HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 176 - 200 of 754) sorted by null

1 2 3 4 5 6 78 91011>>

  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/distutils/
config.py 18 password:%s
42 def _store_pypirc(self, username, password):
47 f.write(DEFAULT_PYPIRC % (username, password))
82 ('password', None)):
98 'password': config.get(server, 'password'),
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/distutils/
config.py 18 password:%s
42 def _store_pypirc(self, username, password):
47 f.write(DEFAULT_PYPIRC % (username, password))
82 ('password', None)):
98 'password': config.get(server, 'password'),
  /system/vold/
cryptfs.h 57 #define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password
59 * devices where type is always password.*/
61 * password */
138 we will continue to believe the user entered the wrong password. In that
139 case the only solution is for the user to enter a password enough times to
143 wrong, we simply won't recognise a right password, and will continue to
144 prompt. On the first password change, this value will be populated and
153 * configure the phone before asking for the password
237 int cryptfs_get_master_key(struct crypt_mnt_ftr* ftr, const char* password,
239 int cryptfs_set_password(struct crypt_mnt_ftr* ftr, const char* password,
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 231 u8 *password = dpos; local
234 password[password_len - 1] == '\0') {
238 "User-Password (PAP)",
239 password, password_len);
240 parse->user_password = password;
252 "EAP-TTLS: CHAP-Password (CHAP)",
503 if (!sm->user || !sm->user->password || sm->user->password_hash ||
506 "password configured");
512 os_memcmp_const(sm->user->password, user_password,
514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
    [all...]
  /bionic/tools/bionicbb/
presubmit.py 69 password = config.jenkins_credentials['password']
71 jenkins = jenkinsapi.api.Jenkins(jenkins_url, username, password)
97 password = config.jenkins_credentials['password']
99 jenkins = jenkinsapi.api.Jenkins(jenkins_url, username, password)
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
MyKeyStore.java 61 public Key engineGetKey(String alias, char[] password)
90 public void engineSetKeyEntry(String alias, Key key, char[] password,
176 public void engineStore(OutputStream stream, char[] password)
199 public void engineLoad(InputStream stream, char[] password)
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/builderTemplate/
buildAll.bat 23 REM FTP user/password, required for Windows to ftp. Without it, no push.
52 echo "usage: buildAll [-mapVersionTag HEAD|<branch name>] [-vm <url to java executable to run build>] [-bc <bootclasspath>] [-target <buildall target to execute>] [-buildID <buildID, e.g. 2.1.2>] [-ftp <userid> <password>] I|M"
  /external/jetty/src/java/org/eclipse/jetty/server/
Authentication.java 85 * @param password
88 Authentication login(String username,Object password,ServletRequest request);
  /external/lldb/test/pexpect-2.4/examples/
bd_serv.py 9 --password : (optional) sets the password to login with
14 # Having the password on the command line is not a good idea, but
140 optlist, args = getopt.getopt(sys.argv[1:], 'h?d', ['help','h','?', 'hostname=', 'username=', 'password=', 'port=', 'watch'])
154 password = ""
169 if '--password' in options:
170 password = options['--password']
172 password = getpass.getpass('password: '
    [all...]
  /external/lzma/CPP/7zip/UI/Common/
UpdateCallback.cpp 237 STDMETHODIMP CArchiveUpdateCallback::CryptoGetTextPassword2(Int32 *passwordIsDefined, BSTR *password)
240 return Callback->CryptoGetTextPassword2(passwordIsDefined, password);
244 STDMETHODIMP CArchiveUpdateCallback::CryptoGetTextPassword(BSTR *password)
247 return Callback->CryptoGetTextPassword(password);
  /external/openssh/
authfd.h 29 int ssh_lock_agent(int sock, int lock, const char *password);
sshconnect2.c 352 {"password",
879 char *password; local
889 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password: ",
891 password = read_passphrase(prompt, 0);
897 packet_put_cstring(password);
898 explicit_bzero(password, strlen(password));
899 free(password);
917 char *info, *lang, *password = NULL, *retype = NULL; local
940 "Enter %.30s@%.128s's old password: "
    [all...]
