/external/smack/src/org/jivesoftware/smackx/bookmark/ |
H A D | BookmarkManager.java | 102 * @param password the password to use for the user when joining the conference 107 String nickname, String password) throws XMPPException 111 = new BookmarkedConference(name, jid, isAutoJoin, nickname, password); 121 oldConference.setPassword(password); 106 addBookmarkedConference(String name, String jid, boolean isAutoJoin, String nickname, String password) argument
|
H A D | BookmarkedConference.java | 34 private String password; field in class:BookmarkedConference 42 String password) 48 this.password = password; 102 * Returns the password to use when joining this conference room. This is an optional 105 * @return the password to use when joining this conference room, null may be returned. 108 return password; 111 protected void setPassword(String password) { argument 112 this.password = password; 41 BookmarkedConference(String name, String jid, boolean autoJoin, String nickname, String password) argument [all...] |
/external/smack/src/org/jivesoftware/smackx/packet/ |
H A D | MUCInitialPresence.java | 31 * the occupant to speak the MUC protocol when joining a room. If the room requires a password 43 private String password; field in class:MUCInitialPresence 59 buf.append("<password>").append(getPassword()).append("</password>"); 80 * Returns the password to use when the room requires a password. 82 * @return the password to use when the room requires a password. 85 return password; 100 * Sets the password t 104 setPassword(String password) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 65 password, password_len); 68 password, nt_response) || 70 password, peer_challenge, auth_challenge, 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 96 if (hash_nt_password_hash(password, password_hash_has 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 65 password, password_len); 68 password, nt_response) || 70 password, peer_challenge, auth_challenge, 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 96 if (hash_nt_password_hash(password, password_hash_has 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 65 password, password_len); 68 password, nt_response) || 70 password, peer_challenge, auth_challenge, 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 96 if (hash_nt_password_hash(password, password_hash_has 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | MyKeyStore.java | 61 public Key engineGetKey(String alias, char[] password) argument 90 public void engineSetKeyEntry(String alias, Key key, char[] password, argument 176 public void engineStore(OutputStream stream, char[] password) argument 199 public void engineLoad(InputStream stream, char[] password) argument
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 100 * For simplicity use the same password for the key as that of the keystore 256 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) argument 263 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
H A D | HttpAuthDatabase.java | 48 private static final String HTTPAUTH_PASSWORD_COL = "password"; 163 * Sets the HTTP authentication password. Tuple (HTTPAUTH_HOST_COL, HTTPAUTH_REALM_COL, 166 * @param host the host for the password 167 * @param realm the realm for the password 168 * @param username the username for the password. 169 * @param password the password 172 String password) { 181 c.put(HTTPAUTH_PASSWORD_COL, password); 186 * Retrieves the HTTP authentication username and password fo 171 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument [all...] |
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/ |
H A D | ChromeHttpAuthHandler.java | 61 public void proceed(String username, String password) { argument 62 nativeSetAuth(mNativeChromeHttpAuthHandler, username, password); 114 public void onAutofillDataAvailable(String username, String password); argument 130 private void onAutofillDataAvailable(String username, String password) { argument 132 mAutofillPassword = password; 134 mAutofillObserver.onAutofillDataAvailable(username, password); 143 String username, String password); 142 nativeSetAuth(long nativeChromeHttpAuthHandler, String username, String password) argument
|
/external/chromium_org/chrome/browser/ |
H A D | certificate_manager_model.cc | 160 const base::string16& password, 162 int result = cert_db_->ImportFromPKCS12(module, data, password, 158 ImportFromPKCS12(net::CryptoModule* module, const std::string& data, const base::string16& password, bool is_extractable) argument
|
/external/chromium_org/chrome/browser/chromeos/login/lock/ |
H A D | screen_locker_tester.cc | 98 virtual void SetPassword(const std::string& password) OVERRIDE; 100 virtual void EnterPassword(const std::string& password) OVERRIDE; 121 void WebUIScreenLockerTester::SetPassword(const std::string& password) { argument 125 password.c_str()))); 137 void WebUIScreenLockerTester::EnterPassword(const std::string& password) { argument 139 SetPassword(password); 141 // Verify password is set. 142 ASSERT_EQ(password, GetPassword());
|
/external/chromium_org/chrome/browser/chromeos/login/supervised/ |
