/external/clang/test/Analysis/ |
default-diagnostic-visitors.c | 8 int *password; // expected-note {{'password' declared without an initial value}} local 9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}} 10 err = *password;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKCS12Key.java | 6 * A password based key for use with PKCS#12. 11 private final char[] password; field in class:PKCS12Key 14 * Basic constructor for a password based key - secret key generation parameters will be passed separately.. 16 * @param password password to use. 18 public PKCS12Key(char[] password) 20 this(password, false); 27 * @param password password to use. 30 public PKCS12Key(char[] password, boolean useWrongZeroLengthConversion [all...] |
PKCS12KeyWithParameters.java | 8 * A password based key for use with PKCS#12 with full PBE parameters. 18 * Basic constructor for a password based key with generation parameters. 20 * @param password password to use. 24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) 26 super(password); 34 * Basic constructor for a password based key with generation parameters, specifying the wrong conversion for 37 * @param password password to use. 42 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount [all...] |
/libcore/ojluni/src/main/java/java/net/ |
PasswordAuthentication.java | 31 * Authenticator. It is simply a repository for a user name and a password. 43 private char[] password; field in class:PasswordAuthentication 47 * user name and password. 49 * <p> Note that the given user password is cloned before it is stored in 53 * @param password the user's password 55 public PasswordAuthentication(String userName, char[] password) { 57 this.password = password.clone(); 70 * Returns the user password [all...] |
/libcore/ojluni/src/main/java/javax/crypto/spec/ |
PBEKeySpec.java | 31 * A user-chosen password that can be used with password-based encryption 34 * <p>The password can be viewed as some kind of raw key material, from which 37 * <p>Different PBE mechanisms may consume different bits of each password 43 * <p>You convert the password characters to a PBE key by creating an 46 * of each password character, whereas a secret-key factory for PKCS #12 will 52 * internal value when the password stored in it is no longer needed. Hence, 53 * this class requests the password as a char array, so it can be overwritten 65 private char[] password; field in class:PBEKeySpec 71 * Constructor that takes a password. An empty char[] is used i [all...] |
/external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/ |
CustomUserAccount.groovy | 21 * Test-only subclass of UserAccount tha provides a custom implementation of password comparison 24 protected boolean comparePassword(String password) { 25 return password == this.password + "123"
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 6 * super class for all Password Based Encryption (PBE) parameter generator classes. 10 protected byte[] password; field in class:PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, 34 this.password = password; 40 * return the password byte array. 42 * @return the password byte array [all...] |
/external/curl/tests/unit/ |
unit1304.c | 27 static char *password; variable 32 password = strdup(""); 34 if(!password || !login) { 35 Curl_safefree(password); 44 Curl_safefree(password); 57 result = Curl_parsenetrc("test.example.com", &login, &password, filename); 59 abort_unless(password != NULL, "returned NULL!"); 60 fail_unless(password[0] == 0, "password should not have been changed"); 70 result = Curl_parsenetrc("example.com", &login, &password, filename) 141 free(password); variable 156 free(password); variable 174 free(password); variable [all...] |
/frameworks/base/obex/javax/obex/ |
PasswordAuthentication.java | 36 * This class holds user name and password combinations. 47 * password provided. 49 * @param password the password to include in the response 50 * @throws NullPointerException if <code>password</code> is 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { 59 mPassword = new byte[password.length]; 60 System.arraycopy(password, 0, mPassword, 0, password.length); 73 * Retrieves the password [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
PBEKeySpecTest.java | 38 * PBEKeySpec(char[] password) method testing. Tests the behavior of 51 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 52 PBEKeySpec pbeks = new PBEKeySpec(password); 53 password[0] ++; 54 assertFalse("The change of password specified in the constructor " 56 password[0] == pbeks.getPassword()[0]); 60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int 66 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 83 new PBEKeySpec(password, null, iterationCount, keyLength); 92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength) 145 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 206 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 223 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 244 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 269 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 286 char[] password = new char[] {'1', '2', '3', '4', '5'}; local [all...] |
