Searched defs:password (Results 101 - 125 of 419) sorted by relevance

1234567891011>>

/external/smack/src/org/jivesoftware/smackx/bookmark/
H A DBookmarkManager.java102 * @param password the password to use for the user when joining the conference
107 String nickname, String password) throws XMPPException
111 = new BookmarkedConference(name, jid, isAutoJoin, nickname, password);
121 oldConference.setPassword(password);
106 addBookmarkedConference(String name, String jid, boolean isAutoJoin, String nickname, String password) argument
H A DBookmarkedConference.java34 private String password; field in class:BookmarkedConference
42 String password)
48 this.password = password;
102 * Returns the password to use when joining this conference room. This is an optional
105 * @return the password to use when joining this conference room, null may be returned.
108 return password;
111 protected void setPassword(String password) { argument
112 this.password = password;
41 BookmarkedConference(String name, String jid, boolean autoJoin, String nickname, String password) argument
[all...]
/external/smack/src/org/jivesoftware/smackx/packet/
H A DMUCInitialPresence.java31 * the occupant to speak the MUC protocol when joining a room. If the room requires a password
43 private String password; field in class:MUCInitialPresence
59 buf.append("<password>").append(getPassword()).append("</password>");
80 * Returns the password to use when the room requires a password.
82 * @return the password to use when the room requires a password.
85 return password;
100 * Sets the password t
104 setPassword(String password) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
H A Dmschapv2.c37 const u8 *password, size_t password_len,
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
65 password, password_len);
68 password, nt_response) ||
70 password, peer_challenge, auth_challenge,
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
96 if (hash_nt_password_hash(password, password_hash_has
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
H A Dmschapv2.c37 const u8 *password, size_t password_len,
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
65 password, password_len);
68 password, nt_response) ||
70 password, peer_challenge, auth_challenge,
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
96 if (hash_nt_password_hash(password, password_hash_has
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
H A Dmschapv2.c37 const u8 *password, size_t password_len,
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
65 password, password_len);
68 password, nt_response) ||
70 password, peer_challenge, auth_challenge,
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
96 if (hash_nt_password_hash(password, password_hash_has
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
[all...]
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
H A DMyKeyStore.java61 public Key engineGetKey(String alias, char[] password) argument
90 public void engineSetKeyEntry(String alias, Key key, char[] password, argument
176 public void engineStore(OutputStream stream, char[] password) argument
199 public void engineLoad(InputStream stream, char[] password) argument
/external/apache-http/src/org/apache/http/conn/ssl/
H A DSSLSocketFactory.java100 * For simplicity use the same password for the key as that of the keystore
256 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) argument
263 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/
H A DHttpAuthDatabase.java48 private static final String HTTPAUTH_PASSWORD_COL = "password";
163 * Sets the HTTP authentication password. Tuple (HTTPAUTH_HOST_COL, HTTPAUTH_REALM_COL,
166 * @param host the host for the password
167 * @param realm the realm for the password
168 * @param username the username for the password.
169 * @param password the password
172 String password) {
181 c.put(HTTPAUTH_PASSWORD_COL, password);
186 * Retrieves the HTTP authentication username and password fo
171 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument
[all...]
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/
H A DChromeHttpAuthHandler.java61 public void proceed(String username, String password) { argument
62 nativeSetAuth(mNativeChromeHttpAuthHandler, username, password);
114 public void onAutofillDataAvailable(String username, String password); argument
130 private void onAutofillDataAvailable(String username, String password) { argument
132 mAutofillPassword = password;
134 mAutofillObserver.onAutofillDataAvailable(username, password);
143 String username, String password);
142 nativeSetAuth(long nativeChromeHttpAuthHandler, String username, String password) argument
/external/chromium_org/chrome/browser/
H A Dcertificate_manager_model.cc160 const base::string16& password,
162 int result = cert_db_->ImportFromPKCS12(module, data, password,
158 ImportFromPKCS12(net::CryptoModule* module, const std::string& data, const base::string16& password, bool is_extractable) argument
/external/chromium_org/chrome/browser/chromeos/login/lock/
H A Dscreen_locker_tester.cc98 virtual void SetPassword(const std::string& password) OVERRIDE;
100 virtual void EnterPassword(const std::string& password) OVERRIDE;
121 void WebUIScreenLockerTester::SetPassword(const std::string& password) { argument
125 password.c_str())));
