/external/chromium/chrome/browser/sync/glue/ |
D | password_model_associator.cc | 80 const sync_pb::PasswordSpecificsData& password = in AssociateModels() local 82 DCHECK_EQ(tag, MakeTag(password)); in AssociateModels() 86 if (MergePasswords(password, **ix, &new_password)) { in AssociateModels() 124 const sync_pb::PasswordSpecificsData& password = in AssociateModels() local 126 std::string tag = MakeTag(password); in AssociateModels() 133 CopyPassword(password, &new_password); in AssociateModels() 231 const std::string& password) { in GetSyncIdFromChromeId() argument 232 PasswordToSyncIdMap::const_iterator iter = id_map_.find(password); in GetSyncIdFromChromeId() 237 const std::string* password, int64 sync_id) { in Associate() argument 240 DCHECK(id_map_.find(*password) == id_map_.end()); in Associate() [all …]
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
D | PBEKeySpecTest.java | 51 char[] password = new char[] {'1', '2', '3', '4', '5'}; in testPBEKeySpec1() local 52 PBEKeySpec pbeks = new PBEKeySpec(password); in testPBEKeySpec1() 53 password[0] ++; in testPBEKeySpec1() 56 password[0] == pbeks.getPassword()[0]); in testPBEKeySpec1() 66 char[] password = new char[] {'1', '2', '3', '4', '5'}; in testPBEKeySpec2() local 83 new PBEKeySpec(password, null, iterationCount, keyLength); in testPBEKeySpec2() 92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength); in testPBEKeySpec2() 99 new PBEKeySpec(password, salt, -1, keyLength); in testPBEKeySpec2() 106 new PBEKeySpec(password, salt, iterationCount, -1); in testPBEKeySpec2() 113 new PBEKeySpec(password, salt, 0, keyLength); in testPBEKeySpec2() [all …]
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/ |
D | PBEParametersGenerator.java | 10 protected byte[] password; field in PBEParametersGenerator 30 byte[] password, in init() argument 34 this.password = password; in init() 46 return password; in getPassword() 104 char[] password) in PKCS5PasswordToBytes() argument 106 byte[] bytes = new byte[password.length]; in PKCS5PasswordToBytes() 110 bytes[i] = (byte)password[i]; in PKCS5PasswordToBytes() 124 char[] password) in PKCS5PasswordToUTF8Bytes() argument 126 return Strings.toUTF8ByteArray(password); in PKCS5PasswordToUTF8Bytes() 137 char[] password) in PKCS12PasswordToBytes() argument [all …]
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
D | UserInfo.java | 53 protected String password; field in UserInfo 89 if (this.password != null && other.password == null) in equals() 92 if (other.password != null && this.password == null) in equals() 95 if (this.password == other.password) in equals() 98 return (this.password.equals(other.password)); in equals() 110 if (password != null) in encode() 111 buffer.append(user).append(COLON).append(password); in encode() 121 this.password = null; in clearPassword() 143 return password; in getPassword() 169 password = p; in setPassword()
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/module/ |
D | LoginModuleUtilsTest.java | 39 char[] password = LoginModuleUtils.getPassword(in); in testGetPassword() local 40 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword() 44 password = LoginModuleUtils.getPassword(in); in testGetPassword() 45 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword() 49 password = LoginModuleUtils.getPassword(in); in testGetPassword() 50 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword() 54 password = LoginModuleUtils.getPassword(in); in testGetPassword() 55 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword() 59 password = LoginModuleUtils.getPassword(in); in testGetPassword() 61 assertTrue(Arrays.equals(expectedString.toCharArray(), password)); in testGetPassword() local [all …]
|
/external/webkit/Tools/Scripts/webkitpy/common/net/ |
D | credentials.py | 86 password = self._keychain_value_with_label("^password: ", 88 return [username, password] 129 def _offer_to_store_credentials_in_keyring(self, username, password): argument 134 self._keyring.set_password(self.host, username, password) 137 username, password = self._credentials_from_environment() 140 if not username or not password: 141 username, password = self._credentials_from_git() 142 if not username or not password: 143 username, password = self._credentials_from_keychain(username) 145 if username and not password and self._keyring: [all …]
|
/external/webkit/Source/WebKit/chromium/src/ |
D | WebPasswordFormData.cpp | 55 HTMLInputElement** password, in locateSpecificPasswords() argument 59 ASSERT(password); in locateSpecificPasswords() 64 *password = fields->passwords[0]; in locateSpecificPasswords() 69 *password = fields->passwords[0]; in locateSpecificPasswords() 73 *password = fields->passwords[1]; in locateSpecificPasswords() 80 *password = fields->passwords[0]; in locateSpecificPasswords() 84 *password = fields->passwords[2]; in locateSpecificPasswords() 87 *password = fields->passwords[1]; in locateSpecificPasswords() 117 HTMLInputElement* password, in assemblePasswordFormResult() argument 138 if (password) { in assemblePasswordFormResult() [all …]
