Searched defs:password (Results 1 - 25 of 541) sorted by relevance

1234567891011>>

/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/objc/public/
H A DRTCICEServer.h33 // The server URI, username, and password.
36 @property(nonatomic, copy, readonly) NSString* password; variable
38 // Initializer for RTCICEServer taking uri and password.
41 password:(NSString*)password;
/external/clang/test/Analysis/
H A Ddefault-diagnostic-visitors.c8 int *password; // expected-note {{'password' declared without an initial value}} local
9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}}
10 err = *password;
/external/chromium_org/components/autofill/core/browser/
H A Dpassword_generator_unittest.cc14 std::string password = pg1.Generate(); local
15 EXPECT_EQ(password.size(), 10u);
18 password = pg2.Generate();
19 EXPECT_EQ(password.size(), PasswordGenerator::kDefaultPasswordLength);
22 password = pg3.Generate();
23 EXPECT_EQ(password.size(), PasswordGenerator::kDefaultPasswordLength);
28 std::string password = pg.Generate(); local
33 for (size_t i = 0; i < password.size(); i++) {
34 if (isupper(password[i]))
36 else if (islower(password[
51 std::string password = pg.Generate(); local
[all...]
/external/chromium_org/tools/telemetry/telemetry/core/backends/chrome/chromeos_login_ext/
H A Dmain.js15 'password': ''
/external/dropbear/
H A Dsvr-authpasswd.c25 /* Validates a user password */
35 /* Process a password auth request, sending success or failure messages as
43 char * testcrypt = NULL; /* crypt generated from the user's password sent */
44 unsigned char * password; local
51 /* get the shadow password if possible */
63 /* check for empty password - need to do this again here
64 * since the shadow password may differ to that tested
67 dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected",
73 /* check if client wants to change password */
81 password
[all...]
/external/chromium/net/ftp/
H A Dftp_auth_cache.h31 const string16& password);
36 string16 password; member in struct:net::FtpAuthCache::Entry
46 // |password|). If there is already an entry for |origin|, it will be
49 const string16& password);
52 // |username| and |password|.
54 const string16& password);
/external/chromium_org/chrome/browser/sync/test/integration/
H A Dsingle_client_managed_user_settings_sync_test.cc49 // ProfileSyncServiceHarness sets the password, which can't be empty.
50 std::string password = "password"; local
51 GetClient(i)->SetCredentials(username, password);
/external/chromium_org/components/webdata/encryptor/
H A Die7_password_win.h20 // Encrypted data containing the username, password and some more undocumented
32 std::wstring password; member in struct:ie7_password::DecryptedCredentials
/external/lzma/CPP/7zip/UI/Console/
H A DOpenCallbackConsole.cpp29 HRESULT COpenCallbackConsole::Open_CryptoGetTextPassword(BSTR *password) argument
38 return StringToBstr(Password, password);
41 HRESULT COpenCallbackConsole::Open_GetPasswordIfAny(UString &password) argument
44 password = Password;
/external/openssh/
H A Dauth2-passwd.c52 char *password, *newpass; local
58 password = packet_get_string(&len);
60 /* discard new password from packet */
68 logit("password change not supported");
70 /* no password authentication in android */
71 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
74 memset(password, 0, len);
75 xfree(password);
80 "password",
/external/openssh/openbsd-compat/
H A Dxcrypt.c61 xcrypt(const char *password, const char *salt) argument
67 crypted = md5_crypt(password, salt);
69 crypted = crypt(password, salt);
72 crypted = bigcrypt(password, salt);
74 crypted = crypt(password, salt);
76 crypted = bigcrypt(password, salt);
78 crypted = crypt(password, salt);
85 * Handle shadowed password systems in a cleaner way for portable
/external/smack/src/org/jivesoftware/smack/
H A DUserAuthentication.java45 * @param cbh the CallbackHandler used to obtain authentication ID, password, or other
62 * @param password the password to send to the server.
67 String authenticate(String username, String password, String resource) throws argument
/external/wpa_supplicant_8/hostapd/
H A Dnt_password_hash.c2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/
H A DMyKeyManagerFactorySpi.java39 protected void engineInit(KeyStore ks, char[] password) argument
42 if (password == null) {
43 throw new KeyStoreException("Incorrect password");
/external/apache-http/src/org/apache/http/auth/
H A DUsernamePasswordCredentials.java38 * Username and password {@link Credentials}
51 private final String password; field in class:UsernamePasswordCredentials
54 * The constructor with the username and password combined string argument.
56 * @param usernamePassword the username:password formed string
62 throw new IllegalArgumentException("Username:password string may not be null");
67 this.password = usernamePassword.substring(atColon + 1);
70 this.password = null;
76 * The constructor with the username and password arguments.
79 * @param password the password
81 UsernamePasswordCredentials(String userName, String password) argument
[all...]
/external/apache-http/src/org/apache/http/impl/auth/
H A DNTLMEngine.java62 * @param password Password
71 String password,
69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
H A DOpenSSLPBEParametersGenerator.java36 * @param password password to use.
40 byte[] password,
43 super.init(password, salt, 1);
47 * the derived key function, the ith hash of the password and the salt.
58 digest.update(password, 0, password.length);
83 * Generate a key parameter derived from the password, salt, and iteration
102 * the password, salt, and iteration count we are currently initialised
123 * Generate a key parameter for use with a MAC derived from the password,
39 init( byte[] password, byte[] salt) argument
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/
H A DPKCS12StoreParameter.java15 public PKCS12StoreParameter(OutputStream out, char[] password) argument
17 this(out, password, false);
25 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding) argument
27 this(out, new KeyStore.PasswordProtection(password), forDEREncoding);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
H A DJDKPKCS12StoreParameter.java37 public void setPassword(char[] password) argument
39 this.protectionParameter = new KeyStore.PasswordProtection(password);
/external/chromium/chrome/browser/password_manager/
H A Dencryptor_linux.cc32 // Generates a newly allocated SymmetricKey object based a hard-coded password.
37 // password. We need to improve this password situation by moving a secure
38 // password into a system-level key store.
40 std::string password = "peanuts"; local
43 // Create an encryption key from our password and salt.
46 password,
74 // This currently "obfuscates" by encrypting with hard-coded password.
75 // We need to improve this password situation by moving a secure password
[all...]
/external/chromium/chrome/browser/printing/cloud_print/
H A Dcloud_print_setup_message_handler.cc30 std::string username, password, captcha, access_code; local
44 !result->GetString("pass", &password) ||
53 flow_->OnUserSubmittedAuth(username, password, captcha, access_code);
/external/chromium/chrome/browser/sync/
H A Dsignin_manager.h25 // A listener might use this to make note of a username / password
31 password(in_password) {}
33 std::string password; member in struct:GoogleServiceSigninSuccessDetails
58 const std::string& password,
/external/chromium/chrome/browser/sync/util/
H A Dcryptographer.h26 std::string password; member in struct:browser_sync::KeyParams
/external/chromium/crypto/
H A Dsymmetric_key_openssl.cc44 const std::string& password,
56 int rv = PKCS5_PBKDF2_HMAC_SHA1(password.data(), password.length(),
43 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
H A Dsymmetric_key_unittest.cc53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160));
70 const char* password; member in struct:PBKDF2TestVector
95 test_data.password, test_data.salt,
112 "password",
120 "password",
128 "password",
138 "password",
150 "password",
158 "password",
166 "password",
[all...]

Completed in 576 milliseconds

1234567891011>>