/external/libchrome/crypto/ |
D | p224_spake_unittest.cc | 58 const char kPassword[] = "foo"; variable 64 P224EncryptedKeyExchange::kPeerTypeClient, kPassword); in TEST() 66 P224EncryptedKeyExchange::kPeerTypeServer, kPassword); in TEST() 75 kPassword); in TEST() 85 kPassword); in TEST() 88 kPassword); in TEST() 124 P224EncryptedKeyExchange::kPeerTypeClient, kPassword); in TEST() 126 P224EncryptedKeyExchange::kPeerTypeServer, kPassword); in TEST()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs12_test.cc | 1219 static const char kPassword[] = "foo"; variable 1517 ASSERT_TRUE(PKCS12_verify_mac(p12.get(), kPassword, sizeof(kPassword) - 1)); in TestCompat() 1522 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat() 1534 TestImpl("OpenSSL", kOpenSSL, kPassword, nullptr); in TEST() 1538 TestImpl("NSS", kNSS, kPassword, "Internet Widgits Pty Ltd"); in TEST() 1544 TestImpl("Windows", kWindows, kPassword, nullptr); in TEST() 1548 TestImpl("kPBES2WithSHA1", kPBES2WithSHA1, kPassword, nullptr); in TEST() 1549 TestImpl("kPBES2WithSHA256", kPBES2WithSHA256, kPassword, nullptr); in TEST() 1553 TestImpl("kNoEncryption", kNoEncryption, kPassword, nullptr); in TEST() 1785 TestRoundTrip(kPassword, nullptr /* no name */, in TEST() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs8/ |
D | pkcs12_test.cc | 1219 static const char kPassword[] = "foo"; variable 1517 ASSERT_TRUE(PKCS12_verify_mac(p12.get(), kPassword, sizeof(kPassword) - 1)); in TestCompat() 1522 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat() 1534 TestImpl("OpenSSL", kOpenSSL, kPassword, nullptr); in TEST() 1538 TestImpl("NSS", kNSS, kPassword, "Internet Widgits Pty Ltd"); in TEST() 1544 TestImpl("Windows", kWindows, kPassword, nullptr); in TEST() 1548 TestImpl("kPBES2WithSHA1", kPBES2WithSHA1, kPassword, nullptr); in TEST() 1549 TestImpl("kPBES2WithSHA256", kPBES2WithSHA256, kPassword, nullptr); in TEST() 1553 TestImpl("kNoEncryption", kNoEncryption, kPassword, nullptr); in TEST() 1785 TestRoundTrip(kPassword, nullptr /* no name */, in TEST() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/ |
D | pbkdf_test.cc | 126 static const char kPassword[] = "password"; in TEST() local 127 const size_t password_len = strlen(kPassword); in TEST() 136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST() 144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
|
D | scrypt_test.cc | 63 static const char kPassword[] = "pleaseletmein"; in TEST() local 68 EXPECT_FALSE(EVP_PBE_scrypt(kPassword, strlen(kPassword), in TEST()
|
/external/boringssl/src/crypto/evp/ |
D | pbkdf_test.cc | 126 static const char kPassword[] = "password"; in TEST() local 127 const size_t password_len = strlen(kPassword); in TEST() 136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST() 144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
|
D | scrypt_test.cc | 63 static const char kPassword[] = "pleaseletmein"; in TEST() local 68 EXPECT_FALSE(EVP_PBE_scrypt(kPassword, strlen(kPassword), in TEST()
|
/external/boringssl/src/tool/ |
D | speed.cc | 820 static const uint8_t kPassword[] = "password"; in SpeedSPAKE2() local 829 kPassword, sizeof(kPassword))) { in SpeedSPAKE2() 841 sizeof(bob_msg), kPassword, in SpeedSPAKE2() 842 sizeof(kPassword)) || in SpeedSPAKE2() 865 static const char kPassword[] = "password"; in SpeedScrypt() local 870 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt() 881 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
|
/external/rust/crates/quiche/deps/boringssl/src/tool/ |
D | speed.cc | 819 static const uint8_t kPassword[] = "password"; in SpeedSPAKE2() local 828 kPassword, sizeof(kPassword))) { in SpeedSPAKE2() 840 sizeof(bob_msg), kPassword, in SpeedSPAKE2() 841 sizeof(kPassword)) || in SpeedSPAKE2() 864 static const char kPassword[] = "password"; in SpeedScrypt() local 869 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt() 880 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
|
/external/lzma/CPP/7zip/Bundles/SFXCon/ |
D | SfxCon.cpp | 54 kPassword, enumerator 353 bool passwordEnabled = parser[NKey::kPassword].ThereIs; in Main2() 357 password = parser[NKey::kPassword].PostStrings[0]; in Main2()
|
/external/python/cpython2/Lib/plat-mac/Carbon/ |
D | Files.py | 133 kPassword = 2 variable
|
/external/lzma/CPP/7zip/UI/Common/ |
D | ArchiveCommandLine.cpp | 153 , kPassword enumerator 1080 options.PasswordEnabled = parser[NKey::kPassword].ThereIs; in Parse2() 1082 options.Password = parser[NKey::kPassword].PostStrings[0]; in Parse2()
|