|
/external/chromium/chrome/browser/resources/options/ |
D | password_manager_list.css | 7 button.password-button { 21 button.password-button:hover { 26 html[dir='ltr'] button.password-button { 30 html[dir='rtl'] button.password-button { 34 input[type="password"].inactive-password { 49 #saved-passwords-list .password { 54 #saved-passwords-list .password input[type="password"], 55 #saved-passwords-list .password input[type="text"] { 60 #password-exceptions-list .url { 66 #password-exceptions-list .url {
|
/external/chromium/net/ftp/ |
D | ftp_auth_cache.cc | 17 const string16& password) in Entry() argument 20 password(password) { in Entry() 38 const string16& password) { in Add() argument 45 entry->password = password; in Add() 47 entries_.push_front(Entry(origin, username, password)); in Add() 56 const string16& password) { in Remove() argument 59 it->password == password) { in Remove()
|
/external/openssh/ |
D | auth-passwd.c | 81 auth_password(Authctxt *authctxt, const char *password) in auth_password() argument 93 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password() 98 int ret = auth_krb5_password(authctxt, password); in auth_password() 106 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password() 116 return (sshpam_auth_passwd(authctxt, password) && ok); in auth_password() 125 result = sys_auth_passwd(authctxt, password); in auth_password() 167 sys_auth_passwd(Authctxt *authctxt, const char *password) in sys_auth_passwd() argument 174 (char *)password); in sys_auth_passwd() 192 sys_auth_passwd(Authctxt *authctxt, const char *password) in sys_auth_passwd() argument 201 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0) in sys_auth_passwd() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | mschapv2.c | 43 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 71 password, password_len); in mschapv2_derive_response() 74 password, nt_response); in mschapv2_derive_response() 76 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 80 password, password_len); in mschapv2_derive_response() 83 password, password_len, nt_response); in mschapv2_derive_response() 84 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 96 hash_nt_password_hash(password, password_hash_hash); in mschapv2_derive_response() 98 nt_password_hash(password, password_len, password_hash); in mschapv2_derive_response()
|
D | eap_leap.c | 70 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 78 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request() 79 if (identity == NULL || password == NULL) in eap_leap_process_request() 124 challenge_response(challenge, password, rpos); in eap_leap_process_request() 126 nt_challenge_response(challenge, password, password_len, rpos); in eap_leap_process_request() 193 const u8 *pos, *password; in eap_leap_process_response() local 201 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response() 202 if (password == NULL) in eap_leap_process_response() 236 hash_nt_password_hash(password, pw_hash_hash); in eap_leap_process_response() 238 nt_password_hash(password, password_len, pw_hash); in eap_leap_process_response() [all …]
|
D | eap_otp.c | 39 const u8 *pos, *password; in eap_otp_process() local 51 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 52 if (password) in eap_otp_process() 55 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 59 if (password == NULL) { in eap_otp_process() 76 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 78 password, password_len); in eap_otp_process()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | mschapv2.c | 37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 65 password, password_len); in mschapv2_derive_response() 68 password, nt_response); in mschapv2_derive_response() 70 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 74 password, password_len); in mschapv2_derive_response() 77 password, password_len, nt_response); in mschapv2_derive_response() 78 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 90 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response() 93 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request() 74 if (identity == NULL || password == NULL) in eap_leap_process_request() 119 challenge_response(challenge, password, rpos); in eap_leap_process_request() 121 nt_challenge_response(challenge, password, password_len, rpos); in eap_leap_process_request() 188 const u8 *pos, *password; in eap_leap_process_response() local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response() 197 if (password == NULL) in eap_leap_process_response() 231 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response() 236 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response() [all …]
|
