/external/chromium_org/cloud_print/service/win/ |
H A D | service_controller.cc | 133 const base::string16& password, 136 return InstallService(user, password, true, kServiceSwitch, user_data_dir, 142 const base::string16& password, 144 return InstallService(user, password, false, kRequirementsSwitch, 149 const base::string16& password, 205 password.empty() ? NULL : password.c_str())); 131 InstallConnectorService( const base::string16& user, const base::string16& password, const base::FilePath& user_data_dir, bool enable_logging) argument 140 InstallCheckService( const base::string16& user, const base::string16& password, const base::FilePath& user_data_dir) argument 148 InstallService(const base::string16& user, const base::string16& password, bool auto_start, const std::string& run_switch, const base::FilePath& user_data_dir, bool enable_logging) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 231 u8 *password = dpos; local 234 password[password_len - 1] == '\0') { 239 password, password_len); 240 parse->user_password = password; 503 if (!sm->user || !sm->user->password || sm->user->password_hash || 506 "password configured"); 512 os_memcmp_const(sm->user->password, user_password, 514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); 519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password"); 528 const u8 *password, 524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 231 u8 *password = dpos; local 234 password[password_len - 1] == '\0') { 239 password, password_len); 240 parse->user_password = password; 503 if (!sm->user || !sm->user->password || sm->user->password_hash || 506 "password configured"); 512 os_memcmp_const(sm->user->password, user_password, 514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); 519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password"); 528 const u8 *password, 524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 231 u8 *password = dpos; local 234 password[password_len - 1] == '\0') { 239 password, password_len); 240 parse->user_password = password; 503 if (!sm->user || !sm->user->password || sm->user->password_hash || 506 "password configured"); 512 os_memcmp_const(sm->user->password, user_password, 514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); 519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password"); 528 const u8 *password, 524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument [all...] |
/external/chromium_org/chrome/browser/local_discovery/wifi/ |
H A D | wifi_manager_nonchromeos.cc | 30 const std::string& password) { 38 if (!password.empty()) { 39 wifi->SetString(onc::wifi::kPassphrase, password); 66 const std::string& password, 100 const std::string& password, 107 const std::string& password); 176 const std::string& password, 179 scoped_ptr<base::DictionaryValue> properties = MakeProperties(ssid, password); 194 if (FindAndConfigureNetwork(ssid, password, &network_guid)) { 407 const std::string& password, 29 MakeProperties(const std::string& ssid, const std::string& password) argument 174 ConfigureAndConnectPskNetwork( const std::string& ssid, const std::string& password, const WifiManager::SuccessCallback& callback) argument 405 FindAndConfigureNetwork( const std::string& ssid, const std::string& password, std::string* network_guid) argument 448 PostCredentialsCallback( const WifiManager::CredentialsCallback& callback, const std::string& ssid, bool success, const std::string& password) argument [all...] |
/external/chromium_org/chrome/browser/ui/login/ |
H A D | login_prompt.cc | 139 const base::string16& password) { 159 // Tell the password manager the credentials were submitted / accepted. 162 password_form_.password_value = password; 177 NotifyAuthSupplied(username, password); 184 base::Bind(&LoginHandler::SetAuthDeferred, this, username, password)); 244 SetAuth(supplied_details->username(), supplied_details->password()); 327 const base::string16& password) { 339 AuthSuppliedLoginNotificationDetails details(this, username, password); 376 const base::string16& password) { 380 request_->SetAuth(net::AuthCredentials(username, password)); 138 SetAuth(const base::string16& username, const base::string16& password) argument 326 NotifyAuthSupplied(const base::string16& username, const base::string16& password) argument 375 SetAuthDeferred(const base::string16& username, const base::string16& password) argument [all...] |
/external/chromium_org/url/ |
H A D | url_canon_internal.cc | 321 DoOverrideComponent(repl_source.password, repl_parsed.password, 322 &source->password, &parsed->password); 358 repl_source.password, repl_parsed.password, 359 utf8_buffer, &parsed->password); 381 if (repl_source.password) source->password = utf8_buffer->data();
|
/external/chromium_org/chrome/browser/resources/chromeos/login/ |
