/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 105 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 106 * @password_len: Length of password 110 int nt_password_hash(const u8 *password, size_t password_len, argument 117 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 164 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 165 * @password_len: Length of password 171 const u8 *password, size_t password_len, 180 if (nt_password_hash(password, password_len, password_hash)) 274 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 275 * @password_len: Length of password 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument 430 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_config.h | 50 * password - Password string for EAP 52 * This field can include either the plaintext password (default 54 * presentation of the password) if flags field has 65 u8 *password; member in struct:eap_peer_config 68 * password_len - Length of password field 534 * otp - One-time-password 556 * pending_req_password - Whether there is a pending password request 574 * pending_req_new_password - Pending password update request 626 * new_password - New password for password updat [all...] |
H A D | eap_eke.c | 71 const u8 *identity, *password; local 75 password = eap_get_config_password(sm, &password_len); 76 if (!password) { 77 wpa_printf(MSG_INFO, "EAP-EKE: No password configured"); 367 const u8 *password; local 378 password = eap_get_config_password(sm, &password_len); 379 if (password == NULL) { 380 wpa_printf(MSG_INFO, "EAP-EKE: No password configured!"); 401 * temp = prf(0+, password) 404 if (eap_eke_derive_key(&data->sess, password, password_le [all...] |
H A D | eap_gpsk.c | 82 const u8 *identity, *password; local 86 password = eap_get_config_password(sm, &password_len); 87 if (password == NULL) { 88 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured"); 125 os_memcpy(data->psk, password, password_len);
|
H A D | eap_pwd.c | 26 u8 *password; member in struct:eap_pwd_data 86 const u8 *identity, *password; local 90 password = eap_get_config_password(sm, &password_len); 91 if (password == NULL) { 92 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); 123 if ((data->password = os_malloc(password_len)) == NULL) { 130 os_memcpy(data->password, password, password_len); 160 bin_clear_free(data->password, data->password_len); 265 data->password, dat [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap.h | 29 u8 *password; member in struct:eap_user 31 int password_hash; /* whether password is hashed with
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 105 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 106 * @password_len: Length of password 110 int nt_password_hash(const u8 *password, size_t password_len, argument 117 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 164 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 165 * @password_len: Length of password 171 const u8 *password, size_t password_len, 180 if (nt_password_hash(password, password_len, password_hash)) 274 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 275 * @password_len: Length of password 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument 430 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 50 * password - Password string for EAP 52 * This field can include either the plaintext password (default 54 * presentation of the password) if flags field has 65 u8 *password; member in struct:eap_peer_config 68 * password_len - Length of password field 534 * otp - One-time-password 556 * pending_req_password - Whether there is a pending password request 574 * pending_req_new_password - Pending password update request 626 * new_password - New password for password updat [all...] |
H A D | eap_eke.c | 71 const u8 *identity, *password; local 75 password = eap_get_config_password(sm, &password_len); 76 if (!password) { 77 wpa_printf(MSG_INFO, "EAP-EKE: No password configured"); 367 const u8 *password; local 378 password = eap_get_config_password(sm, &password_len); 379 if (password == NULL) { 380 wpa_printf(MSG_INFO, "EAP-EKE: No password configured!"); 401 * temp = prf(0+, password) 404 if (eap_eke_derive_key(&data->sess, password, password_le [all...] |
H A D | eap_gpsk.c | 82 const u8 *identity, *password; local 86 password = eap_get_config_password(sm, &password_len); 87 if (password == NULL) { 88 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured"); 125 os_memcpy(data->psk, password, password_len);
|
H A D | eap_pwd.c | 26 u8 *password; member in struct:eap_pwd_data 86 const u8 *identity, *password; local 90 password = eap_get_config_password(sm, &password_len); 91 if (password == NULL) { 92 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); 123 if ((data->password = os_malloc(password_len)) == NULL) { 130 os_memcpy(data->password, password, password_len); 160 bin_clear_free(data->password, data->password_len); 265 data->password, dat [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap.h | 29 u8 *password; member in struct:eap_user 31 int password_hash; /* whether password is hashed with
|
/external/zlib/src/contrib/minizip/ |
H A D | miniunz.c | 196 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \ 203 " -p extract crypted file using password\n\n"); 312 int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password) 316 const char* password; 370 err = unzOpenCurrentFilePassword(uf,password); 475 int do_extract(uf,opt_extract_without_path,opt_overwrite,password) 479 const char* password; 494 password) != UNZ_OK) 511 int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password) 516 const char* password; 540 const char *password=NULL; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
