Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 709) sorted by relevance

12345678910>>...29

/external/chromium/chrome/browser/sync/glue/
Dpassword_model_associator.cc80 const sync_pb::PasswordSpecificsData& password = in AssociateModels() local
82 DCHECK_EQ(tag, MakeTag(password)); in AssociateModels()
86 if (MergePasswords(password, **ix, &new_password)) { in AssociateModels()
124 const sync_pb::PasswordSpecificsData& password = in AssociateModels() local
126 std::string tag = MakeTag(password); in AssociateModels()
133 CopyPassword(password, &new_password); in AssociateModels()
231 const std::string& password) { in GetSyncIdFromChromeId() argument
232 PasswordToSyncIdMap::const_iterator iter = id_map_.find(password); in GetSyncIdFromChromeId()
237 const std::string* password, int64 sync_id) { in Associate() argument
240 DCHECK(id_map_.find(*password) == id_map_.end()); in Associate()
[all …]
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
DPBEKeySpecTest.java51 char[] password = new char[] {'1', '2', '3', '4', '5'}; in testPBEKeySpec1() local
52 PBEKeySpec pbeks = new PBEKeySpec(password); in testPBEKeySpec1()
53 password[0] ++; in testPBEKeySpec1()
56 password[0] == pbeks.getPassword()[0]); in testPBEKeySpec1()
66 char[] password = new char[] {'1', '2', '3', '4', '5'}; in testPBEKeySpec2() local
83 new PBEKeySpec(password, null, iterationCount, keyLength); in testPBEKeySpec2()
92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength); in testPBEKeySpec2()
99 new PBEKeySpec(password, salt, -1, keyLength); in testPBEKeySpec2()
106 new PBEKeySpec(password, salt, iterationCount, -1); in testPBEKeySpec2()
113 new PBEKeySpec(password, salt, 0, keyLength); in testPBEKeySpec2()
[all …]
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/
DPBEParametersGenerator.java10 protected byte[] password; field in PBEParametersGenerator
30 byte[] password, in init() argument
34 this.password = password; in init()
46 return password; in getPassword()
104 char[] password) in PKCS5PasswordToBytes() argument
106 byte[] bytes = new byte[password.length]; in PKCS5PasswordToBytes()
110 bytes[i] = (byte)password[i]; in PKCS5PasswordToBytes()
124 char[] password) in PKCS5PasswordToUTF8Bytes() argument
126 return Strings.toUTF8ByteArray(password); in PKCS5PasswordToUTF8Bytes()
137 char[] password) in PKCS12PasswordToBytes() argument
[all …]
/external/nist-sip/java/gov/nist/javax/sip/address/
DUserInfo.java53 protected String password; field in UserInfo
89 if (this.password != null && other.password == null) in equals()
92 if (other.password != null && this.password == null) in equals()
95 if (this.password == other.password) in equals()
98 return (this.password.equals(other.password)); in equals()
110 if (password != null) in encode()
111 buffer.append(user).append(COLON).append(password); in encode()
121 this.password = null; in clearPassword()
143 return password; in getPassword()
169 password = p; in setPassword()
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/module/
DLoginModuleUtilsTest.java39 char[] password = LoginModuleUtils.getPassword(in); in testGetPassword() local
40 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword()
44 password = LoginModuleUtils.getPassword(in); in testGetPassword()
45 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword()
49 password = LoginModuleUtils.getPassword(in); in testGetPassword()
50 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword()
54 password = LoginModuleUtils.getPassword(in); in testGetPassword()
55 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword()
59 password = LoginModuleUtils.getPassword(in); in testGetPassword()
61 assertTrue(Arrays.equals(expectedString.toCharArray(), password)); in testGetPassword() local
[all …]
/external/webkit/Tools/Scripts/webkitpy/common/net/
Dcredentials.py86 password = self._keychain_value_with_label("^password: ",
88 return [username, password]
129 def _offer_to_store_credentials_in_keyring(self, username, password): argument
134 self._keyring.set_password(self.host, username, password)
137 username, password = self._credentials_from_environment()
140 if not username or not password:
141 username, password = self._credentials_from_git()
142 if not username or not password:
143 username, password = self._credentials_from_keychain(username)
145 if username and not password and self._keyring:
[all …]
/external/webkit/Source/WebKit/chromium/src/
DWebPasswordFormData.cpp55 HTMLInputElement** password, in locateSpecificPasswords() argument
59 ASSERT(password); in locateSpecificPasswords()
64 *password = fields->passwords[0]; in locateSpecificPasswords()
69 *password = fields->passwords[0]; in locateSpecificPasswords()
73 *password = fields->passwords[1]; in locateSpecificPasswords()
80 *password = fields->passwords[0]; in locateSpecificPasswords()
84 *password = fields->passwords[2]; in locateSpecificPasswords()
