/external/chromium_org/third_party/skia/platform_tools/android/bin/ |
H A D | http_download.py | 8 This module supports username and password with basic authentication. 29 def HttpDownload(url, target, username=None, password=None, verbose=True, 37 password: Optional password for download (ignored if no username). 46 if password: 47 auth_code = base64.b64encode(username + ':' + password)
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | autodetectproxy.h | 45 const CryptString& password) { 48 proxy_.password = password; 44 set_auth_info(bool use_auth, const std::string& username, const CryptString& password) argument
|
H A D | cryptstring.h | 74 // Used for constructing strings where a password is involved and we 96 void Append(const CryptString * password) { argument 97 size_t len = password->GetLength(); 99 password->CopyTo(storage_ + length_, true); 158 std::string& password() { return password_; } function in class:rtc::InsecureCryptStringImpl 159 const std::string& password() const { return password_; } function in class:rtc::InsecureCryptStringImpl 170 copy->password() = password_;
|
/external/skia/platform_tools/android/bin/ |
H A D | http_download.py | 8 This module supports username and password with basic authentication. 29 def HttpDownload(url, target, username=None, password=None, verbose=True, 37 password: Optional password for download (ignored if no username). 46 if password: 47 auth_code = base64.b64encode(username + ':' + password)
|
/external/chromium_org/android_webview/javatests/src/org/chromium/android_webview/test/ |
H A D | HttpAuthDatabaseTest.java | 40 String password = "password"; 45 instance.setHttpAuthUsernamePassword(host, realm, userName, password); 49 assertEquals(password, result[1]); 65 instance.setHttpAuthUsernamePassword(host, realm, null, password); 69 assertEquals(password, result[1]);
|
/external/chromium_org/chrome/browser/ui/webui/chromeos/login/ |
H A D | gaia_screen_handler.h | 35 // True if password was changed for the current user. 95 const std::string& password, 98 const std::string& password, 109 const std::string& password, 115 const std::string& password, 121 // Mark user as having password changed: 134 const std::string& password);
|
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/java/src/org/webrtc/ |
H A D | PeerConnection.java | 94 public final String password; field in class:PeerConnection.IceServer 101 public IceServer(String uri, String username, String password) { argument 104 this.password = password; 108 return uri + "[" + username + ":" + password + "]";
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 9 # NOTE! This file may contain password information and should probably be made 20 # wpa_cli or wpa_gui, or a password is changed). This is required for 225 # NFC password token for WPS 226 # These parameters can be used to configure a fixed NFC password token for the 229 # that includes the matching NFC password token (e.g., written based on the 264 #ext_password_backend=test:pw1=password|pw2=testing 397 # password: Password for Interworking network selection 529 # password="password" 542 # password [all...] |
/external/smack/src/org/jivesoftware/smack/ |
H A D | ServerTrustManager.java | 273 private final String password; field in class:ServerTrustManager.KeyStoreOptions 275 public KeyStoreOptions(String type, String path, String password) { argument 279 this.password = password; 291 return password; 298 result = prime * result + ((password == null) ? 0 : password.hashCode()); 313 if (password == null) { 314 if (other.password != null) 316 } else if (!password [all...] |
/external/chromium_org/chrome/browser/chromeos/login/lock/ |
H A D | screen_locker_tester.cc | 98 virtual void SetPassword(const std::string& password) OVERRIDE; 100 virtual void EnterPassword(const std::string& password) OVERRIDE; 121 void WebUIScreenLockerTester::SetPassword(const std::string& password) { argument 125 password.c_str()))); 137 void WebUIScreenLockerTester::EnterPassword(const std::string& password) { argument 139 SetPassword(password); 141 // Verify password is set. 142 ASSERT_EQ(password, GetPassword());
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 74 if (identity == NULL || password == NULL) 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 188 const u8 *pos, *password; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 197 if (password == NULL) 231 if (hash_nt_password_hash(password, pw_hash_hash)) { 236 if (nt_password_hash(password, password_le 276 const u8 *password; local 334 const u8 *addr[5], *password; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 74 if (identity == NULL || password == NULL) 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 188 const u8 *pos, *password; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 197 if (password == NULL) 231 if (hash_nt_password_hash(password, pw_hash_hash)) { 236 if (nt_password_hash(password, password_le 276 const u8 *password; local 334 const u8 *addr[5], *password; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 74 if (identity == NULL || password == NULL) 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 188 const u8 *pos, *password; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 197 if (password == NULL) 231 if (hash_nt_password_hash(password, pw_hash_hash)) { 236 if (nt_password_hash(password, password_le 276 const u8 *password; local 334 const u8 *addr[5], *password; local [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | stunport.h | 53 const std::string& password) { 55 username, password); 69 const std::string& password) { 72 username, password); 121 const std::string& username, const std::string& password); 125 const std::string& username, const std::string& password); 219 const std::string& password, 223 username, password, servers); 241 const std::string& username, const std::string& password, 244 password) { 48 Create(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, rtc::AsyncPacketSocket* socket, const std::string& username, const std::string& password) argument 63 Create(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, const rtc::IPAddress& ip, int min_port, int max_port, const std::string& username, const std::string& password) argument 212 Create( rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, const rtc::IPAddress& ip, int min_port, int max_port, const std::string& username, const std::string& password, const ServerAddresses& servers) argument 238 StunPort(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, const rtc::IPAddress& ip, int min_port, int max_port, const std::string& username, const std::string& password, const ServerAddresses& servers) argument [all...] |
