Searched refs:password (Results 251 - 275 of 833) sorted by relevance

<<11121314151617181920>>

/external/chromium_org/cloud_print/service/win/
H A Dservice_controller.cc133 const base::string16& password,
136 return InstallService(user, password, true, kServiceSwitch, user_data_dir,
142 const base::string16& password,
144 return InstallService(user, password, false, kRequirementsSwitch,
149 const base::string16& password,
205 password.empty() ? NULL : password.c_str()));
131 InstallConnectorService( const base::string16& user, const base::string16& password, const base::FilePath& user_data_dir, bool enable_logging) argument
140 InstallCheckService( const base::string16& user, const base::string16& password, const base::FilePath& user_data_dir) argument
148 InstallService(const base::string16& user, const base::string16& password, bool auto_start, const std::string& run_switch, const base::FilePath& user_data_dir, bool enable_logging) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_ttls.c231 u8 *password = dpos; local
234 password[password_len - 1] == '\0') {
239 password, password_len);
240 parse->user_password = password;
503 if (!sm->user || !sm->user->password || sm->user->password_hash ||
506 "password configured");
512 os_memcmp_const(sm->user->password, user_password,
514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password");
528 const u8 *password,
524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_ttls.c231 u8 *password = dpos; local
234 password[password_len - 1] == '\0') {
239 password, password_len);
240 parse->user_password = password;
503 if (!sm->user || !sm->user->password || sm->user->password_hash ||
506 "password configured");
512 os_memcmp_const(sm->user->password, user_password,
514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password");
528 const u8 *password,
524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c231 u8 *password = dpos; local
234 password[password_len - 1] == '\0') {
239 password, password_len);
240 parse->user_password = password;
503 if (!sm->user || !sm->user->password || sm->user->password_hash ||
506 "password configured");
512 os_memcmp_const(sm->user->password, user_password,
514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password");
528 const u8 *password,
524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument
[all...]
/external/chromium_org/chrome/browser/local_discovery/wifi/
H A Dwifi_manager_nonchromeos.cc30 const std::string& password) {
38 if (!password.empty()) {
39 wifi->SetString(onc::wifi::kPassphrase, password);
66 const std::string& password,
100 const std::string& password,
107 const std::string& password);
176 const std::string& password,
179 scoped_ptr<base::DictionaryValue> properties = MakeProperties(ssid, password);
194 if (FindAndConfigureNetwork(ssid, password, &network_guid)) {
407 const std::string& password,
29 MakeProperties(const std::string& ssid, const std::string& password) argument
174 ConfigureAndConnectPskNetwork( const std::string& ssid, const std::string& password, const WifiManager::SuccessCallback& callback) argument
405 FindAndConfigureNetwork( const std::string& ssid, const std::string& password, std::string* network_guid) argument
448 PostCredentialsCallback( const WifiManager::CredentialsCallback& callback, const std::string& ssid, bool success, const std::string& password) argument
[all...]
/external/chromium_org/chrome/browser/ui/login/
H A Dlogin_prompt.cc139 const base::string16& password) {
159 // Tell the password manager the credentials were submitted / accepted.
162 password_form_.password_value = password;
177 NotifyAuthSupplied(username, password);
184 base::Bind(&LoginHandler::SetAuthDeferred, this, username, password));
244 SetAuth(supplied_details->username(), supplied_details->password());
327 const base::string16& password) {
339 AuthSuppliedLoginNotificationDetails details(this, username, password);
376 const base::string16& password) {
380 request_->SetAuth(net::AuthCredentials(username, password));
138 SetAuth(const base::string16& username, const base::string16& password) argument
326 NotifyAuthSupplied(const base::string16& username, const base::string16& password) argument
375 SetAuthDeferred(const base::string16& username, const base::string16& password) argument
[all...]
/external/chromium_org/url/
H A Durl_canon_internal.cc321 DoOverrideComponent(repl_source.password, repl_parsed.password,
322 &source->password, &parsed->password);
358 repl_source.password, repl_parsed.password,
359 utf8_buffer, &parsed->password);
381 if (repl_source.password) source->password = utf8_buffer->data();
/external/chromium_org/chrome/browser/resources/chromeos/login/
H A Dlogin_common.js153 * Shows password changed screen that offers migration.
154 * @param {boolean} showError Whether to show the incorrect password error.
235 * Clears password field in user-pod.
259 * @param {string} password Login password.
