HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 201 - 225 of 1437) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
PKCS12ParametersGenerator.java 107 if ((password != null) && (password.length != 0))
109 P = new byte[v * ((password.length + v - 1) / v)];
113 P[i] = password[i % password.length];
165 * Generate a key parameter derived from the password, salt, and iteration
183 * the password, salt, and iteration count we are currently initialised
205 * Generate a key parameter for use with a MAC derived from the password,
  /external/curl/src/
tool_getpass.c 225 char *password, /* buffer to store password in */
226 size_t buflen) /* size of buffer to store password in */
237 nread = read(fd, password, buflen);
239 password[--nread] = '\0'; /* zero terminate where enter is stored */
241 password[0] = '\0'; /* got nothing */
252 return password; /* return pointer to buffer */
  /external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/
CustomTrust.java 168 char[] password = "password".toCharArray(); // Any password will work. local
169 KeyStore keyStore = newEmptyKeyStore(password);
179 keyManagerFactory.init(keyStore, password);
192 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException {
196 keyStore.load(in, password);
  /external/okhttp/samples/static-server/src/main/java/com/squareup/okhttp/sample/
SampleServer.java 105 System.out.println("Usage: SampleServer <keystore> <password> <root file> <port>");
110 String password = args[1]; local
114 SSLContext sslContext = sslContext(keystoreFile, password);
119 private static SSLContext sslContext(String keystoreFile, String password)
124 keystore.load(in, password.toCharArray());
130 keyManagerFactory.init(keystore, password.toCharArray());
  /external/syslinux/com32/cmenu/libmenu/
tui.c 25 // password <> 0 implies not echoed on screen
29 void getuserinput(char *stra, unsigned int size, unsigned int password,
47 if (password != 0)
48 showoldvalue = 0; // Password's never displayed
66 if (password == 0) // Not a password, print initial value
191 if (password == 0) {
200 if (password == 0)
  /external/webrtc/webrtc/base/
cryptstring.h 69 // Used for constructing strings where a password is involved and we
91 void Append(const CryptString * password) {
92 size_t len = password->GetLength();
94 password->CopyTo(storage_ + length_, true);
153 std::string& password() { return password_; } function in class:rtc::InsecureCryptStringImpl
154 const std::string& password() const { return password_; } function in class:rtc::InsecureCryptStringImpl
  /external/webrtc/webrtc/p2p/client/
fakeportallocator.h 36 const std::string& password,
40 max_port, username, password, origin,
66 const std::string& password,
76 password,
106 password(), std::string(), false));
  /external/apache-http/android/src/android/net/http/
RequestHandle.java 223 public void setupBasicAuthResponse(boolean isProxy, String username, String password) {
224 String response = computeBasicAuthResponse(username, password);
237 String password,
245 username, password, realm, nonce, QOP, algorithm, opaque);
272 * @return Basic-scheme authentication response: BASE64(username:password).
274 public static String computeBasicAuthResponse(String username, String password) {
279 if (password == null) {
280 throw new NullPointerException("password == null");
283 // encode username:password to base64
284 return new String(Base64.encodeBase64((username + ':' + password).getBytes()))
    [all...]
  /external/pdfium/core/fpdfapi/parser/
cpdf_security_handler.cpp 31 const uint8_t* password,
40 passcode[i] = i < pass_size ? password[i] : defpasscode[i - pass_size];
104 CFX_ByteString password = m_pParser->GetPassword(); local
105 if (!password.IsEmpty() &&
106 CheckPassword(password.raw_str(), password.GetLength(), true,
111 return CheckPassword(password.raw_str(), password.GetLength(), false,
232 void Revision6_Hash(const uint8_t* password,
239 CRYPT_SHA256Update(&sha, password, size)
    [all...]
  /external/autotest/database/
database_connection.py 37 def connect(self, host=None, username=None, password=None, db_name=None):
71 def connect(self, host=None, username=None, password=None, db_name=None):
77 host=host, user=username, passwd=password, db=db_name,
94 def connect(self, host=None, username=None, password=None, db_name=None):
124 def connect(self, host=None, username=None, password=None, db_name=None):
161 _DATABASE_ATTRIBUTES = ('db_type', 'host', 'username', 'password',
211 password=None, db_name=None):
221 @param password: database password, default to None.
225 use_afe_setting = not bool(db_type or host or username or password)
    [all...]
