HomeSort by relevance Sort by last modified time
    Searched defs:password (Results 1 - 25 of 568) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/clang/test/Analysis/
default-diagnostic-visitors.c 8 int *password; // expected-note {{'password' declared without an initial value}} local
9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}}
10 err = *password;
  /external/webrtc/talk/app/webrtc/objc/public/
RTCICEServer.h 33 // The server URI, username, and password.
36 @property(nonatomic, copy, readonly) NSString* password; variable
38 // Initializer for RTCICEServer taking uri, username, and password.
41 password:(NSString*)password;
  /external/curl/tests/unit/
unit1304.c 27 static char *password; variable
32 password = strdup("");
34 if (!password || !login) {
35 Curl_safefree(password);
44 Curl_safefree(password);
57 result = Curl_parsenetrc("test.example.com", &login, &password, filename);
59 abort_unless(password != NULL, "returned NULL!");
60 fail_unless(password[0] == 0, "password should not have been changed");
70 result = Curl_parsenetrc("example.com", &login, &password, filename)
137 free(password); variable
152 free(password); variable
170 free(password); variable
    [all...]
  /external/jcommander/src/test/java/com/beust/jcommander/args/
ArgsPassword.java 24 @Parameter(names = "-password", description = "Connection password", password = true)
25 public String password; field in class:ArgsPassword
  /external/wpa_supplicant_8/hostapd/
nt_password_hash.c 2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
  /libcore/ojluni/src/main/java/java/net/
PasswordAuthentication.java 31 * Authenticator. It is simply a repository for a user name and a password.
43 private char[] password; field in class:PasswordAuthentication
47 * user name and password.
49 * <p> Note that the given user password is cloned before it is stored in
53 * @param password the user's password
55 public PasswordAuthentication(String userName, char[] password) {
57 this.password = password.clone();
70 * Returns the user password
    [all...]
  /external/chromium-trace/catapult/telemetry/telemetry/internal/backends/chrome/chromeos_login_ext/
main.js 16 'password': ''
  /system/core/gatekeeperd/tests/
gatekeeper_test.cpp 36 SizedBuffer password; local
38 password.buffer.reset(new uint8_t[16]);
39 password.length = 16;
40 memset(password.buffer.get(), 0, 16);
41 EnrollRequest request(0, NULL, &password, NULL);
55 SizedBuffer password; local
58 EnrollRequest request(0, NULL, &password, NULL);
100 // do_enroll enrolls an all 0 password
113 // verify first password
124 // enroll new password
128 SizedBuffer password; local
173 SizedBuffer password; local
    [all...]
  /external/apache-http/src/org/apache/http/auth/
UsernamePasswordCredentials.java 38 * Username and password {@link Credentials}
56 private final String password; field in class:UsernamePasswordCredentials
59 * The constructor with the username and password combined string argument.
61 * @param usernamePassword the username:password formed string
67 throw new IllegalArgumentException("Username:password string may not be null");
72 this.password = usernamePassword.substring(atColon + 1);
75 this.password = null;
81 * The constructor with the username and password arguments.
84 * @param password the password
    [all...]
  /external/autotest/frontend/
make_superuser.py 18 password = config.get_config_value(section, "password") variable
21 passwd=password, db=db_name)
  /external/boringssl/src/tool/
pkcs12.cc 99 printf("Enter password: ");
102 char password[256]; local
105 n = read(0, &password[off], sizeof(password) - 1 - off);
109 } while ((n > 0 && memchr(password, '\n', off) == NULL &&
110 off < sizeof(password) - 1) ||
113 char *newline = reinterpret_cast<char*>(memchr(password, '\n', off));
125 if (!PKCS12_get_key_and_certs(&key, certs, &pkcs12, password)) {
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
PBEParametersGenerator.java 6 * super class for all Password Based Encryption (PBE) parameter generator classes.
10 protected byte[] password; field in class:PBEParametersGenerator
24 * @param password the password converted into bytes (see below).
25 * @param salt the salt to be mixed with the password.
30 byte[] password,
34 this.password = password;
40 * return the password byte array.
42 * @return the password byte array
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
PKCS12Key.java 6 * A password based key for use with PKCS#12.
11 private final char[] password; field in class:PKCS12Key
14 * Basic constructor for a password based key - secret key generation parameters will be passed separately..
16 * @param password password to use.
18 public PKCS12Key(char[] password)
20 this(password, false);
27 * @param password password to use.
30 public PKCS12Key(char[] password, boolean useWrongZeroLengthConversion
    [all...]
  /external/libchrome/crypto/
symmetric_key_unittest.cc 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160));
70 const char* password; member in struct:PBKDF2TestVector
95 test_data.password, test_data.salt,
112 "password",
120 "password",
128 "password",
138 "password",
150 "password",
158 "password",
166 "password",
    [all...]
  /external/libmicrohttpd/src/examples/
digest_auth_example.c 45 const char *password = "testpass"; local
64 password,
  /external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/command/
PassCommandHandler.java 27 * <li>If the required password parameter is missing, then reply with 501</li>
30 * <li>If the specified password is not correct, then reply with 530</li>
40 String password = command.getRequiredParameter(0); local
45 if (userAccount.isValidPassword(password)) {
  /external/webrtc/webrtc/base/
proxyinfo.h 35 CryptString password; member in struct:rtc::ProxyInfo
  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 34 const u8 *pos, *challenge, *password; local
38 password = eap_get_config_password(sm, &password_len);
39 if (password == NULL) {
40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
eap_otp.c 33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
eap_gtc.c 50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured");
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
  /libcore/luni/src/test/java/libcore/java/net/
OldPasswordAuthenticationTest.java 27 char[] password = "hunter2".toCharArray(); local
35 PasswordAuthentication pa = new PasswordAuthentication(null, password);
37 assertEquals(password.length, pa.getPassword().length);
  /libcore/luni/src/test/java/libcore/java/security/cert/
PKIXParametersTest.java 30 char[] password = "password".toCharArray(); local
37 ks.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain());
44 keyOnly.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain());
  /libcore/ojluni/src/main/java/javax/crypto/spec/
PBEKeySpec.java 31 * A user-chosen password that can be used with password-based encryption
34 * <p>The password can be viewed as some kind of raw key material, from which
37 * <p>Different PBE mechanisms may consume different bits of each password
43 * <p>You convert the password characters to a PBE key by creating an
46 * of each password character, whereas a secret-key factory for PKCS #12 will
52 * internal value when the password stored in it is no longer needed. Hence,
53 * this class requests the password as a char array, so it can be overwritten
65 private char[] password; field in class:PBEKeySpec
71 * Constructor that takes a password. An empty char[] is used i
    [all...]
  /external/snakeyaml/src/test/java/org/yaml/snakeyaml/issues/issue10/
JDBCDataSource.java 20 String password; field in class:JDBCDataSource
42 return password;
45 public void setPassword(String password) {
46 this.password = password;
  /frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
ConnectivityManagerTestRunner.java 62 String password = (String) icicle.get("password"); local
63 if (password != null) {
64 mPassword = password;

Completed in 852 milliseconds

1 2 3 4 5 6 7 8 91011>>