D | eap_otp.c | 33 const u8 *pos, *password; in eap_otp_process() local 45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 46 if (password) in eap_otp_process() 49 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 53 if (password == NULL) { in eap_otp_process() 70 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 72 password, password_len); in eap_otp_process()
|
/external/chromium/chrome/browser/password_manager/ |
D | encryptor_password_mac_unittest.cc | 16 EncryptorPassword password(keychain); in TEST() local 17 EXPECT_FALSE(password.GetEncryptorPassword().empty()); in TEST() 27 EncryptorPassword password(keychain); in TEST() local 28 EXPECT_FALSE(password.GetEncryptorPassword().empty()); in TEST() 38 EncryptorPassword password(keychain); in TEST() local 39 EXPECT_TRUE(password.GetEncryptorPassword().empty()); in TEST() 49 EncryptorPassword password(keychain); in TEST() local 50 EXPECT_TRUE(password.GetEncryptorPassword().empty()); in TEST()
|
D | encryptor_password_mac.mm | 16 // Generates a random password and adds it to the Keychain. The added password 17 // is returned from the function. If an error occurs, an empty password is 22 std::string password = Generate128BitRandomHexString(); 24 const_cast<void*>(static_cast<const void*>(password.data())); 31 password.size(), 40 return password; 64 std::string password = 67 return password;
|
/external/apache-http/src/org/apache/http/auth/ |
D | UsernamePasswordCredentials.java | 51 private final String password; field in UsernamePasswordCredentials 67 this.password = usernamePassword.substring(atColon + 1); in UsernamePasswordCredentials() 70 this.password = null; in UsernamePasswordCredentials() 81 public UsernamePasswordCredentials(String userName, String password) { in UsernamePasswordCredentials() argument 87 this.password = password; in UsernamePasswordCredentials() 99 return password; in getPassword()
|
/external/openssh/openbsd-compat/ |
D | xcrypt.c | 61 xcrypt(const char *password, const char *salt) in xcrypt() argument 67 crypted = md5_crypt(password, salt); in xcrypt() 69 crypted = crypt(password, salt); in xcrypt() 72 crypted = bigcrypt(password, salt); in xcrypt() 74 crypted = crypt(password, salt); in xcrypt() 76 crypted = bigcrypt(password, salt); in xcrypt() 78 crypted = crypt(password, salt); in xcrypt()
|
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/net/ |
D | PasswordAuthenticationTest.java | 31 char[] password = new char[] { 'd', 'r', 'o', 'w', 's', 's', 'a', 'p' }; in test_ConstructorLjava_lang_String$C() local 33 PasswordAuthentication pa = new PasswordAuthentication(name, password); in test_ConstructorLjava_lang_String$C() 36 assertTrue("Password was not cloned", returnedPassword != password); in test_ConstructorLjava_lang_String$C() 38 returnedPassword.length == password.length); in test_ConstructorLjava_lang_String$C() 39 for (int counter = password.length - 1; counter >= 0; counter--) in test_ConstructorLjava_lang_String$C() 41 returnedPassword[counter] == password[counter]); in test_ConstructorLjava_lang_String$C()
|
/external/bouncycastle/src/main/java/org/bouncycastle/openssl/ |
D | PEMUtilities.java | 81 …static SecretKey generateSecretKeyForPKCS5Scheme2(String algorithm, char[] password, byte[] salt, … in generateSecretKeyForPKCS5Scheme2() argument 86 PBEParametersGenerator.PKCS5PasswordToBytes(password), in generateSecretKeyForPKCS5Scheme2() 97 char[] password, in crypt() argument 112 return crypt(encrypt, prov, bytes, password, dekAlgName, iv); in crypt() 119 char[] password, in crypt() argument 159 sKey = getKey(password, alg, 24, iv, des2); in crypt() 164 sKey = getKey(password, alg, 8, iv); in crypt() 169 sKey = getKey(password, alg, 16, iv); in crypt() 183 sKey = getKey(password, alg, keyBits / 8, iv); in crypt() 220 sKey = getKey(password, "AES", keyBits / 8, salt); in crypt() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
D | test_ms_funcs.c | 22 u8 *password = "clientPass"; in main() local 72 nt_password_hash(password, strlen(password), buf); in main() 80 password, strlen(password), in main() 93 generate_authenticator_response(password, strlen(password), in main()
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.eap_user | 3 # Each line must contain an identity, EAP method(s), and an optional password 4 # separated with whitespace (space or tab). The identity and password must be 6 # NtPasswordHash (16-byte MD4 hash of the unicode presentation of the password 8 # that the plaintext password does not need to be included in the user file. 20 # password option. 22 # password. 49 # plaintext password while TTLS-MSCHAP and TTLS-MSCHAPV2 can use NT password 53 "user" MD5 "password" 56 "DOMAIN\user" MSCHAPV2 "password" 57 "gtc user" GTC "password" [all …]
|
D | nt_password_hash.c | 19 char *password, buf[64], *pos; in main() local 22 password = argv[1]; in main() 37 password = buf; in main() 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
|