/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS12ParametersGenerator.java | 107 if ((password != null) && (password.length != 0)) 109 P = new byte[v * ((password.length + v - 1) / v)]; 113 P[i] = password[i % password.length]; 165 * Generate a key parameter derived from the password, salt, and iteration 183 * the password, salt, and iteration count we are currently initialised 205 * Generate a key parameter for use with a MAC derived from the password,
|
/external/curl/src/ |
tool_getpass.c | 225 char *password, /* buffer to store password in */ 226 size_t buflen) /* size of buffer to store password in */ 237 nread = read(fd, password, buflen); 239 password[--nread] = '\0'; /* zero terminate where enter is stored */ 241 password[0] = '\0'; /* got nothing */ 252 return password; /* return pointer to buffer */
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CustomTrust.java | 168 char[] password = "password".toCharArray(); // Any password will work. local 169 KeyStore keyStore = newEmptyKeyStore(password); 179 keyManagerFactory.init(keyStore, password); 192 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { 196 keyStore.load(in, password);
|
/external/okhttp/samples/static-server/src/main/java/com/squareup/okhttp/sample/ |
SampleServer.java | 105 System.out.println("Usage: SampleServer <keystore> <password> <root file> <port>"); 110 String password = args[1]; local 114 SSLContext sslContext = sslContext(keystoreFile, password); 119 private static SSLContext sslContext(String keystoreFile, String password) 124 keystore.load(in, password.toCharArray()); 130 keyManagerFactory.init(keystore, password.toCharArray());
|
/external/syslinux/com32/cmenu/libmenu/ |
tui.c | 25 // password <> 0 implies not echoed on screen 29 void getuserinput(char *stra, unsigned int size, unsigned int password, 47 if (password != 0) 48 showoldvalue = 0; // Password's never displayed 66 if (password == 0) // Not a password, print initial value 191 if (password == 0) { 200 if (password == 0)
|
/external/webrtc/webrtc/base/ |
cryptstring.h | 69 // Used for constructing strings where a password is involved and we 91 void Append(const CryptString * password) { 92 size_t len = password->GetLength(); 94 password->CopyTo(storage_ + length_, true); 153 std::string& password() { return password_; } function in class:rtc::InsecureCryptStringImpl 154 const std::string& password() const { return password_; } function in class:rtc::InsecureCryptStringImpl
|
/external/webrtc/webrtc/p2p/client/ |
fakeportallocator.h | 36 const std::string& password, 40 max_port, username, password, origin, 66 const std::string& password, 76 password, 106 password(), std::string(), false));
|
/external/apache-http/android/src/android/net/http/ |
RequestHandle.java | 223 public void setupBasicAuthResponse(boolean isProxy, String username, String password) { 224 String response = computeBasicAuthResponse(username, password); 237 String password, 245 username, password, realm, nonce, QOP, algorithm, opaque); 272 * @return Basic-scheme authentication response: BASE64(username:password). 274 public static String computeBasicAuthResponse(String username, String password) { 279 if (password == null) { 280 throw new NullPointerException("password == null"); 283 // encode username:password to base64 284 return new String(Base64.encodeBase64((username + ':' + password).getBytes())) [all...] |
/external/pdfium/core/fpdfapi/parser/ |
cpdf_security_handler.cpp | 31 const uint8_t* password, 40 passcode[i] = i < pass_size ? password[i] : defpasscode[i - pass_size]; 104 CFX_ByteString password = m_pParser->GetPassword(); local 105 if (!password.IsEmpty() && 106 CheckPassword(password.raw_str(), password.GetLength(), true, 111 return CheckPassword(password.raw_str(), password.GetLength(), false, 232 void Revision6_Hash(const uint8_t* password, 239 CRYPT_SHA256Update(&sha, password, size) [all...] |
/external/autotest/database/ |
database_connection.py | 37 def connect(self, host=None, username=None, password=None, db_name=None): 71 def connect(self, host=None, username=None, password=None, db_name=None): 77 host=host, user=username, passwd=password, db=db_name, 94 def connect(self, host=None, username=None, password=None, db_name=None): 124 def connect(self, host=None, username=None, password=None, db_name=None): 161 _DATABASE_ATTRIBUTES = ('db_type', 'host', 'username', 'password', 211 password=None, db_name=None): 221 @param password: database password, default to None. 225 use_afe_setting = not bool(db_type or host or username or password) [all...] |
/external/zlib/src/contrib/minizip/ |
