HomeSort by relevance Sort by last modified time
    Searched defs:password (Results 1 - 25 of 382) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/clang/test/Analysis/
default-diagnostic-visitors.c 8 int *password; // expected-note {{'password' declared without an initial value}} local
9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}}
10 err = *password;
  /external/wpa_supplicant_8/hostapd/
nt_password_hash.c 2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
  /libcore/luni/src/main/java/java/net/
PasswordAuthentication.java 22 * password which is used by the {@code Authenticator} class.
30 private char[] password; field in class:PasswordAuthentication
33 * Creates an instance of a password authentication with a specified
34 * username and password.
38 * @param password
39 * the associated password to store.
41 public PasswordAuthentication(String userName, char[] password) {
43 this.password = password.clone();
47 * Gets a clone of the password stored by this instance. The user i
    [all...]
  /external/openssh/
auth2-passwd.c 53 char *password, *newpass; local
59 password = packet_get_string(&len);
61 /* discard new password from packet */
69 logit("password change not supported");
71 /* no password authentication in Android */
72 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
75 explicit_bzero(password, len);
76 free(password);
81 "password",
  /system/core/gatekeeperd/tests/
gatekeeper_test.cpp 37 SizedBuffer password; local
39 password.buffer.reset(new uint8_t[16]);
40 password.length = 16;
41 memset(password.buffer.get(), 0, 16);
42 EnrollRequest request(0, NULL, &password, NULL);
56 SizedBuffer password; local
59 EnrollRequest request(0, NULL, &password, NULL);
101 // do_enroll enrolls an all 0 password
114 // verify first password
125 // enroll new password
129 SizedBuffer password; local
174 SizedBuffer password; local
    [all...]
  /external/apache-http/src/org/apache/http/auth/
UsernamePasswordCredentials.java 38 * Username and password {@link Credentials}
56 private final String password; field in class:UsernamePasswordCredentials
59 * The constructor with the username and password combined string argument.
61 * @param usernamePassword the username:password formed string
67 throw new IllegalArgumentException("Username:password string may not be null");
72 this.password = usernamePassword.substring(atColon + 1);
75 this.password = null;
81 * The constructor with the username and password arguments.
84 * @param password the password
    [all...]
NTCredentials.java 56 /** Password */
57 private final String password; field in class:NTCredentials
63 * The constructor with the fully qualified username and password combined
66 * @param usernamePassword the domain/username:password formed string
71 throw new IllegalArgumentException("Username:password string may not be null");
77 this.password = usernamePassword.substring(atColon + 1);
80 this.password = null;
99 * @param password The password.
106 final String password,
    [all...]
  /external/boringssl/src/tool/
pkcs12.cc 99 printf("Enter password: ");
102 char password[256]; local
105 n = read(0, &password[off], sizeof(password) - 1 - off);
109 } while ((n > 0 && memchr(password, '\n', off) == NULL &&
110 off < sizeof(password) - 1) ||
113 char *newline = reinterpret_cast<char*>(memchr(password, '\n', off));
125 if (!PKCS12_get_key_and_certs(&key, certs, &pkcs12, password)) {
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
PBEParametersGenerator.java 6 * super class for all Password Based Encryption (PBE) parameter generator classes.
10 protected byte[] password; field in class:PBEParametersGenerator
24 * @param password the password converted into bytes (see below).
25 * @param salt the salt to be mixed with the password.
30 byte[] password,
34 this.password = password;
40 * return the password byte array.
42 * @return the password byte array
    [all...]
