/external/tensorflow/tensorflow/tools/docker/ |
jupyter_notebook_config.py | 23 # sets a password if PASSWORD is set in the environment 24 if 'PASSWORD' in os.environ: 25 password = os.environ['PASSWORD'] variable 26 if password: 27 c.NotebookApp.password = passwd(password) 29 c.NotebookApp.password = '' 31 del os.environ['PASSWORD'] [all...] |
/external/clang/test/Analysis/ |
default-diagnostic-visitors.c | 8 int *password; // expected-note {{'password' declared without an initial value}} local 9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}} 10 err = *password;
|
/external/webrtc/talk/app/webrtc/objc/public/ |
RTCICEServer.h | 33 // The server URI, username, and password. 36 @property(nonatomic, copy, readonly) NSString* password; variable 38 // Initializer for RTCICEServer taking uri, username, and password. 41 password:(NSString*)password;
|
/external/curl/tests/unit/ |
unit1304.c | 27 static char *password; variable 32 password = strdup(""); 34 if(!password || !login) { 35 Curl_safefree(password); 44 Curl_safefree(password); 57 result = Curl_parsenetrc("test.example.com", &login, &password, filename); 59 abort_unless(password != NULL, "returned NULL!"); 60 fail_unless(password[0] == 0, "password should not have been changed"); 70 result = Curl_parsenetrc("example.com", &login, &password, filename) 141 free(password); variable 156 free(password); variable 174 free(password); variable [all...] |
/external/jcommander/src/test/java/com/beust/jcommander/args/ |
ArgsPassword.java | 24 @Parameter(names = "-password", description = "Connection password", password = true) 25 public String password; field in class:ArgsPassword
|
/external/wpa_supplicant_8/hostapd/ |
nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/libcore/ojluni/src/main/java/java/net/ |
PasswordAuthentication.java | 31 * Authenticator. It is simply a repository for a user name and a password. 43 private char[] password; field in class:PasswordAuthentication 47 * user name and password. 49 * <p> Note that the given user password is cloned before it is stored in 53 * @param password the user's password 55 public PasswordAuthentication(String userName, char[] password) { 57 this.password = password.clone(); 70 * Returns the user password [all...] |
/packages/apps/Settings/src/com/android/settings/password/ |
ScreenLockSuggestionActivity.java | 17 package com.android.settings.password;
|
StorageManagerWrapper.java | 17 package com.android.settings.password;
|
ManagedLockPasswordProvider.java | 17 package com.android.settings.password; 26 * It provides resources that should be shown in settings UI when lock password quality is set to 28 * an option for setting the password quality to 40 * Whether choosing/setting a managed lock password is supported for the user. 46 * Whether the user should be able to choose managed lock password. 51 * Returns title for managed password preference in security (lock) setting picker. 58 * Creates intent that should be launched when user chooses managed password in the lock 60 * @param requirePasswordToDecrypt Whether a password is needed to decrypt the user. 61 * @param password Current lock password [all...] |
/packages/apps/Settings/tests/robotests/src/com/android/settings/password/ |
ConfirmCredentialTest.java | 17 package com.android.settings.password; 24 import com.android.settings.password.ConfirmDeviceCredentialBaseFragment.LastTryDialog;
|
ScreenLockTypeTest.java | 17 package com.android.settings.password; 34 .isEqualTo(ScreenLockType.PASSWORD); 36 .isEqualTo(ScreenLockType.PASSWORD); 40 .isEqualTo(ScreenLockType.PASSWORD);
|
/external/pdfium/xfa/fxfa/ |
cxfa_ffpasswordedit.cpp | 52 WideString password = m_pNode->GetWidgetAcc()->GetPasswordChar(); local 53 if (!password.IsEmpty()) 54 pWidget->SetAliasChar(password[0]);
|
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 35 SizedBuffer password; local 37 password.buffer.reset(new uint8_t[16]); 38 password.length = 16; 39 memset(password.buffer.get(), 0, 16); 40 EnrollRequest request(0, NULL, &password, NULL); 54 SizedBuffer password; local 57 EnrollRequest request(0, NULL, &password, NULL); 99 // do_enroll enrolls an all 0 password 112 // verify first password 123 // enroll new password 127 SizedBuffer password; local 172 SizedBuffer password; local [all...] |