/external/chromium_org/chrome/browser/password_manager/ |
H A D | password_manager_util_win.cc | 63 // Returns seconds since last password change. 81 // If we cannot determine when the password was last changed 82 // then assume the password is not blank 97 // Attempt to login using blank password. 105 // Win XP and later return ERROR_ACCOUNT_RESTRICTION for blank password. 109 // In the case the password is blank, then LogonUser returns a failure, 117 // Account for clock skew between pulling the password age and 121 // Save the blank password status for later. 136 // If we are on a domain, it is almost certain that the password is not 156 WCHAR password[CREDUI_MAX_PASSWORD_LENGT local [all...] |
/external/chromium_org/chrome/browser/ui/login/ |
H A D | login_prompt.h | 61 void SetAuth(const base::string16& username, const base::string16& password); 104 const base::string16& password); 115 const base::string16& password); 138 // when later notifying the password manager if the credentials were accepted 143 // Points to the password manager owned by the WebContents requesting auth. 183 const base::string16& password) 186 password_(password) {} 188 const base::string16& password() const { return password_; } function in class:AuthSuppliedLoginNotificationDetails 194 // The password that was used for the authentication. 200 // Prompts the user for their username and password 181 AuthSuppliedLoginNotificationDetails(LoginHandler* handler, const base::string16& username, const base::string16& password) argument [all...] |
/external/chromium_org/components/password_manager/core/browser/ |
H A D | password_generation_manager_unittest.cc | 140 // Enabling the PasswordManager and password sync should cause generation to 147 // Disabling password syncing should cause generation to be disabled. 171 autofill::FormFieldData password; local 172 password.label = ASCIIToUTF16("password"); 173 password.name = ASCIIToUTF16("password"); 174 password.form_control_type = "password"; 175 login_form.fields.push_back(password); [all...] |
/external/lzma/CPP/7zip/UI/Console/ |
H A D | UpdateCallbackConsole.cpp | 197 HRESULT CUpdateCallbackConsole::CryptoGetTextPassword2(Int32 *passwordIsDefined, BSTR *password)
argument 199 *password = NULL;
217 return StringToBstr(Password, password);
222 HRESULT CUpdateCallbackConsole::CryptoGetTextPassword(BSTR *password)
argument 224 *password = NULL;
239 return StringToBstr(Password, password);
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
H A D | SslContextBuilder.java | 82 char[] password = "password".toCharArray(); 89 KeyStore keyStore = newEmptyKeyStore(password); 91 keyStore.setKeyEntry("private", keyPair.getPrivate(), password, certificateChain); 97 keyManagerFactory.init(keyStore, password); 132 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { argument 136 keyStore.load(in, password);
|
/external/apache-harmony/sql/src/test/java/org/apache/harmony/sql/tests/java/sql/ |
H A D | TestHelper_Driver4.java | 72 static String passwordProperty = "password"; 82 * Check for user and password, except for datasource = 83 * data1 which is set up not to require a user/password 93 String password = (String) info.get(passwordProperty); 94 if (user == null || password == null) { 96 "Userid and/or password not supplied"); 99 || !password.equals(validpassword)) { 101 "Userid and/or password not valid");
|
/external/chromium_org/chrome/browser/ui/ |
H A D | crypto_module_delegate_nss.cc | 83 void ChromeNSSCryptoModuleDelegate::GotPassword(const std::string& password) { argument 84 if (!password.empty()) 85 password_ = password;
|
/external/chromium_org/crypto/ |
H A D | ec_private_key_nss.cc | 109 const std::string& password, 117 password, 128 const std::string& password, 133 password, 144 const std::string& password, 193 reinterpret_cast<unsigned char*>(const_cast<char*>(password.data())), 194 static_cast<unsigned>(password.size()) 234 const std::string& password, 243 reinterpret_cast<unsigned char*>(const_cast<char*>(password.data())), 244 static_cast<unsigned>(password 108 CreateFromEncryptedPrivateKeyInfo( const std::string& password, const std::vector<uint8>& encrypted_private_key_info, const std::vector<uint8>& subject_public_key_info) argument 126 CreateSensitiveFromEncryptedPrivateKeyInfo( PK11SlotInfo* slot, const std::string& password, const std::vector<uint8>& encrypted_private_key_info, const std::vector<uint8>& subject_public_key_info) argument 142 ImportFromEncryptedPrivateKeyInfo( PK11SlotInfo* slot, const std::string& password, const uint8* encrypted_private_key_info, size_t encrypted_private_key_info_len, CERTSubjectPublicKeyInfo* decoded_spki, bool permanent, bool sensitive, SECKEYPrivateKey** key, SECKEYPublicKey** public_key) argument 233 ExportEncryptedPrivateKey( const std::string& password, int iterations, std::vector<uint8>* output) argument 363 CreateFromEncryptedPrivateKeyInfoWithParams( PK11SlotInfo* slot, const std::string& password, const std::vector<uint8>& encrypted_private_key_info, const std::vector<uint8>& subject_public_key_info, bool permanent, bool sensitive) argument [all...] |
H A D | symmetric_key_openssl.cc | 51 const std::string& password, 75 int rv = PKCS5_PBKDF2_HMAC_SHA1(password.data(), password.length(), 50 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | KeyManagerFactoryImpl.java | 43 //password 47 * @see KeyManagerFactorySpi#engineInit(KeyStore ks, char[] password) 50 protected void engineInit(KeyStore ks, char[] password) argument 55 if (password != null) { 56 pwd = password.clone();
|
/external/lzma/CPP/7zip/UI/Common/ |
H A D | ArchiveOpenCallback.h | 23 virtual HRESULT Open_CryptoGetTextPassword(BSTR *password) x; \
24 virtual HRESULT Open_GetPasswordIfAny(UString &password) x; \
68 STDMETHOD(CryptoGetTextPassword)(BSTR *password);
|