Searched defs:password (Results 26 - 50 of 419) sorted by relevance

1234567891011>>

/external/chromium_org/chrome/test/android/javatests/src/org/chromium/chrome/test/util/
H A DTestHttpServerClient.java42 public static String getUrl(String path, String username, String password) { argument
43 return "http://" + username + ":" + password + "@localhost:" + SERVER_PORT + "/" + path;
/external/chromium_org/chromeos/
H A Dtpm_password_fetcher.cc17 // Interval between TPM password checks.
50 const std::string& password) {
52 if (password.empty()) {
55 // password is cleared after EULA is accepted.
56 LOG(ERROR) << "TPM returned an empty password.";
58 delegate_->OnPasswordFetched(password);
49 OnTpmGetPassword(DBusMethodCallStatus call_status, const std::string& password) argument
/external/chromium_org/components/autofill/core/common/
H A Dpassword_form_fill_data.h25 base::string16 password; member in struct:autofill::UsernamesCollectionKey
30 base::string16 password; member in struct:autofill::PasswordAndRealm
34 // Structure used for autofilling password forms. Note that the realms in this
35 // struct are only set when the password's realm differs from the realm of the
42 // Identifies the HTML form on the page and preferred username/password for
54 // saved username/password to ensure uniqueness, though the username is not
59 // before we autofill the password. By default, this is off unless the
71 // matching stored logins to use as username/password values.
/external/chromium_org/components/os_crypt/
H A Dos_crypt_posix.cc32 // Generates a newly allocated SymmetricKey object based a hard-coded password.
37 // password. We need to improve this password situation by moving a secure
38 // password into a system-level key store.
40 std::string password = "peanuts"; local
43 // Create an encryption key from our password and salt.
46 password,
74 // This currently "obfuscates" by encrypting with hard-coded password.
75 // We need to improve this password situation by moving a secure password
[all...]
/external/chromium_org/components/password_manager/content/common/
H A Dcredential_manager_types.h49 // Corresponds to WebLocalCredential's password property.
50 base::string16 password; member in struct:password_manager::CredentialInfo
/external/chromium_org/components/signin/core/browser/
H A Dsignin_client.h83 const std::string& password) {}
81 GoogleSigninSucceeded(const std::string& account_id, const std::string& username, const std::string& password) argument
/external/chromium_org/crypto/
H A Dsymmetric_key_openssl.cc51 const std::string& password,
75 int rv = PKCS5_PBKDF2_HMAC_SHA1(password.data(), password.length(),
50 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
H A Dsymmetric_key_unittest.cc53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160));
70 const char* password; member in struct:PBKDF2TestVector
95 test_data.password, test_data.salt,
112 "password",
120 "password",
128 "password",
138 "password",
150 "password",
158 "password",
166 "password",
[all...]
/external/chromium_org/crypto/third_party/nss/
H A Dpk11akey.cc51 SECItem* password,
64 password,
73 &epki->algorithm, &crypto_param, password);
48 ImportEncryptedECPrivateKeyInfoAndReturnKey( PK11SlotInfo* slot, SECKEYEncryptedPrivateKeyInfo* epki, SECItem* password, SECItem* nickname, SECItem* public_value, PRBool permanent, PRBool sensitive, SECKEYPrivateKey** private_key, void* wincx) argument
/external/chromium_org/net/http/
H A Dhttp_auth_handler_basic_unittest.cc22 const char* password; member in struct:net::__anon9266
28 // Empty password
30 // Empty username and empty password.
41 base::ASCIIToUTF16(tests[i].password));
/external/chromium_org/third_party/WebKit/Source/core/dom/
H A DDOMURLUtilsReadOnly.h52 static String password(const KURL& url) { return url.pass(); } function in class:blink::DOMURLUtilsReadOnly
53 String password() { return password(url()); } function in class:blink::DOMURLUtilsReadOnly
/external/chromium_org/third_party/WebKit/Source/modules/credentialmanager/
H A DLocalCredential.cpp20 LocalCredential* LocalCredential::create(const String& id, const String& name, const String& avatar, const String& password, ExceptionState& exceptionState) argument
25 return new LocalCredential(id, name, avatarURL, password);
33 LocalCredential::LocalCredential(const String& id, const String& name, const KURL& avatar, const String& password) argument
34 : Credential(PlatformLocalCredential::create(id, name, avatar, password))
38 const String& LocalCredential::password() const function in class:blink::LocalCredential
40 return static_cast<PlatformLocalCredential*>(m_platformCredential.get())->password();
/external/chromium_org/third_party/boringssl/src/tool/
H A Dpkcs12.cc84 printf("Enter password: ");
87 char password[256]; local
90 n = read(0, &password[off], sizeof(password) - 1 - off);
94 } while ((n > 0 && memchr(password, '\n', off) == NULL &&
95 off < sizeof(password) - 1) ||
98 char *newline = reinterpret_cast<char*>(memchr(password, '\n', off));
110 if (!PKCS12_get_key_and_certs(&key, certs, &pkcs12, password)) {
/external/chromium_org/third_party/libjingle/source/talk/xmpp/
H A Dsaslplainmechanism.h39 SaslPlainMechanism(const buzz::Jid user_jid, const rtc::CryptString & password) : argument
40 user_jid_(user_jid), password_(password) {}
/external/chromium_org/third_party/webrtc/base/
H A Dproxyinfo.h35 CryptString password; member in struct:rtc::ProxyInfo
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
H A DSslContextBuilder.java82 char[] password = "password".toCharArray();
89 KeyStore keyStore = newEmptyKeyStore(password);
91 keyStore.setKeyEntry("private", keyPair.getPrivate(), password, certificateChain);
97 keyManagerFactory.init(keyStore, password);
132 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { argument
136 keyStore.load(in, password);
/external/smack/src/org/apache/qpid/management/common/sasl/
H A DUserPasswordCallbackHandler.java34 public UserPasswordCallbackHandler(String user, String password) argument
37 this.pwchars = password.toCharArray();
H A DUsernameHashedPasswordCallbackHandler.java39 public UsernameHashedPasswordCallbackHandler(String user, String password) throws Exception argument
42 this.pwchars = getHash(password);
/external/smack/src/org/jivesoftware/smack/
H A DNonSASLAuthentication.java48 //Use the callback handler to determine the password, and continue on.
54 throw new XMPPException("Unable to determine password.",e);
58 public String authenticate(String username, String password, String resource) throws argument
89 auth.setDigest(connection.getConnectionID(), password);
92 auth.setPassword(password);
/external/smack/src/org/jivesoftware/smack/sasl/
H A DSASLAnonymous.java46 public void authenticate(String username, String host, String password) throws IOException { argument
H A DSASLGSSAPIMechanism.java77 * @param password the password of the user (ignored for GSSAPI)
80 public void authenticate(String username, String host, String password) throws IOException, XMPPException { argument
/external/smack/src/org/jivesoftware/smackx/muc/
H A DInvitationListener.java36 * If the room is password-protected, the invitee will receive a password to use to join
43 * @param password the password to use when joining the room.
47 String password, Message message);
46 invitationReceived(Connection conn, String room, String inviter, String reason, String password, Message message) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_otp.c33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_otp.c33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_otp.c33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");

Completed in 237 milliseconds

1234567891011>>