Searched defs:password (Results 1 - 25 of 313) sorted by relevance

1234567891011>>

/external/clang/test/Analysis/
H A Ddefault-diagnostic-visitors.c8 int *password; // expected-note {{'password' declared without an initial value}} local
9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}}
10 err = *password;
/external/webrtc/talk/app/webrtc/objc/public/
H A DRTCICEServer.h33 // The server URI, username, and password.
36 @property(nonatomic, copy, readonly) NSString* password; variable
38 // Initializer for RTCICEServer taking uri, username, and password.
41 password:(NSString*)password;
/external/curl/tests/unit/
H A Dunit1304.c27 static char *password; variable
32 password = strdup("");
34 if(!password || !login) {
35 Curl_safefree(password);
44 Curl_safefree(password);
57 result = Curl_parsenetrc("test.example.com", &login, &password, filename);
59 abort_unless(password != NULL, "returned NULL!");
60 fail_unless(password[0] == 0, "password should not have been changed");
70 result = Curl_parsenetrc("example.com", &login, &password, filenam
141 free(password); variable
156 free(password); variable
174 free(password); variable
[all...]
/external/jcommander/src/test/java/com/beust/jcommander/args/
H A DArgsPassword.java24 @Parameter(names = "-password", description = "Connection password", password = true)
25 public String password; field in class:ArgsPassword
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
H A DCredentials.java27 public static String basic(String userName, String password) { argument
29 String usernameAndPassword = userName + ":" + password;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
H A DPKCS12Key.java6 * A password based key for use with PKCS#12.
11 private final char[] password; field in class:PKCS12Key
14 * Basic constructor for a password based key - secret key generation parameters will be passed separately..
16 * @param password password to use.
18 public PKCS12Key(char[] password) argument
20 this(password, false);
27 * @param password password to use.
30 public PKCS12Key(char[] password, boolea argument
[all...]
H A DPKCS12KeyWithParameters.java8 * A password based key for use with PKCS#12 with full PBE parameters.
18 * Basic constructor for a password based key with generation parameters.
20 * @param password password to use.
24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) argument
26 super(password);
34 * Basic constructor for a password based key with generation parameters, specifying the wrong conversion for
37 * @param password password to use.
42 public PKCS12KeyWithParameters(char[] password, boolea argument
[all...]
H A DPKCS12StoreParameter.java21 public PKCS12StoreParameter(OutputStream out, char[] password) argument
23 this(out, password, false);
31 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding) argument
33 this(out, new KeyStore.PasswordProtection(password), forDEREncoding);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/
H A DPKCS12StoreParameter.java13 public PKCS12StoreParameter(OutputStream out, char[] password) argument
15 super(out, password, false);
23 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding) argument
25 super(out, new KeyStore.PasswordProtection(password), forDEREncoding);
/external/conscrypt/common/src/main/java/org/conscrypt/
H A DKeyManagerFactoryImpl.java44 //password
48 * @see KeyManagerFactorySpi#engineInit(KeyStore ks, char[] password)
51 protected void engineInit(KeyStore ks, char[] password) argument
56 if (password != null) {
57 pwd = password.clone();
/external/lzma/CPP/7zip/UI/Console/
H A DOpenCallbackConsole.cpp78 HRESULT COpenCallbackConsole::Open_CryptoGetTextPassword(BSTR *password) argument
80 *password = NULL;
89 return StringToBstr(Password, password);
93 HRESULT COpenCallbackConsole::Open_GetPasswordIfAny(bool &passwordIsDefined, UString &password)
96 password = Password;
/external/openssh/
H A Dauth2-passwd.c53 char *password, *newpass; local
59 password = packet_get_string(&len);
61 /* discard new password from packet */
69 logit("password change not supported");
71 /* no password authentication in Android */
72 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
75 explicit_bzero(password, len);
76 free(password);
81 "password",
/external/wpa_supplicant_8/hostapd/
H A Dnt_password_hash.c2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
