Searched defs:password (Results 201 - 225 of 419) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
74 if (identity == NULL || password == NULL)
119 challenge_response(challenge, password, rpos);
121 nt_challenge_response(challenge, password, password_len, rpos);
188 const u8 *pos, *password; local
196 password = eap_get_config_password2(sm, &password_len, &pwhash);
197 if (password == NULL)
231 if (hash_nt_password_hash(password, pw_hash_hash)) {
236 if (nt_password_hash(password, password_le
276 const u8 *password; local
334 const u8 *addr[5], *password; local
[all...]
H A Deap_pax.c50 const u8 *identity, *password; local
54 password = eap_get_config_password(sm, &password_len);
55 if (!identity || !password) {
56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) "
79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
H A Deap_psk.c36 const u8 *identity, *password; local
39 password = eap_get_config_password(sm, &password_len);
40 if (!password || password_len != 16) {
49 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
H A Deap_sake.c71 const u8 *identity, *password; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
99 password + EAP_SAKE_ROOT_SECRET_LEN,
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pwd_common.c86 * on the password and identities.
89 u8 *password, int password_len,
175 * compute counter-mode password value and stretch to prime
176 * pwd-seed = H(token | peer-id | server-id | password |
185 eap_pwd_h_update(hash, password, password_len);
88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_ikev2.c61 const u8 *identity, *password; local
92 password = eap_get_config_password(sm, &password_len);
93 if (password) {
97 os_memcpy(data->ikev2.shared_secret, password, password_len);
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
74 if (identity == NULL || password == NULL)
119 challenge_response(challenge, password, rpos);
121 nt_challenge_response(challenge, password, password_len, rpos);
188 const u8 *pos, *password; local
196 password = eap_get_config_password2(sm, &password_len, &pwhash);
197 if (password == NULL)
231 if (hash_nt_password_hash(password, pw_hash_hash)) {
236 if (nt_password_hash(password, password_le
276 const u8 *password; local
334 const u8 *addr[5], *password; local
[all...]
H A Deap_pax.c50 const u8 *identity, *password; local
54 password = eap_get_config_password(sm, &password_len);
55 if (!identity || !password) {
56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) "
79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
H A Deap_psk.c36 const u8 *identity, *password; local
39 password = eap_get_config_password(sm, &password_len);
40 if (!password || password_len != 16) {
49 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
H A Deap_sake.c71 const u8 *identity, *password; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
99 password + EAP_SAKE_ROOT_SECRET_LEN,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pwd_common.c86 * on the password and identities.
89 u8 *password, int password_len,
175 * compute counter-mode password value and stretch to prime
176 * pwd-seed = H(token | peer-id | server-id | password |
185 eap_pwd_h_update(hash, password, password_len);
88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_ikev2.c61 const u8 *identity, *password; local
92 password = eap_get_config_password(sm, &password_len);
93 if (password) {
97 os_memcpy(data->ikev2.shared_secret, password, password_len);
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
74 if (identity == NULL || password == NULL)
119 challenge_response(challenge, password, rpos);
121 nt_challenge_response(challenge, password, password_len, rpos);
188 const u8 *pos, *password; local
196 password = eap_get_config_password2(sm, &password_len, &pwhash);
197 if (password == NULL)
231 if (hash_nt_password_hash(password, pw_hash_hash)) {
236 if (nt_password_hash(password, password_le
276 const u8 *password; local
334 const u8 *addr[5], *password; local
[all...]
H A Deap_pax.c50 const u8 *identity, *password; local
54 password = eap_get_config_password(sm, &password_len);
55 if (!identity || !password) {
56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) "
79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
H A Deap_psk.c36 const u8 *identity, *password; local
39 password = eap_get_config_password(sm, &password_len);
40 if (!password || password_len != 16) {
49 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
H A Deap_sake.c71 const u8 *identity, *password; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
99 password + EAP_SAKE_ROOT_SECRET_LEN,
/external/zlib/src/contrib/minizip/
H A Dminizip.c174 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \
260 const char* password=NULL; local
291 password=argv[i+1];
419 if ((password != NULL) && (err==ZIP_OK))
457 password,crcFile, zip64);
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
H A Dant-swing.jar ... String imgurl private String proxy private String user private String password private String port private int showDuration private boolean useProxy private ...
