/external/clang/test/Analysis/ |
default-diagnostic-visitors.c | 8 int *password; // expected-note {{'password' declared without an initial value}} local 9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}} 10 err = *password;
|
/external/wpa_supplicant_8/hostapd/ |
nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/libcore/luni/src/main/java/java/net/ |
PasswordAuthentication.java | 22 * password which is used by the {@code Authenticator} class. 30 private char[] password; field in class:PasswordAuthentication 33 * Creates an instance of a password authentication with a specified 34 * username and password. 38 * @param password 39 * the associated password to store. 41 public PasswordAuthentication(String userName, char[] password) { 43 this.password = password.clone(); 47 * Gets a clone of the password stored by this instance. The user i [all...] |
/external/openssh/ |
auth2-passwd.c | 53 char *password, *newpass; local 59 password = packet_get_string(&len); 61 /* discard new password from packet */ 69 logit("password change not supported"); 71 /* no password authentication in Android */ 72 else if (PRIVSEP(auth_password(authctxt, password)) == 1) 75 explicit_bzero(password, len); 76 free(password); 81 "password",
|
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 37 SizedBuffer password; local 39 password.buffer.reset(new uint8_t[16]); 40 password.length = 16; 41 memset(password.buffer.get(), 0, 16); 42 EnrollRequest request(0, NULL, &password, NULL); 56 SizedBuffer password; local 59 EnrollRequest request(0, NULL, &password, NULL); 101 // do_enroll enrolls an all 0 password 114 // verify first password 125 // enroll new password 129 SizedBuffer password; local 174 SizedBuffer password; local [all...] |
/external/apache-http/src/org/apache/http/auth/ |
UsernamePasswordCredentials.java | 38 * Username and password {@link Credentials} 56 private final String password; field in class:UsernamePasswordCredentials 59 * The constructor with the username and password combined string argument. 61 * @param usernamePassword the username:password formed string 67 throw new IllegalArgumentException("Username:password string may not be null"); 72 this.password = usernamePassword.substring(atColon + 1); 75 this.password = null; 81 * The constructor with the username and password arguments. 84 * @param password the password [all...] |
NTCredentials.java | 56 /** Password */ 57 private final String password; field in class:NTCredentials 63 * The constructor with the fully qualified username and password combined 66 * @param usernamePassword the domain/username:password formed string 71 throw new IllegalArgumentException("Username:password string may not be null"); 77 this.password = usernamePassword.substring(atColon + 1); 80 this.password = null; 99 * @param password The password. 106 final String password, [all...] |
/external/boringssl/src/tool/ |
pkcs12.cc | 99 printf("Enter password: "); 102 char password[256]; local 105 n = read(0, &password[off], sizeof(password) - 1 - off); 109 } while ((n > 0 && memchr(password, '\n', off) == NULL && 110 off < sizeof(password) - 1) || 113 char *newline = reinterpret_cast<char*>(memchr(password, '\n', off)); 125 if (!PKCS12_get_key_and_certs(&key, certs, &pkcs12, password)) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 6 * super class for all Password Based Encryption (PBE) parameter generator classes. 10 protected byte[] password; field in class:PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, 34 this.password = password; 40 * return the password byte array. 42 * @return the password byte array [all...] |
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/command/ |
PassCommandHandler.java | 27 * <li>If the required password parameter is missing, then reply with 501</li>
30 * <li>If the specified password is not correct, then reply with 530</li>
40 String password = command.getRequiredParameter(0);
local 45 if (userAccount.isValidPassword(password)) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 34 const u8 *pos, *challenge, *password; local 38 password = eap_get_config_password(sm, &password_len); 39 if (password == NULL) { 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured"); 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
eap_vendor_test.c | 34 const u8 *password; local 43 password = eap_get_config_password(sm, &password_len); 44 data->test_pending_req = password && password_len == 7 && 45 os_memcmp(password, "pending", 7) == 0;
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldPasswordAuthenticationTest.java | 27 char[] password = "hunter2".toCharArray(); local 35 PasswordAuthentication pa = new PasswordAuthentication(null, password); 37 assertEquals(password.length, pa.getPassword().length);
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
PKIXParametersTest.java | 30 char[] password = "password".toCharArray(); local 37 ks.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain()); 44 keyOnly.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain());
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
ConnectivityManagerTestRunner.java | 62 String password = (String) icicle.get("password"); local 63 if (password != null) { 64 mPassword = password;
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/net/ |
PasswordAuthenticationTest.java | 31 char[] password = new char[] { 'd', 'r', 'o', 'w', 's', 's', 'a', 'p' }; local 33 PasswordAuthentication pa = new PasswordAuthentication(name, password); 36 assertTrue("Password was not cloned", returnedPassword != password); 38 returnedPassword.length == password.length); 39 for (int counter = password.length - 1; counter >= 0; counter--) 41 returnedPassword[counter] == password[counter]);
|
/libcore/luni/src/main/java/javax/crypto/spec/ |
PBEKeySpec.java | 25 * The key specification for a <i>password based encryption</i> key. 27 * Password based encryption is described in <a 32 private char[] password; field in class:PBEKeySpec 38 * Creates a new <code>PBEKeySpec</code> with the specified password. 40 * @param password 41 * the password. 43 public PBEKeySpec(char[] password) { 44 if (password == null) { 45 this.password = EmptyArray.CHAR; 47 this.password = new char[password.length] [all...] |
/cts/hostsidetests/devicepolicy/app/WifiConfigCreator/src/com/android/cts/deviceowner/wificonfigcreator/ |
WifiConfigCreatorActivity.java | 51 String password = intent.getStringExtra(EXTRA_PASSWORD); local 52 configCreator.addNetwork(ssid, false, securityType, password); 57 String password = intent.getStringExtra(EXTRA_PASSWORD); local 58 configCreator.updateNetwork(netId, ssid, false, securityType, password);
|
/external/jetty/src/java/org/eclipse/jetty/security/authentication/ |
BasicAuthenticator.java | 88 String password = credentials.substring(i+1); local 90 UserIdentity user = login (username, password, request);
|
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
Credential.java | 35 * Often a Credential is related to a Password via a one way algorithm, so while 36 * a Password itself is a Credential, a UnixCrypt or MD5 digest of a a password 37 * is only a credential that can be checked against the password. 41 * @see Password 55 * another Credential object, a Password object or a String 66 * type is returned. Else the credential is assumed to be a Password. 69 * @return A Credential or Password instance. 76 return new Password(credential); 101 if (!(credentials instanceof String) && !(credentials instanceof Password)) [all...] |
/external/nist-sip/java/gov/nist/javax/sip/address/ |
UserInfo.java | 51 /** password field 53 protected String password; field in class:UserInfo 89 if (this.password != null && other.password == null) 92 if (other.password != null && this.password == null) 95 if (this.password == other.password) 98 return (this.password.equals(other.password)); [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
WebPlatformUrlTestData.java | 40 String password = null; field in class:WebPlatformUrlTestData 60 password = value;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
DataProfile.java | 40 //the password for APN, or NULL 41 public final String password; field in class:DataProfile 57 String user, String password, int type, int maxConnsTime, int maxConns, 65 this.password = password; 75 apn.authType, apn.user, apn.password, apn.bearerBitmask == 0 ? TYPE_COMMON : 93 pc.writeString(dps[i].password); 106 + "/" + user + "/" + password + "/" + type + "/" + maxConnsTime
|