HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 1 - 25 of 754) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/clang/test/Analysis/
default-diagnostic-visitors.c 8 int *password; // expected-note {{'password' declared without an initial value}} local
9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}}
10 err = *password;
  /external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/
CustomUserAccount.groovy 21 * Test-only subclass of UserAccount tha provides a custom implementation of password comparison
24 protected boolean comparePassword(String password) {
25 return password == this.password + "123"
  /libcore/luni/src/main/java/javax/crypto/spec/
PBEKeySpec.java 25 * The key specification for a <i>password based encryption</i> key.
27 * Password based encryption is described in <a
32 private char[] password; field in class:PBEKeySpec
38 * Creates a new <code>PBEKeySpec</code> with the specified password.
40 * @param password
41 * the password.
43 public PBEKeySpec(char[] password) {
44 if (password == null) {
45 this.password = EmptyArray.CHAR;
47 this.password = new char[password.length]
    [all...]
  /libcore/luni/src/main/java/java/net/
PasswordAuthentication.java 22 * password which is used by the {@code Authenticator} class.
30 private char[] password; field in class:PasswordAuthentication
33 * Creates an instance of a password authentication with a specified
34 * username and password.
38 * @param password
39 * the associated password to store.
41 public PasswordAuthentication(String userName, char[] password) {
43 this.password = password.clone();
47 * Gets a clone of the password stored by this instance. The user i
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
PBEParametersGenerator.java 6 * super class for all Password Based Encryption (PBE) parameter generator classes.
10 protected byte[] password; field in class:PBEParametersGenerator
24 * @param password the password converted into bytes (see below).
25 * @param salt the salt to be mixed with the password.
30 byte[] password,
34 this.password = password;
40 * return the password byte array.
42 * @return the password byte array
    [all...]
  /frameworks/base/obex/javax/obex/
PasswordAuthentication.java 36 * This class holds user name and password combinations.
47 * password provided.
49 * @param password the password to include in the response
50 * @throws NullPointerException if <code>password</code> is
53 public PasswordAuthentication(final byte[] userName, final byte[] password) {
59 mPassword = new byte[password.length];
60 System.arraycopy(password, 0, mPassword, 0, password.length);
73 * Retrieves the password
    [all...]
  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
PBEKeySpecTest.java 38 * PBEKeySpec(char[] password) method testing. Tests the behavior of
51 char[] password = new char[] { '1', '2', '3', '4', '5' }; local
52 PBEKeySpec pbeks = new PBEKeySpec(password);
53 password[0]++;
54 assertFalse("The change of password specified in the constructor "
56 password[0] == pbeks.getPassword()[0]);
60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
66 char[] password = new char[] { '1', '2', '3', '4', '5' }; local
83 new PBEKeySpec(password, null, iterationCount, keyLength);
92 new PBEKeySpec(password, new byte[0], iterationCount, keyLength)
145 char[] password = new char[] { '1', '2', '3', '4', '5' }; local
206 char[] password = new char[] { '1', '2', '3', '4', '5' }; local
223 char[] password = new char[] { '1', '2', '3', '4', '5' }; local
244 char[] password = new char[] { '1', '2', '3', '4', '5' }; local
269 char[] password = new char[] { '1', '2', '3', '4', '5' }; local
286 char[] password = new char[] { '1', '2', '3', '4', '5' }; local
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
PBEKeySpecTest.java 38 * PBEKeySpec(char[] password) method testing. Tests the behavior of
51 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
52 PBEKeySpec pbeks = new PBEKeySpec(password);
53 password[0] ++;
54 assertFalse("The change of password specified in the constructor "
56 password[0] == pbeks.getPassword()[0]);
60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
66 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
83 new PBEKeySpec(password, null, iterationCount, keyLength);
92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength)
145 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
206 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
223 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
244 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
269 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
286 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/address/
UserInfo.java 51 /** password field
53 protected String password; field in class:UserInfo
89 if (this.password != null && other.password == null)
92 if (other.password != null && this.password == null)
95 if (this.password == other.password)
98 return (this.password.equals(other.password));
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/net/
PasswordAuthenticationTest.java 31 char[] password = new char[] { 'd', 'r', 'o', 'w', 's', 's', 'a', 'p' }; local
33 PasswordAuthentication pa = new PasswordAuthentication(name, password);
36 assertTrue("Password was not cloned", returnedPassword != password);
38 returnedPassword.length == password.length);