/external/nist-sip/java/gov/nist/javax/sip/address/ |
UserInfo.java | 51 /** password field 53 protected String password; field in class:UserInfo 89 if (this.password != null && other.password == null) 92 if (other.password != null && this.password == null) 95 if (this.password == other.password) 98 return (this.password.equals(other.password)); [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/net/ |
PasswordAuthenticationTest.java | 31 char[] password = new char[] { 'd', 'r', 'o', 'w', 's', 's', 'a', 'p' }; local 33 PasswordAuthentication pa = new PasswordAuthentication(name, password); 36 assertTrue("Password was not cloned", returnedPassword != password); 38 returnedPassword.length == password.length); 39 for (int counter = password.length - 1; counter >= 0; counter--) 41 returnedPassword[counter] == password[counter]);
|
/external/jcommander/src/test/java/com/beust/jcommander/args/ |
ArgsPassword.java | 24 @Parameter(names = "-password", description = "Connection password", password = true) 25 public String password; field in class:ArgsPassword
|
/external/openssh/ |
auth2-passwd.c | 53 char *password, *newpass; local 59 password = packet_get_string(&len); 61 /* discard new password from packet */ 69 logit("password change not supported"); 71 /* no password authentication in Android */ 72 else if (PRIVSEP(auth_password(authctxt, password)) == 1) 75 explicit_bzero(password, len); 76 free(password); 81 "password",
|
/external/snakeyaml/src/test/java/org/yaml/snakeyaml/issues/issue10/ |
JDBCDataSource.java | 20 String password; field in class:JDBCDataSource 42 return password; 45 public void setPassword(String password) { 46 this.password = password;
|
/external/wpa_supplicant_8/hostapd/ |
nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/external/webrtc/talk/app/webrtc/objc/public/ |
RTCICEServer.h | 33 // The server URI, username, and password. 36 @property(nonatomic, copy, readonly) NSString* password; variable 38 // Initializer for RTCICEServer taking uri, username, and password. 41 password:(NSString*)password;
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldPasswordAuthenticationTest.java | 27 char[] password = "hunter2".toCharArray(); local 35 PasswordAuthentication pa = new PasswordAuthentication(null, password); 37 assertEquals(password.length, pa.getPassword().length);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
PKCS12StoreParameter.java | 13 public PKCS12StoreParameter(OutputStream out, char[] password) 15 super(out, password, false); 23 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding) 25 super(out, new KeyStore.PasswordProtection(password), forDEREncoding);
|
/external/webrtc/talk/app/webrtc/objc/ |
RTCICEServer.mm | 38 @synthesize password = _password; 42 password:(NSString*)password { 43 if (!URI || !username || !password) { 51 _password = [password copy]; 60 self.password]; 71 iceServer.password = [self.password UTF8String];
|
/packages/apps/Settings/src/com/android/settings/password/ |
StorageManagerWrapper.java | 17 package com.android.settings.password;
|
/developers/build/prebuilts/gradle/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/server/ |
StoreBackend.java | 41 * Verifies the authenticity of the provided transaction by password. 45 * @param password the password for the user associated with the {@code transaction}. 46 * @return true if the password is verified. 48 boolean verify(Transaction transaction, String password); 55 * @param password the password for the user for the server side 59 boolean enroll(String userId, String password, PublicKey publicKey);
|
/developers/samples/android/security/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/server/ |
StoreBackend.java | 41 * Verifies the authenticity of the provided transaction by password. 45 * @param password the password for the user associated with the {@code transaction}. 46 * @return true if the password is verified. 48 boolean verify(Transaction transaction, String password); 55 * @param password the password for the user for the server side 59 boolean enroll(String userId, String password, PublicKey publicKey);
|
/development/samples/browseable/AsymmetricFingerprintDialog/src/com.example.android.asymmetricfingerprintdialog/server/ |
StoreBackend.java | 41 * Verifies the authenticity of the provided transaction by password. 45 * @param password the password for the user associated with the {@code transaction}. 46 * @return true if the password is verified. 48 boolean verify(Transaction transaction, String password); 55 * @param password the password for the user for the server side 59 boolean enroll(String userId, String password, PublicKey publicKey);
|
/external/autotest/tko/ |
db_postgres.py | 5 def connect(self, host, database, user, password): 6 return driver.connect("dbname=%s user=%s password=%s" % \ 7 (database, user, password))
|