/external/clang/test/Analysis/ |
default-diagnostic-visitors.c | 8 int *password; // expected-note {{'password' declared without an initial value}} local 9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}} 10 err = *password;
|
/external/webrtc/talk/app/webrtc/objc/public/ |
RTCICEServer.h | 33 // The server URI, username, and password. 36 @property(nonatomic, copy, readonly) NSString* password; variable 38 // Initializer for RTCICEServer taking uri, username, and password. 41 password:(NSString*)password;
|
/external/curl/tests/unit/ |
unit1304.c | 27 static char *password; variable 32 password = strdup(""); 34 if (!password || !login) { 35 Curl_safefree(password); 44 Curl_safefree(password); 57 result = Curl_parsenetrc("test.example.com", &login, &password, filename); 59 abort_unless(password != NULL, "returned NULL!"); 60 fail_unless(password[0] == 0, "password should not have been changed"); 70 result = Curl_parsenetrc("example.com", &login, &password, filename) 137 free(password); variable 152 free(password); variable 170 free(password); variable [all...] |
/external/jcommander/src/test/java/com/beust/jcommander/args/ |
ArgsPassword.java | 24 @Parameter(names = "-password", description = "Connection password", password = true) 25 public String password; field in class:ArgsPassword
|
/external/wpa_supplicant_8/hostapd/ |
nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/libcore/ojluni/src/main/java/java/net/ |
PasswordAuthentication.java | 31 * Authenticator. It is simply a repository for a user name and a password. 43 private char[] password; field in class:PasswordAuthentication 47 * user name and password. 49 * <p> Note that the given user password is cloned before it is stored in 53 * @param password the user's password 55 public PasswordAuthentication(String userName, char[] password) { 57 this.password = password.clone(); 70 * Returns the user password [all...] |
/external/chromium-trace/catapult/telemetry/telemetry/internal/backends/chrome/chromeos_login_ext/ |
main.js | 16 'password': ''
|
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 36 SizedBuffer password; local 38 password.buffer.reset(new uint8_t[16]); 39 password.length = 16; 40 memset(password.buffer.get(), 0, 16); 41 EnrollRequest request(0, NULL, &password, NULL); 55 SizedBuffer password; local 58 EnrollRequest request(0, NULL, &password, NULL); 100 // do_enroll enrolls an all 0 password 113 // verify first password 124 // enroll new password 128 SizedBuffer password; local 173 SizedBuffer password; local [all...] |
/external/apache-http/src/org/apache/http/auth/ |
UsernamePasswordCredentials.java | 38 * Username and password {@link Credentials} 56 private final String password; field in class:UsernamePasswordCredentials 59 * The constructor with the username and password combined string argument. 61 * @param usernamePassword the username:password formed string 67 throw new IllegalArgumentException("Username:password string may not be null"); 72 this.password = usernamePassword.substring(atColon + 1); 75 this.password = null; 81 * The constructor with the username and password arguments. 84 * @param password the password [all...] |
/external/autotest/frontend/ |
make_superuser.py | 18 password = config.get_config_value(section, "password") variable 21 passwd=password, db=db_name)
|
/external/boringssl/src/tool/ |
pkcs12.cc | 99 printf("Enter password: "); 102 char password[256]; local 105 n = read(0, &password[off], sizeof(password) - 1 - off); 109 } while ((n > 0 && memchr(password, '\n', off) == NULL && 110 off < sizeof(password) - 1) || 113 char *newline = reinterpret_cast<char*>(memchr(password, '\n', off)); 125 if (!PKCS12_get_key_and_certs(&key, certs, &pkcs12, password)) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 6 * super class for all Password Based Encryption (PBE) parameter generator classes. 10 protected byte[] password; field in class:PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, 34 this.password = password; 40 * return the password byte array. 42 * @return the password byte array [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKCS12Key.java | 6 * A password based key for use with PKCS#12. 11 private final char[] password; field in class:PKCS12Key 14 * Basic constructor for a password based key - secret key generation parameters will be passed separately.. 16 * @param password password to use. 18 public PKCS12Key(char[] password) 20 this(password, false); 27 * @param password password to use. 30 public PKCS12Key(char[] password, boolean useWrongZeroLengthConversion [all...] |
/external/libchrome/crypto/ |
symmetric_key_unittest.cc | 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160)); 70 const char* password; member in struct:PBKDF2TestVector 95 test_data.password, test_data.salt, 112 "password", 120 "password", 128 "password", 138 "password", 150 "password", 158 "password", 166 "password", [all...] |
/external/libmicrohttpd/src/examples/ |
digest_auth_example.c | 45 const char *password = "testpass"; local 64 password,
|
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/command/ |
PassCommandHandler.java | 27 * <li>If the required password parameter is missing, then reply with 501</li>
30 * <li>If the specified password is not correct, then reply with 530</li>
40 String password = command.getRequiredParameter(0);
local 45 if (userAccount.isValidPassword(password)) {
|
/external/webrtc/webrtc/base/ |
proxyinfo.h | 35 CryptString password; member in struct:rtc::ProxyInfo
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 34 const u8 *pos, *challenge, *password; local 38 password = eap_get_config_password(sm, &password_len); 39 if (password == NULL) { 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured"); 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldPasswordAuthenticationTest.java | 27 char[] password = "hunter2".toCharArray(); local 35 PasswordAuthentication pa = new PasswordAuthentication(null, password); 37 assertEquals(password.length, pa.getPassword().length);
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
PKIXParametersTest.java | 30 char[] password = "password".toCharArray(); local 37 ks.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain()); 44 keyOnly.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain());
|
/libcore/ojluni/src/main/java/javax/crypto/spec/ |
PBEKeySpec.java | 31 * A user-chosen password that can be used with password-based encryption 34 * <p>The password can be viewed as some kind of raw key material, from which 37 * <p>Different PBE mechanisms may consume different bits of each password 43 * <p>You convert the password characters to a PBE key by creating an 46 * of each password character, whereas a secret-key factory for PKCS #12 will 52 * internal value when the password stored in it is no longer needed. Hence, 53 * this class requests the password as a char array, so it can be overwritten 65 private char[] password; field in class:PBEKeySpec 71 * Constructor that takes a password. An empty char[] is used i [all...] |
/external/snakeyaml/src/test/java/org/yaml/snakeyaml/issues/issue10/ |
JDBCDataSource.java | 20 String password; field in class:JDBCDataSource 42 return password; 45 public void setPassword(String password) { 46 this.password = password;
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
ConnectivityManagerTestRunner.java | 62 String password = (String) icicle.get("password"); local 63 if (password != null) { 64 mPassword = password;
|