HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 176 - 200 of 1357) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
PKCS5S1ParametersGenerator.java 35 * the derived key function, the ith hash of the password and the salt.
41 digest.update(password, 0, password.length);
55 * Generate a key parameter derived from the password, salt, and iteration
80 * the password, salt, and iteration count we are currently initialised
107 * Generate a key parameter for use with a MAC derived from the password,
PKCS12ParametersGenerator.java 107 if ((password != null) && (password.length != 0))
109 P = new byte[v * ((password.length + v - 1) / v)];
113 P[i] = password[i % password.length];
165 * Generate a key parameter derived from the password, salt, and iteration
183 * the password, salt, and iteration count we are currently initialised
205 * Generate a key parameter for use with a MAC derived from the password,
  /external/chromium-trace/catapult/telemetry/telemetry/internal/backends/chrome/chromeos_login_ext/
main.js 16 'password': ''
15 'gaiaId': '12345', property in class:msg
  /external/wpa_supplicant_8/src/utils/
http-utils.h 40 const char *password, const char *client_cert,
54 const char *username, const char *password,
  /frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/dataconnection/
DataProfileTest.java 38 "passwd", // password
66 "passwd", // password
91 assertEquals(mApn1.password, dp.password);
  /hardware/qcom/gps/msm8960/loc_api/libloc_api_50001/
loc_eng_agps.h 279 inline virtual void setWifiInfo(char* ssid, char* password)
280 { ssid[0] = 0; password[0] = 0; }
358 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) :
361 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]),
367 strlcpy(mPassword, password, SSID_BUF_SIZE);
375 inline virtual void setWifiInfo(char* ssid, char* password)
382 strlcpy(password, mPassword, SSID_BUF_SIZE);
384 password[0] = '\0';
  /libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/
MyKeyManagerFactorySpi.java 38 protected void engineInit(KeyStore ks, char[] password)
41 if (password == null) {
42 throw new KeyStoreException("Incorrect password");
  /packages/apps/Email/provider_src/com/android/email/mail/store/
ServiceStore.java 82 public Bundle autoDiscover(Context context, String username, String password) {
84 return getService().autoDiscover(username, password);
  /packages/apps/Settings/src/com/android/settings/password/
PasswordRequirementAdapter.java 17 package com.android.settings.password;
27 import static com.android.settings.password.PasswordRequirementAdapter
31 * Used in {@link com.android.settings.ChooseLockPassword} to show password requirements.
  /packages/apps/TvSettings/Settings/src/com/android/tv/settings/connectivity/
WifiMultiPagedFormActivity.java 142 WifiConfiguration wifiConfiguration, WifiSecurity wifiSecurity, String password) {
144 int length = password.length();
147 && password.matches("[0-9A-Fa-f]*")) {
148 wifiConfiguration.wepKeys[0] = password;
150 wifiConfiguration.wepKeys[0] = '"' + password + '"';
153 if (password.matches("[0-9A-Fa-f]{64}")) {
154 wifiConfiguration.preSharedKey = password;
156 wifiConfiguration.preSharedKey = '"' + password + '"';
  /system/tpm/trunks/
password_authorization_delegate.cc 28 const std::string& password) {
29 password_ = Make_TPM2B_DIGEST(password);
trunks_factory_impl.cc 83 TrunksFactoryImpl::GetPasswordAuthorization(const std::string& password) const {
84 return base::MakeUnique<PasswordAuthorizationDelegate>(password);
  /developers/samples/android/input/autofill/AutofillFramework/Application/src/main/java/com/example/android/autofillframework/app/
StandardAutoCompleteSignInActivity.java 101 String password = mPasswordField.getText().toString(); local
102 boolean valid = isValidCredentials(username, password);
116 public boolean isValidCredentials(String username, String password) {
117 return username != null && password != null && username.equals(password);
  /external/curl/src/
tool_getpass.c 225 char *password, /* buffer to store password in */
226 size_t buflen) /* size of buffer to store password in */
237 nread = read(fd, password, buflen);
239 password[--nread] = '\0'; /* zero terminate where enter is stored */
241 password[0] = '\0'; /* got nothing */
252 return password; /* return pointer to buffer */
  /external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/
CustomTrust.java 168 char[] password = "password".toCharArray(); // Any password will work. local
169 KeyStore keyStore = newEmptyKeyStore(password);
179 keyManagerFactory.init(keyStore, password);
192 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException {
196 keyStore.load(in, password);
  /external/okhttp/samples/static-server/src/main/java/com/squareup/okhttp/sample/
