/external/chromium/chrome/browser/sync/glue/ |
D | password_model_associator.cc | 80 const sync_pb::PasswordSpecificsData& password = in AssociateModels() local 82 DCHECK_EQ(tag, MakeTag(password)); in AssociateModels() 86 if (MergePasswords(password, **ix, &new_password)) { in AssociateModels() 124 const sync_pb::PasswordSpecificsData& password = in AssociateModels() local 126 std::string tag = MakeTag(password); in AssociateModels() 133 CopyPassword(password, &new_password); in AssociateModels() 231 const std::string& password) { in GetSyncIdFromChromeId() argument 232 PasswordToSyncIdMap::const_iterator iter = id_map_.find(password); in GetSyncIdFromChromeId() 237 const std::string* password, int64 sync_id) { in Associate() argument 240 DCHECK(id_map_.find(*password) == id_map_.end()); in Associate() [all …]
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
D | PBEKeySpecTest.java | 51 char[] password = new char[] {'1', '2', '3', '4', '5'}; in testPBEKeySpec1() local 52 PBEKeySpec pbeks = new PBEKeySpec(password); in testPBEKeySpec1() 53 password[0] ++; in testPBEKeySpec1() 56 password[0] == pbeks.getPassword()[0]); in testPBEKeySpec1() 66 char[] password = new char[] {'1', '2', '3', '4', '5'}; in testPBEKeySpec2() local 83 new PBEKeySpec(password, null, iterationCount, keyLength); in testPBEKeySpec2() 92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength); in testPBEKeySpec2() 99 new PBEKeySpec(password, salt, -1, keyLength); in testPBEKeySpec2() 106 new PBEKeySpec(password, salt, iterationCount, -1); in testPBEKeySpec2() 113 new PBEKeySpec(password, salt, 0, keyLength); in testPBEKeySpec2() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
D | PBEParametersGenerator.java | 10 protected byte[] password; field in PBEParametersGenerator 30 byte[] password, in init() argument 34 this.password = password; in init() 46 return password; in getPassword() 104 char[] password) in PKCS5PasswordToBytes() argument 106 if (password != null) in PKCS5PasswordToBytes() 108 byte[] bytes = new byte[password.length]; in PKCS5PasswordToBytes() 112 bytes[i] = (byte)password[i]; in PKCS5PasswordToBytes() 131 char[] password) in PKCS5PasswordToUTF8Bytes() argument 133 return Strings.toUTF8ByteArray(password); in PKCS5PasswordToUTF8Bytes() [all …]
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
D | UserInfo.java | 53 protected String password; field in UserInfo 89 if (this.password != null && other.password == null) in equals() 92 if (other.password != null && this.password == null) in equals() 95 if (this.password == other.password) in equals() 98 return (this.password.equals(other.password)); in equals() 110 if (password != null) in encode() 111 buffer.append(user).append(COLON).append(password); in encode() 121 this.password = null; in clearPassword() 143 return password; in getPassword() 169 password = p; in setPassword()
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/module/ |
D | LoginModuleUtilsTest.java | 39 char[] password = LoginModuleUtils.getPassword(in); in testGetPassword() local 40 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword() 44 password = LoginModuleUtils.getPassword(in); in testGetPassword() 45 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword() 49 password = LoginModuleUtils.getPassword(in); in testGetPassword() 50 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword() 54 password = LoginModuleUtils.getPassword(in); in testGetPassword() 55 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); in testGetPassword() 59 password = LoginModuleUtils.getPassword(in); in testGetPassword() 61 assertTrue(Arrays.equals(expectedString.toCharArray(), password)); in testGetPassword() local [all …]
|
/external/webkit/Tools/Scripts/webkitpy/common/net/ |
D | credentials.py | 86 password = self._keychain_value_with_label("^password: ", 88 return [username, password] 129 def _offer_to_store_credentials_in_keyring(self, username, password): argument 134 self._keyring.set_password(self.host, username, password) 137 username, password = self._credentials_from_environment() 140 if not username or not password: 141 username, password = self._credentials_from_git() 142 if not username or not password: 143 username, password = self._credentials_from_keychain(username) 145 if username and not password and self._keyring: [all …]
|
/external/webkit/Source/WebKit/chromium/src/ |
D | WebPasswordFormData.cpp | 55 HTMLInputElement** password, in locateSpecificPasswords() argument 59 ASSERT(password); in locateSpecificPasswords() 64 *password = fields->passwords[0]; in locateSpecificPasswords() 69 *password = fields->passwords[0]; in locateSpecificPasswords() 73 *password = fields->passwords[1]; in locateSpecificPasswords() 80 *password = fields->passwords[0]; in locateSpecificPasswords() 84 *password = fields->passwords[2]; in locateSpecificPasswords() 87 *password = fields->passwords[1]; in locateSpecificPasswords() 117 HTMLInputElement* password, in assemblePasswordFormResult() argument 138 if (password) { in assemblePasswordFormResult() [all …]