/external/apache-http/src/org/apache/http/auth/ |
UsernamePasswordCredentials.java | 38 * Username and password {@link Credentials} 56 private final String password; field in class:UsernamePasswordCredentials 59 * The constructor with the username and password combined string argument. 61 * @param usernamePassword the username:password formed string 67 throw new IllegalArgumentException("Username:password string may not be null"); 72 this.password = usernamePassword.substring(atColon + 1); 75 this.password = null; 81 * The constructor with the username and password arguments. 84 * @param password the password [all...] |
/external/autotest/client/cros/ |
service_login.js | 11 gaia.chromeOSLogin.attemptLogin = function(email, password, attemptToken) { 15 'password': password, 14 'email': email, property in class:gaia.chromeOSLogin.attemptLogin.msg
|
/external/boringssl/src/tool/ |
pkcs12.cc | 100 printf("Enter password: "); 103 char password[256]; local 106 n = BORINGSSL_READ(0, &password[off], sizeof(password) - 1 - off); 110 } while ((n > 0 && OPENSSL_memchr(password, '\n', off) == NULL && 111 off < sizeof(password) - 1) || 114 char *newline = reinterpret_cast<char *>(OPENSSL_memchr(password, '\n', off)); 126 if (!PKCS12_get_key_and_certs(&key, certs.get(), &pkcs12, password)) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 6 * super class for all Password Based Encryption (PBE) parameter generator classes. 10 protected byte[] password; field in class:PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, 34 this.password = password; 40 * return the password byte array. 42 * @return the password byte array [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKCS12Key.java | 6 * A password based key for use with PKCS#12. 11 private final char[] password; field in class:PKCS12Key 14 * Basic constructor for a password based key - secret key generation parameters will be passed separately.. 16 * @param password password to use. 18 public PKCS12Key(char[] password) 20 this(password, false); 27 * @param password password to use. 30 public PKCS12Key(char[] password, boolean useWrongZeroLengthConversion [all...] |
/external/libchrome/crypto/ |
symmetric_key_unittest.cc | 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160)); 70 const char* password; member in struct:PBKDF2TestVector 85 test_data.algorithm, test_data.password, test_data.salt, 102 "password", 110 "password", 118 "password", 128 "password", 140 "password", 148 "password", 156 "password", [all...] |
/external/libmicrohttpd/src/examples/ |
digest_auth_example.c | 45 const char *password = "testpass"; local 64 password,
|
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/command/ |
PassCommandHandler.java | 27 * <li>If the required password parameter is missing, then reply with 501</li>
30 * <li>If the specified password is not correct, then reply with 530</li>
40 String password = command.getRequiredParameter(0);
local 45 if (userAccount.isValidPassword(password)) {
|
/external/pdfium/core/fpdfapi/parser/ |
cpdf_security_handler_embeddertest.cpp | 78 const char* password; member in struct:__anon31044 83 OpenSavedDocument(test.password);
|
/external/python/cpython3/Modules/clinic/ |
_hashopenssl.c.h | 8 "scrypt($module, /, password, *, salt=None, n=None, r=None, p=None,\n" 12 "scrypt password-based key derivation function."); 18 _hashlib_scrypt_impl(PyObject *module, Py_buffer *password, Py_buffer *salt, 26 static const char * const _keywords[] = {"password", "salt", "n", "r", "p", "maxmem", "dklen", NULL}; 28 Py_buffer password = {NULL, NULL}; local 37 &password, &salt, &PyLong_Type, &n_obj, &PyLong_Type, &r_obj, &PyLong_Type, &p_obj, &maxmem, &dklen)) { 40 return_value = _hashlib_scrypt_impl(module, &password, &salt, n_obj, r_obj, p_obj, maxmem, dklen); 43 /* Cleanup for password */ 44 if (password.obj) { 45 PyBuffer_Release(&password); [all...] |
/external/syslinux/gpxe/src/usr/ |
imgmgmt.c | 51 const char *password; local 59 /* Redact password portion of URI, if necessary */ 60 password = uri->password; 61 if ( password ) 62 uri->password = "***"; 65 uri->password = password;
|