39 for (int counter = password.length - 1; counter >= 0; counter--)
41 returnedPassword[counter] == password[counter]);
  /external/openssh/
auth2-passwd.c 53 char *password, *newpass; local
59 password = packet_get_string(&len);
61 /* discard new password from packet */
69 logit("password change not supported");
71 /* no password authentication in Android */
72 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
75 explicit_bzero(password, len);
76 free(password);
81 "password",
  /external/wpa_supplicant_8/hostapd/
nt_password_hash.c 2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
  /libcore/luni/src/test/java/libcore/java/net/
OldPasswordAuthenticationTest.java 27 char[] password = "hunter2".toCharArray(); local
35 PasswordAuthentication pa = new PasswordAuthentication(null, password);
37 assertEquals(password.length, pa.getPassword().length);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/
PKCS12StoreParameter.java 13 public PKCS12StoreParameter(OutputStream out, char[] password)
15 super(out, password, false);
23 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding)
25 super(out, new KeyStore.PasswordProtection(password), forDEREncoding);
  /external/lzma/CPP/7zip/UI/Console/
OpenCallbackConsole.cpp 29 HRESULT COpenCallbackConsole::Open_CryptoGetTextPassword(BSTR *password)
35 Password = GetPassword(OutStream);
38 return StringToBstr(Password, password);
41 HRESULT COpenCallbackConsole::Open_GetPasswordIfAny(UString &password)
44 password = Password;
  /external/chromium-trace/trace-viewer/third_party/webapp2/tests/
extras_security_test.py 32 password = 'foo'
33 hashval = security.generate_password_hash(password, 'sha1')
34 self.assertTrue(security.check_password_hash(password, hashval))
36 hashval = security.generate_password_hash(password, 'sha1', pepper='bar')
37 self.assertTrue(security.check_password_hash(password, hashval,
40 hashval = security.generate_password_hash(password, 'md5')
41 self.assertTrue(security.check_password_hash(password, hashval))
43 hashval = security.generate_password_hash(password, 'plain')
44 self.assertTrue(security.check_password_hash(password, hashval))
46 hashval = security.generate_password_hash(password, 'plain'
    [all...]
  /external/lzma/CPP/7zip/
IPassword.h 15 STDMETHOD(CryptoGetTextPassword)(BSTR *password) PURE;
20 STDMETHOD(CryptoGetTextPassword2)(Int32 *passwordIsDefined, BSTR *password) PURE;
  /external/wpa_supplicant_8/wpa_supplicant/examples/
ieee8021x.conf 11 password="password"
  /libcore/luni/src/main/java/javax/security/auth/callback/
PasswordCallback.java 24 * Used in conjunction with a {@link CallbackHandler} to retrieve a password
78 * Sets the password. The {@link CallbackHandler} that performs the actual
79 * provisioning or input of the password needs to call this method to hand
80 * back the password to the security service that requested it.
82 * @param password
83 * the password. A copy of this is stored, so subsequent changes
86 public void setPassword(char[] password) {
87 if (password == null) {
88 this.inputPassword = password;
90 inputPassword = new char[password.length]
    [all...]
  /external/apache-http/src/org/apache/http/auth/
UsernamePasswordCredentials.java 38 * Username and password {@link Credentials}
56 private final String password; field in class:UsernamePasswordCredentials
59 * The constructor with the username and password combined string argument.
61 * @param usernamePassword the username:password formed string
67 throw new IllegalArgumentException("Username:password string may not be null");
72 this.password = usernamePassword.substring(atColon + 1);
75 this.password = null;
81 * The constructor with the username and password arguments.
84 * @param password the password
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_otp.c 33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
mschapv2.c 37 const u8 *password, size_t password_len,
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
65 password, password_len);
68 password, nt_response) ||
70 password, peer_challenge, auth_challenge,
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
96 if (hash_nt_password_hash(password, password_hash_hash)
    [all...]
  /development/tools/
make_key 49 read -p "Enter password for '$1' (blank for none; password will be visible): " \
50 password
66 if [ "${password}" == "" ]; then
67 echo "creating ${1}.pk8 with no password"
70 echo "creating ${1}.pk8 with password [${password}]"
71 export password
73 -passout env:password
74 unset password
    [all...]
  /system/core/gatekeeperd/tests/
gatekeeper_test.cpp 37 SizedBuffer password; local
39 password.buffer.reset(new uint8_t[16]);
40 password.length = 16;
41 memset(password.buffer.get(), 0, 16);
42 EnrollRequest request(0, NULL, &password, NULL);
56 SizedBuffer password; local
59 EnrollRequest request(0, NULL, &password, NULL);
101 // do_enroll enrolls an all 0 password
114 // verify first password
125 // enroll new password
129 SizedBuffer password; local
174 SizedBuffer password; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
PKCS12StoreParameter.java 21 public PKCS12StoreParameter(OutputStream out, char[] password)
23 this(out, password, false);
31 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding)
33 this(out, new KeyStore.PasswordProtection(password), forDEREncoding);

Completed in 470 milliseconds

1 2 3 4 5 6 7 8 91011>>