H A D | PKCS12KeyStoreSpi.java | 475 char[] password) 524 char[] password, 581 char[] password, 592 PBEKeySpec pbeSpec = new PBEKeySpec(password); 615 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId); 633 char[] password) 636 PBEKeySpec pbeSpec = new PBEKeySpec(password); 664 char[] password, 674 PBEKeySpec pbeSpec = new PBEKeySpec(password); 700 Cipher cipher = createCipher(Cipher.DECRYPT_MODE, password, algI 473 engineGetKey( String alias, char[] password) argument 521 engineSetKeyEntry( String alias, Key key, char[] password, Certificate[] chain) argument 578 unwrapKey( AlgorithmIdentifier algId, byte[] data, char[] password, boolean wrongPKCS12Zero) argument 629 wrapKey( String algorithm, Key key, PKCS12PBEParams pbeParams, char[] password) argument 661 cryptData( boolean forEncryption, AlgorithmIdentifier algId, char[] password, boolean wrongPKCS12Zero, byte[] data) argument 715 createCipher(int mode, char[] password, AlgorithmIdentifier algId) argument 755 engineLoad( InputStream stream, char[] password) argument 1243 engineStore(OutputStream stream, char[] password) argument 1249 doStore(OutputStream stream, char[] password, boolean useDEREncoding) argument 1638 calculatePbeMac( ASN1ObjectIdentifier oid, byte[] salt, int itCount, char[] password, boolean wrongPkcs12Zero, byte[] data) argument [all...] |
/external/chromium_org/chrome/browser/chromeos/login/supervised/ |
H A D | supervised_user_creation_screen.cc | 297 NOTREACHED() << " Oops, no password"; 302 // password sync is implemented. 305 const std::string& password) { 339 password, 519 // displaying, but does not contain sensitive data, such as master password. 303 ImportSupervisedUserWithPassword( const std::string& user_id, const std::string& password) argument
|
/external/chromium_org/chrome/browser/password_manager/ |
H A D | native_backend_gnome_x_unittest.cc | 41 const std::string& password) 44 password(password) {} 80 std::string password; member in struct:__anon4367::MockKeyringItem 106 const gchar* password, 112 MockKeyringItem(keyring, display_name, password)); 241 found->secret = strdup(item->password.c_str()); 366 form_facebook_.password_element = UTF8ToUTF16("password"); 448 EXPECT_EQ(UTF16ToUTF8(form.password_value), item->password); 531 // password, the 39 MockKeyringItem(const char* keyring, const std::string& display_name, const std::string& password) argument 102 mock_gnome_keyring_store_password( const GnomeKeyringPasswordSchema* schema, const gchar* keyring, const gchar* display_name, const gchar* password, GnomeKeyringOperationDoneCallback callback, gpointer data, GDestroyNotify destroy_data, ...) argument [all...] |
H A D | password_store_mac_unittest.cc | 104 "secure_user", "password", false }, 126 // An FTP password with an invalid date, for edge-case testing. 285 const wchar_t* password; member in struct:__anon4379 303 "https://some.domain.com/secure.html", L"secure_user", L"password", true, 345 EXPECT_EQ(WideToUTF16(expected[i].password), form.password_value) 566 L"username", L"password", false, false, 0 }, true }, 575 // password; see MockAppleKeychain::ItemModifyAttributesAndData) is 665 different_form.username_element = ASCIIToUTF16("password"); 739 L"submit", L"username", L"password", L"joe_user", L"", 745 L"submit", L"username", L"password", [all...] |
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/common/ |
H A D | focus_util.js | 40 'password' : true,
|
/external/chromium_org/chrome/browser/sync_file_system/drive_backend/ |
H A D | sync_engine.cc | 726 const std::string& password) { 724 GoogleSigninSucceeded(const std::string& account_id, const std::string& username, const std::string& password) argument
|
/external/chromium_org/chrome/browser/ui/app_list/ |
H A D | app_list_view_delegate.cc | 332 const std::string& password) { 330 GoogleSigninSucceeded(const std::string& account_id, const std::string& username, const std::string& password) argument
|
/external/chromium_org/chrome/browser/ui/webui/chromeos/login/ |
H A D | gaia_screen_handler.cc | 305 const std::string& password, 311 user_context.SetKey(Key(password)); 317 const std::string& password, 320 DoCompleteLogin(typed_email, password, using_saml); 340 password, 403 const std::string& password, 418 DoCompleteLogin(typed_email, password, using_saml); 422 const std::string& password, 433 user_context.SetKey(Key(password)); 497 const std::string& password) { 303 HandleCompleteAuthentication( const std::string& email, const std::string& password, const std::string& auth_code) argument 316 HandleCompleteLogin(const std::string& typed_email, const std::string& password, bool using_saml) argument 402 OnSetOwnerDone(const std::string& typed_email, const std::string& password, bool using_saml, bool success) argument 421 DoCompleteLogin(const std::string& typed_email, const std::string& password, bool using_saml) argument 496 ShowSigninScreenForCreds(const std::string& username, const std::string& password) argument [all...] |
/external/chromium_org/chrome/browser/ui/webui/local_discovery/ |
H A D | local_discovery_ui_handler.cc | 485 const std::string& password) { 482 GoogleSigninSucceeded( const std::string& account_id, const std::string& username, const std::string& password) argument
|
/external/chromium_org/chrome/renderer/autofill/ |
H A D | password_autofill_agent_browsertest.cc | 40 // The name of the username/password element in the form. 42 const char kPasswordName[] = "password"; 45 const char kAlicePassword[] = "password"; 55 " <INPUT type='password' id='password'/>" 64 " <input type='password' id='password'/>" 78 " <input type='password' id='password'/>" 114 " <input type='password' i 367 CheckTextFieldsStateForElements(const WebInputElement& username_element, const std::string& username, bool username_autofilled, const WebInputElement& password_element, const std::string& password, bool password_autofilled, bool checkSuggestedValue) argument 387 CheckTextFieldsState(const std::string& username, bool username_autofilled, const std::string& password, bool password_autofilled) argument 402 CheckTextFieldsDOMState(const std::string& username, bool username_autofilled, const std::string& password, bool password_autofilled) argument [all...] |
/external/chromium_org/components/autofill/content/renderer/ |
H A D | autofill_agent.cc | 520 const base::string16& password) { 524 password); 530 const base::string16& password) { 534 password); 519 OnFillPasswordSuggestion(const base::string16& username, const base::string16& password) argument 528 OnPreviewPasswordSuggestion( const base::string16& username, const base::string16& password) argument
|
/external/chromium_org/media/base/android/ |
H A D | media_player_bridge.cc | 244 const base::string16& username, const base::string16& password) { 248 if (!password.empty()) 249 replacements.SetPasswordStr(password); 243 OnAuthCredentialsRetrieved( const base::string16& username, const base::string16& password) argument
|