  /external/pdfium/public/
fpdf_dataavail.h 133 * password - Optional password for decrypting the PDF file.
141 FPDF_BYTESTRING password);
  /external/wpa_supplicant_8/src/common/
sae.h 59 const u8 *password, size_t password_len,
  /external/wpa_supplicant_8/src/eap_common/
eap_pwd_common.h 60 const u8 *password, size_t password_len,
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 50 * password - Password string for EAP
52 * This field can include either the plaintext password (default
54 * presentation of the password) if flags field has
65 u8 *password; member in struct:eap_peer_config
68 * password_len - Length of password field
156 * private_key_passwd - Password for private key file
306 * private_key2_passwd - Password for private key file
439 * be used to disable MSCHAPv2 password retry in authentication failure
573 * otp - One-time-password
    [all...]
eap_ttls.c 434 const u8 *identity, *password; local
441 password = eap_get_config_password2(sm, &password_len, &pwhash);
442 if (identity == NULL || password == NULL)
489 if (mschapv2_derive_response(identity, identity_len, password,
523 const u8 *identity, *password; local
530 password = eap_get_config_password2(sm, &password_len, &pwhash);
531 if (identity == NULL || password == NULL)
570 challenge_response(challenge, password, pos); /* NT-Response */
571 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash",
572 password, 16)
606 const u8 *identity, *password; local
659 const u8 *identity, *password; local
    [all...]
  /libcore/luni/src/main/java/java/security/
KeyStoreSpi.java 40 * Returns the key with the given alias, using the password to recover the
45 * @param password
46 * the password used to recover the key.
54 public abstract Key engineGetKey(String alias, char[] password)
88 * Associates the given alias with the key, password and certificate chain.
96 * @param password
97 * the password.
108 char[] password, Certificate[] chain) throws KeyStoreException;
219 * specified password.
223 * @param password
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MyKeyStore.java 63 public Key engineGetKey(String alias, char[] password)
92 public void engineSetKeyEntry(String alias, Key key, char[] password,
178 public void engineStore(OutputStream stream, char[] password)
201 public void engineLoad(InputStream stream, char[] password)
  /packages/apps/Settings/tests/src/com/android/settings/vpn2/
CertInstallerHelper.java 61 /* Define a password to unlock keystore after it is reset */
62 private static final String CERT_STORE_PASSWORD = "password";
70 * Unlock keystore and set password
77 private void extractCertificate(String certFile, String password) {
82 // Read .p12 file from SDCARD and extract with password
88 PasswordProtection passwordProtection = new PasswordProtection(password.toCharArray());
170 * @param password password to extract the .p12 file
172 public void installCertificate(VpnProfile profile, String certFile, String password) {
174 extractCertificate(certFile, password);
    [all...]
  /packages/apps/Browser/src/com/android/browser/
PageDialogsHandler.java 92 public void onOk(String host, String realm, String username, String password) {
93 setHttpAuthUsernamePassword(host, realm, username, password);
94 handler.proceed(username, password);
109 * Set HTTP authentication password.
111 * @param host The host for the password
112 * @param realm The realm for the password
113 * @param username The username for the password. If it is null, it means
114 * password can't be saved.
115 * @param password The password
    [all...]
  /external/chromium-trace/trace-viewer/third_party/webapp2/webapp2_extras/
auth.py 75 """Raised when a user password doesn't match."""
135 def get_user_by_auth_password(self, auth_id, password, silent=False):
136 """Returns a user dict based on auth_id and password.
140 :param password:
141 User password.
143 If True, raises an exception if auth_id or password are invalid.
150 user = self.user_model.get_by_auth_password(auth_id, password)
261 def validate_password(self, auth_id, password, silent=False):
262 """Validates a password.
269 :param password
    [all...]
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/imsphone/
ImsPhoneCommandInterface.java 259 String apn, String user, String password, String authType,
352 public void queryFacilityLock(String facility, String password,
357 public void queryFacilityLockForApp(String facility, String password,
363 String password, int serviceClass, