/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 74 if (identity == NULL || password == NULL) 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 188 const u8 *pos, *password; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 197 if (password == NULL) 231 if (hash_nt_password_hash(password, pw_hash_hash)) { 236 if (nt_password_hash(password, password_le 276 const u8 *password; local 334 const u8 *addr[5], *password; local [all...] |
H A D | eap_pax.c | 50 const u8 *identity, *password; local 54 password = eap_get_config_password(sm, &password_len); 55 if (!identity || !password) { 56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " 79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
|
H A D | eap_psk.c | 36 const u8 *identity, *password; local 39 password = eap_get_config_password(sm, &password_len); 40 if (!password || password_len != 16) { 49 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
|
H A D | eap_sake.c | 71 const u8 *identity, *password; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 99 password + EAP_SAKE_ROOT_SECRET_LEN,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.c | 86 * on the password and identities. 89 u8 *password, int password_len, 175 * compute counter-mode password value and stretch to prime 176 * pwd-seed = H(token | peer-id | server-id | password | 185 eap_pwd_h_update(hash, password, password_len); 88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_ikev2.c | 61 const u8 *identity, *password; local 92 password = eap_get_config_password(sm, &password_len); 93 if (password) { 97 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 74 if (identity == NULL || password == NULL) 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 188 const u8 *pos, *password; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 197 if (password == NULL) 231 if (hash_nt_password_hash(password, pw_hash_hash)) { 236 if (nt_password_hash(password, password_le 276 const u8 *password; local 334 const u8 *addr[5], *password; local [all...] |
H A D | eap_pax.c | 50 const u8 *identity, *password; local 54 password = eap_get_config_password(sm, &password_len); 55 if (!identity || !password) { 56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " 79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
|
H A D | eap_psk.c | 36 const u8 *identity, *password; local 39 password = eap_get_config_password(sm, &password_len); 40 if (!password || password_len != 16) { 49 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
|
H A D | eap_sake.c | 71 const u8 *identity, *password; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 99 password + EAP_SAKE_ROOT_SECRET_LEN,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.c | 86 * on the password and identities. 89 u8 *password, int password_len, 175 * compute counter-mode password value and stretch to prime 176 * pwd-seed = H(token | peer-id | server-id | password | 185 eap_pwd_h_update(hash, password, password_len); 88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_ikev2.c | 61 const u8 *identity, *password; local 92 password = eap_get_config_password(sm, &password_len); 93 if (password) { 97 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 74 if (identity == NULL || password == NULL) 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 188 const u8 *pos, *password; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 197 if (password == NULL) 231 if (hash_nt_password_hash(password, pw_hash_hash)) { 236 if (nt_password_hash(password, password_le 276 const u8 *password; local 334 const u8 *addr[5], *password; local [all...] |
H A D | eap_pax.c | 50 const u8 *identity, *password; local 54 password = eap_get_config_password(sm, &password_len); 55 if (!identity || !password) { 56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " 79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
|
H A D | eap_psk.c | 36 const u8 *identity, *password; local 39 password = eap_get_config_password(sm, &password_len); 40 if (!password || password_len != 16) { 49 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
|
H A D | eap_sake.c | 71 const u8 *identity, *password; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 99 password + EAP_SAKE_ROOT_SECRET_LEN,
|
/external/zlib/src/contrib/minizip/ |
H A D | minizip.c | 174 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \ 260 const char* password=NULL; local 291 password=argv[i+1]; 419 if ((password != NULL) && (err==ZIP_OK)) 457 password,crcFile, zip64);
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant-swing.jar | ... String imgurl private String proxy private String user private String password private String port private int showDuration private boolean useProxy private ... |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStore2Test.java | 482 // test with null password 664 public Key engineGetKey(String alias, char[] password) argument 680 public void engineLoad(InputStream stream, char[] password) argument 693 public void engineSetKeyEntry(String alias, Key key, char[] password, argument 710 public void engineStore(OutputStream stream, char[] password) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
