/external/webkit/WebKitTools/BuildSlaveSupport/build.webkit.org-config/webkit/ |
auth.py | 4 def createBuildSlave((name, password)): 5 return BuildSlave(name, password, max_builds=1) 9 return [("slave-name", "password")]
|
/frameworks/base/core/tests/ConnectivityManagerTest/assets/ |
accesspoints.xml | 14 <password>androidwifi</password> 22 <password>android</password>
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 6 * super class for all Password Based Encryption (PBE) parameter generator classes. 10 protected byte[] password; field in class:PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, 34 this.password = password; 40 * return the password byte array. 42 * @return the password byte array [all...] |
/external/e2fsprogs/lib/et/test_cases/ |
continuation.et | 4 "New password was found in a dictionary of possible passwords and\n\ 5 therefore may be easily guessed. Please choose another password.\n\ 6 See the ovpasswd man page for help in choosing a good password."
|
/libcore/luni/src/main/java/javax/crypto/spec/ |
PBEKeySpec.java | 24 * The key specification for a <i>password based encryption</i> key. 26 * Password based encryption is described in <a 31 private char[] password; field in class:PBEKeySpec 37 * Creates a new <code>PBEKeySpec</code> with the specified password. 39 * @param password 40 * the password. 42 public PBEKeySpec(char[] password) { 43 if (password == null) { 44 this.password = new char[0]; 46 this.password = new char[password.length] [all...] |
/libcore/luni/src/main/java/java/net/ |
PasswordAuthentication.java | 22 * password which is used by the {@code Authenticator} class. 30 private char[] password; field in class:PasswordAuthentication 33 * Creates an instance of a password authentication with a specified 34 * username and password. 38 * @param password 39 * the associated password to store. 41 public PasswordAuthentication(String userName, char[] password) { 43 this.password = password.clone(); 47 * Gets a clone of the password stored by this instance. The user i [all...] |
/external/wpa_supplicant/examples/ |
ieee8021x.conf | 11 password="password"
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
ieee8021x.conf | 11 password="password"
|
/external/clearsilver/cs/ |
test_uvar.cs.gold | 2 quote ' backslash \ semicolon ; end tag </script>Secret Password~!@#$%^&*()+=-_|\[]{}:";'<>,.?</title><script>alert(1)</script> 4 quote ' backslash \ semicolon ; end tag </script>Secret Password~!@#$%^&*()+=-_|\[]{}:";'<>,.?</title><script>alert(1)</script> 5 quote ' backslash \ semicolon ; end tag </script>Secret Password~!@#$%^&*()+=-_|\[]{}:";'<>,.?</title><script>alert(1)</script> 6 quote ' backslash \ semicolon ; end tag </script>Secret Password~!@#$%^&*()+=-_|\[]{}:";'<>,.?</title><script>alert(1)</script> 7 quote ' backslash \ semicolon ; end tag </script>Secret Password~!@#$%^&*()+=-_|\[]{}:";'<>,.?</title><script>alert(1)</script>
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
UserCredentialHash.java | 5 * hash(user:domain:password). This is more secure than simply supplying 6 * password because the password cannot be extracted. Implementations 30 * Get the MD5(userName:sipdomain:password) 32 * @return the MD5 hash of userName:sipDomain:password.
|
UserCredentials.java | 23 * Returns a password associated with this set of credentials. 25 * @return a password associated with this set of credentials. 31 * Returns the SIP Domain for this username password combination.
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
UserInfo.java | 51 /** password field 53 protected String password; field in class:UserInfo 89 if (this.password != null && other.password == null) 92 if (other.password != null && this.password == null) 95 if (this.password == other.password) 98 return (this.password.equals(other.password)); [all...] |
/external/chromium/net/ftp/ |
ftp_auth_cache.cc | 24 const std::wstring& password) { 31 entry->password = password; 33 entries_.push_front(Entry(origin, username, password)); 42 const std::wstring& password) { 45 it->password == password) {
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
PBEKeySpecTest.java | 45 * PBEKeySpec(char[] password) method testing. Tests the behavior of 64 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 65 PBEKeySpec pbeks = new PBEKeySpec(password); 66 password[0] ++; 67 assertFalse("The change of password specified in the constructor " 69 password[0] == pbeks.getPassword()[0]); 73 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int 85 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 102 new PBEKeySpec(password, null, iterationCount, keyLength); 111 new PBEKeySpec(password, new byte [0], iterationCount, keyLength) 170 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 237 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 260 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 287 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 318 char[] password = new char[] {'1', '2', '3', '4', '5'}; local 341 char[] password = new char[] {'1', '2', '3', '4', '5'}; local [all...] |
/libcore/luni/src/main/java/javax/security/auth/callback/ |
