/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS5S1ParametersGenerator.java | 35 * the derived key function, the ith hash of the password and the salt. 41 digest.update(password, 0, password.length); 55 * Generate a key parameter derived from the password, salt, and iteration 80 * the password, salt, and iteration count we are currently initialised 107 * Generate a key parameter for use with a MAC derived from the password,
|
PKCS12ParametersGenerator.java | 107 if ((password != null) && (password.length != 0)) 109 P = new byte[v * ((password.length + v - 1) / v)]; 113 P[i] = password[i % password.length]; 165 * Generate a key parameter derived from the password, salt, and iteration 183 * the password, salt, and iteration count we are currently initialised 205 * Generate a key parameter for use with a MAC derived from the password,
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/backends/chrome/chromeos_login_ext/ |
main.js | 16 'password': '' 15 'gaiaId': '12345', property in class:msg
|
/external/wpa_supplicant_8/src/utils/ |
http-utils.h | 40 const char *password, const char *client_cert, 54 const char *username, const char *password,
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/dataconnection/ |
DataProfileTest.java | 38 "passwd", // password 66 "passwd", // password 91 assertEquals(mApn1.password, dp.password);
|
/hardware/qcom/gps/msm8960/loc_api/libloc_api_50001/ |
loc_eng_agps.h | 279 inline virtual void setWifiInfo(char* ssid, char* password) 280 { ssid[0] = 0; password[0] = 0; } 358 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) : 361 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]), 367 strlcpy(mPassword, password, SSID_BUF_SIZE); 375 inline virtual void setWifiInfo(char* ssid, char* password) 382 strlcpy(password, mPassword, SSID_BUF_SIZE); 384 password[0] = '\0';
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
MyKeyManagerFactorySpi.java | 38 protected void engineInit(KeyStore ks, char[] password) 41 if (password == null) { 42 throw new KeyStoreException("Incorrect password");
|
/packages/apps/Email/provider_src/com/android/email/mail/store/ |
ServiceStore.java | 82 public Bundle autoDiscover(Context context, String username, String password) { 84 return getService().autoDiscover(username, password);
|
/packages/apps/Settings/src/com/android/settings/password/ |
PasswordRequirementAdapter.java | 17 package com.android.settings.password; 27 import static com.android.settings.password.PasswordRequirementAdapter 31 * Used in {@link com.android.settings.ChooseLockPassword} to show password requirements.
|
/packages/apps/TvSettings/Settings/src/com/android/tv/settings/connectivity/ |
WifiMultiPagedFormActivity.java | 142 WifiConfiguration wifiConfiguration, WifiSecurity wifiSecurity, String password) { 144 int length = password.length(); 147 && password.matches("[0-9A-Fa-f]*")) { 148 wifiConfiguration.wepKeys[0] = password; 150 wifiConfiguration.wepKeys[0] = '"' + password + '"'; 153 if (password.matches("[0-9A-Fa-f]{64}")) { 154 wifiConfiguration.preSharedKey = password; 156 wifiConfiguration.preSharedKey = '"' + password + '"';
|
/system/tpm/trunks/ |
password_authorization_delegate.cc | 28 const std::string& password) { 29 password_ = Make_TPM2B_DIGEST(password);
|
trunks_factory_impl.cc | 83 TrunksFactoryImpl::GetPasswordAuthorization(const std::string& password) const { 84 return base::MakeUnique<PasswordAuthorizationDelegate>(password);
|
/developers/samples/android/input/autofill/AutofillFramework/Application/src/main/java/com/example/android/autofillframework/app/ |
StandardAutoCompleteSignInActivity.java | 101 String password = mPasswordField.getText().toString(); local 102 boolean valid = isValidCredentials(username, password); 116 public boolean isValidCredentials(String username, String password) { 117 return username != null && password != null && username.equals(password);
|
/external/curl/src/ |
tool_getpass.c | 225 char *password, /* buffer to store password in */ 226 size_t buflen) /* size of buffer to store password in */ 237 nread = read(fd, password, buflen); 239 password[--nread] = '\0'; /* zero terminate where enter is stored */ 241 password[0] = '\0'; /* got nothing */ 252 return password; /* return pointer to buffer */
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CustomTrust.java | 168 char[] password = "password".toCharArray(); // Any password will work. local 169 KeyStore keyStore = newEmptyKeyStore(password); 179 keyManagerFactory.init(keyStore, password); 192 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { 196 keyStore.load(in, password);
|
/external/okhttp/samples/static-server/src/main/java/com/squareup/okhttp/sample/ |
