/external/chromium_org/chrome/test/android/javatests/src/org/chromium/chrome/test/util/ |
H A D | TestHttpServerClient.java | 42 public static String getUrl(String path, String username, String password) { argument 43 return "http://" + username + ":" + password + "@localhost:" + SERVER_PORT + "/" + path;
|
/external/chromium_org/chromeos/ |
H A D | tpm_password_fetcher.cc | 17 // Interval between TPM password checks. 50 const std::string& password) { 52 if (password.empty()) { 55 // password is cleared after EULA is accepted. 56 LOG(ERROR) << "TPM returned an empty password."; 58 delegate_->OnPasswordFetched(password); 49 OnTpmGetPassword(DBusMethodCallStatus call_status, const std::string& password) argument
|
/external/chromium_org/components/autofill/core/common/ |
H A D | password_form_fill_data.h | 25 base::string16 password; member in struct:autofill::UsernamesCollectionKey 30 base::string16 password; member in struct:autofill::PasswordAndRealm 34 // Structure used for autofilling password forms. Note that the realms in this 35 // struct are only set when the password's realm differs from the realm of the 42 // Identifies the HTML form on the page and preferred username/password for 54 // saved username/password to ensure uniqueness, though the username is not 59 // before we autofill the password. By default, this is off unless the 71 // matching stored logins to use as username/password values.
|
/external/chromium_org/components/os_crypt/ |
H A D | os_crypt_posix.cc | 32 // Generates a newly allocated SymmetricKey object based a hard-coded password. 37 // password. We need to improve this password situation by moving a secure 38 // password into a system-level key store. 40 std::string password = "peanuts"; local 43 // Create an encryption key from our password and salt. 46 password, 74 // This currently "obfuscates" by encrypting with hard-coded password. 75 // We need to improve this password situation by moving a secure password [all...] |
/external/chromium_org/components/password_manager/content/common/ |
H A D | credential_manager_types.h | 49 // Corresponds to WebLocalCredential's password property. 50 base::string16 password; member in struct:password_manager::CredentialInfo
|
/external/chromium_org/components/signin/core/browser/ |
H A D | signin_client.h | 83 const std::string& password) {} 81 GoogleSigninSucceeded(const std::string& account_id, const std::string& username, const std::string& password) argument
|
/external/chromium_org/crypto/ |
H A D | symmetric_key_openssl.cc | 51 const std::string& password, 75 int rv = PKCS5_PBKDF2_HMAC_SHA1(password.data(), password.length(), 50 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
|
H A D | symmetric_key_unittest.cc | 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160)); 70 const char* password; member in struct:PBKDF2TestVector 95 test_data.password, test_data.salt, 112 "password", 120 "password", 128 "password", 138 "password", 150 "password", 158 "password", 166 "password", [all...] |
/external/chromium_org/crypto/third_party/nss/ |
H A D | pk11akey.cc | 51 SECItem* password, 64 password, 73 &epki->algorithm, &crypto_param, password); 48 ImportEncryptedECPrivateKeyInfoAndReturnKey( PK11SlotInfo* slot, SECKEYEncryptedPrivateKeyInfo* epki, SECItem* password, SECItem* nickname, SECItem* public_value, PRBool permanent, PRBool sensitive, SECKEYPrivateKey** private_key, void* wincx) argument
|
/external/chromium_org/net/http/ |
H A D | http_auth_handler_basic_unittest.cc | 22 const char* password; member in struct:net::__anon9266 28 // Empty password 30 // Empty username and empty password. 41 base::ASCIIToUTF16(tests[i].password));
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
H A D | DOMURLUtilsReadOnly.h | 52 static String password(const KURL& url) { return url.pass(); } function in class:blink::DOMURLUtilsReadOnly 53 String password() { return password(url()); } function in class:blink::DOMURLUtilsReadOnly
|
/external/chromium_org/third_party/WebKit/Source/modules/credentialmanager/ |
H A D | LocalCredential.cpp | 20 LocalCredential* LocalCredential::create(const String& id, const String& name, const String& avatar, const String& password, ExceptionState& exceptionState) argument 25 return new LocalCredential(id, name, avatarURL, password); 33 LocalCredential::LocalCredential(const String& id, const String& name, const KURL& avatar, const String& password) argument 34 : Credential(PlatformLocalCredential::create(id, name, avatar, password)) 38 const String& LocalCredential::password() const function in class:blink::LocalCredential 40 return static_cast<PlatformLocalCredential*>(m_platformCredential.get())->password();
|
/external/chromium_org/third_party/boringssl/src/tool/ |
H A D | pkcs12.cc | 84 printf("Enter password: "); 87 char password[256]; local 90 n = read(0, &password[off], sizeof(password) - 1 - off); 94 } while ((n > 0 && memchr(password, '\n', off) == NULL && 95 off < sizeof(password) - 1) || 98 char *newline = reinterpret_cast<char*>(memchr(password, '\n', off)); 110 if (!PKCS12_get_key_and_certs(&key, certs, &pkcs12, password)) {
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | saslplainmechanism.h | 39 SaslPlainMechanism(const buzz::Jid user_jid, const rtc::CryptString & password) : argument 40 user_jid_(user_jid), password_(password) {}
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | proxyinfo.h | 35 CryptString password; member in struct:rtc::ProxyInfo
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
H A D | SslContextBuilder.java | 82 char[] password = "password".toCharArray(); 89 KeyStore keyStore = newEmptyKeyStore(password); 91 keyStore.setKeyEntry("private", keyPair.getPrivate(), password, certificateChain); 97 keyManagerFactory.init(keyStore, password); 132 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { argument 136 keyStore.load(in, password);
|
/external/smack/src/org/apache/qpid/management/common/sasl/ |
H A D | UserPasswordCallbackHandler.java | 34 public UserPasswordCallbackHandler(String user, String password) argument 37 this.pwchars = password.toCharArray();
|
H A D | UsernameHashedPasswordCallbackHandler.java | 39 public UsernameHashedPasswordCallbackHandler(String user, String password) throws Exception argument 42 this.pwchars = getHash(password);
|
/external/smack/src/org/jivesoftware/smack/ |
H A D | NonSASLAuthentication.java | 48 //Use the callback handler to determine the password, and continue on.
54 throw new XMPPException("Unable to determine password.",e);
58 public String authenticate(String username, String password, String resource) throws
argument 89 auth.setDigest(connection.getConnectionID(), password);
92 auth.setPassword(password);
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
H A D | SASLAnonymous.java | 46 public void authenticate(String username, String host, String password) throws IOException {
argument
|
H A D | SASLGSSAPIMechanism.java | 77 * @param password the password of the user (ignored for GSSAPI)
80 public void authenticate(String username, String host, String password) throws IOException, XMPPException {
argument
|
/external/smack/src/org/jivesoftware/smackx/muc/ |
H A D | InvitationListener.java | 36 * If the room is password-protected, the invitee will receive a password to use to join 43 * @param password the password to use when joining the room. 47 String password, Message message); 46 invitationReceived(Connection conn, String room, String inviter, String reason, String password, Message message) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|