H A D | BcKeyStoreSpi.java | 128 char[] password, 151 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); 205 char[] password) 208 if (password == null || password.length == 0) 229 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); 248 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); 269 cipher = makePBECipher("Old" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); 288 Cipher out = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); 457 char[] password, 125 StoreEntry( String alias, Key key, char[] password, Certificate[] certChain) argument 204 getObject( char[] password) argument 454 makePBECipher( String algorithm, int mode, char[] password, byte[] salt, int iterationCount) argument 592 engineGetKey( String alias, char[] password) argument 657 engineSetKeyEntry( String alias, Key key, char[] password, Certificate[] chain) argument 786 engineLoad( InputStream stream, char[] password) argument 877 engineStore(OutputStream stream, char[] password) argument 941 engineLoad( InputStream stream, char[] password) argument 1014 engineStore(OutputStream stream, char[] password) argument [all...] |
/external/chromium_org/chrome/browser/chromeos/login/supervised/ |
H A D | supervised_user_authentication.cc | 64 LOG(ERROR) << "Could not deserialize password data, error = " << error_code 70 LOG(ERROR) << "Stored password data is not a dictionary"; 123 NOTREACHED() << "Unknown password schema for " << context.GetUserID(); 129 const std::string& password, 142 Key key(password); 232 LOG(ERROR) << "Failed to schedule password update for supervised user " 296 const std::string& password, 301 secret.set_secret(password); 127 FillDataForNewUser( const std::string& user_id, const std::string& password, base::DictionaryValue* password_data, base::DictionaryValue* extra_data) argument 295 BuildPasswordSignature( const std::string& password, int revision, const std::string& base64_signature_key) argument
|
/external/chromium_org/chrome/browser/chromeos/login/ui/ |
H A D | webui_login_display.cc | 324 const std::string& password) { 326 webui_handler_->ShowSigninScreenForCreds(username, password); 322 ShowSigninScreenForCreds( const std::string& username, const std::string& password) argument
|
/external/chromium_org/chrome/browser/local_discovery/wifi/ |
H A D | wifi_manager_nonchromeos.cc | 30 const std::string& password) { 38 if (!password.empty()) { 39 wifi->SetString(onc::wifi::kPassphrase, password); 66 const std::string& password, 100 const std::string& password, 107 const std::string& password); 176 const std::string& password, 179 scoped_ptr<base::DictionaryValue> properties = MakeProperties(ssid, password); 194 if (FindAndConfigureNetwork(ssid, password, &network_guid)) { 407 const std::string& password, 29 MakeProperties(const std::string& ssid, const std::string& password) argument 174 ConfigureAndConnectPskNetwork( const std::string& ssid, const std::string& password, const WifiManager::SuccessCallback& callback) argument 405 FindAndConfigureNetwork( const std::string& ssid, const std::string& password, std::string* network_guid) argument 448 PostCredentialsCallback( const WifiManager::CredentialsCallback& callback, const std::string& ssid, bool success, const std::string& password) argument [all...] |
/external/chromium_org/chrome/browser/ui/login/ |
H A D | login_prompt_browsertest.cc | 57 const std::string& password) 58 : username_(username), password_(password) {} 136 const base::string16& password) { 137 // The TestServer sets the title to username/password on successful login. 138 return username + base::UTF8ToUTF16("/") + password; 221 // The request should be retried after the incorrect password is 271 // The request should be retried after the incorrect password is 282 base::string16 password(base::UTF8ToUTF16(password_)); 283 handler->SetAuth(username, password); 286 base::string16 expected_title = ExpectedTitleFromAuth(username, password); 56 AuthInfo(const std::string& username, const std::string& password) argument 135 ExpectedTitleFromAuth(const base::string16& username, const base::string16& password) argument [all...] |
/external/chromium_org/chrome/browser/ui/sync/ |
H A D | one_click_signin_sync_starter.cc | 79 const std::string& password, 103 refresh_token, email, password, 75 OneClickSigninSyncStarter( Profile* profile, Browser* browser, const std::string& email, const std::string& password, const std::string& refresh_token, StartSyncMode start_mode, content::WebContents* web_contents, ConfirmationRequired confirmation_required, const GURL& continue_url, Callback sync_setup_completed_callback) argument
|