HomeSort by relevance Sort by last modified time
    Searched full:password (Results 1 - 25 of 992) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/webkit/WebKitTools/BuildSlaveSupport/build.webkit.org-config/webkit/
auth.py 4 def createBuildSlave((name, password)):
5 return BuildSlave(name, password, max_builds=1)
9 return [("slave-name", "password")]
  /frameworks/base/core/tests/ConnectivityManagerTest/assets/
accesspoints.xml 14 <password>androidwifi</password>
22 <password>android</password>
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/
PBEParametersGenerator.java 6 * super class for all Password Based Encryption (PBE) parameter generator classes.
10 protected byte[] password; field in class:PBEParametersGenerator
24 * @param password the password converted into bytes (see below).
25 * @param salt the salt to be mixed with the password.
30 byte[] password,
34 this.password = password;
40 * return the password byte array.
42 * @return the password byte array
    [all...]
  /external/e2fsprogs/lib/et/test_cases/
continuation.et 4 "New password was found in a dictionary of possible passwords and\n\
5 therefore may be easily guessed. Please choose another password.\n\
6 See the ovpasswd man page for help in choosing a good password."
  /libcore/luni/src/main/java/javax/crypto/spec/
PBEKeySpec.java 24 * The key specification for a <i>password based encryption</i> key.
26 * Password based encryption is described in <a
31 private char[] password; field in class:PBEKeySpec
37 * Creates a new <code>PBEKeySpec</code> with the specified password.
39 * @param password
40 * the password.
42 public PBEKeySpec(char[] password) {
43 if (password == null) {
44 this.password = new char[0];
46 this.password = new char[password.length]
    [all...]
  /libcore/luni/src/main/java/java/net/
PasswordAuthentication.java 22 * password which is used by the {@code Authenticator} class.
30 private char[] password; field in class:PasswordAuthentication
33 * Creates an instance of a password authentication with a specified
34 * username and password.
38 * @param password
39 * the associated password to store.
41 public PasswordAuthentication(String userName, char[] password) {
43 this.password = password.clone();
47 * Gets a clone of the password stored by this instance. The user i
    [all...]
  /external/wpa_supplicant/examples/
ieee8021x.conf 11 password="password"
  /external/wpa_supplicant_6/wpa_supplicant/examples/
ieee8021x.conf 11 password="password"
  /external/clearsilver/cs/
test_uvar.cs.gold 2 quote ' backslash \ semicolon ; end tag </script>Secret Password~!@#$%^&*()+=-_|\[]{}:";'<>,.?</title><script>alert(1)</script>
4 quote ' backslash \ semicolon ; end tag </script>Secret Password~!@#$%^&*()+=-_|\[]{}:";'<>,.?</title><script>alert(1)</script>
5 quote ' backslash \ semicolon ; end tag </script>Secret Password~!@#$%^&*()+=-_|\[]{}:";'<>,.?</title><script>alert(1)</script>
6 quote ' backslash \ semicolon ; end tag </script>Secret Password~!@#$%^&*()+=-_|\[]{}:";'<>,.?</title><script>alert(1)</script>
7 quote ' backslash \ semicolon ; end tag </script>Secret Password~!@#$%^&*()+=-_|\[]{}:";'<>,.?</title><script>alert(1)</script>
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
UserCredentialHash.java 5 * hash(user:domain:password). This is more secure than simply supplying
6 * password because the password cannot be extracted. Implementations
30 * Get the MD5(userName:sipdomain:password)
32 * @return the MD5 hash of userName:sipDomain:password.
UserCredentials.java 23 * Returns a password associated with this set of credentials.
25 * @return a password associated with this set of credentials.
31 * Returns the SIP Domain for this username password combination.
  /external/nist-sip/java/gov/nist/javax/sip/address/
UserInfo.java 51 /** password field
53 protected String password; field in class:UserInfo
89 if (this.password != null && other.password == null)
92 if (other.password != null && this.password == null)
95 if (this.password == other.password)
98 return (this.password.equals(other.password));
    [all...]
  /external/chromium/net/ftp/
ftp_auth_cache.cc 24 const std::wstring& password) {
31 entry->password = password;
33 entries_.push_front(Entry(origin, username, password));
42 const std::wstring& password) {
45 it->password == password) {
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
PBEKeySpecTest.java 45 * PBEKeySpec(char[] password) method testing. Tests the behavior of
64 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
65 PBEKeySpec pbeks = new PBEKeySpec(password);
66 password[0] ++;
67 assertFalse("The change of password specified in the constructor "
69 password[0] == pbeks.getPassword()[0]);
73 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
85 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
102 new PBEKeySpec(password, null, iterationCount, keyLength);
111 new PBEKeySpec(password, new byte [0], iterationCount, keyLength)
170 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
237 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
260 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
287 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
318 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
341 char[] password = new char[] {'1', '2', '3', '4', '5'}; local
    [all...]
  /libcore/luni/src/main/java/javax/security/auth/callback/
PasswordCallback.java 24 * Used in conjunction with a {@link CallbackHandler} to retrieve a password
79 * Sets the password. The {@link CallbackHandler} that performs the actual
80 * provisioning or input of the password needs to call this method to hand
81 * back the password to the security service that requested it.
