HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 1 - 25 of 1193) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/clang/test/Analysis/
default-diagnostic-visitors.c 8 int *password; // expected-note {{'password' declared without an initial value}} local
9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}}
10 err = *password;
  /libcore/luni/src/main/java/javax/crypto/spec/
PBEKeySpec.java 25 * The key specification for a <i>password based encryption</i> key.
27 * Password based encryption is described in <a
32 private char[] password; field in class:PBEKeySpec
38 * Creates a new <code>PBEKeySpec</code> with the specified password.
40 * @param password
41 * the password.
43 public PBEKeySpec(char[] password) {
44 if (password == null) {
45 this.password = EmptyArray.CHAR;
47 this.password = new char[password.length]
    [all...]
  /libcore/luni/src/main/java/java/net/
PasswordAuthentication.java 22 * password which is used by the {@code Authenticator} class.
30 private char[] password; field in class:PasswordAuthentication
33 * Creates an instance of a password authentication with a specified
34 * username and password.
38 * @param password
39 * the associated password to store.
41 public PasswordAuthentication(String userName, char[] password) {
43 this.password = password.clone();
47 * Gets a clone of the password stored by this instance. The user i
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
PBEParametersGenerator.java 6 * super class for all Password Based Encryption (PBE) parameter generator classes.
10 protected byte[] password; field in class:PBEParametersGenerator
24 * @param password the password converted into bytes (see below).
25 * @param salt the salt to be mixed with the password.
30 byte[] password,
34 this.password = password;
40 * return the password byte array.
42 * @return the password byte array
    [all...]
  /frameworks/base/obex/javax/obex/
PasswordAuthentication.java 36 * This class holds user name and password combinations.
47 * password provided.
49 * @param password the password to include in the response
50 * @throws NullPointerException if <code>password</code> is
53 public PasswordAuthentication(final byte[] userName, final byte[] password) {
59 mPassword = new byte[password.length];
60 System.arraycopy(password, 0, mPassword, 0, password.length);
73 * Retrieves the password
    [all...]
  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
PBEKeySpecTest.java 38 * PBEKeySpec(char[] password) method testing. Tests the behavior of
51 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
52 PBEKeySpec pbeks = new PBEKeySpec(password);
53 password[0] ++;
54 assertFalse("The change of password specified in the constructor "
56 password[0] == pbeks.getPassword()[0]);
60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
66 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
83 new PBEKeySpec(password, null, iterationCount, keyLength);
92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength)
145 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
206 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
223 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
244 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
269 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
286 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
PBEKeySpecTest.java 38 * PBEKeySpec(char[] password) method testing. Tests the behavior of
51 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
52 PBEKeySpec pbeks = new PBEKeySpec(password);
53 password[0] ++;
54 assertFalse("The change of password specified in the constructor "
56 password[0] == pbeks.getPassword()[0]);
60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
66 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
83 new PBEKeySpec(password, null, iterationCount, keyLength);
92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength)
145 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
206 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
223 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
244 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
269 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
286 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
    [all...]
  /external/chromium_org/chrome/browser/resources/chromeos/login/
screen_password_changed.css 6 #password-changed {
13 #password-changed-contents {
18 #oobe.password-changed .step-controls {
23 #password-changed-title {
27 #password-changed-description,
28 #password-changed-more-info {
32 #old-password-block {
36 #old-password {
40 #password-changed-link-block {
44 #password-changed-contents a
    [all...]
  /external/chromium_org/components/autofill/core/browser/
password_generator_unittest.cc 14 std::string password = pg1.Generate(); local
15 EXPECT_EQ(password.size(), 10u);
18 password = pg2.Generate();
19 EXPECT_EQ(password.size(), PasswordGenerator::kDefaultPasswordLength);
22 password = pg3.Generate();
23 EXPECT_EQ(password.size(), PasswordGenerator::kDefaultPasswordLength);
28 std::string password = pg.Generate(); local
33 for (size_t i = 0; i < password.size(); i++) {
34 if (isupper(password[i]))
36 else if (islower(password[i])
51 std::string password = pg.Generate(); local
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/app/webrtc/objc/
RTCICEServer.mm 36 - (id)initWithURI:(NSURL *)URI password:(NSString *)password {
37 if (!URI || !password) {
44 _password = [password copy];
51 [self.URI absoluteString], self.password];
61 iceServer.password = [self.password UTF8String];
  /external/nist-sip/java/gov/nist/javax/sip/address/
UserInfo.java 51 /** password field
53 protected String password; field in class:UserInfo
89 if (this.password != null && other.password == null)
92 if (other.password != null && this.password == null)
95 if (this.password == other.password)
98 return (this.password.equals(other.password));
    [all...]
