/external/clang/test/Analysis/ |
H A D | default-diagnostic-visitors.c | 8 int *password; // expected-note {{Variable 'password' declared without an initial value}} local 9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}} 10 err = *password;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
H A D | PBEParametersGenerator.java | 10 protected byte[] password; field in class:PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, 34 this.password = password; 40 * return the password byte array. 42 * @return the password byte array. 46 return password; 29 init( byte[] password, byte[] salt, int iterationCount) argument 103 PKCS5PasswordToBytes( char[] password) argument 123 PKCS5PasswordToUTF8Bytes( char[] password) argument 136 PKCS12PasswordToBytes( char[] password) argument [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
H A D | PBEKeySpecTest.java | 38 * PBEKeySpec(char[] password) method testing. Tests the behavior of 51 char[] password = new char[] {'1', '2', '3', '4', '5'}; 52 PBEKeySpec pbeks = new PBEKeySpec(password); 53 password[0] ++; 54 assertFalse("The change of password specified in the constructor " 56 password[0] == pbeks.getPassword()[0]); 60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int 66 char[] password = new char[] {'1', '2', '3', '4', '5'}; 83 new PBEKeySpec(password, null, iterationCount, keyLength); 92 new PBEKeySpec(password, ne [all...] |
/external/nist-sip/java/gov/nist/javax/sip/address/ |
H A D | UserInfo.java | 51 /** password field 53 protected String password; field in class:UserInfo 89 if (this.password != null && other.password == null) 92 if (other.password != null && this.password == null) 95 if (this.password == other.password) 98 return (this.password.equals(other.password)); [all...] |
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/net/ |
H A D | PasswordAuthenticationTest.java | 31 char[] password = new char[] { 'd', 'r', 'o', 'w', 's', 's', 'a', 'p' }; 33 PasswordAuthentication pa = new PasswordAuthentication(name, password); 36 assertTrue("Password was not cloned", returnedPassword != password); 38 returnedPassword.length == password.length); 39 for (int counter = password.length - 1; counter >= 0; counter--) 41 returnedPassword[counter] == password[counter]);
|
/external/openssh/ |
H A D | auth2-passwd.c | 52 char *password, *newpass; local 58 password = packet_get_string(&len); 60 /* discard new password from packet */ 68 logit("password change not supported"); 70 /* no password authentication in android */ 71 else if (PRIVSEP(auth_password(authctxt, password)) == 1) 74 memset(password, 0, len); 75 xfree(password); 80 "password",
|
/external/wpa_supplicant_8/hostapd/ |
H A D | nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/external/chromium/chrome/browser/sync/glue/ |
H A D | password_model_associator.cc | 48 // We must not be holding a transaction when we interact with the password 55 LOG(ERROR) << "Could not get the password entries."; 66 LOG(ERROR) << "Server did not create the top-level password node. We " 80 const sync_pb::PasswordSpecificsData& password = local 82 DCHECK_EQ(tag, MakeTag(password)); 86 if (MergePasswords(password, **ix, &new_password)) { 90 LOG(ERROR) << "Failed to edit password sync node."; 103 LOG(ERROR) << "Failed to create password sync node."; 124 const sync_pb::PasswordSpecificsData& password = local 126 std::string tag = MakeTag(password); 230 GetSyncIdFromChromeId( const std::string& password) argument 236 Associate( const std::string* password, int64 sync_id) argument 299 CopyPassword( const sync_pb::PasswordSpecificsData& password, webkit_glue::PasswordForm* new_password) argument 324 MergePasswords( const sync_pb::PasswordSpecificsData& password, const webkit_glue::PasswordForm& password_form, webkit_glue::PasswordForm* new_password) argument 364 sync_pb::PasswordSpecificsData password; local 382 MakeTag( const webkit_glue::PasswordForm& password) argument 392 MakeTag( const sync_pb::PasswordSpecificsData& password) argument [all...] |
/external/chromium/net/ftp/ |
H A D | ftp_auth_cache.cc | 17 const string16& password) 20 password(password) { 38 const string16& password) { 45 entry->password = password; 47 entries_.push_front(Entry(origin, username, password)); 56 const string16& password) { 59 it->password == password) { 15 Entry(const GURL& origin, const string16& username, const string16& password) argument 37 Add(const GURL& origin, const string16& username, const string16& password) argument 55 Remove(const GURL& origin, const string16& username, const string16& password) argument [all...] |
H A D | ftp_auth_cache.h | 31 const string16& password); 36 string16 password; member in struct:net::FtpAuthCache::Entry 46 // |password|). If there is already an entry for |origin|, it will be 49 const string16& password); 52 // |username| and |password|. 54 const string16& password);
|
/external/webkit/Source/WebKit/chromium/src/ |
