/external/clang/test/Analysis/ |
default-diagnostic-visitors.c | 8 int *password; // expected-note {{'password' declared without an initial value}} local 9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}} 10 err = *password;
|
/external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/ |
CustomUserAccount.groovy | 21 * Test-only subclass of UserAccount tha provides a custom implementation of password comparison 24 protected boolean comparePassword(String password) { 25 return password == this.password + "123"
|
/libcore/luni/src/main/java/javax/crypto/spec/ |
PBEKeySpec.java | 25 * The key specification for a <i>password based encryption</i> key. 27 * Password based encryption is described in <a 32 private char[] password; field in class:PBEKeySpec 38 * Creates a new <code>PBEKeySpec</code> with the specified password. 40 * @param password 41 * the password. 43 public PBEKeySpec(char[] password) { 44 if (password == null) { 45 this.password = EmptyArray.CHAR; 47 this.password = new char[password.length] [all...] |
/libcore/luni/src/main/java/java/net/ |
PasswordAuthentication.java | 22 * password which is used by the {@code Authenticator} class. 30 private char[] password; field in class:PasswordAuthentication 33 * Creates an instance of a password authentication with a specified 34 * username and password. 38 * @param password 39 * the associated password to store. 41 public PasswordAuthentication(String userName, char[] password) { 43 this.password = password.clone(); 47 * Gets a clone of the password stored by this instance. The user i [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 6 * super class for all Password Based Encryption (PBE) parameter generator classes. 10 protected byte[] password; field in class:PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, 34 this.password = password; 40 * return the password byte array. 42 * @return the password byte array [all...] |
/frameworks/base/obex/javax/obex/ |
PasswordAuthentication.java | 36 * This class holds user name and password combinations. 47 * password provided. 49 * @param password the password to include in the response 50 * @throws NullPointerException if <code>password</code> is 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { 59 mPassword = new byte[password.length]; 60 System.arraycopy(password, 0, mPassword, 0, password.length); 73 * Retrieves the password [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
PBEKeySpecTest.java | 38 * PBEKeySpec(char[] password) method testing. Tests the behavior of 51 char[] password = new char[] { '1', '2', '3', '4', '5' }; local 52 PBEKeySpec pbeks = new PBEKeySpec(password); 53 password[0]++; 54 assertFalse("The change of password specified in the constructor " 56 password[0] == pbeks.getPassword()[0]); 60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int 66 char[] password = new char[] { '1', '2', '3', '4', '5' }; local 83 new PBEKeySpec(password, null, iterationCount, keyLength); 92 new PBEKeySpec(password, new byte[0], iterationCount, keyLength) 145 char[] password = new char[] { '1', '2', '3', '4', '5' }; local 206 char[] password = new char[] { '1', '2', '3', '4', '5' }; local 223 char[] password = new char[] { '1', '2', '3', '4', '5' }; local 244 char[] password = new char[] { '1', '2', '3', '4', '5' }; local 269 char[] password = new char[] { '1', '2', '3', '4', '5' }; local 286 char[] password = new char[] { '1', '2', '3', '4', '5' }; local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
PBEKeySpecTest.java | 38 * PBEKeySpec(char[] password) method testing. Tests the behavior of 51 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 52 PBEKeySpec pbeks = new PBEKeySpec(password); 53 password[0] ++; 54 assertFalse("The change of password specified in the constructor " 56 password[0] == pbeks.getPassword()[0]); 60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int 66 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 83 new PBEKeySpec(password, null, iterationCount, keyLength); 92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength) 145 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 206 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 223 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 244 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 269 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 286 char[] password = new char[] {'1', '2', '3', '4', '5'}; local [all...] |
/external/nist-sip/java/gov/nist/javax/sip/address/ |
UserInfo.java | 51 /** password field 53 protected String password; field in class:UserInfo 89 if (this.password != null && other.password == null) 92 if (other.password != null && this.password == null) 95 if (this.password == other.password) 98 return (this.password.equals(other.password)); [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/net/ |
PasswordAuthenticationTest.java | 31 char[] password = new char[] { 'd', 'r', 'o', 'w', 's', 's', 'a', 'p' }; local 33 PasswordAuthentication pa = new PasswordAuthentication(name, password); 36 assertTrue("Password was not cloned", returnedPassword != password); 38 returnedPassword.length == password.length); 39 for (int counter = password.length - 1; counter >= 0; counter--) 41 returnedPassword[counter] == password[counter]);