/external/apache-http/src/org/apache/http/auth/
H A DUsernamePasswordCredentials.java38 * Username and password {@link Credentials}
56 private final String password; field in class:UsernamePasswordCredentials
59 * The constructor with the username and password combined string argument.
61 * @param usernamePassword the username:password formed string
67 throw new IllegalArgumentException("Username:password string may not be null");
72 this.password = usernamePassword.substring(atColon + 1);
75 this.password = null;
81 * The constructor with the username and password arguments.
84 * @param password the password
86 UsernamePasswordCredentials(String userName, String password) argument
[all...]
/external/apache-http/src/org/apache/http/impl/auth/
H A DNTLMEngine.java67 * @param password Password
76 String password,
74 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
/external/autotest/frontend/
H A Dmake_superuser.py18 password = config.get_config_value(section, "password") variable
21 passwd=password, db=db_name)
/external/boringssl/src/tool/
H A Dpkcs12.cc100 printf("Enter password: ");
103 char password[256]; local
106 n = BORINGSSL_READ(0, &password[off], sizeof(password) - 1 - off);
110 } while ((n > 0 && OPENSSL_memchr(password, '\n', off) == NULL &&
111 off < sizeof(password) - 1) ||
114 char *newline = reinterpret_cast<char *>(OPENSSL_memchr(password, '\n', off));
126 if (!PKCS12_get_key_and_certs(&key, certs.get(), &pkcs12, password)) {
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
H A DOpenSSLPBEParametersGenerator.java38 * @param password password to use.
42 byte[] password,
45 super.init(password, salt, 1);
49 * the derived key function, the ith hash of the password and the salt.
60 digest.update(password, 0, password.length);
85 * Generate a key parameter derived from the password, salt, and iteration
104 * the password, salt, and iteration count we are currently initialised
125 * Generate a key parameter for use with a MAC derived from the password,
41 init( byte[] password, byte[] salt) argument
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
H A DPBKDF2KeySpec.java22 * @param password password to use as the seed of the PBE key generator.
28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument
30 super(password, salt, iterationCount, keySize);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
H A DJDKPKCS12StoreParameter.java37 public void setPassword(char[] password) argument
39 this.protectionParameter = new KeyStore.PasswordProtection(password);
/external/libchrome/crypto/
H A Dsymmetric_key.cc55 const std::string& password,
80 password.data(), password.length(),
53 DeriveKeyFromPassword( Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
H A Dsymmetric_key_unittest.cc53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160));
70 const char* password; member in struct:PBKDF2TestVector
85 test_data.algorithm, test_data.password, test_data.salt,
102 "password",
110 "password",
118 "password",
128 "password",
140 "password",
148 "password",
156 "password",
[all...]
/external/libmicrohttpd/src/microhttpd/
H A Dbasicauth.c37 * Get the username and password from the basic authorization header sent by the client
40 * @param password a pointer for the password
47 char** password)
68 /* Find user:password pattern */
84 if (NULL != password)
86 *password = strdup (separator + 1);
87 if (NULL == *password)
91 "Failed to allocate memory for password\n");
46 MHD_basic_auth_get_username_password(struct MHD_Connection *connection, char** password) argument
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
H A DSslContextBuilder.java92 char[] password = "password".toCharArray();
93 KeyStore keyStore = newEmptyKeyStore(password);
100 keyStore.setKeyEntry("private", chain[0].keyPair.getPrivate(), password, certificates);
110 keyManagerFactory.init(keyStore, password);
120 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { argument
124 keyStore.load(in, password);
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/
H A DCustomTrust.java168 char[] password = "password".toCharArray(); // Any password will work.
169 KeyStore keyStore = newEmptyKeyStore(password);
179 keyManagerFactory.init(keyStore, password);
192 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { argument
196 keyStore.load(in, password);

Completed in 558 milliseconds

1234567891011>>