/external/smack/src/org/apache/qpid/management/common/sasl/ |
H A D | PlainSaslClient.java | 41 private byte password[]; field in class:PlainSaslClient 51 this.password = (byte[]) userInfo[1]; 52 if (authenticationID == null || password == null) 54 throw new SaslException("PLAIN: authenticationID and password must be specified"); 73 password.length + 87 System.arraycopy(password, 0, response, size, password.length); 158 if (password != null) 160 for (int i = 0 ; i < password.length ; i++) 162 password[ [all...] |
/external/chromium_org/chrome/browser/chromeos/login/supervised/ |
H A D | supervised_user_authenticator.h | 37 const std::string& password, 59 const std::string password; member in class:chromeos::SupervisedUserAuthenticator::AuthAttempt 86 const std::string& password); 89 const std::string& password); 92 const std::string& password,
|
H A D | supervised_user_authentication_unittest.cc | 34 std::string password = "password"; local 44 Key key(password);
|
/external/chromium_org/crypto/ |
H A D | ec_private_key.h | 57 const std::string& password, 69 const std::string& password, 81 const std::string& password, 103 // The |password| and |iterations| are used as inputs to the key derivation 106 bool ExportEncryptedPrivateKey(const std::string& password, 137 const std::string& password,
|
/external/lldb/test/pexpect-2.4/examples/ |
H A D | passmass.py | 15 def login(host, user, password): 30 child.sendline(password) 42 # (current) UNIX password: 46 i = child.expect(['[Oo]ld [Pp]assword', '.current.*password', '[Nn]ew [Pp]assword']) 47 # Root does not require old password, so it gets to bypass the next step. 54 print 'Host did not like new password. Here is what it said...' 68 password = getpass.getpass('Current Password: ') 76 child = login(host, user, password) 80 print 'Changing password on host:', host 81 change_password(child, user, password, newpasswor [all...] |
/external/smack/src/org/jivesoftware/smackx/packet/ |
H A D | MUCInitialPresence.java | 31 * the occupant to speak the MUC protocol when joining a room. If the room requires a password 43 private String password; field in class:MUCInitialPresence 59 buf.append("<password>").append(getPassword()).append("</password>"); 80 * Returns the password to use when the room requires a password. 82 * @return the password to use when the room requires a password. 85 return password; 100 * Sets the password t 104 setPassword(String password) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 36 int nt_password_hash(const u8 *password, size_t password_len, 45 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 36 int nt_password_hash(const u8 *password, size_t password_len, 45 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 36 int nt_password_hash(const u8 *password, size_t password_len, 45 const u8 *password, size_t password_len,
|
/external/chromium_org/sync/test/android/javatests/src/org/chromium/sync/test/util/ |
H A D | AccountHolder.java | 14 * account, such as its password and set of granted auth tokens. 28 private AccountHolder(Account account, String password, Map<String, String> authTokens, argument 35 mPassword = password; 99 public AccountHolder withPassword(String password) { argument 100 return copy().password(password).build(); 120 return create().account(mAccount).password(mPassword).authTokens(mAuthTokens). 141 public Builder password(String password) { argument 142 mTempPassword = password; [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
H A D | pbkdf.c | 61 int PKCS5_PBKDF2_HMAC(const char *password, int password_len, argument 74 if (password == NULL) { 79 password_len = strlen(password); 81 if (!HMAC_Init_ex(&hctx_tpl, password, password_len, digest, NULL)) { 134 int PKCS5_PBKDF2_HMAC_SHA1(const char *password, int password_len, argument 138 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
|
/external/chromium_org/third_party/tlslite/scripts/ |
H A D | tlsdb.py | 92 password = args.get(4) variable 100 N, g, salt, verifier = VerifierDB.makeVerifier(username, password, bits) 114 password = args.getLast(4) variable 116 password = None variable 125 if password: 126 if db.check(username, password):
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/ |
H A D | MyKeyManagerFactorySpi.java | 38 protected void engineInit(KeyStore ks, char[] password) argument 41 if (password == null) { 42 throw new KeyStoreException("Incorrect password");
|
/external/chromium_org/android_webview/browser/ |
H A D | aw_login_delegate.h | 28 const base::string16& password); 39 const base::string16& password);
|
/external/chromium_org/chrome/browser/sync/test/integration/ |
H A D | single_client_supervised_user_settings_sync_test.cc | 51 // ProfileSyncServiceHarness sets the password, which can't be empty. 52 std::string password = "password"; local 53 GetClient(i)->SetCredentials(username, password);
|
/external/chromium_org/components/autofill/core/common/ |
H A D | password_form_fill_data.h | 25 base::string16 password; member in struct:autofill::UsernamesCollectionKey 30 base::string16 password; member in struct:autofill::PasswordAndRealm 34 // Structure used for autofilling password forms. Note that the realms in this 35 // struct are only set when the password's realm differs from the realm of the 42 // Identifies the HTML form on the page and preferred username/password for 54 // saved username/password to ensure uniqueness, though the username is not 59 // before we autofill the password. By default, this is off unless the 71 // matching stored logins to use as username/password values.
|
/external/chromium_org/components/password_manager/core/browser/ |
H A D | password_manager_driver.h | 44 // Informs the driver that |form| can be used for password generation. 52 // Tells the driver to fill the form with the |username| and |password|. 54 const base::string16& password) = 0; 57 // |password|. 59 const base::string16& password) = 0; 61 // Tells the driver to clear previewed password and username fields.
|
H A D | password_syncable_service.cc | 19 // Converts the |password| into a SyncData object. 20 syncer::SyncData SyncDataFromPassword(const autofill::PasswordForm& password); 24 const sync_pb::PasswordSpecificsData& password); 27 // |password| entry. 28 std::string MakePasswordSyncTag(const sync_pb::PasswordSpecificsData& password); 29 std::string MakePasswordSyncTag(const autofill::PasswordForm& password); 159 // Changes from password db that need to be propagated to sync. 235 specifics.password().client_only_encrypted_data(), time_now, entries); 315 // We have to notify password store observers of the change by hand since 316 // we use internal password stor 410 PasswordFromSpecifics( const sync_pb::PasswordSpecificsData& password) argument 438 MakePasswordSyncTag( const sync_pb::PasswordSpecificsData& password) argument 443 MakePasswordSyncTag(const autofill::PasswordForm& password) argument [all...] |
H A D | stub_password_manager_driver.cc | 36 const base::string16& password) { 41 const base::string16& password) { 35 FillSuggestion(const base::string16& username, const base::string16& password) argument 39 PreviewSuggestion( const base::string16& username, const base::string16& password) argument
|
H A D | stub_password_manager_driver.h | 30 const base::string16& password) OVERRIDE; 32 const base::string16& password) OVERRIDE;
|
/external/chromium_org/content/shell/browser/ |
H A D | shell_login_dialog.h | 43 const base::string16& password); 71 const base::string16& password);
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | plainsaslhandler.h | 40 PlainSaslHandler(const Jid & jid, const rtc::CryptString & password, argument 41 bool allow_plain) : jid_(jid), password_(password),
|