H A D | WebPasswordFormData.cpp | 52 // Helper to determine which password is the main one, and which is 53 // an old password (e.g on a "make new password" form), if any. 55 HTMLInputElement** password, 59 ASSERT(password); 63 // Single password, easy. 64 *password = fields->passwords[0]; 68 // Treat two identical passwords as a single password. 69 *password = fields->passwords[0]; 71 // Assume first is old password, secon 54 locateSpecificPasswords(PasswordFormFields* fields, HTMLInputElement** password, HTMLInputElement** oldPassword) argument 112 assemblePasswordFormResult(const KURL& fullOrigin, const KURL& fullAction, HTMLFormControlElement* submit, HTMLInputElement* userName, HTMLInputElement* oldPassword, HTMLInputElement* password, WebPasswordFormData* result) argument [all...] |
/external/webkit/Tools/Scripts/webkitpy/common/net/ |
H A D | credentials.py | 65 Git.read_git_config(self.git_prefix + "password")) 86 password = self._keychain_value_with_label("^password: ", 88 return [username, password] 93 "find-internet-password", 101 log("Reading Keychain for %s account and password. " 127 return (self._read_environ("username"), self._read_environ("password")) 129 def _offer_to_store_credentials_in_keyring(self, username, password): 132 if not User().confirm("Store password in system keyring?", User.DEFAULT_NO): 134 self._keyring.set_password(self.host, username, password) [all...] |
/external/webkit/Source/WebCore/platform/network/soup/ |
H A D | SoupURIUtils.cpp | 28 // does not add the password to the URL when calling 37 if (!soupURI->password) 40 url.setPass(String::fromUTF8(soupURI->password));
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 11 password="password"
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 11 password="password"
|
/external/chromium/chrome/browser/resources/options/ |
H A D | password_manager_list.css | 7 button.password-button { 21 button.password-button:hover { 26 html[dir='ltr'] button.password-button { 30 html[dir='rtl'] button.password-button { 34 input[type="password"].inactive-password { 49 #saved-passwords-list .password { 54 #saved-passwords-list .password input[type="password"], 55 #saved-passwords-list .password inpu [all...] |
/external/dropbear/ |
H A D | svr-authpasswd.c | 25 /* Validates a user password */ 35 /* Process a password auth request, sending success or failure messages as 43 char * testcrypt = NULL; /* crypt generated from the user's password sent */ 44 unsigned char * password; local 51 /* get the shadow password if possible */ 63 /* check for empty password - need to do this again here 64 * since the shadow password may differ to that tested 67 dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected", 73 /* check if client wants to change password */ 81 password [all...] |
/external/apache-http/src/org/apache/http/auth/ |
H A D | UsernamePasswordCredentials.java | 38 * Username and password {@link Credentials} 51 private final String password; field in class:UsernamePasswordCredentials 54 * The constructor with the username and password combined string argument. 56 * @param usernamePassword the username:password formed string 62 throw new IllegalArgumentException("Username:password string may not be null"); 67 this.password = usernamePassword.substring(atColon + 1); 70 this.password = null; 76 * The constructor with the username and password arguments. 79 * @param password the password 81 UsernamePasswordCredentials(String userName, String password) argument [all...] |
/external/openssh/openbsd-compat/ |
H A D | xcrypt.c | 61 xcrypt(const char *password, const char *salt) argument 67 crypted = md5_crypt(password, salt); 69 crypted = crypt(password, salt); 72 crypted = bigcrypt(password, salt); 74 crypted = crypt(password, salt); 76 crypted = bigcrypt(password, salt); 78 crypted = crypt(password, salt); 85 * Handle shadowed password systems in a cleaner way for portable
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 39 const u8 *pos, *password; local 51 password = eap_get_config_otp(sm, &password_len); 52 if (password) 55 password = eap_get_config_password(sm, &password_len); 59 if (password == NULL) { 76 wpabuf_put_data(resp, password, password_len); 78 password, password_len); 81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
H A D | mschapv2.c | 43 const u8 *password, size_t password_len, 70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 71 password, password_len); 74 password, nt_response); 76 password, peer_challenge, auth_challenge, 79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 80 password, password_len); 83 password, password_len, nt_response); 84 generate_authenticator_response(password, password_len, 96 hash_nt_password_hash(password, password_hash_has 42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 65 password, password_len); 68 password, nt_response) || 70 password, peer_challenge, auth_challenge, 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 96 if (hash_nt_password_hash(password, password_hash_has 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|