Searched refs:password (Results 76 - 100 of 833) sorted by relevance

1234567891011>>

/external/smack/src/org/apache/qpid/management/common/sasl/
H A DPlainSaslClient.java41 private byte password[]; field in class:PlainSaslClient
51 this.password = (byte[]) userInfo[1];
52 if (authenticationID == null || password == null)
54 throw new SaslException("PLAIN: authenticationID and password must be specified");
73 password.length +
87 System.arraycopy(password, 0, response, size, password.length);
158 if (password != null)
160 for (int i = 0 ; i < password.length ; i++)
162 password[
[all...]
/external/chromium_org/chrome/browser/chromeos/login/supervised/
H A Dsupervised_user_authenticator.h37 const std::string& password,
59 const std::string password; member in class:chromeos::SupervisedUserAuthenticator::AuthAttempt
86 const std::string& password);
89 const std::string& password);
92 const std::string& password,
H A Dsupervised_user_authentication_unittest.cc34 std::string password = "password"; local
44 Key key(password);
/external/chromium_org/crypto/
H A Dec_private_key.h57 const std::string& password,
69 const std::string& password,
81 const std::string& password,
103 // The |password| and |iterations| are used as inputs to the key derivation
106 bool ExportEncryptedPrivateKey(const std::string& password,
137 const std::string& password,
/external/lldb/test/pexpect-2.4/examples/
H A Dpassmass.py15 def login(host, user, password):
30 child.sendline(password)
42 # (current) UNIX password:
46 i = child.expect(['[Oo]ld [Pp]assword', '.current.*password', '[Nn]ew [Pp]assword'])
47 # Root does not require old password, so it gets to bypass the next step.
54 print 'Host did not like new password. Here is what it said...'
68 password = getpass.getpass('Current Password: ')
76 child = login(host, user, password)
80 print 'Changing password on host:', host
81 change_password(child, user, password, newpasswor
[all...]
/external/smack/src/org/jivesoftware/smackx/packet/
H A DMUCInitialPresence.java31 * the occupant to speak the MUC protocol when joining a room. If the room requires a password
43 private String password; field in class:MUCInitialPresence
59 buf.append("<password>").append(getPassword()).append("</password>");
80 * Returns the password to use when the room requires a password.
82 * @return the password to use when the room requires a password.
85 return password;
100 * Sets the password t
104 setPassword(String password) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
31 int nt_challenge_response(const u8 *challenge, const u8 *password,
36 int nt_password_hash(const u8 *password, size_t password_len,
45 const u8 *password, size_t password_len,
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
31 int nt_challenge_response(const u8 *challenge, const u8 *password,
36 int nt_password_hash(const u8 *password, size_t password_len,
45 const u8 *password, size_t password_len,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
31 int nt_challenge_response(const u8 *challenge, const u8 *password,
36 int nt_password_hash(const u8 *password, size_t password_len,
45 const u8 *password, size_t password_len,
/external/chromium_org/sync/test/android/javatests/src/org/chromium/sync/test/util/
H A DAccountHolder.java14 * account, such as its password and set of granted auth tokens.
28 private AccountHolder(Account account, String password, Map<String, String> authTokens, argument
35 mPassword = password;
99 public AccountHolder withPassword(String password) { argument
100 return copy().password(password).build();
120 return create().account(mAccount).password(mPassword).authTokens(mAuthTokens).
141 public Builder password(String password) { argument
142 mTempPassword = password;
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/evp/
H A Dpbkdf.c61 int PKCS5_PBKDF2_HMAC(const char *password, int password_len, argument
74 if (password == NULL) {
79 password_len = strlen(password);
81 if (!HMAC_Init_ex(&hctx_tpl, password, password_len, digest, NULL)) {
134 int PKCS5_PBKDF2_HMAC_SHA1(const char *password, int password_len, argument
138 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
/external/chromium_org/third_party/tlslite/scripts/
H A Dtlsdb.py92 password = args.get(4) variable
100 N, g, salt, verifier = VerifierDB.makeVerifier(username, password, bits)
114 password = args.getLast(4) variable
116 password = None variable
125 if password:
126 if db.check(username, password):
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/
H A DMyKeyManagerFactorySpi.java38 protected void engineInit(KeyStore ks, char[] password) argument
41 if (password == null) {
42 throw new KeyStoreException("Incorrect password");
/external/chromium_org/android_webview/browser/
H A Daw_login_delegate.h28 const base::string16& password);
39 const base::string16& password);
/external/chromium_org/chrome/browser/sync/test/integration/
H A Dsingle_client_supervised_user_settings_sync_test.cc51 // ProfileSyncServiceHarness sets the password, which can't be empty.
52 std::string password = "password"; local
53 GetClient(i)->SetCredentials(username, password);
/external/chromium_org/components/autofill/core/common/
H A Dpassword_form_fill_data.h25 base::string16 password; member in struct:autofill::UsernamesCollectionKey
30 base::string16 password; member in struct:autofill::PasswordAndRealm
34 // Structure used for autofilling password forms. Note that the realms in this
35 // struct are only set when the password's realm differs from the realm of the
42 // Identifies the HTML form on the page and preferred username/password for
54 // saved username/password to ensure uniqueness, though the username is not
59 // before we autofill the password. By default, this is off unless the
71 // matching stored logins to use as username/password values.
/external/chromium_org/components/password_manager/core/browser/
H A Dpassword_manager_driver.h44 // Informs the driver that |form| can be used for password generation.
52 // Tells the driver to fill the form with the |username| and |password|.
54 const base::string16& password) = 0;
57 // |password|.
59 const base::string16& password) = 0;
61 // Tells the driver to clear previewed password and username fields.
H A Dpassword_syncable_service.cc19 // Converts the |password| into a SyncData object.
20 syncer::SyncData SyncDataFromPassword(const autofill::PasswordForm& password);
24 const sync_pb::PasswordSpecificsData& password);
27 // |password| entry.
28 std::string MakePasswordSyncTag(const sync_pb::PasswordSpecificsData& password);
29 std::string MakePasswordSyncTag(const autofill::PasswordForm& password);
159 // Changes from password db that need to be propagated to sync.
235 specifics.password().client_only_encrypted_data(), time_now, entries);
315 // We have to notify password store observers of the change by hand since
316 // we use internal password stor
410 PasswordFromSpecifics( const sync_pb::PasswordSpecificsData& password) argument
438 MakePasswordSyncTag( const sync_pb::PasswordSpecificsData& password) argument
443 MakePasswordSyncTag(const autofill::PasswordForm& password) argument
[all...]
H A Dstub_password_manager_driver.cc36 const base::string16& password) {
41 const base::string16& password) {
35 FillSuggestion(const base::string16& username, const base::string16& password) argument
39 PreviewSuggestion( const base::string16& username, const base::string16& password) argument
H A Dstub_password_manager_driver.h30 const base::string16& password) OVERRIDE;
32 const base::string16& password) OVERRIDE;
/external/chromium_org/content/shell/browser/
H A Dshell_login_dialog.h43 const base::string16& password);
71 const base::string16& password);
/external/chromium_org/third_party/libjingle/source/talk/xmpp/
H A Dplainsaslhandler.h40 PlainSaslHandler(const Jid & jid, const rtc::CryptString & password, argument
41 bool allow_plain) : jid_(jid), password_(password),

Completed in 5415 milliseconds

1234567891011>>