HomeSort by relevance Sort by last modified time
    Searched defs:password (Results 1 - 25 of 803) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/tensorflow/tensorflow/tools/docker/
jupyter_notebook_config.py 23 # sets a password if PASSWORD is set in the environment
24 if 'PASSWORD' in os.environ:
25 password = os.environ['PASSWORD'] variable
26 if password:
27 c.NotebookApp.password = passwd(password)
29 c.NotebookApp.password = ''
31 del os.environ['PASSWORD']
    [all...]
  /external/clang/test/Analysis/
default-diagnostic-visitors.c 8 int *password; // expected-note {{'password' declared without an initial value}} local
9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}}
10 err = *password;
  /external/webrtc/talk/app/webrtc/objc/public/
RTCICEServer.h 33 // The server URI, username, and password.
36 @property(nonatomic, copy, readonly) NSString* password; variable
38 // Initializer for RTCICEServer taking uri, username, and password.
41 password:(NSString*)password;
  /external/curl/tests/unit/
unit1304.c 27 static char *password; variable
32 password = strdup("");
34 if(!password || !login) {
35 Curl_safefree(password);
44 Curl_safefree(password);
57 result = Curl_parsenetrc("test.example.com", &login, &password, filename);
59 abort_unless(password != NULL, "returned NULL!");
60 fail_unless(password[0] == 0, "password should not have been changed");
70 result = Curl_parsenetrc("example.com", &login, &password, filename)
141 free(password); variable
156 free(password); variable
174 free(password); variable
    [all...]
  /external/jcommander/src/test/java/com/beust/jcommander/args/
ArgsPassword.java 24 @Parameter(names = "-password", description = "Connection password", password = true)
25 public String password; field in class:ArgsPassword
  /external/wpa_supplicant_8/hostapd/
nt_password_hash.c 2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
  /libcore/ojluni/src/main/java/java/net/
PasswordAuthentication.java 31 * Authenticator. It is simply a repository for a user name and a password.
43 private char[] password; field in class:PasswordAuthentication
47 * user name and password.
49 * <p> Note that the given user password is cloned before it is stored in
53 * @param password the user's password
55 public PasswordAuthentication(String userName, char[] password) {
57 this.password = password.clone();
70 * Returns the user password
    [all...]
  /packages/apps/Settings/src/com/android/settings/password/
ScreenLockSuggestionActivity.java 17 package com.android.settings.password;
StorageManagerWrapper.java 17 package com.android.settings.password;
ManagedLockPasswordProvider.java 17 package com.android.settings.password;
26 * It provides resources that should be shown in settings UI when lock password quality is set to
28 * an option for setting the password quality to
40 * Whether choosing/setting a managed lock password is supported for the user.
46 * Whether the user should be able to choose managed lock password.
51 * Returns title for managed password preference in security (lock) setting picker.
58 * Creates intent that should be launched when user chooses managed password in the lock
60 * @param requirePasswordToDecrypt Whether a password is needed to decrypt the user.
61 * @param password Current lock password
    [all...]
  /packages/apps/Settings/tests/robotests/src/com/android/settings/password/
ConfirmCredentialTest.java 17 package com.android.settings.password;
24 import com.android.settings.password.ConfirmDeviceCredentialBaseFragment.LastTryDialog;
ScreenLockTypeTest.java 17 package com.android.settings.password;
34 .isEqualTo(ScreenLockType.PASSWORD);
36 .isEqualTo(ScreenLockType.PASSWORD);
40 .isEqualTo(ScreenLockType.PASSWORD);
  /external/pdfium/xfa/fxfa/
cxfa_ffpasswordedit.cpp 52 WideString password = m_pNode->GetWidgetAcc()->GetPasswordChar(); local
53 if (!password.IsEmpty())
54 pWidget->SetAliasChar(password[0]);
  /system/core/gatekeeperd/tests/
gatekeeper_test.cpp 35 SizedBuffer password; local
37 password.buffer.reset(new uint8_t[16]);
38 password.length = 16;
39 memset(password.buffer.get(), 0, 16);
40 EnrollRequest request(0, NULL, &password, NULL);
54 SizedBuffer password; local
57 EnrollRequest request(0, NULL, &password, NULL);
99 // do_enroll enrolls an all 0 password
112 // verify first password
123 // enroll new password
127 SizedBuffer password; local
172 SizedBuffer password; local
    [all...]