83 * @param password
84 * the password. A copy of this is stored, so subsequent changes
87 public void setPassword(char[] password) {
88 if (password == null) {
89 this.inputPassword = password;
91 inputPassword = new char[password.length]
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
mschapv2.c 43 const u8 *password, size_t password_len,
70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
71 password, password_len);
74 password, nt_response);
76 password, peer_challenge, auth_challenge,
79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
80 password, password_len);
83 password, password_len, nt_response);
84 generate_authenticator_response(password, password_len,
96 hash_nt_password_hash(password, password_hash_hash)
    [all...]
eap_otp.c 39 const u8 *pos, *password; local
51 password = eap_get_config_otp(sm, &password_len);
52 if (password)
55 password = eap_get_config_password(sm, &password_len);
59 if (password == NULL) {
60 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
76 wpabuf_put_data(resp, password, password_len);
78 password, password_len);
81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
  /frameworks/base/obex/javax/obex/
PasswordAuthentication.java 36 * This class holds user name and password combinations.
47 * password provided.
49 * @param password the password to include in the response
50 * @throws NullPointerException if <code>password</code> is
53 public PasswordAuthentication(final byte[] userName, final byte[] password) {
59 mPassword = new byte[password.length];
60 System.arraycopy(password, 0, mPassword, 0, password.length);
73 * Retrieves the password
    [all...]
  /external/webkit/WebCore/manual-tests/
password-ctrl-click-lose-focus.html 7 <p><b>BUG ID:</b> <a href="rdar://problem/4604703">4604703</a> REGRESSION (NativeTextField): Focus is not removed from password field after I ctrl-click into a different field</p>
10 <br>1) Make a selection in the password field
14 After ctrl-clicking in the text field, the password field should lose focus, and its selection should be cleared.
18 After ctrl-clicking in the text field, if the password field still has a selection, the test has failed.
20 <br><input type="text" value="Ctrl-Click in this field. Test passes if the password field no longer has a selection." size=100></input>
21 <br><input type="password" id="pass" value="12345"></input>
  /external/dropbear/
svr-authpasswd.c 25 /* Validates a user password */
35 /* Process a password auth request, sending success or failure messages as
43 char * testcrypt = NULL; /* crypt generated from the user's password sent */
44 unsigned char * password; local
51 /* get the shadow password if possible */
63 /* check for empty password - need to do this again here
64 * since the shadow password may differ to that tested
67 dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected",
73 /* check if client wants to change password */
81 password = buf_getstring(ses.payload, &passwordlen)
    [all...]
  /external/webkit/WebKit/chromium/src/
WebPasswordFormData.cpp 52 // Helper to determine which password is the main one, and which is
53 // an old password (e.g on a "make new password" form), if any.
55 HTMLInputElement** password,
59 ASSERT(password);
63 // Single password, easy.
64 *password = fields->passwords[0];
68 // Treat two identical passwords as a single password.
69 *password = fields->passwords[0];
71 // Assume first is old password, second is new (no choice but to guess)
    [all...]
  /external/grub/util/
grub-md5-crypt 3 # Encrypt a password in MD5 format
35 Encrypt a password in MD5 format.
67 # Prompt to enter a password.
68 echo -n "Password: "
69 read -r password
73 echo -n "Retype password: "
80 if test "x$password" = x; then
81 echo "Empty password is not permitted."
85 if test "x$password" != "x$password2"; then
94 $password
    [all...]
grub-md5-crypt.in 3 # Encrypt a password in MD5 format
35 Encrypt a password in MD5 format.
67 # Prompt to enter a password.
68 echo -n "Password: "
69 read -r password
73 echo -n "Retype password: "
80 if test "x$password" = x; then
81 echo "Empty password is not permitted."
85 if test "x$password" != "x$password2"; then
94 $password
    [all...]
  /frameworks/base/keystore/tests/src/android/security/
KeyStoreTest.java 70 //assertFalse(mKeyStore.password(TEST_EMPTY_PASSWD));
71 //assertFalse(mKeyStore.password(TEST_SHORT_PASSWD));
73 assertTrue(mKeyStore.password(TEST_PASSWD));
76 assertFalse(mKeyStore.password(TEST_PASSWD2, TEST_PASSWD2));
77 //assertFalse(mKeyStore.password(TEST_PASSWD, TEST_SHORT_PASSWD));
79 assertTrue(mKeyStore.password(TEST_PASSWD, TEST_PASSWD2));
85 mKeyStore.password(TEST_PASSWD);
92 mKeyStore.password(TEST_I18N);
99 mKeyStore.password(TEST_PASSWD);
109 mKeyStore.password(TEST_PASSWD)
    [all...]
  /external/wpa_supplicant/
eap_otp.c 42 const u8 *pos, *password; local
57 password = eap_get_config_otp(sm, &password_len);
58 if (password)
61 password = eap_get_config_password(sm, &password_len);
65 if (password == NULL) {
66 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
83 os_memcpy(rpos, password, password_len);
85 password, password_len);
88 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");

Completed in 426 milliseconds

1 2 3 4 5 6 7 8 91011>>