|
/external/chromium/chrome/browser/resources/options/ |
D | password_manager_list.css | 7 button.password-button { 21 button.password-button:hover { 26 html[dir='ltr'] button.password-button { 30 html[dir='rtl'] button.password-button { 34 input[type="password"].inactive-password { 49 #saved-passwords-list .password { 54 #saved-passwords-list .password input[type="password"], 55 #saved-passwords-list .password input[type="text"] { 60 #password-exceptions-list .url { 66 #password-exceptions-list .url {
|
/external/chromium/net/ftp/ |
D | ftp_auth_cache.cc | 17 const string16& password) in Entry() argument 20 password(password) { in Entry() 38 const string16& password) { in Add() argument 45 entry->password = password; in Add() 47 entries_.push_front(Entry(origin, username, password)); in Add() 56 const string16& password) { in Remove() argument 59 it->password == password) { in Remove()
|
/external/smack/src/org/jivesoftware/smack/packet/ |
D | Authentication.java | 32 private String password = null; field in Authentication 73 return password; in getPassword() 81 public void setPassword(String password) { in setPassword() argument 82 this.password = password; in setPassword() 111 public void setDigest(String connectionID, String password) { in setDigest() argument 112 this.digest = StringUtils.hash(connectionID + password); in setDigest() 167 if (password != null && digest == null) { in getChildElementXML() 168 if (password.equals("")) { in getChildElementXML() 172 … buf.append("<password>").append(StringUtils.escapeForXML(password)).append("</password>"); in getChildElementXML()
|
/external/smack/src/org/jivesoftware/smackx/bookmark/ |
D | BookmarkedConference.java | 34 private String password; field in BookmarkedConference 42 String password) in BookmarkedConference() argument 48 this.password = password; in BookmarkedConference() 108 return password; in getPassword() 111 protected void setPassword(String password) { in setPassword() argument 112 this.password = password; in setPassword()
|
/external/openssh/ |
D | auth-passwd.c | 81 auth_password(Authctxt *authctxt, const char *password) in auth_password() argument 93 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password() 98 int ret = auth_krb5_password(authctxt, password); in auth_password() 106 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password() 116 return (sshpam_auth_passwd(authctxt, password) && ok); in auth_password() 125 result = sys_auth_passwd(authctxt, password); in auth_password() 167 sys_auth_passwd(Authctxt *authctxt, const char *password) in sys_auth_passwd() argument 174 (char *)password); in sys_auth_passwd() 192 sys_auth_passwd(Authctxt *authctxt, const char *password) in sys_auth_passwd() argument 201 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0) in sys_auth_passwd() [all …]
|
D | auth2-passwd.c | 52 char *password, *newpass; in userauth_passwd() local 58 password = packet_get_string(&len); in userauth_passwd() 71 else if (PRIVSEP(auth_password(authctxt, password)) == 1) in userauth_passwd() 74 memset(password, 0, len); in userauth_passwd() 75 xfree(password); in userauth_passwd()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | mschapv2.c | 37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 65 password, password_len); in mschapv2_derive_response() 68 password, nt_response) || in mschapv2_derive_response() 70 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 76 password, password_len); in mschapv2_derive_response() 79 password, password_len, in mschapv2_derive_response() 81 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 96 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response() 99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request() 74 if (identity == NULL || password == NULL) in eap_leap_process_request() 119 challenge_response(challenge, password, rpos); in eap_leap_process_request() 121 nt_challenge_response(challenge, password, password_len, rpos); in eap_leap_process_request() 188 const u8 *pos, *password; in eap_leap_process_response() local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response() 197 if (password == NULL) in eap_leap_process_response() 231 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response() 236 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response() [all …]
|