  /external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/net/
PasswordAuthenticationTest.java 31 char[] password = new char[] { 'd', 'r', 'o', 'w', 's', 's', 'a', 'p' }; local
33 PasswordAuthentication pa = new PasswordAuthentication(name, password);
36 assertTrue("Password was not cloned", returnedPassword != password);
38 returnedPassword.length == password.length);
39 for (int counter = password.length - 1; counter >= 0; counter--)
41 returnedPassword[counter] == password[counter]);
  /external/chromium_org/chrome/browser/resources/options/
password_manager.css 6 #password-manager > div.content-area {
10 #password-search-column {
16 html[dir=rtl] #password-search-column {
21 #password-list-headers {
  /external/chromium_org/third_party/libjingle/source/talk/app/webrtc/objc/public/
RTCICEServer.h 36 // The server password.
37 @property(nonatomic, copy, readonly) NSString* password; variable
39 // Initializer for RTCICEServer taking uri and password.
40 - (id)initWithURI:(NSString*)URI password:(NSString*)password;
  /external/openssh/
auth2-passwd.c 52 char *password, *newpass; local
58 password = packet_get_string(&len);
60 /* discard new password from packet */
68 logit("password change not supported");
70 /* no password authentication in android */
71 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
74 memset(password, 0, len);
75 xfree(password);
80 "password",
  /external/wpa_supplicant_8/hostapd/
nt_password_hash.c 2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
  /external/chromium/chrome/browser/sync/glue/
password_model_associator.cc 48 // We must not be holding a transaction when we interact with the password
55 LOG(ERROR) << "Could not get the password entries.";
66 LOG(ERROR) << "Server did not create the top-level password node. We "
80 const sync_pb::PasswordSpecificsData& password = local
82 DCHECK_EQ(tag, MakeTag(password));
86 if (MergePasswords(password, **ix, &new_password)) {
90 LOG(ERROR) << "Failed to edit password sync node.";
103 LOG(ERROR) << "Failed to create password sync node.";
124 const sync_pb::PasswordSpecificsData& password = local
126 std::string tag = MakeTag(password);
364 sync_pb::PasswordSpecificsData password; local
    [all...]
  /external/chromium_org/chrome/browser/sync/glue/
password_model_associator.cc 57 // We must not be holding a transaction when we interact with the password
65 // Password store often fails to load passwords. Track failures with UMA.
72 "Could not get the password entries.",
90 "Server did not create the top-level password node. We "
103 const sync_pb::PasswordSpecificsData& password = local
105 DCHECK_EQ(tag, MakeTag(password));
109 if (MergePasswords(password, **ix, &new_password)) {
116 "Failed to edit password sync node.",
132 "Failed to create password sync node.",
156 const sync_pb::PasswordSpecificsData& password local
390 sync_pb::PasswordSpecificsData password; local
    [all...]
  /external/chromium/net/ftp/
ftp_auth_cache.cc 17 const string16& password)
20 password(password) {
38 const string16& password) {
45 entry->password = password;
47 entries_.push_front(Entry(origin, username, password));
56 const string16& password) {
59 it->password == password) {
    [all...]
ftp_auth_cache.h 31 const string16& password);
36 string16 password; member in struct:net::FtpAuthCache::Entry
46 // |password|). If there is already an entry for |origin|, it will be
49 const string16& password);
52 // |username| and |password|.
54 const string16& password);
  /external/chromium_org/chrome/browser/chromeos/login/
screen_locker_tester.h 30 // Injects MockAuthenticate that uses given |user| and |password|.
32 const std::string& password);
34 // Sets the password text.
35 virtual void SetPassword(const std::string& password) = 0;
37 // Gets the password text.
40 // Emulates entring a password.
41 virtual void EnterPassword(const std::string& password) = 0;
  /libcore/luni/src/test/java/libcore/java/net/
OldPasswordAuthenticationTest.java 27 char[] password = "hunter2".toCharArray(); local
35 PasswordAuthentication pa = new PasswordAuthentication(null, password);
37 assertEquals(password.length, pa.getPassword().length);
  /external/chromium_org/third_party/WebKit/Source/web/
WebPasswordFormData.cpp 52 // Helper to determine which password is the main one, and which is
53 // an old password (e.g on a "make new password" form), if any.
55 HTMLInputElement** password,
59 ASSERT(password);
63 // Single password, easy.
64 *password = fields->passwords[0];
68 // Treat two identical passwords as a single password.
69 *password = fields->passwords[0];
71 // Assume first is old password, second is new (no choice but to guess)
    [all...]
  /external/lzma/CPP/7zip/UI/Console/
OpenCallbackConsole.cpp 29 HRESULT COpenCallbackConsole::Open_CryptoGetTextPassword(BSTR *password)
35 Password = GetPassword(OutStream);
38 return StringToBstr(Password, password);
41 HRESULT COpenCallbackConsole::Open_GetPasswordIfAny(UString &password)
44 password = Password;
  /external/chromium_org/chrome/browser/resources/net_internals/
chromeos_view.css 6 #chromeos-view-password-div,

Completed in 922 milliseconds

1 2 3 4 5 6 7 8 91011>>