Home
last modified time | relevance | path

Searched refs:kPassword (Results 1 – 6 of 6) sorted by relevance

/external/libchrome/crypto/
Dp224_spake_unittest.cc58 const char kPassword[] = "foo"; variable
64 P224EncryptedKeyExchange::kPeerTypeClient, kPassword); in TEST()
66 P224EncryptedKeyExchange::kPeerTypeServer, kPassword); in TEST()
75 kPassword); in TEST()
85 kPassword); in TEST()
88 kPassword); in TEST()
124 P224EncryptedKeyExchange::kPeerTypeClient, kPassword); in TEST()
126 P224EncryptedKeyExchange::kPeerTypeServer, kPassword); in TEST()
/external/boringssl/src/crypto/pkcs8/
Dpkcs12_test.cc901 static const char kPassword[] = "foo"; variable
912 if (!PKCS12_get_key_and_certs(&key, certs.get(), &pkcs12, kPassword)) { in Test()
945 if (!PKCS12_verify_mac(p12.get(), kPassword, sizeof(kPassword) - 1)) { in TestCompat()
953 if (!PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)) { in TestCompat()
/external/boringssl/src/crypto/evp/
Dpbkdf_test.cc159 static const char kPassword[] = "password"; in TestZeroIterations() local
160 const size_t password_len = strlen(kPassword); in TestZeroIterations()
169 if (!PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TestZeroIterations()
180 if (PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TestZeroIterations()
/external/lzma/CPP/7zip/Bundles/SFXCon/
DSfxCon.cpp48 kPassword, enumerator
330 bool passwordEnabled = parser[NKey::kPassword].ThereIs; in Main2()
334 password = parser[NKey::kPassword].PostStrings[0]; in Main2()
/external/boringssl/src/tool/
Dspeed.cc543 static const uint8_t kPassword[] = "password"; in SpeedSPAKE2() local
552 kPassword, sizeof(kPassword))) { in SpeedSPAKE2()
564 sizeof(bob_msg), kPassword, in SpeedSPAKE2()
565 sizeof(kPassword)) || in SpeedSPAKE2()
/external/lzma/CPP/7zip/UI/Common/
DArchiveCommandLine.cpp90 kPassword, enumerator
1049 options.PasswordEnabled = parser[NKey::kPassword].ThereIs; in Parse2()
1051 options.Password = parser[NKey::kPassword].PostStrings[0]; in Parse2()