/external/clang/test/Analysis/ |
H A D | default-diagnostic-visitors.c | 8 int *password; // expected-note {{'password' declared without an initial value}} local 9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}} 10 err = *password;
|
/external/webrtc/talk/app/webrtc/objc/public/ |
H A D | RTCICEServer.h | 33 // The server URI, username, and password. 36 @property(nonatomic, copy, readonly) NSString* password; variable 38 // Initializer for RTCICEServer taking uri, username, and password. 41 password:(NSString*)password;
|
/external/curl/tests/unit/ |
H A D | unit1304.c | 27 static char *password; variable 32 password = strdup(""); 34 if(!password || !login) { 35 Curl_safefree(password); 44 Curl_safefree(password); 57 result = Curl_parsenetrc("test.example.com", &login, &password, filename); 59 abort_unless(password != NULL, "returned NULL!"); 60 fail_unless(password[0] == 0, "password should not have been changed"); 70 result = Curl_parsenetrc("example.com", &login, &password, filenam 141 free(password); variable 156 free(password); variable 174 free(password); variable [all...] |
/external/jcommander/src/test/java/com/beust/jcommander/args/ |
H A D | ArgsPassword.java | 24 @Parameter(names = "-password", description = "Connection password", password = true) 25 public String password; field in class:ArgsPassword
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
H A D | Credentials.java | 27 public static String basic(String userName, String password) { argument 29 String usernameAndPassword = userName + ":" + password;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
H A D | PKCS12Key.java | 6 * A password based key for use with PKCS#12. 11 private final char[] password; field in class:PKCS12Key 14 * Basic constructor for a password based key - secret key generation parameters will be passed separately.. 16 * @param password password to use. 18 public PKCS12Key(char[] password) argument 20 this(password, false); 27 * @param password password to use. 30 public PKCS12Key(char[] password, boolea argument [all...] |
H A D | PKCS12KeyWithParameters.java | 8 * A password based key for use with PKCS#12 with full PBE parameters. 18 * Basic constructor for a password based key with generation parameters. 20 * @param password password to use. 24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) argument 26 super(password); 34 * Basic constructor for a password based key with generation parameters, specifying the wrong conversion for 37 * @param password password to use. 42 public PKCS12KeyWithParameters(char[] password, boolea argument [all...] |
H A D | PKCS12StoreParameter.java | 21 public PKCS12StoreParameter(OutputStream out, char[] password) argument 23 this(out, password, false); 31 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding) argument 33 this(out, new KeyStore.PasswordProtection(password), forDEREncoding);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
H A D | PKCS12StoreParameter.java | 13 public PKCS12StoreParameter(OutputStream out, char[] password) argument 15 super(out, password, false); 23 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding) argument 25 super(out, new KeyStore.PasswordProtection(password), forDEREncoding);
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
H A D | KeyManagerFactoryImpl.java | 44 //password 48 * @see KeyManagerFactorySpi#engineInit(KeyStore ks, char[] password) 51 protected void engineInit(KeyStore ks, char[] password) argument 56 if (password != null) { 57 pwd = password.clone();
|
/external/lzma/CPP/7zip/UI/Console/ |
H A D | OpenCallbackConsole.cpp | 78 HRESULT COpenCallbackConsole::Open_CryptoGetTextPassword(BSTR *password)
argument 80 *password = NULL;
89 return StringToBstr(Password, password);
93 HRESULT COpenCallbackConsole::Open_GetPasswordIfAny(bool &passwordIsDefined, UString &password)
96 password = Password;
|
/external/openssh/ |
H A D | auth2-passwd.c | 53 char *password, *newpass; local 59 password = packet_get_string(&len); 61 /* discard new password from packet */ 69 logit("password change not supported"); 71 /* no password authentication in Android */ 72 else if (PRIVSEP(auth_password(authctxt, password)) == 1) 75 explicit_bzero(password, len); 76 free(password); 81 "password",
|
/external/wpa_supplicant_8/hostapd/ |
H A D | nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/external/apache-http/src/org/apache/http/auth/ |