|
/external/openssh/ |
auth2-passwd.c | 53 char *password, *newpass; local 59 password = packet_get_string(&len); 61 /* discard new password from packet */ 69 logit("password change not supported"); 71 /* no password authentication in Android */ 72 else if (PRIVSEP(auth_password(authctxt, password)) == 1) 75 explicit_bzero(password, len); 76 free(password); 81 "password",
|
/external/wpa_supplicant_8/hostapd/ |
nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldPasswordAuthenticationTest.java | 27 char[] password = "hunter2".toCharArray(); local 35 PasswordAuthentication pa = new PasswordAuthentication(null, password); 37 assertEquals(password.length, pa.getPassword().length);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
PKCS12StoreParameter.java | 13 public PKCS12StoreParameter(OutputStream out, char[] password) 15 super(out, password, false); 23 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding) 25 super(out, new KeyStore.PasswordProtection(password), forDEREncoding);
|
/external/lzma/CPP/7zip/UI/Console/ |
OpenCallbackConsole.cpp | 29 HRESULT COpenCallbackConsole::Open_CryptoGetTextPassword(BSTR *password)
35 Password = GetPassword(OutStream);
38 return StringToBstr(Password, password);
41 HRESULT COpenCallbackConsole::Open_GetPasswordIfAny(UString &password)
44 password = Password;
|
/external/chromium-trace/trace-viewer/third_party/webapp2/tests/ |
extras_security_test.py | 32 password = 'foo' 33 hashval = security.generate_password_hash(password, 'sha1') 34 self.assertTrue(security.check_password_hash(password, hashval)) 36 hashval = security.generate_password_hash(password, 'sha1', pepper='bar') 37 self.assertTrue(security.check_password_hash(password, hashval, 40 hashval = security.generate_password_hash(password, 'md5') 41 self.assertTrue(security.check_password_hash(password, hashval)) 43 hashval = security.generate_password_hash(password, 'plain') 44 self.assertTrue(security.check_password_hash(password, hashval)) 46 hashval = security.generate_password_hash(password, 'plain' [all...] |
/external/lzma/CPP/7zip/ |
IPassword.h | 15 STDMETHOD(CryptoGetTextPassword)(BSTR *password) PURE;
20 STDMETHOD(CryptoGetTextPassword2)(Int32 *passwordIsDefined, BSTR *password) PURE;
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
ieee8021x.conf | 11 password="password"
|
/libcore/luni/src/main/java/javax/security/auth/callback/ |
PasswordCallback.java | 24 * Used in conjunction with a {@link CallbackHandler} to retrieve a password 78 * Sets the password. The {@link CallbackHandler} that performs the actual 79 * provisioning or input of the password needs to call this method to hand 80 * back the password to the security service that requested it. 82 * @param password 83 * the password. A copy of this is stored, so subsequent changes 86 public void setPassword(char[] password) { 87 if (password == null) { 88 this.inputPassword = password; 90 inputPassword = new char[password.length] [all...] |
/external/apache-http/src/org/apache/http/auth/ |
UsernamePasswordCredentials.java | 38 * Username and password {@link Credentials} 56 private final String password; field in class:UsernamePasswordCredentials 59 * The constructor with the username and password combined string argument. 61 * @param usernamePassword the username:password formed string 67 throw new IllegalArgumentException("Username:password string may not be null"); 72 this.password = usernamePassword.substring(atColon + 1); 75 this.password = null; 81 * The constructor with the username and password arguments. 84 * @param password the password [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
mschapv2.c | 37 const u8 *password, size_t password_len, 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 65 password, password_len); 68 password, nt_response) || 70 password, peer_challenge, auth_challenge, 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 96 if (hash_nt_password_hash(password, password_hash_hash) [all...] |
/development/tools/ |
make_key | 49 read -p "Enter password for '$1' (blank for none; password will be visible): " \ 50 password 66 if [ "${password}" == "" ]; then 67 echo "creating ${1}.pk8 with no password" 70 echo "creating ${1}.pk8 with password [${password}]" 71 export password 73 -passout env:password 74 unset password [all...] |
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 37 SizedBuffer password; local 39 password.buffer.reset(new uint8_t[16]); 40 password.length = 16; 41 memset(password.buffer.get(), 0, 16); 42 EnrollRequest request(0, NULL, &password, NULL); 56 SizedBuffer password; local 59 EnrollRequest request(0, NULL, &password, NULL); 101 // do_enroll enrolls an all 0 password 114 // verify first password 125 // enroll new password 129 SizedBuffer password; local 174 SizedBuffer password; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKCS12StoreParameter.java | 21 public PKCS12StoreParameter(OutputStream out, char[] password) 23 this(out, password, false); 31 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding) 33 this(out, new KeyStore.PasswordProtection(password), forDEREncoding);
|