
H A D | url_canon_unittest.cc | 90 const char* password; member in struct:__anon2761::ReplaceCase 860 parsed.password, 879 parsed.password, 1318 SetupReplComp(&R::SetPassword, &R::ClearPassword, &r, cur.password); 1391 SetupReplComp(&R::SetPassword, &R::ClearPassword, &r, cur.password); 1431 SetupReplComp(&R::SetPassword, &R::ClearPassword, &r, cur.password); 1483 SetupReplComp(&R::SetPassword, &R::ClearPassword, &r, cur.password); 1771 a.password.begin == b.password.begin && a.password [all...] |
/external/zlib/src/contrib/minizip/ |
H A D | zip.c | 1060 const char* password, uLong crcForCrypting, 1071 if (password != NULL) 1122 if (password != NULL) 1244 if ((err==Z_OK) && (password != NULL)) 1250 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/ 1252 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting); 1270 const char* password, uLong crcForCrypting, 1278 password, crcForCrypting, versionMadeBy, flagBase, 0); 1286 const char* password, uLong crcForCrypting) 1293 password, crcForCryptin 1055 zipOpenNewFileInZip4_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase, int zip64) argument 1265 zipOpenNewFileInZip4(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase) argument 1281 zipOpenNewFileInZip3(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting) argument 1296 zipOpenNewFileInZip3_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, int zip64) argument [all...] |
H A D | unzip.c | 31 non-echoing password parts) were originally written in Europe. The 1473 int* level, int raw, const char* password) 1484 if (password != NULL) 1616 if (password != NULL) 1620 init_keys(password,s->keys,s->pcrc_32_tab); 1646 extern int ZEXPORT unzOpenCurrentFilePassword (unzFile file, const char* password) argument 1648 return unzOpenCurrentFile3(file, NULL, NULL, 0, password); 1472 unzOpenCurrentFile3(unzFile file, int* method, int* level, int raw, const char* password) argument
|
/external/chromium/chrome/browser/chromeos/cros/ |
H A D | network_library.h | 546 std::string password; member in struct:chromeos::CellularNetwork::Apn 550 const std::string& username, const std::string& password) 552 username(username), password(password) { 708 // Erase cached credentials, used when "Save password" is unchecked. 549 Apn(const std::string& apn, const std::string& network_id, const std::string& username, const std::string& password) argument
|
/external/chromium/chrome/browser/sync/engine/ |
H A D | syncer_util.cc | 340 } else if (specifics.HasExtension(sync_pb::password)) { 342 const sync_pb::PasswordSpecifics& password = local 343 specifics.GetExtension(sync_pb::password); 344 if (!cryptographer->CanDecrypt(password.encrypted())) {
|
/external/chromium/net/base/ |
H A D | net_util.h | 65 // If set, any username and password are removed. 127 // Extracts the unescaped username/password from |url|, saving the results 128 // into |*username| and |*password|. 131 string16* password); 371 // - user name / password
|
/external/chromium/net/http/ |
H A D | http_auth_gssapi_posix.h | 236 // obtained using |*username| and |*password|. If |username| and |password| 239 const string16* password,
|
/external/chromium/net/socket_stream/ |
H A D | socket_stream.h | 87 // is found in password database, or call Close() to close the connection. 138 const string16& password);
|
/external/chromium/net/url_request/ |
H A D | url_request_http_job.cc | 731 const string16& password) { 733 password_ = password; 764 // Ensure that we do not send username and password fields in the referrer. 948 const string16& password) { 959 RestartTransactionWithAuth(username, password); 729 RestartTransactionWithAuth( const string16& username, const string16& password) argument 947 SetAuth(const string16& username, const string16& password) argument
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | socketadapters.cc | 254 const CryptString& password) 256 user_(username), pass_(password), force_connect_(false), state_(PS_ERROR), 520 const CryptString& password) 522 user_(username), pass_(password) { 250 AsyncHttpsProxySocket(AsyncSocket* socket, const std::string& user_agent, const SocketAddress& proxy, const std::string& username, const CryptString& password) argument 517 AsyncSocksProxySocket(AsyncSocket* socket, const SocketAddress& proxy, const std::string& username, const CryptString& password) argument
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.security_1.0.200.v20100503.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/freetype/include/freetype/ |
H A D | t1tables.h | 152 FT_Long password; member in struct:PS_PrivateRec_
|
/external/openssh/ |
H A D | sshconnect.c | 1185 ssh_put_password(char *password) argument 1191 packet_put_cstring(password); 1194 size = roundup(strlen(password) + 1, 32); 1196 strlcpy(padded, password, size);
|
/external/openssl/apps/ |
H A D | apps.h | 221 const void *password; member in struct:pw_cb_data
|
H A D | genrsa.c | 230 BIO_printf(bio_err, "Error getting password\n"); 295 cb_data.password = passout;
|
/external/qemu/ |
H A D | vnc.h | 96 char *password; member in struct:VncDisplay
|
/external/webkit/Source/WebCore/html/ |
H A D | InputType.h | 270 const AtomicString& password();
|
/external/webkit/Source/WebCore/platform/network/cf/ |
H A D | ResourceHandleCFNet.cpp | 127 static String encodeBasicAuthorization(const String& user, const String& password) argument 129 return base64Encode((user + ":" + password).utf8()); 425 String authHeader = "Basic " + encodeBasicAuthorization(d->m_initialCredential.user(), d->m_initialCredential.password()); 579 Credential webCredential(credential.user(), credential.password(), CredentialPersistenceNone);
|
/external/webkit/Source/WebCore/xml/ |
H A D | XMLHttpRequest.h | 92 void open(const String& method, const KURL&, bool async, const String& user, const String& password, ExceptionCode&);
|
/external/webkit/Tools/DumpRenderTree/qt/ |
H A D | LayoutTestControllerQt.h | 248 void authenticateSession(const QString& url, const QString& username, const QString& password);
|
/external/webkit/Source/WebCore/platform/network/mac/ |
H A D | ResourceHandleMac.mm | 166 static String encodeBasicAuthorization(const String& user, const String& password) 168 return base64Encode((user + ":" + password).utf8()); 252 String authHeader = "Basic " + encodeBasicAuthorization(d->m_initialCredential.user(), d->m_initialCredential.password()); 612 password:d->m_pass 691 Credential webCredential(credential.user(), credential.password(), CredentialPersistenceForSession);
|
/external/wpa_supplicant_8/hostapd/ |
H A D | config_file.c | 209 /* Lines: "user" METHOD,METHOD2 "password" (password optional) */ 369 wpa_printf(MSG_ERROR, "Invalid EAP password " 375 user->password = os_malloc(pos - start); 376 if (user->password == NULL) { 378 "memory for EAP password"); 381 os_memcpy(user->password, start, pos - start); 392 wpa_printf(MSG_ERROR, "Invalid password hash " 396 user->password = os_malloc(16); 397 if (user->password [all...] |
/external/webkit/Source/WebKit/mac/Plugins/ |
H A D | WebBaseNetscapePluginView.mm | 999 CString& username, CString& password) 1037 password = [[credential password] UTF8String];
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | eula_view.cc | 120 explicit TpmInfoView(std::string* password) argument 122 password_(password) { 154 // Holds pointer to the password storage. 240 // password is cleared after EULA is accepted. 241 LOG(ERROR) << "TPM returned an empty password.";
|