D | eap_otp.c | 33 const u8 *pos, *password; in eap_otp_process() local 45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 46 if (password) in eap_otp_process() 49 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 53 if (password == NULL) { in eap_otp_process() 70 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 72 password, password_len); in eap_otp_process()
|
/external/chromium/chrome/browser/password_manager/ |
D | encryptor_password_mac_unittest.cc | 16 EncryptorPassword password(keychain); in TEST() local 17 EXPECT_FALSE(password.GetEncryptorPassword().empty()); in TEST() 27 EncryptorPassword password(keychain); in TEST() local 28 EXPECT_FALSE(password.GetEncryptorPassword().empty()); in TEST() 38 EncryptorPassword password(keychain); in TEST() local 39 EXPECT_TRUE(password.GetEncryptorPassword().empty()); in TEST() 49 EncryptorPassword password(keychain); in TEST() local 50 EXPECT_TRUE(password.GetEncryptorPassword().empty()); in TEST()
|
D | encryptor_password_mac.mm | 16 // Generates a random password and adds it to the Keychain. The added password 17 // is returned from the function. If an error occurs, an empty password is 22 std::string password = Generate128BitRandomHexString(); 24 const_cast<void*>(static_cast<const void*>(password.data())); 31 password.size(), 40 return password; 64 std::string password = 67 return password;
|
/external/apache-http/src/org/apache/http/auth/ |
D | UsernamePasswordCredentials.java | 51 private final String password; field in UsernamePasswordCredentials 67 this.password = usernamePassword.substring(atColon + 1); in UsernamePasswordCredentials() 70 this.password = null; in UsernamePasswordCredentials() 81 public UsernamePasswordCredentials(String userName, String password) { in UsernamePasswordCredentials() argument 87 this.password = password; in UsernamePasswordCredentials() 99 return password; in getPassword()
|
/external/openssh/openbsd-compat/ |
D | xcrypt.c | 61 xcrypt(const char *password, const char *salt) in xcrypt() argument 67 crypted = md5_crypt(password, salt); in xcrypt() 69 crypted = crypt(password, salt); in xcrypt() 72 crypted = bigcrypt(password, salt); in xcrypt() 74 crypted = crypt(password, salt); in xcrypt() 76 crypted = bigcrypt(password, salt); in xcrypt() 78 crypted = crypt(password, salt); in xcrypt()
|
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/net/ |
D | PasswordAuthenticationTest.java | 31 char[] password = new char[] { 'd', 'r', 'o', 'w', 's', 's', 'a', 'p' }; in test_ConstructorLjava_lang_String$C() local 33 PasswordAuthentication pa = new PasswordAuthentication(name, password); in test_ConstructorLjava_lang_String$C() 36 assertTrue("Password was not cloned", returnedPassword != password); in test_ConstructorLjava_lang_String$C() 38 returnedPassword.length == password.length); in test_ConstructorLjava_lang_String$C() 39 for (int counter = password.length - 1; counter >= 0; counter--) in test_ConstructorLjava_lang_String$C() 41 returnedPassword[counter] == password[counter]); in test_ConstructorLjava_lang_String$C()
|
/external/smack/src/org/apache/qpid/management/common/sasl/ |
D | PlainSaslClient.java | 41 private byte password[]; field in PlainSaslClient 51 this.password = (byte[]) userInfo[1]; in PlainSaslClient() 52 if (authenticationID == null || password == null) in PlainSaslClient() 73 password.length + in evaluateChallenge() 87 System.arraycopy(password, 0, response, size, password.length); in evaluateChallenge() 158 if (password != null) in clearPassword() 160 for (int i = 0 ; i < password.length ; i++) in clearPassword() 162 password[i] = 0; in clearPassword() 164 password = null; in clearPassword()
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.eap_user | 3 # Each line must contain an identity, EAP method(s), and an optional password 4 # separated with whitespace (space or tab). The identity and password must be 6 # NtPasswordHash (16-byte MD4 hash of the unicode presentation of the password 8 # that the plaintext password does not need to be included in the user file. 20 # password option. 22 # password. 49 # plaintext password while TTLS-MSCHAP and TTLS-MSCHAPV2 can use NT password 53 "user" MD5 "password" 56 "DOMAIN\user" MSCHAPV2 "password" 57 "gtc user" GTC "password" [all …]
|
D | nt_password_hash.c | 19 char *password, buf[64], *pos; in main() local 22 password = argv[1]; in main() 37 password = buf; in main() 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
|
/external/dropbear/ |
D | cli-authpasswd.c | 118 char* password = NULL; in cli_auth_password() local 128 password = gui_getpass(prompt); in cli_auth_password() 131 password = getpass_or_cancel(prompt); in cli_auth_password() 146 buf_putstring(ses.writepayload, password, strlen(password)); in cli_auth_password() 149 m_burn(password, strlen(password)); in cli_auth_password()
|