261 Oobe.loginForTesting = function(username, password) {
264 chrome.send('completeLogin', [username, password, false]);
278 * @param {string} password Login password.
280 Oobe.authenticateForTesting = function(username, password) {
[all...]
/external/chromium_org/cloud_print/service/
H A Dservice_state.cc162 const std::string& password) {
174 post_body += "&Passwd=" + net::EscapeUrlEncodedData(password, true);
213 const std::string& password,
219 auth_token_ = LoginToGoogle("cloudprint", email_, password);
220 xmpp_auth_token_ = LoginToGoogle("chromiumsync", email_, password);
160 LoginToGoogle(const std::string& service, const std::string& email, const std::string& password) argument
212 Configure(const std::string& email, const std::string& password, const std::string& proxy_id) argument
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dcandidate.h53 const std::string& username, const std::string& password,
57 priority_(priority), username_(username), password_(password),
103 const std::string & password() const { return password_; } function in class:cricket::Candidate
104 void set_password(const std::string & password) { password_ = password; } argument
51 Candidate(const std::string& id, int component, const std::string& protocol, const rtc::SocketAddress& address, uint32 priority, const std::string& username, const std::string& password, const std::string& type, const std::string& network_name, uint32 generation, const std::string& foundation) argument
H A Dtcpport.h54 const std::string& password,
58 username, password, allow_listen);
80 const std::string& password, bool allow_listen);
48 Create(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, const rtc::IPAddress& ip, int min_port, int max_port, const std::string& username, const std::string& password, bool allow_listen) argument
/external/smack/src/org/jivesoftware/smack/
H A DConnectionConfiguration.java89 private String password; field in class:ConnectionConfiguration
95 // Holds the proxy information (such as proxyhost, proxyport, username, password etc)
211 // Set the default password of the cacert file that is "changeit"
326 * Returns the password to use to access the trust store file. It is assumed that all
327 * certificates share the same password in the trust store.
329 * @return the password to use to access the truststore file.
336 * Sets the password to use to access the trust store file. It is assumed that all
337 * certificates share the same password in the trust store.
339 * @param truststorePassword the password to use to access the truststore file.
661 * Returns a CallbackHandler to obtain information, such as the password o
771 setLoginInfo(String username, String password, String resource) argument
[all...]
H A DSASLAuthentication.java293 * @param password the password to send to the server.
298 public String authenticate(String username, String password, String resource) argument
319 currentMechanism.authenticate(username, connection.getServiceName(), password);
353 .authenticate(username, password, resource);
363 .authenticate(username, password, resource);
368 return new NonSASLAuthentication(connection).authenticate(username, password, resource);
/external/smack/src/org/jivesoftware/smack/sasl/
H A DSASLMechanism.java62 protected String password; field in class:SASLMechanism
77 * @param password the password for this account.
81 public void authenticate(String username, String host, String password) throws IOException, XMPPException { argument
87 this.password = password;
178 pcb.setPassword(password.toCharArray());
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dauthsrv.c72 if (eap_user->password) {
73 user->password = os_malloc(eap_user->password_len);
74 if (user->password == NULL)
76 os_memcpy(user->password, eap_user->password,
/external/wpa_supplicant_8/src/ap/
H A Dauthsrv.c72 if (eap_user->password) {
73 user->password = os_malloc(eap_user->password_len);
74 if (user->password == NULL)
76 os_memcpy(user->password, eap_user->password,
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dauthsrv.c72 if (eap_user->password) {
73 user->password = os_malloc(eap_user->password_len);
74 if (user->password == NULL)
76 os_memcpy(user->password, eap_user->password,
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
H A DPKCS12KeyStoreSpi.java475 char[] password)
524 char[] password,
581 char[] password,
592 PBEKeySpec pbeSpec = new PBEKeySpec(password);
615 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId);
633 char[] password)
636 PBEKeySpec pbeSpec = new PBEKeySpec(password);
664 char[] password,
674 PBEKeySpec pbeSpec = new PBEKeySpec(password);
700 Cipher cipher = createCipher(Cipher.DECRYPT_MODE, password, algI
473 engineGetKey( String alias, char[] password) argument
521 engineSetKeyEntry( String alias, Key key, char[] password, Certificate[] chain) argument
578 unwrapKey( AlgorithmIdentifier algId, byte[] data, char[] password, boolean wrongPKCS12Zero) argument
629 wrapKey( String algorithm, Key key, PKCS12PBEParams pbeParams, char[] password) argument
661 cryptData( boolean forEncryption, AlgorithmIdentifier algId, char[] password, boolean wrongPKCS12Zero, byte[] data) argument
715 createCipher(int mode, char[] password, AlgorithmIdentifier algId) argument
755 engineLoad( InputStream stream, char[] password) argument
1243 engineStore(OutputStream stream, char[] password) argument
1249 doStore(OutputStream stream, char[] password, boolean useDEREncoding) argument
1638 calculatePbeMac( ASN1ObjectIdentifier oid, byte[] salt, int itCount, char[] password, boolean wrongPkcs12Zero, byte[] data) argument
[all...]
