Searched defs:password (Results 251 - 275 of 419) sorted by relevance

<<11121314151617

/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.c105 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
106 * @password_len: Length of password
110 int nt_password_hash(const u8 *password, size_t password_len, argument
117 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
164 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
165 * @password_len: Length of password
171 const u8 *password, size_t password_len,
180 if (nt_password_hash(password, password_len, password_hash))
274 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
275 * @password_len: Length of password
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
430 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_config.h50 * password - Password string for EAP
52 * This field can include either the plaintext password (default
54 * presentation of the password) if flags field has
65 u8 *password; member in struct:eap_peer_config
68 * password_len - Length of password field
534 * otp - One-time-password
556 * pending_req_password - Whether there is a pending password request
574 * pending_req_new_password - Pending password update request
626 * new_password - New password for password updat
[all...]
H A Deap_eke.c71 const u8 *identity, *password; local
75 password = eap_get_config_password(sm, &password_len);
76 if (!password) {
77 wpa_printf(MSG_INFO, "EAP-EKE: No password configured");
367 const u8 *password; local
378 password = eap_get_config_password(sm, &password_len);
379 if (password == NULL) {
380 wpa_printf(MSG_INFO, "EAP-EKE: No password configured!");
401 * temp = prf(0+, password)
404 if (eap_eke_derive_key(&data->sess, password, password_le
[all...]
H A Deap_gpsk.c82 const u8 *identity, *password; local
86 password = eap_get_config_password(sm, &password_len);
87 if (password == NULL) {
88 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured");
125 os_memcpy(data->psk, password, password_len);
H A Deap_pwd.c26 u8 *password; member in struct:eap_pwd_data
86 const u8 *identity, *password; local
90 password = eap_get_config_password(sm, &password_len);
91 if (password == NULL) {
92 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!");
123 if ((data->password = os_malloc(password_len)) == NULL) {
130 os_memcpy(data->password, password, password_len);
160 bin_clear_free(data->password, data->password_len);
265 data->password, dat
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap.h29 u8 *password; member in struct:eap_user
31 int password_hash; /* whether password is hashed with
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.c105 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
106 * @password_len: Length of password
110 int nt_password_hash(const u8 *password, size_t password_len, argument
117 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
164 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
165 * @password_len: Length of password
171 const u8 *password, size_t password_len,
180 if (nt_password_hash(password, password_len, password_hash))
274 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
275 * @password_len: Length of password
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
430 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_config.h50 * password - Password string for EAP
52 * This field can include either the plaintext password (default
54 * presentation of the password) if flags field has
65 u8 *password; member in struct:eap_peer_config
68 * password_len - Length of password field
534 * otp - One-time-password
556 * pending_req_password - Whether there is a pending password request
574 * pending_req_new_password - Pending password update request
626 * new_password - New password for password updat
[all...]
H A Deap_eke.c71 const u8 *identity, *password; local
75 password = eap_get_config_password(sm, &password_len);
76 if (!password) {
77 wpa_printf(MSG_INFO, "EAP-EKE: No password configured");
367 const u8 *password; local
378 password = eap_get_config_password(sm, &password_len);
379 if (password == NULL) {
380 wpa_printf(MSG_INFO, "EAP-EKE: No password configured!");
401 * temp = prf(0+, password)
404 if (eap_eke_derive_key(&data->sess, password, password_le
[all...]
H A Deap_gpsk.c82 const u8 *identity, *password; local
86 password = eap_get_config_password(sm, &password_len);
87 if (password == NULL) {
88 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured");
125 os_memcpy(data->psk, password, password_len);
H A Deap_pwd.c26 u8 *password; member in struct:eap_pwd_data
86 const u8 *identity, *password; local
90 password = eap_get_config_password(sm, &password_len);
91 if (password == NULL) {
92 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!");
123 if ((data->password = os_malloc(password_len)) == NULL) {
130 os_memcpy(data->password, password, password_len);
160 bin_clear_free(data->password, data->password_len);
265 data->password, dat
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap.h29 u8 *password; member in struct:eap_user
31 int password_hash; /* whether password is hashed with
/external/zlib/src/contrib/minizip/
H A Dminiunz.c196 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \
203 " -p extract crypted file using password\n\n");
312 int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password)
316 const char* password;
370 err = unzOpenCurrentFilePassword(uf,password);
475 int do_extract(uf,opt_extract_without_path,opt_overwrite,password)
479 const char* password;
494 password) != UNZ_OK)
511 int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password)
516 const char* password;
540 const char *password=NULL; local
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
H A DPKCS12KeyStoreSpi.java475 char[] password)
524 char[] password,
581 char[] password,
592 PBEKeySpec pbeSpec = new PBEKeySpec(password);
615 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId);
633 char[] password)
636 PBEKeySpec pbeSpec = new PBEKeySpec(password);
664 char[] password,
674 PBEKeySpec pbeSpec = new PBEKeySpec(password);
700 Cipher cipher = createCipher(Cipher.DECRYPT_MODE, password, algI
473 engineGetKey( String alias, char[] password) argument
521 engineSetKeyEntry( String alias, Key key, char[] password, Certificate[] chain) argument