87 *password = fields->passwords[1]; in locateSpecificPasswords()
117 HTMLInputElement* password, in assemblePasswordFormResult() argument
138 if (password) { in assemblePasswordFormResult()
[all …]
/external/chromium/chrome/browser/resources/options/
Dpassword_manager_list.css7 button.password-button {
21 button.password-button:hover {
26 html[dir='ltr'] button.password-button {
30 html[dir='rtl'] button.password-button {
34 input[type="password"].inactive-password {
49 #saved-passwords-list .password {
54 #saved-passwords-list .password input[type="password"],
55 #saved-passwords-list .password input[type="text"] {
60 #password-exceptions-list .url {
66 #password-exceptions-list .url {
/external/chromium/net/ftp/
Dftp_auth_cache.cc17 const string16& password) in Entry() argument
20 password(password) { in Entry()
38 const string16& password) { in Add() argument
45 entry->password = password; in Add()
47 entries_.push_front(Entry(origin, username, password)); in Add()
56 const string16& password) { in Remove() argument
59 it->password == password) { in Remove()
/external/openssh/
Dauth-passwd.c81 auth_password(Authctxt *authctxt, const char *password) in auth_password() argument
93 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password()
98 int ret = auth_krb5_password(authctxt, password); in auth_password()
106 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password()
116 return (sshpam_auth_passwd(authctxt, password) && ok); in auth_password()
125 result = sys_auth_passwd(authctxt, password); in auth_password()
167 sys_auth_passwd(Authctxt *authctxt, const char *password) in sys_auth_passwd() argument
174 (char *)password); in sys_auth_passwd()
192 sys_auth_passwd(Authctxt *authctxt, const char *password) in sys_auth_passwd() argument
201 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0) in sys_auth_passwd()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Dmschapv2.c43 const u8 *password, size_t password_len, in mschapv2_derive_response() argument
71 password, password_len); in mschapv2_derive_response()
74 password, nt_response); in mschapv2_derive_response()
76 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
80 password, password_len); in mschapv2_derive_response()
83 password, password_len, nt_response); in mschapv2_derive_response()
84 generate_authenticator_response(password, password_len, in mschapv2_derive_response()
96 hash_nt_password_hash(password, password_hash_hash); in mschapv2_derive_response()
98 nt_password_hash(password, password_len, password_hash); in mschapv2_derive_response()
Deap_leap.c70 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
78 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request()
79 if (identity == NULL || password == NULL) in eap_leap_process_request()
124 challenge_response(challenge, password, rpos); in eap_leap_process_request()
126 nt_challenge_response(challenge, password, password_len, rpos); in eap_leap_process_request()
193 const u8 *pos, *password; in eap_leap_process_response() local
201 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response()
202 if (password == NULL) in eap_leap_process_response()
236 hash_nt_password_hash(password, pw_hash_hash); in eap_leap_process_response()
238 nt_password_hash(password, password_len, pw_hash); in eap_leap_process_response()
[all …]
Deap_otp.c39 const u8 *pos, *password; in eap_otp_process() local
51 password = eap_get_config_otp(sm, &password_len); in eap_otp_process()
52 if (password) in eap_otp_process()
55 password = eap_get_config_password(sm, &password_len); in eap_otp_process()
59 if (password == NULL) { in eap_otp_process()
76 wpabuf_put_data(resp, password, password_len); in eap_otp_process()
78 password, password_len); in eap_otp_process()
/external/wpa_supplicant_8/src/eap_peer/
Dmschapv2.c37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument
65 password, password_len); in mschapv2_derive_response()
68 password, nt_response); in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
74 password, password_len); in mschapv2_derive_response()
77 password, password_len, nt_response); in mschapv2_derive_response()
78 generate_authenticator_response(password, password_len, in mschapv2_derive_response()
90 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response()
93 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request()
74 if (identity == NULL || password == NULL) in eap_leap_process_request()
119 challenge_response(challenge, password, rpos); in eap_leap_process_request()
121 nt_challenge_response(challenge, password, password_len, rpos); in eap_leap_process_request()
188 const u8 *pos, *password; in eap_leap_process_response() local
196 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response()
197 if (password == NULL) in eap_leap_process_response()
231 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response()
236 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response()
[all …]