SampleServer.java | 105 System.out.println("Usage: SampleServer <keystore> <password> <root file> <port>"); 110 String password = args[1]; local 114 SSLContext sslContext = sslContext(keystoreFile, password); 119 private static SSLContext sslContext(String keystoreFile, String password) 124 keystore.load(in, password.toCharArray()); 130 keyManagerFactory.init(keystore, password.toCharArray());
|
/external/syslinux/com32/cmenu/libmenu/ |
tui.c | 25 // password <> 0 implies not echoed on screen 29 void getuserinput(char *stra, unsigned int size, unsigned int password, 47 if (password != 0) 48 showoldvalue = 0; // Password's never displayed 66 if (password == 0) // Not a password, print initial value 191 if (password == 0) { 200 if (password == 0)
|
/external/webrtc/webrtc/base/ |
cryptstring.h | 69 // Used for constructing strings where a password is involved and we 91 void Append(const CryptString * password) { 92 size_t len = password->GetLength(); 94 password->CopyTo(storage_ + length_, true); 153 std::string& password() { return password_; } function in class:rtc::InsecureCryptStringImpl 154 const std::string& password() const { return password_; } function in class:rtc::InsecureCryptStringImpl
|
/external/webrtc/webrtc/p2p/client/ |
fakeportallocator.h | 36 const std::string& password, 40 max_port, username, password, origin, 66 const std::string& password, 76 password, 106 password(), std::string(), false));
|
/external/apache-http/android/src/android/net/http/ |
RequestHandle.java | 223 public void setupBasicAuthResponse(boolean isProxy, String username, String password) { 224 String response = computeBasicAuthResponse(username, password); 237 String password, 245 username, password, realm, nonce, QOP, algorithm, opaque); 272 * @return Basic-scheme authentication response: BASE64(username:password). 274 public static String computeBasicAuthResponse(String username, String password) { 279 if (password == null) { 280 throw new NullPointerException("password == null"); 283 // encode username:password to base64 284 return new String(Base64.encodeBase64((username + ':' + password).getBytes())) [all...] |
/external/pdfium/core/fpdfapi/parser/ |
cpdf_security_handler.cpp | 31 const uint8_t* password, 40 passcode[i] = i < pass_size ? password[i] : defpasscode[i - pass_size]; 104 CFX_ByteString password = m_pParser->GetPassword(); local 105 if (!password.IsEmpty() && 106 CheckPassword(password.raw_str(), password.GetLength(), true, 111 return CheckPassword(password.raw_str(), password.GetLength(), false, 232 void Revision6_Hash(const uint8_t* password, 239 CRYPT_SHA256Update(&sha, password, size) [all...] |
/external/autotest/database/ |
database_connection.py | 37 def connect(self, host=None, username=None, password=None, db_name=None): 71 def connect(self, host=None, username=None, password=None, db_name=None): 77 host=host, user=username, passwd=password, db=db_name, 94 def connect(self, host=None, username=None, password=None, db_name=None): 124 def connect(self, host=None, username=None, password=None, db_name=None): 161 _DATABASE_ATTRIBUTES = ('db_type', 'host', 'username', 'password', 211 password=None, db_name=None): 221 @param password: database password, default to None. 225 use_afe_setting = not bool(db_type or host or username or password) [all...] |
/external/zlib/src/contrib/minizip/ |
miniunz.c | 196 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \ 203 " -p extract crypted file using password\n\n"); 312 int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password) 316 const char* password; 370 err = unzOpenCurrentFilePassword(uf,password); 475 int do_extract(uf,opt_extract_without_path,opt_overwrite,password) 479 const char* password; 494 password) != UNZ_OK) 511 int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password) 516 const char* password; 540 const char *password=NULL; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 47 /* Change-Password Data field */ 157 const u8 *identity, *password; local 163 password = eap_get_config_password2(sm, &password_len, &pwhash); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 304 "EAP-MSCHAPV2: Password changed successfully"); 306 bin_clear_free(config->password, config->password_len); 310 config->password = os_malloc(16); 312 if (config->password && 315 config->password)) { [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/distutils/command/ |
upload.py | 33 self.password = ''
47 self.password = config['password']
51 # getting the password from the distribution
53 if not self.password and self.distribution.password:
54 self.password = self.distribution.password
135 self.password)
|