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKeyStore2Test.java482 // test with null password
664 public Key engineGetKey(String alias, char[] password) argument
680 public void engineLoad(InputStream stream, char[] password) argument
693 public void engineSetKeyEntry(String alias, Key key, char[] password, argument
710 public void engineStore(OutputStream stream, char[] password) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
H A DBcKeyStoreSpi.java128 char[] password,
151 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount);
205 char[] password)
208 if (password == null || password.length == 0)
229 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount);
248 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount);
269 cipher = makePBECipher("Old" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount);
288 Cipher out = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount);
457 char[] password,
125 StoreEntry( String alias, Key key, char[] password, Certificate[] certChain) argument
204 getObject( char[] password) argument
454 makePBECipher( String algorithm, int mode, char[] password, byte[] salt, int iterationCount) argument
592 engineGetKey( String alias, char[] password) argument
657 engineSetKeyEntry( String alias, Key key, char[] password, Certificate[] chain) argument
786 engineLoad( InputStream stream, char[] password) argument
877 engineStore(OutputStream stream, char[] password) argument
941 engineLoad( InputStream stream, char[] password) argument
1014 engineStore(OutputStream stream, char[] password) argument
[all...]
/external/chromium_org/chrome/browser/chromeos/login/supervised/
H A Dsupervised_user_authentication.cc64 LOG(ERROR) << "Could not deserialize password data, error = " << error_code
70 LOG(ERROR) << "Stored password data is not a dictionary";
123 NOTREACHED() << "Unknown password schema for " << context.GetUserID();
129 const std::string& password,
142 Key key(password);
232 LOG(ERROR) << "Failed to schedule password update for supervised user "
296 const std::string& password,
301 secret.set_secret(password);
127 FillDataForNewUser( const std::string& user_id, const std::string& password, base::DictionaryValue* password_data, base::DictionaryValue* extra_data) argument
295 BuildPasswordSignature( const std::string& password, int revision, const std::string& base64_signature_key) argument
/external/chromium_org/chrome/browser/chromeos/login/ui/
H A Dwebui_login_display.cc324 const std::string& password) {
326 webui_handler_->ShowSigninScreenForCreds(username, password);
322 ShowSigninScreenForCreds( const std::string& username, const std::string& password) argument
/external/chromium_org/chrome/browser/local_discovery/wifi/
H A Dwifi_manager_nonchromeos.cc30 const std::string& password) {
38 if (!password.empty()) {
39 wifi->SetString(onc::wifi::kPassphrase, password);
66 const std::string& password,
100 const std::string& password,
107 const std::string& password);
176 const std::string& password,
179 scoped_ptr<base::DictionaryValue> properties = MakeProperties(ssid, password);
194 if (FindAndConfigureNetwork(ssid, password, &network_guid)) {
407 const std::string& password,
29 MakeProperties(const std::string& ssid, const std::string& password) argument
174 ConfigureAndConnectPskNetwork( const std::string& ssid, const std::string& password, const WifiManager::SuccessCallback& callback) argument
405 FindAndConfigureNetwork( const std::string& ssid, const std::string& password, std::string* network_guid) argument
448 PostCredentialsCallback( const WifiManager::CredentialsCallback& callback, const std::string& ssid, bool success, const std::string& password) argument
[all...]
/external/chromium_org/chrome/browser/ui/login/
H A Dlogin_prompt_browsertest.cc57 const std::string& password)
58 : username_(username), password_(password) {}
136 const base::string16& password) {
137 // The TestServer sets the title to username/password on successful login.
138 return username + base::UTF8ToUTF16("/") + password;
221 // The request should be retried after the incorrect password is
271 // The request should be retried after the incorrect password is
282 base::string16 password(base::UTF8ToUTF16(password_));
283 handler->SetAuth(username, password);
286 base::string16 expected_title = ExpectedTitleFromAuth(username, password);
56 AuthInfo(const std::string& username, const std::string& password) argument
135 ExpectedTitleFromAuth(const base::string16& username, const base::string16& password) argument
[all...]
/external/chromium_org/chrome/browser/ui/sync/
H A Done_click_signin_sync_starter.cc79 const std::string& password,
103 refresh_token, email, password,
75 OneClickSigninSyncStarter( Profile* profile, Browser* browser, const std::string& email, const std::string& password, const std::string& refresh_token, StartSyncMode start_mode, content::WebContents* web_contents, ConfirmationRequired confirmation_required, const GURL& continue_url, Callback sync_setup_completed_callback) argument

Completed in 7224 milliseconds

1234567891011>>