PasswordCallback.java | 24 * Used in conjunction with a {@link CallbackHandler} to retrieve a password 79 * Sets the password. The {@link CallbackHandler} that performs the actual 80 * provisioning or input of the password needs to call this method to hand 81 * back the password to the security service that requested it. 83 * @param password 84 * the password. A copy of this is stored, so subsequent changes 87 public void setPassword(char[] password) { 88 if (password == null) { 89 this.inputPassword = password; 91 inputPassword = new char[password.length] [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
mschapv2.c | 43 const u8 *password, size_t password_len, 70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 71 password, password_len); 74 password, nt_response); 76 password, peer_challenge, auth_challenge, 79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 80 password, password_len); 83 password, password_len, nt_response); 84 generate_authenticator_response(password, password_len, 96 hash_nt_password_hash(password, password_hash_hash) [all...] |
eap_otp.c | 39 const u8 *pos, *password; local 51 password = eap_get_config_otp(sm, &password_len); 52 if (password) 55 password = eap_get_config_password(sm, &password_len); 59 if (password == NULL) { 60 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 76 wpabuf_put_data(resp, password, password_len); 78 password, password_len); 81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
/frameworks/base/obex/javax/obex/ |
PasswordAuthentication.java | 36 * This class holds user name and password combinations. 47 * password provided. 49 * @param password the password to include in the response 50 * @throws NullPointerException if <code>password</code> is 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { 59 mPassword = new byte[password.length]; 60 System.arraycopy(password, 0, mPassword, 0, password.length); 73 * Retrieves the password [all...] |
/external/webkit/WebCore/manual-tests/ |
password-ctrl-click-lose-focus.html | 7 <p><b>BUG ID:</b> <a href="rdar://problem/4604703">4604703</a> REGRESSION (NativeTextField): Focus is not removed from password field after I ctrl-click into a different field</p> 10 <br>1) Make a selection in the password field 14 After ctrl-clicking in the text field, the password field should lose focus, and its selection should be cleared. 18 After ctrl-clicking in the text field, if the password field still has a selection, the test has failed. 20 <br><input type="text" value="Ctrl-Click in this field. Test passes if the password field no longer has a selection." size=100></input> 21 <br><input type="password" id="pass" value="12345"></input>
|
/external/dropbear/ |
svr-authpasswd.c | 25 /* Validates a user password */ 35 /* Process a password auth request, sending success or failure messages as 43 char * testcrypt = NULL; /* crypt generated from the user's password sent */ 44 unsigned char * password; local 51 /* get the shadow password if possible */ 63 /* check for empty password - need to do this again here 64 * since the shadow password may differ to that tested 67 dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected", 73 /* check if client wants to change password */ 81 password = buf_getstring(ses.payload, &passwordlen) [all...] |
/external/webkit/WebKit/chromium/src/ |
WebPasswordFormData.cpp | 52 // Helper to determine which password is the main one, and which is 53 // an old password (e.g on a "make new password" form), if any. 55 HTMLInputElement** password, 59 ASSERT(password); 63 // Single password, easy. 64 *password = fields->passwords[0]; 68 // Treat two identical passwords as a single password. 69 *password = fields->passwords[0]; 71 // Assume first is old password, second is new (no choice but to guess) [all...] |
/external/grub/util/ |
grub-md5-crypt | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format. 67 # Prompt to enter a password. 68 echo -n "Password: " 69 read -r password 73 echo -n "Retype password: " 80 if test "x$password" = x; then 81 echo "Empty password is not permitted." 85 if test "x$password" != "x$password2"; then 94 $password [all...] |
grub-md5-crypt.in | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format. 67 # Prompt to enter a password. 68 echo -n "Password: " 69 read -r password 73 echo -n "Retype password: " 80 if test "x$password" = x; then 81 echo "Empty password is not permitted." 85 if test "x$password" != "x$password2"; then 94 $password [all...] |
/frameworks/base/keystore/tests/src/android/security/ |
KeyStoreTest.java | 70 //assertFalse(mKeyStore.password(TEST_EMPTY_PASSWD)); 71 //assertFalse(mKeyStore.password(TEST_SHORT_PASSWD)); 73 assertTrue(mKeyStore.password(TEST_PASSWD)); 76 assertFalse(mKeyStore.password(TEST_PASSWD2, TEST_PASSWD2)); 77 //assertFalse(mKeyStore.password(TEST_PASSWD, TEST_SHORT_PASSWD)); 79 assertTrue(mKeyStore.password(TEST_PASSWD, TEST_PASSWD2)); 85 mKeyStore.password(TEST_PASSWD); 92 mKeyStore.password(TEST_I18N); 99 mKeyStore.password(TEST_PASSWD); 109 mKeyStore.password(TEST_PASSWD) [all...] |
/external/wpa_supplicant/ |
eap_otp.c | 42 const u8 *pos, *password; local 57 password = eap_get_config_otp(sm, &password_len); 58 if (password) 61 password = eap_get_config_password(sm, &password_len); 65 if (password == NULL) { 66 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 83 os_memcpy(rpos, password, password_len); 85 password, password_len); 88 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|