137 void WebUIScreenLockerTester::EnterPassword(const std::string& password) { argument
139 SetPassword(password);
141 // Verify password is set.
142 ASSERT_EQ(password, GetPassword());
/external/chromium_org/chrome/browser/chromeos/login/supervised/
H A Dsupervised_user_login_flow.cc101 // Edge case, when manager has signed in and already updated the password.
111 // Two cases now - we can currently have either old-style password, or new
112 // password.
115 std::string password; local
125 &password);
127 LOG(ERROR) << "Incomplete data for password change";
138 cryptohome::KeyDefinition key(password,
179 NOTREACHED() << "Unsupported password schema";
206 LOG(ERROR) << "Could not load data for password change";
217 LOG(ERROR) << "Authentication error during password chang
[all...]
/external/chromium_org/chrome/browser/chromeos/policy/
H A Duser_cloud_policy_manager_chromeos_browsertest.cc119 void LogIn(const std::string& user_id, const std::string& password) { argument
120 GetLoginDisplay()->ShowSigninScreenForCreds(user_id, password);
/external/chromium_org/chrome/browser/local_discovery/wifi/
H A Dmock_wifi_manager.cc59 const std::string& password) {
60 credentials_callback_.Run(success, ssid, password);
56 CallRequestNetworkCredentialsCallback( bool success, const std::string& ssid, const std::string& password) argument
/external/chromium_org/chrome/browser/net/
H A Dwebsocket_browsertest.cc118 const std::string& password,
121 password_(base::UTF8ToUTF16(password)),
276 "echo-with-no-extension", "wrong-user", "wrong-password"));
117 AutoLogin(const std::string& username, const std::string& password, content::NavigationController* navigation_controller) argument
/external/chromium_org/chrome/browser/password_manager/
H A Dpassword_manager_util_win.cc63 // Returns seconds since last password change.
81 // If we cannot determine when the password was last changed
82 // then assume the password is not blank
97 // Attempt to login using blank password.
105 // Win XP and later return ERROR_ACCOUNT_RESTRICTION for blank password.
109 // In the case the password is blank, then LogonUser returns a failure,
117 // Account for clock skew between pulling the password age and
121 // Save the blank password status for later.
136 // If we are on a domain, it is almost certain that the password is not
156 WCHAR password[CREDUI_MAX_PASSWORD_LENGT local
[all...]
/external/chromium_org/chrome/browser/profiles/
H A Dgaia_info_update_service.cc209 const std::string& password) {
206 GoogleSigninSucceeded( const std::string& account_id, const std::string& username, const std::string& password) argument
/external/chromium_org/chrome/browser/signin/
H A Dlocal_auth.cc35 const std::string& password,
42 // Library call to create secure password hash as SymmetricKey (uses PBKDF2).
46 password, salt,
63 // Encrypt the hash using the OS account-password protection (if available).
93 // Decrypt the record using the OS account-password protection (if available).
117 const std::string& password) {
122 DCHECK(password.length());
130 // Perform secure hash of password for storage.
132 salt_str, password, kHash1Encoding);
148 const std::string& password) {
34 CreateSecurePasswordHash(const std::string& salt, const std::string& password, char encoding) argument
116 SetLocalAuthCredentials(size_t info_index, const std::string& password) argument
147 SetLocalAuthCredentials(const Profile* profile, const std::string& password) argument
149 SetLocalAuthCredentials(GetProfileInfoIndexOfProfile(profile), password); local
152 ValidateLocalAuthCredentials(size_t info_index, const std::string& password) argument
195 ValidateLocalAuthCredentials(const Profile* profile, const std::string& password) argument
[all...]
/external/chromium_org/components/password_manager/content/browser/
H A Dcontent_password_manager_driver.cc58 const base::string16& password) {
63 password));
68 const base::string16& password) {
73 password));
56 FillSuggestion( const base::string16& username, const base::string16& password) argument
66 PreviewSuggestion( const base::string16& username, const base::string16& password) argument
/external/chromium_org/components/password_manager/core/browser/
H A Dpassword_autofill_manager.cc33 base::string16 password; local
35 GetPasswordForUsername(username, fill_data, &password)) {
37 driver->FillSuggestion(username, password);
47 base::string16 password; local
49 GetPasswordForUsername(username, fill_data, &password)) {
51 driver->PreviewSuggestion(username, password);
148 base::string16* password) {
149 // TODO(dubroy): When password access requires some kind of authentication
151 // fetch the actual password. See crbug.com/178358 for more context.
155 *password
145 GetPasswordForUsername( const base::string16& current_username, const autofill::PasswordFormFillData& fill_data, base::string16* password) argument
[all...]
H A Dpassword_generation_manager_unittest.cc140 // Enabling the PasswordManager and password sync should cause generation to
147 // Disabling password syncing should cause generation to be disabled.
171 autofill::FormFieldData password; local
172 password.label = ASCIIToUTF16("password");
173 password.name = ASCIIToUTF16("password");
174 password.form_control_type = "password";
175 login_form.fields.push_back(password);
[all...]

Completed in 342 milliseconds

1234567891011>>