Deap_otp.c33 const u8 *pos, *password; in eap_otp_process() local
45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process()
46 if (password) in eap_otp_process()
49 password = eap_get_config_password(sm, &password_len); in eap_otp_process()
53 if (password == NULL) { in eap_otp_process()
70 wpabuf_put_data(resp, password, password_len); in eap_otp_process()
72 password, password_len); in eap_otp_process()
/external/chromium/chrome/browser/password_manager/
Dencryptor_password_mac_unittest.cc16 EncryptorPassword password(keychain); in TEST() local
17 EXPECT_FALSE(password.GetEncryptorPassword().empty()); in TEST()
27 EncryptorPassword password(keychain); in TEST() local
28 EXPECT_FALSE(password.GetEncryptorPassword().empty()); in TEST()
38 EncryptorPassword password(keychain); in TEST() local
39 EXPECT_TRUE(password.GetEncryptorPassword().empty()); in TEST()
49 EncryptorPassword password(keychain); in TEST() local
50 EXPECT_TRUE(password.GetEncryptorPassword().empty()); in TEST()
Dencryptor_password_mac.mm16 // Generates a random password and adds it to the Keychain. The added password
17 // is returned from the function. If an error occurs, an empty password is
22 std::string password = Generate128BitRandomHexString();
24 const_cast<void*>(static_cast<const void*>(password.data()));
31 password.size(),
40 return password;
64 std::string password =
67 return password;
/external/apache-http/src/org/apache/http/auth/
DUsernamePasswordCredentials.java51 private final String password; field in UsernamePasswordCredentials
67 this.password = usernamePassword.substring(atColon + 1); in UsernamePasswordCredentials()
70 this.password = null; in UsernamePasswordCredentials()
81 public UsernamePasswordCredentials(String userName, String password) { in UsernamePasswordCredentials() argument
87 this.password = password; in UsernamePasswordCredentials()
99 return password; in getPassword()
/external/openssh/openbsd-compat/
Dxcrypt.c61 xcrypt(const char *password, const char *salt) in xcrypt() argument
67 crypted = md5_crypt(password, salt); in xcrypt()
69 crypted = crypt(password, salt); in xcrypt()
72 crypted = bigcrypt(password, salt); in xcrypt()
74 crypted = crypt(password, salt); in xcrypt()
76 crypted = bigcrypt(password, salt); in xcrypt()
78 crypted = crypt(password, salt); in xcrypt()
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/net/
DPasswordAuthenticationTest.java31 char[] password = new char[] { 'd', 'r', 'o', 'w', 's', 's', 'a', 'p' }; in test_ConstructorLjava_lang_String$C() local
33 PasswordAuthentication pa = new PasswordAuthentication(name, password); in test_ConstructorLjava_lang_String$C()
36 assertTrue("Password was not cloned", returnedPassword != password); in test_ConstructorLjava_lang_String$C()
38 returnedPassword.length == password.length); in test_ConstructorLjava_lang_String$C()
39 for (int counter = password.length - 1; counter >= 0; counter--) in test_ConstructorLjava_lang_String$C()
41 returnedPassword[counter] == password[counter]); in test_ConstructorLjava_lang_String$C()
/external/bouncycastle/src/main/java/org/bouncycastle/openssl/
DPEMUtilities.java81 …static SecretKey generateSecretKeyForPKCS5Scheme2(String algorithm, char[] password, byte[] salt, … in generateSecretKeyForPKCS5Scheme2() argument
86 PBEParametersGenerator.PKCS5PasswordToBytes(password), in generateSecretKeyForPKCS5Scheme2()
97 char[] password, in crypt() argument
112 return crypt(encrypt, prov, bytes, password, dekAlgName, iv); in crypt()
119 char[] password, in crypt() argument
159 sKey = getKey(password, alg, 24, iv, des2); in crypt()
164 sKey = getKey(password, alg, 8, iv); in crypt()
169 sKey = getKey(password, alg, 16, iv); in crypt()
183 sKey = getKey(password, alg, keyBits / 8, iv); in crypt()
220 sKey = getKey(password, "AES", keyBits / 8, salt); in crypt()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/tests/
Dtest_ms_funcs.c22 u8 *password = "clientPass"; in main() local
72 nt_password_hash(password, strlen(password), buf); in main()
80 password, strlen(password), in main()
93 generate_authenticator_response(password, strlen(password), in main()
/external/wpa_supplicant_8/hostapd/
Dhostapd.eap_user3 # Each line must contain an identity, EAP method(s), and an optional password
4 # separated with whitespace (space or tab). The identity and password must be
6 # NtPasswordHash (16-byte MD4 hash of the unicode presentation of the password
8 # that the plaintext password does not need to be included in the user file.
20 # password option.
22 # password.
49 # plaintext password while TTLS-MSCHAP and TTLS-MSCHAPV2 can use NT password
53 "user" MD5 "password"
56 "DOMAIN\user" MSCHAPV2 "password"
57 "gtc user" GTC "password"
[all …]
Dnt_password_hash.c19 char *password, buf[64], *pos; in main() local
22 password = argv[1]; in main()
37 password = buf; in main()
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()

12345678910>>...29