H A D | supervised_user_login_flow.cc | 101 // Edge case, when manager has signed in and already updated the password. 111 // Two cases now - we can currently have either old-style password, or new 112 // password. 115 std::string password; local 125 &password); 127 LOG(ERROR) << "Incomplete data for password change"; 138 cryptohome::KeyDefinition key(password, 179 NOTREACHED() << "Unsupported password schema"; 206 LOG(ERROR) << "Could not load data for password change"; 217 LOG(ERROR) << "Authentication error during password chang [all...] |
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | user_cloud_policy_manager_chromeos_browsertest.cc | 119 void LogIn(const std::string& user_id, const std::string& password) { argument 120 GetLoginDisplay()->ShowSigninScreenForCreds(user_id, password);
|
/external/chromium_org/chrome/browser/local_discovery/wifi/ |
H A D | mock_wifi_manager.cc | 59 const std::string& password) { 60 credentials_callback_.Run(success, ssid, password); 56 CallRequestNetworkCredentialsCallback( bool success, const std::string& ssid, const std::string& password) argument
|
/external/chromium_org/chrome/browser/net/ |
H A D | websocket_browsertest.cc | 118 const std::string& password, 121 password_(base::UTF8ToUTF16(password)), 276 "echo-with-no-extension", "wrong-user", "wrong-password")); 117 AutoLogin(const std::string& username, const std::string& password, content::NavigationController* navigation_controller) argument
|
/external/chromium_org/chrome/browser/password_manager/ |
H A D | password_manager_util_win.cc | 63 // Returns seconds since last password change. 81 // If we cannot determine when the password was last changed 82 // then assume the password is not blank 97 // Attempt to login using blank password. 105 // Win XP and later return ERROR_ACCOUNT_RESTRICTION for blank password. 109 // In the case the password is blank, then LogonUser returns a failure, 117 // Account for clock skew between pulling the password age and 121 // Save the blank password status for later. 136 // If we are on a domain, it is almost certain that the password is not 156 WCHAR password[CREDUI_MAX_PASSWORD_LENGT local [all...] |
/external/chromium_org/chrome/browser/profiles/ |
H A D | gaia_info_update_service.cc | 209 const std::string& password) { 206 GoogleSigninSucceeded( const std::string& account_id, const std::string& username, const std::string& password) argument
|
/external/chromium_org/chrome/browser/signin/ |
H A D | local_auth.cc | 35 const std::string& password, 42 // Library call to create secure password hash as SymmetricKey (uses PBKDF2). 46 password, salt, 63 // Encrypt the hash using the OS account-password protection (if available). 93 // Decrypt the record using the OS account-password protection (if available). 117 const std::string& password) { 122 DCHECK(password.length()); 130 // Perform secure hash of password for storage. 132 salt_str, password, kHash1Encoding); 148 const std::string& password) { 34 CreateSecurePasswordHash(const std::string& salt, const std::string& password, char encoding) argument 116 SetLocalAuthCredentials(size_t info_index, const std::string& password) argument 147 SetLocalAuthCredentials(const Profile* profile, const std::string& password) argument 149 SetLocalAuthCredentials(GetProfileInfoIndexOfProfile(profile), password); local 152 ValidateLocalAuthCredentials(size_t info_index, const std::string& password) argument 195 ValidateLocalAuthCredentials(const Profile* profile, const std::string& password) argument [all...] |
/external/chromium_org/components/password_manager/content/browser/ |
H A D | content_password_manager_driver.cc | 58 const base::string16& password) { 63 password)); 68 const base::string16& password) { 73 password)); 56 FillSuggestion( const base::string16& username, const base::string16& password) argument 66 PreviewSuggestion( const base::string16& username, const base::string16& password) argument
|
/external/chromium_org/components/password_manager/core/browser/ |
H A D | password_autofill_manager.cc | 33 base::string16 password; local 35 GetPasswordForUsername(username, fill_data, &password)) { 37 driver->FillSuggestion(username, password); 47 base::string16 password; local 49 GetPasswordForUsername(username, fill_data, &password)) { 51 driver->PreviewSuggestion(username, password); 148 base::string16* password) { 149 // TODO(dubroy): When password access requires some kind of authentication 151 // fetch the actual password. See crbug.com/178358 for more context. 155 *password 145 GetPasswordForUsername( const base::string16& current_username, const autofill::PasswordFormFillData& fill_data, base::string16* password) argument [all...] |
H A D | password_generation_manager_unittest.cc | 140 // Enabling the PasswordManager and password sync should cause generation to 147 // Disabling password syncing should cause generation to be disabled. 171 autofill::FormFieldData password; local 172 password.label = ASCIIToUTF16("password"); 173 password.name = ASCIIToUTF16("password"); 174 password.form_control_type = "password"; 175 login_form.fields.push_back(password); [all...] |