  /external/apache-http/src/org/apache/http/auth/
UsernamePasswordCredentials.java 38 * Username and password {@link Credentials}
56 private final String password; field in class:UsernamePasswordCredentials
59 * The constructor with the username and password combined string argument.
61 * @param usernamePassword the username:password formed string
67 throw new IllegalArgumentException("Username:password string may not be null");
72 this.password = usernamePassword.substring(atColon + 1);
75 this.password = null;
81 * The constructor with the username and password arguments.
84 * @param password the password
    [all...]
  /external/autotest/client/cros/
service_login.js 11 gaia.chromeOSLogin.attemptLogin = function(email, password, attemptToken) {
15 'password': password,
14 'email': email, property in class:gaia.chromeOSLogin.attemptLogin.msg
  /external/boringssl/src/tool/
pkcs12.cc 100 printf("Enter password: ");
103 char password[256]; local
106 n = BORINGSSL_READ(0, &password[off], sizeof(password) - 1 - off);
110 } while ((n > 0 && OPENSSL_memchr(password, '\n', off) == NULL &&
111 off < sizeof(password) - 1) ||
114 char *newline = reinterpret_cast<char *>(OPENSSL_memchr(password, '\n', off));
126 if (!PKCS12_get_key_and_certs(&key, certs.get(), &pkcs12, password)) {
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
PBEParametersGenerator.java 6 * super class for all Password Based Encryption (PBE) parameter generator classes.
10 protected byte[] password; field in class:PBEParametersGenerator
24 * @param password the password converted into bytes (see below).
25 * @param salt the salt to be mixed with the password.
30 byte[] password,
34 this.password = password;
40 * return the password byte array.
42 * @return the password byte array
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
PKCS12Key.java 6 * A password based key for use with PKCS#12.
11 private final char[] password; field in class:PKCS12Key
14 * Basic constructor for a password based key - secret key generation parameters will be passed separately..
16 * @param password password to use.
18 public PKCS12Key(char[] password)
20 this(password, false);
27 * @param password password to use.
30 public PKCS12Key(char[] password, boolean useWrongZeroLengthConversion
    [all...]
  /external/libchrome/crypto/
symmetric_key_unittest.cc 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160));
70 const char* password; member in struct:PBKDF2TestVector
85 test_data.algorithm, test_data.password, test_data.salt,
102 "password",
110 "password",
118 "password",
128 "password",
140 "password",
148 "password",
156 "password",
    [all...]
  /external/libmicrohttpd/src/examples/
digest_auth_example.c 45 const char *password = "testpass"; local
64 password,
  /external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/command/
PassCommandHandler.java 27 * <li>If the required password parameter is missing, then reply with 501</li>
30 * <li>If the specified password is not correct, then reply with 530</li>
40 String password = command.getRequiredParameter(0); local
45 if (userAccount.isValidPassword(password)) {
  /external/pdfium/core/fpdfapi/parser/
cpdf_security_handler_embeddertest.cpp 78 const char* password; member in struct:__anon31044
83 OpenSavedDocument(test.password);
  /external/python/cpython3/Modules/clinic/
_hashopenssl.c.h 8 "scrypt($module, /, password, *, salt=None, n=None, r=None, p=None,\n"
12 "scrypt password-based key derivation function.");
18 _hashlib_scrypt_impl(PyObject *module, Py_buffer *password, Py_buffer *salt,
26 static const char * const _keywords[] = {"password", "salt", "n", "r", "p", "maxmem", "dklen", NULL};
28 Py_buffer password = {NULL, NULL}; local
37 &password, &salt, &PyLong_Type, &n_obj, &PyLong_Type, &r_obj, &PyLong_Type, &p_obj, &maxmem, &dklen)) {
40 return_value = _hashlib_scrypt_impl(module, &password, &salt, n_obj, r_obj, p_obj, maxmem, dklen);
43 /* Cleanup for password */
44 if (password.obj) {
45 PyBuffer_Release(&password);
    [all...]
  /external/syslinux/gpxe/src/usr/
imgmgmt.c 51 const char *password; local
59 /* Redact password portion of URI, if necessary */
60 password = uri->password;
61 if ( password )
62 uri->password = "***";
65 uri->password = password;

Completed in 828 milliseconds

1 2 3 4 5 6 7 8 91011>>