/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/objc/public/ |
H A D | RTCICEServer.h | 33 // The server URI, username, and password. 36 @property(nonatomic, copy, readonly) NSString* password; variable 38 // Initializer for RTCICEServer taking uri and password. 41 password:(NSString*)password;
|
/external/clang/test/Analysis/ |
H A D | default-diagnostic-visitors.c | 8 int *password; // expected-note {{'password' declared without an initial value}} local 9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}} 10 err = *password;
|
/external/chromium_org/components/autofill/core/browser/ |
H A D | password_generator_unittest.cc | 14 std::string password = pg1.Generate(); local 15 EXPECT_EQ(password.size(), 10u); 18 password = pg2.Generate(); 19 EXPECT_EQ(password.size(), PasswordGenerator::kDefaultPasswordLength); 22 password = pg3.Generate(); 23 EXPECT_EQ(password.size(), PasswordGenerator::kDefaultPasswordLength); 28 std::string password = pg.Generate(); local 33 for (size_t i = 0; i < password.size(); i++) { 34 if (isupper(password[i])) 36 else if (islower(password[ 51 std::string password = pg.Generate(); local [all...] |
/external/chromium_org/tools/telemetry/telemetry/core/backends/chrome/chromeos_login_ext/ |
H A D | main.js | 15 'password': ''
|
/external/dropbear/ |
H A D | svr-authpasswd.c | 25 /* Validates a user password */ 35 /* Process a password auth request, sending success or failure messages as 43 char * testcrypt = NULL; /* crypt generated from the user's password sent */ 44 unsigned char * password; local 51 /* get the shadow password if possible */ 63 /* check for empty password - need to do this again here 64 * since the shadow password may differ to that tested 67 dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected", 73 /* check if client wants to change password */ 81 password [all...] |
/external/chromium/net/ftp/ |
H A D | ftp_auth_cache.h | 31 const string16& password); 36 string16 password; member in struct:net::FtpAuthCache::Entry 46 // |password|). If there is already an entry for |origin|, it will be 49 const string16& password); 52 // |username| and |password|. 54 const string16& password);
|
/external/chromium_org/chrome/browser/sync/test/integration/ |
H A D | single_client_managed_user_settings_sync_test.cc | 49 // ProfileSyncServiceHarness sets the password, which can't be empty. 50 std::string password = "password"; local 51 GetClient(i)->SetCredentials(username, password);
|
/external/chromium_org/components/webdata/encryptor/ |
H A D | ie7_password_win.h | 20 // Encrypted data containing the username, password and some more undocumented 32 std::wstring password; member in struct:ie7_password::DecryptedCredentials
|
/external/lzma/CPP/7zip/UI/Console/ |
H A D | OpenCallbackConsole.cpp | 29 HRESULT COpenCallbackConsole::Open_CryptoGetTextPassword(BSTR *password)
argument 38 return StringToBstr(Password, password);
41 HRESULT COpenCallbackConsole::Open_GetPasswordIfAny(UString &password)
argument 44 password = Password;
|
/external/openssh/ |
H A D | auth2-passwd.c | 52 char *password, *newpass; local 58 password = packet_get_string(&len); 60 /* discard new password from packet */ 68 logit("password change not supported"); 70 /* no password authentication in android */ 71 else if (PRIVSEP(auth_password(authctxt, password)) == 1) 74 memset(password, 0, len); 75 xfree(password); 80 "password",
|
/external/openssh/openbsd-compat/ |
H A D | xcrypt.c | 61 xcrypt(const char *password, const char *salt) argument 67 crypted = md5_crypt(password, salt); 69 crypted = crypt(password, salt); 72 crypted = bigcrypt(password, salt); 74 crypted = crypt(password, salt); 76 crypted = bigcrypt(password, salt); 78 crypted = crypt(password, salt); 85 * Handle shadowed password systems in a cleaner way for portable
|
/external/smack/src/org/jivesoftware/smack/ |
H A D | UserAuthentication.java | 45 * @param cbh the CallbackHandler used to obtain authentication ID, password, or other
62 * @param password the password to send to the server.
67 String authenticate(String username, String password, String resource) throws
argument
|
/external/wpa_supplicant_8/hostapd/ |
H A D | nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/ |
H A D | MyKeyManagerFactorySpi.java | 39 protected void engineInit(KeyStore ks, char[] password) argument 42 if (password == null) { 43 throw new KeyStoreException("Incorrect password");
|
/external/apache-http/src/org/apache/http/auth/ |
H A D | UsernamePasswordCredentials.java | 38 * Username and password {@link Credentials} 51 private final String password; field in class:UsernamePasswordCredentials 54 * The constructor with the username and password combined string argument. 56 * @param usernamePassword the username:password formed string 62 throw new IllegalArgumentException("Username:password string may not be null"); 67 this.password = usernamePassword.substring(atColon + 1); 70 this.password = null; 76 * The constructor with the username and password arguments. 79 * @param password the password 81 UsernamePasswordCredentials(String userName, String password) argument [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMEngine.java | 62 * @param password Password 71 String password, 69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | OpenSSLPBEParametersGenerator.java | 36 * @param password password to use. 40 byte[] password, 43 super.init(password, salt, 1); 47 * the derived key function, the ith hash of the password and the salt. 58 digest.update(password, 0, password.length); 83 * Generate a key parameter derived from the password, salt, and iteration 102 * the password, salt, and iteration count we are currently initialised 123 * Generate a key parameter for use with a MAC derived from the password, 39 init( byte[] password, byte[] salt) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
H A D | PKCS12StoreParameter.java | 15 public PKCS12StoreParameter(OutputStream out, char[] password) argument 17 this(out, password, false); 25 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding) argument 27 this(out, new KeyStore.PasswordProtection(password), forDEREncoding);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | JDKPKCS12StoreParameter.java | 37 public void setPassword(char[] password) argument 39 this.protectionParameter = new KeyStore.PasswordProtection(password);
|
/external/chromium/chrome/browser/password_manager/ |
H A D | encryptor_linux.cc | 32 // Generates a newly allocated SymmetricKey object based a hard-coded password. 37 // password. We need to improve this password situation by moving a secure 38 // password into a system-level key store. 40 std::string password = "peanuts"; local 43 // Create an encryption key from our password and salt. 46 password, 74 // This currently "obfuscates" by encrypting with hard-coded password. 75 // We need to improve this password situation by moving a secure password [all...] |
/external/chromium/chrome/browser/printing/cloud_print/ |
H A D | cloud_print_setup_message_handler.cc | 30 std::string username, password, captcha, access_code; local 44 !result->GetString("pass", &password) || 53 flow_->OnUserSubmittedAuth(username, password, captcha, access_code);
|
/external/chromium/chrome/browser/sync/ |
H A D | signin_manager.h | 25 // A listener might use this to make note of a username / password 31 password(in_password) {} 33 std::string password; member in struct:GoogleServiceSigninSuccessDetails 58 const std::string& password,
|
/external/chromium/chrome/browser/sync/util/ |
H A D | cryptographer.h | 26 std::string password; member in struct:browser_sync::KeyParams
|
/external/chromium/crypto/ |
H A D | symmetric_key_openssl.cc | 44 const std::string& password, 56 int rv = PKCS5_PBKDF2_HMAC_SHA1(password.data(), password.length(), 43 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
|
H A D | symmetric_key_unittest.cc | 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160)); 70 const char* password; member in struct:PBKDF2TestVector 95 test_data.password, test_data.salt, 112 "password", 120 "password", 128 "password", 138 "password", 150 "password", 158 "password", 166 "password", [all...] |