578 unwrapKey( AlgorithmIdentifier algId, byte[] data, char[] password, boolean wrongPKCS12Zero) argument
629 wrapKey( String algorithm, Key key, PKCS12PBEParams pbeParams, char[] password) argument
661 cryptData( boolean forEncryption, AlgorithmIdentifier algId, char[] password, boolean wrongPKCS12Zero, byte[] data) argument
715 createCipher(int mode, char[] password, AlgorithmIdentifier algId) argument
755 engineLoad( InputStream stream, char[] password) argument
1243 engineStore(OutputStream stream, char[] password) argument
1249 doStore(OutputStream stream, char[] password, boolean useDEREncoding) argument
1638 calculatePbeMac( ASN1ObjectIdentifier oid, byte[] salt, int itCount, char[] password, boolean wrongPkcs12Zero, byte[] data) argument
[all...]
/external/chromium_org/chrome/browser/chromeos/login/supervised/
H A Dsupervised_user_creation_screen.cc297 NOTREACHED() << " Oops, no password";
302 // password sync is implemented.
305 const std::string& password) {
339 password,
519 // displaying, but does not contain sensitive data, such as master password.
303 ImportSupervisedUserWithPassword( const std::string& user_id, const std::string& password) argument
/external/chromium_org/chrome/browser/password_manager/
H A Dnative_backend_gnome_x_unittest.cc41 const std::string& password)
44 password(password) {}
80 std::string password; member in struct:__anon4367::MockKeyringItem
106 const gchar* password,
112 MockKeyringItem(keyring, display_name, password));
241 found->secret = strdup(item->password.c_str());
366 form_facebook_.password_element = UTF8ToUTF16("password");
448 EXPECT_EQ(UTF16ToUTF8(form.password_value), item->password);
531 // password, the
39 MockKeyringItem(const char* keyring, const std::string& display_name, const std::string& password) argument
102 mock_gnome_keyring_store_password( const GnomeKeyringPasswordSchema* schema, const gchar* keyring, const gchar* display_name, const gchar* password, GnomeKeyringOperationDoneCallback callback, gpointer data, GDestroyNotify destroy_data, ...) argument
[all...]
H A Dpassword_store_mac_unittest.cc104 "secure_user", "password", false },
126 // An FTP password with an invalid date, for edge-case testing.
285 const wchar_t* password; member in struct:__anon4379
303 "https://some.domain.com/secure.html", L"secure_user", L"password", true,
345 EXPECT_EQ(WideToUTF16(expected[i].password), form.password_value)
566 L"username", L"password", false, false, 0 }, true },
575 // password; see MockAppleKeychain::ItemModifyAttributesAndData) is
665 different_form.username_element = ASCIIToUTF16("password");
739 L"submit", L"username", L"password", L"joe_user", L"",
745 L"submit", L"username", L"password",
[all...]
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/common/
H A Dfocus_util.js40 'password' : true,
/external/chromium_org/chrome/browser/sync_file_system/drive_backend/
H A Dsync_engine.cc726 const std::string& password) {
724 GoogleSigninSucceeded(const std::string& account_id, const std::string& username, const std::string& password) argument
/external/chromium_org/chrome/browser/ui/app_list/
H A Dapp_list_view_delegate.cc332 const std::string& password) {
330 GoogleSigninSucceeded(const std::string& account_id, const std::string& username, const std::string& password) argument
/external/chromium_org/chrome/browser/ui/webui/chromeos/login/
H A Dgaia_screen_handler.cc305 const std::string& password,
311 user_context.SetKey(Key(password));
317 const std::string& password,
320 DoCompleteLogin(typed_email, password, using_saml);
340 password,
403 const std::string& password,
418 DoCompleteLogin(typed_email, password, using_saml);
422 const std::string& password,
433 user_context.SetKey(Key(password));
497 const std::string& password) {
303 HandleCompleteAuthentication( const std::string& email, const std::string& password, const std::string& auth_code) argument
316 HandleCompleteLogin(const std::string& typed_email, const std::string& password, bool using_saml) argument
402 OnSetOwnerDone(const std::string& typed_email, const std::string& password, bool using_saml, bool success) argument
421 DoCompleteLogin(const std::string& typed_email, const std::string& password, bool using_saml) argument
496 ShowSigninScreenForCreds(const std::string& username, const std::string& password) argument
[all...]
/external/chromium_org/chrome/browser/ui/webui/local_discovery/
H A Dlocal_discovery_ui_handler.cc485 const std::string& password) {
482 GoogleSigninSucceeded( const std::string& account_id, const std::string& username, const std::string& password) argument
/external/chromium_org/chrome/renderer/autofill/
H A Dpassword_autofill_agent_browsertest.cc40 // The name of the username/password element in the form.
42 const char kPasswordName[] = "password";
45 const char kAlicePassword[] = "password";
55 " <INPUT type='password' id='password'/>"
64 " <input type='password' id='password'/>"
78 " <input type='password' id='password'/>"
114 " <input type='password' i
367 CheckTextFieldsStateForElements(const WebInputElement& username_element, const std::string& username, bool username_autofilled, const WebInputElement& password_element, const std::string& password, bool password_autofilled, bool checkSuggestedValue) argument
387 CheckTextFieldsState(const std::string& username, bool username_autofilled, const std::string& password, bool password_autofilled) argument
402 CheckTextFieldsDOMState(const std::string& username, bool username_autofilled, const std::string& password, bool password_autofilled) argument
[all...]
/external/chromium_org/components/autofill/content/renderer/
H A Dautofill_agent.cc520 const base::string16& password) {
524 password);
530 const base::string16& password) {
534 password);
519 OnFillPasswordSuggestion(const base::string16& username, const base::string16& password) argument
528 OnPreviewPasswordSuggestion( const base::string16& username, const base::string16& password) argument
/external/chromium_org/media/base/android/
H A Dmedia_player_bridge.cc244 const base::string16& username, const base::string16& password) {
248 if (!password.empty())
249 replacements.SetPasswordStr(password);
243 OnAuthCredentialsRetrieved( const base::string16& username, const base::string16& password) argument

Completed in 607 milliseconds

<<11121314151617