/external/chromium/chrome/browser/sync/glue/ |
H A D | password_model_associator.cc | 84 webkit_glue::PasswordForm new_password; local 86 if (MergePasswords(password, **ix, &new_password)) { 93 WriteToSyncNode(new_password, &write_node); 94 updated_passwords.push_back(new_password); 131 webkit_glue::PasswordForm new_password; local 133 CopyPassword(password, &new_password); 135 new_passwords.push_back(new_password); 301 webkit_glue::PasswordForm* new_password) { 302 new_password->scheme = 304 new_password 299 CopyPassword( const sync_pb::PasswordSpecificsData& password, webkit_glue::PasswordForm* new_password) argument 324 MergePasswords( const sync_pb::PasswordSpecificsData& password, const webkit_glue::PasswordForm& password_form, webkit_glue::PasswordForm* new_password) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_config.h | 600 * new_password - New password for password update 606 u8 *new_password; member in struct:eap_peer_config 609 * new_password_len - Length of new_password field
|
H A D | eap_mschapv2.c | 301 if (config && config->new_password) { 313 nt_password_hash(config->new_password, 317 os_free(config->new_password); 319 config->password = config->new_password; 322 config->new_password = NULL; 476 if (config->new_password == NULL) { 504 const u8 *username, *password, *new_password; local 513 new_password = eap_get_config_new_password(sm, &new_password_len); 514 if (username == NULL || password == NULL || new_password == NULL) 539 new_password, new_password_le [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_config.h | 600 * new_password - New password for password update 606 u8 *new_password; member in struct:eap_peer_config 609 * new_password_len - Length of new_password field
|
H A D | eap_mschapv2.c | 301 if (config && config->new_password) { 313 nt_password_hash(config->new_password, 317 os_free(config->new_password); 319 config->password = config->new_password; 322 config->new_password = NULL; 476 if (config->new_password == NULL) { 504 const u8 *username, *password, *new_password; local 513 new_password = eap_get_config_new_password(sm, &new_password_len); 514 if (username == NULL || password == NULL || new_password == NULL) 539 new_password, new_password_le [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 600 * new_password - New password for password update 606 u8 *new_password; member in struct:eap_peer_config 609 * new_password_len - Length of new_password field
|
H A D | eap_mschapv2.c | 301 if (config && config->new_password) { 313 nt_password_hash(config->new_password, 317 os_free(config->new_password); 319 config->password = config->new_password; 322 config->new_password = NULL; 476 if (config->new_password == NULL) { 504 const u8 *username, *password, *new_password; local 513 new_password = eap_get_config_new_password(sm, &new_password_len); 514 if (username == NULL || password == NULL || new_password == NULL) 539 new_password, new_password_le [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 463 * @new_password: 0-to-256-unicode-char NewPassword (IN; UTF-8) 464 * @new_password_len: Length of new_password 471 const u8 *new_password, size_t new_password_len, 479 if (encrypt_pw_block_with_password_hash(new_password, new_password_len, 503 * @new_password: 0-to-256-unicode-char NewPassword (IN; UTF-8) 504 * @new_password_len: Length of new_password 511 const u8 *new_password, size_t new_password_len, 519 nt_password_hash(new_password, new_password_len, 470 new_password_encrypted_with_old_nt_password_hash( const u8 *new_password, size_t new_password_len, const u8 *old_password, size_t old_password_len, u8 *encrypted_pw_block) argument 510 old_nt_password_hash_encrypted_with_new_nt_password_hash( const u8 *new_password, size_t new_password_len, const u8 *old_password, size_t old_password_len, u8 *encrypted_password_hash) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 463 * @new_password: 0-to-256-unicode-char NewPassword (IN; UTF-8) 464 * @new_password_len: Length of new_password 471 const u8 *new_password, size_t new_password_len, 479 if (encrypt_pw_block_with_password_hash(new_password, new_password_len, 503 * @new_password: 0-to-256-unicode-char NewPassword (IN; UTF-8) 504 * @new_password_len: Length of new_password 511 const u8 *new_password, size_t new_password_len, 519 nt_password_hash(new_password, new_password_len, 470 new_password_encrypted_with_old_nt_password_hash( const u8 *new_password, size_t new_password_len, const u8 *old_password, size_t old_password_len, u8 *encrypted_pw_block) argument 510 old_nt_password_hash_encrypted_with_new_nt_password_hash( const u8 *new_password, size_t new_password_len, const u8 *old_password, size_t old_password_len, u8 *encrypted_password_hash) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 463 * @new_password: 0-to-256-unicode-char NewPassword (IN; UTF-8) 464 * @new_password_len: Length of new_password 471 const u8 *new_password, size_t new_password_len, 479 if (encrypt_pw_block_with_password_hash(new_password, new_password_len, 503 * @new_password: 0-to-256-unicode-char NewPassword (IN; UTF-8) 504 * @new_password_len: Length of new_password 511 const u8 *new_password, size_t new_password_len, 519 nt_password_hash(new_password, new_password_len, 470 new_password_encrypted_with_old_nt_password_hash( const u8 *new_password, size_t new_password_len, const u8 *old_password, size_t old_password_len, u8 *encrypted_pw_block) argument 510 old_nt_password_hash_encrypted_with_new_nt_password_hash( const u8 *new_password, size_t new_password_len, const u8 *old_password, size_t old_password_len, u8 *encrypted_password_hash) argument
|
/external/chromium/chrome/browser/automation/ |
H A D | testing_automation_provider.cc | 3408 webkit_glue::PasswordForm new_password = local 3421 password_store->AddLogin(new_password);
|