  /external/zlib/src/contrib/minizip/
miniunz.c 196 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \
203 " -p extract crypted file using password\n\n");
312 int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password)
316 const char* password;
370 err = unzOpenCurrentFilePassword(uf,password);
475 int do_extract(uf,opt_extract_without_path,opt_overwrite,password)
479 const char* password;
494 password) != UNZ_OK)
511 int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password)
516 const char* password;
540 const char *password=NULL; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 47 /* Change-Password Data field */
157 const u8 *identity, *password; local
163 password = eap_get_config_password2(sm, &password_len, &pwhash);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
304 "EAP-MSCHAPV2: Password changed successfully");
306 bin_clear_free(config->password, config->password_len);
310 config->password = os_malloc(16);
312 if (config->password &&
315 config->password)) {
    [all...]
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/distutils/command/
upload.py 33 self.password = ''
47 self.password = config['password']
51 # getting the password from the distribution
53 if not self.password and self.distribution.password:
54 self.password = self.distribution.password
135 self.password)
  /external/autotest/client/common_lib/cros/
chrome.py 60 username=None, password=None, gaia_id=None,
85 @param password: Log in using this password instead of the default.
140 self.password = b_options.password if password is None else password
143 b_options.password = self.password
  /external/mdnsresponder/mDNSWindows/ControlPanel/
RegistrationPage.cpp 205 CString password; local
216 password = outPassword;
217 m_passwordControl.SetWindowText( password );
294 CString password; local
306 m_passwordControl.GetWindowText( password );
308 if ( username.GetLength() && password.GetLength() )
311 StringObjectToUTF8String( password, passwordUTF8, sizeof( passwordUTF8 ) );
  /external/python/cpython2/Lib/distutils/command/
upload.py 33 self.password = ''
47 self.password = config['password']
51 # getting the password from the distribution
53 if not self.password and self.distribution.password:
54 self.password = self.distribution.password
135 self.password)
  /external/webrtc/webrtc/p2p/base/
portallocator.h 82 RelayCredentials(const std::string& username, const std::string& password)
83 : username(username), password(password) {}
86 std::string password; member in struct:cricket::RelayCredentials
97 const std::string& password,
100 : type(RELAY_TURN), credentials(username, password) {
152 const std::string& password() const { return ice_pwd_; } function in class:cricket::PortAllocatorSession
  /prebuilts/gdb/darwin-x86/lib/python2.7/distutils/command/
upload.py 33 self.password = ''
47 self.password = config['password']
51 # getting the password from the distribution
53 if not self.password and self.distribution.password:
54 self.password = self.distribution.password
135 self.password)
  /prebuilts/gdb/linux-x86/lib/python2.7/distutils/command/
upload.py 33 self.password = ''
47 self.password = config['password']
51 # getting the password from the distribution
53 if not self.password and self.distribution.password:
54 self.password = self.distribution.password
135 self.password)
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/distutils/command/
upload.py 33 self.password = ''
47 self.password = config['password']
51 # getting the password from the distribution
53 if not self.password and self.distribution.password:
54 self.password = self.distribution.password
135 self.password)
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/distutils/command/
upload.py 33 self.password = ''
47 self.password = config['password']
51 # getting the password from the distribution
53 if not self.password and self.distribution.password:
54 self.password = self.distribution.password
135 self.password)
  /external/wpa_supplicant_8/src/ap/
eap_user_db.c 85 if (os_strcmp(col[i], "password") == 0 && argv[i]) {
86 bin_clear_free(user->password, user->password_len);
88 user->password = (u8 *) os_strdup(argv[i]);
120 (user->password == NULL || len > user->password_len)) {
121 bin_clear_free(user->password, user->password_len);
123 user->password = (u8 *) os_strdup(argv[id]);
167 bin_clear_free(hapd->tmp_eap_user.password,
208 user->identity = user->password;
210 user->password = NULL;
246 wsc_registrar.password = (u8 *) conf->ap_pin
    [all...]
  /external/autotest/frontend/
apache_auth.py 19 def authenticate(self, username=None, password=None):
23 # password is meaningless
25 password='apache authentication')
83 password='')
  /external/libchrome/crypto/
symmetric_key.cc 55 const std::string& password,
80 password.data(), password.length(),
symmetric_key_nss.cc 46 const std::string& password,
65 const_cast<char *>(password.data()));
66 password_item.len = password.size();

Completed in 1579 milliseconds

1 2 3 4 5 6 7 891011>>