  /external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/command/
PassCommandHandler.java 27 * <li>If the required password parameter is missing, then reply with 501</li>
30 * <li>If the specified password is not correct, then reply with 530</li>
40 String password = command.getRequiredParameter(0); local
45 if (userAccount.isValidPassword(password)) {
  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 34 const u8 *pos, *challenge, *password; local
38 password = eap_get_config_password(sm, &password_len);
39 if (password == NULL) {
40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
eap_otp.c 33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
eap_gtc.c 50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured");
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
eap_vendor_test.c 34 const u8 *password; local
43 password = eap_get_config_password(sm, &password_len);
44 data->test_pending_req = password && password_len == 7 &&
45 os_memcmp(password, "pending", 7) == 0;
  /libcore/luni/src/test/java/libcore/java/net/
OldPasswordAuthenticationTest.java 27 char[] password = "hunter2".toCharArray(); local
35 PasswordAuthentication pa = new PasswordAuthentication(null, password);
37 assertEquals(password.length, pa.getPassword().length);
  /libcore/luni/src/test/java/libcore/java/security/cert/
PKIXParametersTest.java 30 char[] password = "password".toCharArray(); local
37 ks.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain());
44 keyOnly.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain());
  /frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
ConnectivityManagerTestRunner.java 62 String password = (String) icicle.get("password"); local
63 if (password != null) {
64 mPassword = password;
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/net/
PasswordAuthenticationTest.java 31 char[] password = new char[] { 'd', 'r', 'o', 'w', 's', 's', 'a', 'p' }; local
33 PasswordAuthentication pa = new PasswordAuthentication(name, password);
36 assertTrue("Password was not cloned", returnedPassword != password);
38 returnedPassword.length == password.length);
39 for (int counter = password.length - 1; counter >= 0; counter--)
41 returnedPassword[counter] == password[counter]);
  /libcore/luni/src/main/java/javax/crypto/spec/
PBEKeySpec.java 25 * The key specification for a <i>password based encryption</i> key.
27 * Password based encryption is described in <a
32 private char[] password; field in class:PBEKeySpec
38 * Creates a new <code>PBEKeySpec</code> with the specified password.
40 * @param password
41 * the password.
43 public PBEKeySpec(char[] password) {
44 if (password == null) {
45 this.password = EmptyArray.CHAR;
47 this.password = new char[password.length]
    [all...]
  /cts/hostsidetests/devicepolicy/app/WifiConfigCreator/src/com/android/cts/deviceowner/wificonfigcreator/
WifiConfigCreatorActivity.java 51 String password = intent.getStringExtra(EXTRA_PASSWORD); local
52 configCreator.addNetwork(ssid, false, securityType, password);
57 String password = intent.getStringExtra(EXTRA_PASSWORD); local
58 configCreator.updateNetwork(netId, ssid, false, securityType, password);
  /external/jetty/src/java/org/eclipse/jetty/security/authentication/
BasicAuthenticator.java 88 String password = credentials.substring(i+1); local
90 UserIdentity user = login (username, password, request);
  /external/jetty/src/java/org/eclipse/jetty/util/security/
Credential.java 35 * Often a Credential is related to a Password via a one way algorithm, so while
36 * a Password itself is a Credential, a UnixCrypt or MD5 digest of a a password
37 * is only a credential that can be checked against the password.
41 * @see Password
55 * another Credential object, a Password object or a String
66 * type is returned. Else the credential is assumed to be a Password.
69 * @return A Credential or Password instance.
76 return new Password(credential);
101 if (!(credentials instanceof String) && !(credentials instanceof Password))
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/address/
UserInfo.java 51 /** password field
53 protected String password; field in class:UserInfo
89 if (this.password != null && other.password == null)
92 if (other.password != null && this.password == null)
95 if (this.password == other.password)
98 return (this.password.equals(other.password));
    [all...]
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/
WebPlatformUrlTestData.java 40 String password = null; field in class:WebPlatformUrlTestData
60 password = value;
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/
DataProfile.java 40 //the password for APN, or NULL
41 public final String password; field in class:DataProfile
57 String user, String password, int type, int maxConnsTime, int maxConns,
65 this.password = password;
75 apn.authType, apn.user, apn.password, apn.bearerBitmask == 0 ? TYPE_COMMON :
93 pc.writeString(dps[i].password);
106 + "/" + user + "/" + password + "/" + type + "/" + maxConnsTime

Completed in 838 milliseconds

1 2 3 4 5 6 7 8 91011>>