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/
H A DLoginPrompt.java43 mPasswordView = (EditText) v.findViewById(R.id.password);
109 public void onAutofillDataAvailable(String username, String password) { argument
111 mPasswordView.setText(password);
/external/chromium_org/chrome/browser/resources/standalone/
H A Dstandalone_hack.js120 * @param {string} password the password of the user logging in.
122 function login(email_address, password) {
123 console.log('password', password);
124 if (password == 'correct') {
/external/chromium_org/chrome/browser/ui/passwords/
H A Dpassword_manager_presenter_unittest.cc63 const std::string& password);
78 const std::string& password) {
84 form->password_value = base::ASCIIToUTF16(password);
75 AddPasswordEntry( const GURL& origin, const std::string& user_name, const std::string& password) argument
/external/chromium_org/components/sync_driver/
H A Dgeneric_change_processor_unittest.cc245 base::StringPrintf("password%i", i));
265 // Verify the password is returned properly.
267 ASSERT_TRUE(password_list[i].GetSpecifics().password().
269 ASSERT_FALSE(password_list[i].GetSpecifics().password().has_encrypted());
271 password_list[i].GetSpecifics().password().client_only_encrypted_data();
273 change_list[i].sync_data().GetSpecifics().password().
287 ASSERT_TRUE(raw_specifics.password().has_encrypted());
288 ASSERT_FALSE(raw_specifics.password().has_client_only_encrypted_data());
304 base::StringPrintf("password%i", i));
337 // Verify the password i
[all...]
/external/chromium_org/crypto/
H A Dp224_spake.cc99 PeerType peer_type, const base::StringPiece& password)
112 // Calculate |password| hash to get SPAKE password value.
113 SHA256HashString(std::string(password.data(), password.length()),
98 P224EncryptedKeyExchange( PeerType peer_type, const base::StringPiece& password) argument
/external/chromium_org/net/http/
H A Dhttp_auth_handler_ntlm_portable.cc249 // LM_Hash computes the LM hash of the given password.
251 // param password
252 // unicode password.
258 static void LM_Hash(const base::string16& password, uint8* hash) { argument
261 // Convert password to OEM character set. We'll just use the native
263 std::string passbuf = base::SysWideToNativeMB(base::UTF16ToWide(password));
272 // Use password keys to hash LM magic string twice.
277 // NTLM_Hash computes the NTLM hash of the given password.
279 // param password
280 // null-terminated unicode password
283 NTLM_Hash(const base::string16& password, uint8* hash) argument
444 GenerateType3Msg(const base::string16& domain, const base::string16& username, const base::string16& password, const std::string& hostname, const void* rand_8_bytes, const void* in_buf, uint32 in_len, void** out_buf, uint32* out_len) argument
[all...]
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/
H A Dconnectivitychecker.cc83 SignalConfigReady(username(), password(), config, proxy_);
264 const std::string& username, const std::string& password,
272 CreateRelayPorts(username, password, config, proxy_info);
379 const std::string& username, const std::string& password,
392 password,
397 const std::string& username, const std::string& password,
410 password);
414 const std::string& username, const std::string& password,
447 RelayPort* port = CreateRelayPort(username, password,
475 const std::string password local
263 OnConfigReady( const std::string& username, const std::string& password, const PortConfiguration* config, const rtc::ProxyInfo& proxy_info) argument
378 CreateStunPort( const std::string& username, const std::string& password, const PortConfiguration* config, rtc::Network* network) argument
396 CreateRelayPort( const std::string& username, const std::string& password, const PortConfiguration* config, rtc::Network* network) argument
413 CreateRelayPorts( const std::string& username, const std::string& password, const PortConfiguration* config, const rtc::ProxyInfo& proxy_info) argument
[all...]

Completed in 548 milliseconds

<<11121314151617181920>>