H A D | login_common.js | 153 * Shows password changed screen that offers migration. 154 * @param {boolean} showError Whether to show the incorrect password error. 235 * Clears password field in user-pod. 259 * @param {string} password Login password. 261 Oobe.loginForTesting = function(username, password) { 264 chrome.send('completeLogin', [username, password, false]); 278 * @param {string} password Login password. 280 Oobe.authenticateForTesting = function(username, password) { [all...] |
/external/chromium_org/cloud_print/service/ |
H A D | service_state.cc | 162 const std::string& password) { 174 post_body += "&Passwd=" + net::EscapeUrlEncodedData(password, true); 213 const std::string& password, 219 auth_token_ = LoginToGoogle("cloudprint", email_, password); 220 xmpp_auth_token_ = LoginToGoogle("chromiumsync", email_, password); 160 LoginToGoogle(const std::string& service, const std::string& email, const std::string& password) argument 212 Configure(const std::string& email, const std::string& password, const std::string& proxy_id) argument
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | candidate.h | 53 const std::string& username, const std::string& password, 57 priority_(priority), username_(username), password_(password), 103 const std::string & password() const { return password_; } function in class:cricket::Candidate 104 void set_password(const std::string & password) { password_ = password; } argument 51 Candidate(const std::string& id, int component, const std::string& protocol, const rtc::SocketAddress& address, uint32 priority, const std::string& username, const std::string& password, const std::string& type, const std::string& network_name, uint32 generation, const std::string& foundation) argument
|
H A D | tcpport.h | 54 const std::string& password, 58 username, password, allow_listen); 80 const std::string& password, bool allow_listen); 48 Create(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, const rtc::IPAddress& ip, int min_port, int max_port, const std::string& username, const std::string& password, bool allow_listen) argument
|
/external/smack/src/org/jivesoftware/smack/ |
H A D | ConnectionConfiguration.java | 89 private String password; field in class:ConnectionConfiguration 95 // Holds the proxy information (such as proxyhost, proxyport, username, password etc) 211 // Set the default password of the cacert file that is "changeit" 326 * Returns the password to use to access the trust store file. It is assumed that all 327 * certificates share the same password in the trust store. 329 * @return the password to use to access the truststore file. 336 * Sets the password to use to access the trust store file. It is assumed that all 337 * certificates share the same password in the trust store. 339 * @param truststorePassword the password to use to access the truststore file. 661 * Returns a CallbackHandler to obtain information, such as the password o 771 setLoginInfo(String username, String password, String resource) argument [all...] |
H A D | SASLAuthentication.java | 293 * @param password the password to send to the server.
298 public String authenticate(String username, String password, String resource)
argument 319 currentMechanism.authenticate(username, connection.getServiceName(), password);
353 .authenticate(username, password, resource);
363 .authenticate(username, password, resource);
368 return new NonSASLAuthentication(connection).authenticate(username, password, resource);
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
H A D | SASLMechanism.java | 62 protected String password;
field in class:SASLMechanism 77 * @param password the password for this account.
81 public void authenticate(String username, String host, String password) throws IOException, XMPPException {
argument 87 this.password = password;
178 pcb.setPassword(password.toCharArray());
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | authsrv.c | 72 if (eap_user->password) { 73 user->password = os_malloc(eap_user->password_len); 74 if (user->password == NULL) 76 os_memcpy(user->password, eap_user->password,
|
/external/wpa_supplicant_8/src/ap/ |
H A D | authsrv.c | 72 if (eap_user->password) { 73 user->password = os_malloc(eap_user->password_len); 74 if (user->password == NULL) 76 os_memcpy(user->password, eap_user->password,
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | authsrv.c | 72 if (eap_user->password) { 73 user->password = os_malloc(eap_user->password_len); 74 if (user->password == NULL) 76 os_memcpy(user->password, eap_user->password,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
