Searched refs:password (Results 1 - 25 of 636) sorted by relevance

1234567891011>>

/external/clang/test/Analysis/
H A Ddefault-diagnostic-visitors.c8 int *password; // expected-note {{Variable 'password' declared without an initial value}} local
9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}}
10 err = *password;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
H A DPBEParametersGenerator.java10 protected byte[] password; field in class:PBEParametersGenerator
24 * @param password the password converted into bytes (see below).
25 * @param salt the salt to be mixed with the password.
30 byte[] password,
34 this.password = password;
40 * return the password byte array.
42 * @return the password byte array.
46 return password;
29 init( byte[] password, byte[] salt, int iterationCount) argument
103 PKCS5PasswordToBytes( char[] password) argument
123 PKCS5PasswordToUTF8Bytes( char[] password) argument
136 PKCS12PasswordToBytes( char[] password) argument
[all...]
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
H A DPBEKeySpecTest.java38 * PBEKeySpec(char[] password) method testing. Tests the behavior of
51 char[] password = new char[] {'1', '2', '3', '4', '5'};
52 PBEKeySpec pbeks = new PBEKeySpec(password);
53 password[0] ++;
54 assertFalse("The change of password specified in the constructor "
56 password[0] == pbeks.getPassword()[0]);
60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
66 char[] password = new char[] {'1', '2', '3', '4', '5'};
83 new PBEKeySpec(password, null, iterationCount, keyLength);
92 new PBEKeySpec(password, ne
[all...]
/external/nist-sip/java/gov/nist/javax/sip/address/
H A DUserInfo.java51 /** password field
53 protected String password; field in class:UserInfo
89 if (this.password != null && other.password == null)
92 if (other.password != null && this.password == null)
95 if (this.password == other.password)
98 return (this.password.equals(other.password));
[all...]
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/net/
H A DPasswordAuthenticationTest.java31 char[] password = new char[] { 'd', 'r', 'o', 'w', 's', 's', 'a', 'p' };
33 PasswordAuthentication pa = new PasswordAuthentication(name, password);
36 assertTrue("Password was not cloned", returnedPassword != password);
38 returnedPassword.length == password.length);
39 for (int counter = password.length - 1; counter >= 0; counter--)
41 returnedPassword[counter] == password[counter]);
/external/openssh/
H A Dauth2-passwd.c52 char *password, *newpass; local
58 password = packet_get_string(&len);
60 /* discard new password from packet */
68 logit("password change not supported");
70 /* no password authentication in android */
71 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
74 memset(password, 0, len);
75 xfree(password);
80 "password",
/external/wpa_supplicant_8/hostapd/
H A Dnt_password_hash.c2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
/external/chromium/chrome/browser/sync/glue/
H A Dpassword_model_associator.cc48 // We must not be holding a transaction when we interact with the password
55 LOG(ERROR) << "Could not get the password entries.";
66 LOG(ERROR) << "Server did not create the top-level password node. We "
80 const sync_pb::PasswordSpecificsData& password = local
82 DCHECK_EQ(tag, MakeTag(password));
86 if (MergePasswords(password, **ix, &new_password)) {
90 LOG(ERROR) << "Failed to edit password sync node.";
103 LOG(ERROR) << "Failed to create password sync node.";
124 const sync_pb::PasswordSpecificsData& password = local
126 std::string tag = MakeTag(password);
230 GetSyncIdFromChromeId( const std::string& password) argument
236 Associate( const std::string* password, int64 sync_id) argument
299 CopyPassword( const sync_pb::PasswordSpecificsData& password, webkit_glue::PasswordForm* new_password) argument
324 MergePasswords( const sync_pb::PasswordSpecificsData& password, const webkit_glue::PasswordForm& password_form, webkit_glue::PasswordForm* new_password) argument
364 sync_pb::PasswordSpecificsData password; local
382 MakeTag( const webkit_glue::PasswordForm& password) argument
392 MakeTag( const sync_pb::PasswordSpecificsData& password) argument
[all...]
/external/chromium/net/ftp/
H A Dftp_auth_cache.cc17 const string16& password)
20 password(password) {
38 const string16& password) {
45 entry->password = password;
47 entries_.push_front(Entry(origin, username, password));
56 const string16& password) {
59 it->password == password) {
15 Entry(const GURL& origin, const string16& username, const string16& password) argument
37 Add(const GURL& origin, const string16& username, const string16& password) argument
55 Remove(const GURL& origin, const string16& username, const string16& password) argument
[all...]
H A Dftp_auth_cache.h31 const string16& password);
36 string16 password; member in struct:net::FtpAuthCache::Entry
46 // |password|). If there is already an entry for |origin|, it will be
49 const string16& password);
52 // |username| and |password|.
54 const string16& password);
/external/webkit/Source/WebKit/chromium/src/
H A DWebPasswordFormData.cpp52 // Helper to determine which password is the main one, and which is
53 // an old password (e.g on a "make new password" form), if any.