SampleServer.java 105 System.out.println("Usage: SampleServer <keystore> <password> <root file> <port>");
110 String password = args[1]; local
114 SSLContext sslContext = sslContext(keystoreFile, password);
119 private static SSLContext sslContext(String keystoreFile, String password)
124 keystore.load(in, password.toCharArray());
130 keyManagerFactory.init(keystore, password.toCharArray());
  /external/syslinux/com32/cmenu/libmenu/
tui.c 25 // password <> 0 implies not echoed on screen
29 void getuserinput(char *stra, unsigned int size, unsigned int password,
47 if (password != 0)
48 showoldvalue = 0; // Password's never displayed
66 if (password == 0) // Not a password, print initial value
191 if (password == 0) {
200 if (password == 0)
  /external/webrtc/webrtc/base/
cryptstring.h 69 // Used for constructing strings where a password is involved and we
91 void Append(const CryptString * password) {
92 size_t len = password->GetLength();
94 password->CopyTo(storage_ + length_, true);
153 std::string& password() { return password_; } function in class:rtc::InsecureCryptStringImpl
154 const std::string& password() const { return password_; } function in class:rtc::InsecureCryptStringImpl
  /external/webrtc/webrtc/p2p/client/
fakeportallocator.h 36 const std::string& password,
40 max_port, username, password, origin,
66 const std::string& password,
76 password,
106 password(), std::string(), false));
  /external/apache-http/android/src/android/net/http/
RequestHandle.java 223 public void setupBasicAuthResponse(boolean isProxy, String username, String password) {
224 String response = computeBasicAuthResponse(username, password);
237 String password,
245 username, password, realm, nonce, QOP, algorithm, opaque);
272 * @return Basic-scheme authentication response: BASE64(username:password).
274 public static String computeBasicAuthResponse(String username, String password) {
279 if (password == null) {
280 throw new NullPointerException("password == null");
283 // encode username:password to base64
284 return new String(Base64.encodeBase64((username + ':' + password).getBytes()))
    [all...]
  /external/pdfium/core/fpdfapi/parser/
cpdf_security_handler.cpp 31 const uint8_t* password,
40 passcode[i] = i < pass_size ? password[i] : defpasscode[i - pass_size];
104 CFX_ByteString password = m_pParser->GetPassword(); local
105 if (!password.IsEmpty() &&
106 CheckPassword(password.raw_str(), password.GetLength(), true,
111 return CheckPassword(password.raw_str(), password.GetLength(), false,
232 void Revision6_Hash(const uint8_t* password,
239 CRYPT_SHA256Update(&sha, password, size)
    [all...]
  /external/autotest/database/
database_connection.py 37 def connect(self, host=None, username=None, password=None, db_name=None):
71 def connect(self, host=None, username=None, password=None, db_name=None):
77 host=host, user=username, passwd=password, db=db_name,
94 def connect(self, host=None, username=None, password=None, db_name=None):
124 def connect(self, host=None, username=None, password=None, db_name=None):
161 _DATABASE_ATTRIBUTES = ('db_type', 'host', 'username', 'password',
211 password=None, db_name=None):
221 @param password: database password, default to None.
225 use_afe_setting = not bool(db_type or host or username or password)
    [all...]
  /external/zlib/src/contrib/minizip/
miniunz.c 196 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \
203 " -p extract crypted file using password\n\n");
312 int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password)
316 const char* password;
370 err = unzOpenCurrentFilePassword(uf,password);
475 int do_extract(uf,opt_extract_without_path,opt_overwrite,password)
479 const char* password;
494 password) != UNZ_OK)
511 int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password)
516 const char* password;
540 const char *password=NULL; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 47 /* Change-Password Data field */
157 const u8 *identity, *password; local
163 password = eap_get_config_password2(sm, &password_len, &pwhash);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
304 "EAP-MSCHAPV2: Password changed successfully");
306 bin_clear_free(config->password, config->password_len);
310 config->password = os_malloc(16);
312 if (config->password &&
315 config->password)) {
    [all...]
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/distutils/command/
upload.py 33 self.password = ''
47 self.password = config['password']
51 # getting the password from the distribution
53 if not self.password and self.distribution.password:
54 self.password = self.distribution.password
135 self.password)

Completed in 996 milliseconds

1 2 3 4 5 6 78 91011>>