H A D | PKCS12KeyStoreSpi.java | 475 char[] password) 524 char[] password, 581 char[] password, 592 PBEKeySpec pbeSpec = new PBEKeySpec(password); 615 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId); 633 char[] password) 636 PBEKeySpec pbeSpec = new PBEKeySpec(password); 664 char[] password, 674 PBEKeySpec pbeSpec = new PBEKeySpec(password); 700 Cipher cipher = createCipher(Cipher.DECRYPT_MODE, password, algI 473 engineGetKey( String alias, char[] password) argument 521 engineSetKeyEntry( String alias, Key key, char[] password, Certificate[] chain) argument 578 unwrapKey( AlgorithmIdentifier algId, byte[] data, char[] password, boolean wrongPKCS12Zero) argument 629 wrapKey( String algorithm, Key key, PKCS12PBEParams pbeParams, char[] password) argument 661 cryptData( boolean forEncryption, AlgorithmIdentifier algId, char[] password, boolean wrongPKCS12Zero, byte[] data) argument 715 createCipher(int mode, char[] password, AlgorithmIdentifier algId) argument 755 engineLoad( InputStream stream, char[] password) argument 1243 engineStore(OutputStream stream, char[] password) argument 1249 doStore(OutputStream stream, char[] password, boolean useDEREncoding) argument 1638 calculatePbeMac( ASN1ObjectIdentifier oid, byte[] salt, int itCount, char[] password, boolean wrongPkcs12Zero, byte[] data) argument [all...] |
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/ |
H A D | LoginPrompt.java | 43 mPasswordView = (EditText) v.findViewById(R.id.password); 109 public void onAutofillDataAvailable(String username, String password) { argument 111 mPasswordView.setText(password);
|
/external/chromium_org/chrome/browser/resources/standalone/ |
H A D | standalone_hack.js | 120 * @param {string} password the password of the user logging in. 122 function login(email_address, password) { 123 console.log('password', password); 124 if (password == 'correct') {
|
/external/chromium_org/chrome/browser/ui/passwords/ |
H A D | password_manager_presenter_unittest.cc | 63 const std::string& password); 78 const std::string& password) { 84 form->password_value = base::ASCIIToUTF16(password); 75 AddPasswordEntry( const GURL& origin, const std::string& user_name, const std::string& password) argument
|
/external/chromium_org/components/sync_driver/ |
H A D | generic_change_processor_unittest.cc | 245 base::StringPrintf("password%i", i)); 265 // Verify the password is returned properly. 267 ASSERT_TRUE(password_list[i].GetSpecifics().password(). 269 ASSERT_FALSE(password_list[i].GetSpecifics().password().has_encrypted()); 271 password_list[i].GetSpecifics().password().client_only_encrypted_data(); 273 change_list[i].sync_data().GetSpecifics().password(). 287 ASSERT_TRUE(raw_specifics.password().has_encrypted()); 288 ASSERT_FALSE(raw_specifics.password().has_client_only_encrypted_data()); 304 base::StringPrintf("password%i", i)); 337 // Verify the password i [all...] |
/external/chromium_org/crypto/ |
H A D | p224_spake.cc | 99 PeerType peer_type, const base::StringPiece& password) 112 // Calculate |password| hash to get SPAKE password value. 113 SHA256HashString(std::string(password.data(), password.length()), 98 P224EncryptedKeyExchange( PeerType peer_type, const base::StringPiece& password) argument
|
/external/chromium_org/net/http/ |
H A D | http_auth_handler_ntlm_portable.cc | 249 // LM_Hash computes the LM hash of the given password. 251 // param password 252 // unicode password. 258 static void LM_Hash(const base::string16& password, uint8* hash) { argument 261 // Convert password to OEM character set. We'll just use the native 263 std::string passbuf = base::SysWideToNativeMB(base::UTF16ToWide(password)); 272 // Use password keys to hash LM magic string twice. 277 // NTLM_Hash computes the NTLM hash of the given password. 279 // param password 280 // null-terminated unicode password 283 NTLM_Hash(const base::string16& password, uint8* hash) argument 444 GenerateType3Msg(const base::string16& domain, const base::string16& username, const base::string16& password, const std::string& hostname, const void* rand_8_bytes, const void* in_buf, uint32 in_len, void** out_buf, uint32* out_len) argument [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/ |
H A D | connectivitychecker.cc | 83 SignalConfigReady(username(), password(), config, proxy_); 264 const std::string& username, const std::string& password, 272 CreateRelayPorts(username, password, config, proxy_info); 379 const std::string& username, const std::string& password, 392 password, 397 const std::string& username, const std::string& password, 410 password); 414 const std::string& username, const std::string& password, 447 RelayPort* port = CreateRelayPort(username, password, 475 const std::string password local 263 OnConfigReady( const std::string& username, const std::string& password, const PortConfiguration* config, const rtc::ProxyInfo& proxy_info) argument 378 CreateStunPort( const std::string& username, const std::string& password, const PortConfiguration* config, rtc::Network* network) argument 396 CreateRelayPort( const std::string& username, const std::string& password, const PortConfiguration* config, rtc::Network* network) argument 413 CreateRelayPorts( const std::string& username, const std::string& password, const PortConfiguration* config, const rtc::ProxyInfo& proxy_info) argument [all...] |