Searched refs:kPassword (Results 1 – 6 of 6) sorted by relevance
/external/libchrome/crypto/ |
D | p224_spake_unittest.cc | 58 const char kPassword[] = "foo"; variable 64 P224EncryptedKeyExchange::kPeerTypeClient, kPassword); in TEST() 66 P224EncryptedKeyExchange::kPeerTypeServer, kPassword); in TEST() 75 kPassword); in TEST() 85 kPassword); in TEST() 88 kPassword); in TEST() 124 P224EncryptedKeyExchange::kPeerTypeClient, kPassword); in TEST() 126 P224EncryptedKeyExchange::kPeerTypeServer, kPassword); in TEST()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs12_test.cc | 901 static const char kPassword[] = "foo"; variable 912 if (!PKCS12_get_key_and_certs(&key, certs.get(), &pkcs12, kPassword)) { in Test() 945 if (!PKCS12_verify_mac(p12.get(), kPassword, sizeof(kPassword) - 1)) { in TestCompat() 953 if (!PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)) { in TestCompat()
|
/external/boringssl/src/crypto/evp/ |
D | pbkdf_test.cc | 159 static const char kPassword[] = "password"; in TestZeroIterations() local 160 const size_t password_len = strlen(kPassword); in TestZeroIterations() 169 if (!PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TestZeroIterations() 180 if (PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TestZeroIterations()
|
/external/lzma/CPP/7zip/Bundles/SFXCon/ |
D | SfxCon.cpp | 48 kPassword, enumerator 330 bool passwordEnabled = parser[NKey::kPassword].ThereIs; in Main2() 334 password = parser[NKey::kPassword].PostStrings[0]; in Main2()
|
/external/boringssl/src/tool/ |
D | speed.cc | 543 static const uint8_t kPassword[] = "password"; in SpeedSPAKE2() local 552 kPassword, sizeof(kPassword))) { in SpeedSPAKE2() 564 sizeof(bob_msg), kPassword, in SpeedSPAKE2() 565 sizeof(kPassword)) || in SpeedSPAKE2()
|
/external/lzma/CPP/7zip/UI/Common/ |
D | ArchiveCommandLine.cpp | 90 kPassword, enumerator 1049 options.PasswordEnabled = parser[NKey::kPassword].ThereIs; in Parse2() 1051 options.Password = parser[NKey::kPassword].PostStrings[0]; in Parse2()
|