H A D | UsernamePasswordCredentials.java | 38 * Username and password {@link Credentials} 56 private final String password; field in class:UsernamePasswordCredentials 59 * The constructor with the username and password combined string argument. 61 * @param usernamePassword the username:password formed string 67 throw new IllegalArgumentException("Username:password string may not be null"); 72 this.password = usernamePassword.substring(atColon + 1); 75 this.password = null; 81 * The constructor with the username and password arguments. 84 * @param password the password 86 UsernamePasswordCredentials(String userName, String password) argument [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMEngine.java | 67 * @param password Password 76 String password, 74 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|
/external/autotest/frontend/ |
H A D | make_superuser.py | 18 password = config.get_config_value(section, "password") variable 21 passwd=password, db=db_name)
|
/external/boringssl/src/tool/ |
H A D | pkcs12.cc | 100 printf("Enter password: "); 103 char password[256]; local 106 n = BORINGSSL_READ(0, &password[off], sizeof(password) - 1 - off); 110 } while ((n > 0 && OPENSSL_memchr(password, '\n', off) == NULL && 111 off < sizeof(password) - 1) || 114 char *newline = reinterpret_cast<char *>(OPENSSL_memchr(password, '\n', off)); 126 if (!PKCS12_get_key_and_certs(&key, certs.get(), &pkcs12, password)) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | OpenSSLPBEParametersGenerator.java | 38 * @param password password to use. 42 byte[] password, 45 super.init(password, salt, 1); 49 * the derived key function, the ith hash of the password and the salt. 60 digest.update(password, 0, password.length); 85 * Generate a key parameter derived from the password, salt, and iteration 104 * the password, salt, and iteration count we are currently initialised 125 * Generate a key parameter for use with a MAC derived from the password, 41 init( byte[] password, byte[] salt) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
H A D | PBKDF2KeySpec.java | 22 * @param password password to use as the seed of the PBE key generator. 28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument 30 super(password, salt, iterationCount, keySize);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | JDKPKCS12StoreParameter.java | 37 public void setPassword(char[] password) argument 39 this.protectionParameter = new KeyStore.PasswordProtection(password);
|
/external/libchrome/crypto/ |
H A D | symmetric_key.cc | 55 const std::string& password, 80 password.data(), password.length(), 53 DeriveKeyFromPassword( Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
|
H A D | symmetric_key_unittest.cc | 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160)); 70 const char* password; member in struct:PBKDF2TestVector 85 test_data.algorithm, test_data.password, test_data.salt, 102 "password", 110 "password", 118 "password", 128 "password", 140 "password", 148 "password", 156 "password", [all...] |
/external/libmicrohttpd/src/microhttpd/ |
H A D | basicauth.c | 37 * Get the username and password from the basic authorization header sent by the client 40 * @param password a pointer for the password 47 char** password) 68 /* Find user:password pattern */ 84 if (NULL != password) 86 *password = strdup (separator + 1); 87 if (NULL == *password) 91 "Failed to allocate memory for password\n"); 46 MHD_basic_auth_get_username_password(struct MHD_Connection *connection, char** password) argument
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
H A D | SslContextBuilder.java | 92 char[] password = "password".toCharArray(); 93 KeyStore keyStore = newEmptyKeyStore(password); 100 keyStore.setKeyEntry("private", chain[0].keyPair.getPrivate(), password, certificates); 110 keyManagerFactory.init(keyStore, password); 120 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { argument 124 keyStore.load(in, password);
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
H A D | CustomTrust.java | 168 char[] password = "password".toCharArray(); // Any password will work. 169 KeyStore keyStore = newEmptyKeyStore(password); 179 keyManagerFactory.init(keyStore, password); 192 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { argument 196 keyStore.load(in, password);
|