55 HTMLInputElement** password,
59 ASSERT(password);
63 // Single password, easy.
64 *password = fields->passwords[0];
68 // Treat two identical passwords as a single password.
69 *password = fields->passwords[0];
71 // Assume first is old password, secon
54 locateSpecificPasswords(PasswordFormFields* fields, HTMLInputElement** password, HTMLInputElement** oldPassword) argument
112 assemblePasswordFormResult(const KURL& fullOrigin, const KURL& fullAction, HTMLFormControlElement* submit, HTMLInputElement* userName, HTMLInputElement* oldPassword, HTMLInputElement* password, WebPasswordFormData* result) argument
[all...]
/external/webkit/Tools/Scripts/webkitpy/common/net/
H A Dcredentials.py65 Git.read_git_config(self.git_prefix + "password"))
86 password = self._keychain_value_with_label("^password: ",
88 return [username, password]
93 "find-internet-password",
101 log("Reading Keychain for %s account and password. "
127 return (self._read_environ("username"), self._read_environ("password"))
129 def _offer_to_store_credentials_in_keyring(self, username, password):
132 if not User().confirm("Store password in system keyring?", User.DEFAULT_NO):
134 self._keyring.set_password(self.host, username, password)
[all...]
/external/webkit/Source/WebCore/platform/network/soup/
H A DSoupURIUtils.cpp28 // does not add the password to the URL when calling
37 if (!soupURI->password)
40 url.setPass(String::fromUTF8(soupURI->password));
/external/wpa_supplicant_6/wpa_supplicant/examples/
H A Dieee8021x.conf11 password="password"
/external/wpa_supplicant_8/wpa_supplicant/examples/
H A Dieee8021x.conf11 password="password"
/external/chromium/chrome/browser/resources/options/
H A Dpassword_manager_list.css7 button.password-button {
21 button.password-button:hover {
26 html[dir='ltr'] button.password-button {
30 html[dir='rtl'] button.password-button {
34 input[type="password"].inactive-password {
49 #saved-passwords-list .password {
54 #saved-passwords-list .password input[type="password"],
55 #saved-passwords-list .password inpu
[all...]
/external/dropbear/
H A Dsvr-authpasswd.c25 /* Validates a user password */
35 /* Process a password auth request, sending success or failure messages as
43 char * testcrypt = NULL; /* crypt generated from the user's password sent */
44 unsigned char * password; local
51 /* get the shadow password if possible */
63 /* check for empty password - need to do this again here
64 * since the shadow password may differ to that tested
67 dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected",
73 /* check if client wants to change password */
81 password
[all...]
/external/apache-http/src/org/apache/http/auth/
H A DUsernamePasswordCredentials.java38 * Username and password {@link Credentials}
51 private final String password; field in class:UsernamePasswordCredentials
54 * The constructor with the username and password combined string argument.
56 * @param usernamePassword the username:password formed string
62 throw new IllegalArgumentException("Username:password string may not be null");
67 this.password = usernamePassword.substring(atColon + 1);
70 this.password = null;
76 * The constructor with the username and password arguments.
79 * @param password the password
81 UsernamePasswordCredentials(String userName, String password) argument
[all...]
/external/openssh/openbsd-compat/
H A Dxcrypt.c61 xcrypt(const char *password, const char *salt) argument
67 crypted = md5_crypt(password, salt);
69 crypted = crypt(password, salt);
72 crypted = bigcrypt(password, salt);
74 crypted = crypt(password, salt);
76 crypted = bigcrypt(password, salt);
78 crypted = crypt(password, salt);
85 * Handle shadowed password systems in a cleaner way for portable
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_otp.c39 const u8 *pos, *password; local
51 password = eap_get_config_otp(sm, &password_len);
52 if (password)
55 password = eap_get_config_password(sm, &password_len);
59 if (password == NULL) {
76 wpabuf_put_data(resp, password, password_len);
78 password, password_len);
81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
H A Dmschapv2.c43 const u8 *password, size_t password_len,
70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
71 password, password_len);
74 password, nt_response);
76 password, peer_challenge, auth_challenge,
79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
80 password, password_len);
83 password, password_len, nt_response);
84 generate_authenticator_response(password, password_len,
96 hash_nt_password_hash(password, password_hash_has
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_otp.c33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
H A Dmschapv2.c37 const u8 *password, size_t password_len,
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
65 password, password_len);
68 password, nt_response) ||
70 password, peer_challenge, auth_challenge,
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
96 if (hash_nt_password_hash(password, password_hash_has
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_otp.c33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_otp.c33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");

Completed in 466 milliseconds

1234567891011>>