miniunz.c | 196 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \ 203 " -p extract crypted file using password\n\n"); 312 int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password) 316 const char* password; 370 err = unzOpenCurrentFilePassword(uf,password); 475 int do_extract(uf,opt_extract_without_path,opt_overwrite,password) 479 const char* password; 494 password) != UNZ_OK) 511 int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password) 516 const char* password; 540 const char *password=NULL; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 47 /* Change-Password Data field */ 157 const u8 *identity, *password; local 163 password = eap_get_config_password2(sm, &password_len, &pwhash); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 304 "EAP-MSCHAPV2: Password changed successfully"); 306 bin_clear_free(config->password, config->password_len); 310 config->password = os_malloc(16); 312 if (config->password && 315 config->password)) { [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/distutils/command/ |
upload.py | 33 self.password = ''
47 self.password = config['password']
51 # getting the password from the distribution
53 if not self.password and self.distribution.password:
54 self.password = self.distribution.password
135 self.password)
|
/external/autotest/client/common_lib/cros/ |
chrome.py | 60 username=None, password=None, gaia_id=None, 85 @param password: Log in using this password instead of the default. 140 self.password = b_options.password if password is None else password 143 b_options.password = self.password
|
/external/mdnsresponder/mDNSWindows/ControlPanel/ |
RegistrationPage.cpp | 205 CString password; local 216 password = outPassword; 217 m_passwordControl.SetWindowText( password ); 294 CString password; local 306 m_passwordControl.GetWindowText( password ); 308 if ( username.GetLength() && password.GetLength() ) 311 StringObjectToUTF8String( password, passwordUTF8, sizeof( passwordUTF8 ) );
|
/external/python/cpython2/Lib/distutils/command/ |
upload.py | 33 self.password = '' 47 self.password = config['password'] 51 # getting the password from the distribution 53 if not self.password and self.distribution.password: 54 self.password = self.distribution.password 135 self.password)
|
/external/webrtc/webrtc/p2p/base/ |
portallocator.h | 82 RelayCredentials(const std::string& username, const std::string& password) 83 : username(username), password(password) {} 86 std::string password; member in struct:cricket::RelayCredentials 97 const std::string& password, 100 : type(RELAY_TURN), credentials(username, password) { 152 const std::string& password() const { return ice_pwd_; } function in class:cricket::PortAllocatorSession
|
/prebuilts/gdb/darwin-x86/lib/python2.7/distutils/command/ |
upload.py | 33 self.password = '' 47 self.password = config['password'] 51 # getting the password from the distribution 53 if not self.password and self.distribution.password: 54 self.password = self.distribution.password 135 self.password)
|
/prebuilts/gdb/linux-x86/lib/python2.7/distutils/command/ |
upload.py | 33 self.password = '' 47 self.password = config['password'] 51 # getting the password from the distribution 53 if not self.password and self.distribution.password: 54 self.password = self.distribution.password 135 self.password)
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/distutils/command/ |
upload.py | 33 self.password = '' 47 self.password = config['password'] 51 # getting the password from the distribution 53 if not self.password and self.distribution.password: 54 self.password = self.distribution.password 135 self.password)
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/distutils/command/ |
upload.py | 33 self.password = '' 47 self.password = config['password'] 51 # getting the password from the distribution 53 if not self.password and self.distribution.password: 54 self.password = self.distribution.password 135 self.password)
|
/external/wpa_supplicant_8/src/ap/ |
eap_user_db.c | 85 if (os_strcmp(col[i], "password") == 0 && argv[i]) { 86 bin_clear_free(user->password, user->password_len); 88 user->password = (u8 *) os_strdup(argv[i]); 120 (user->password == NULL || len > user->password_len)) { 121 bin_clear_free(user->password, user->password_len); 123 user->password = (u8 *) os_strdup(argv[id]); 167 bin_clear_free(hapd->tmp_eap_user.password, 208 user->identity = user->password; 210 user->password = NULL; 246 wsc_registrar.password = (u8 *) conf->ap_pin [all...] |
/external/autotest/frontend/ |
apache_auth.py | 19 def authenticate(self, username=None, password=None): 23 # password is meaningless 25 password='apache authentication') 83 password='')
|
/external/libchrome/crypto/ |
symmetric_key.cc | 55 const std::string& password, 80 password.data(), password.length(),
|
symmetric_key_nss.cc | 46 const std::string& password, 65 const_cast<char *>(password.data())); 66 password_item.len = password.size();
|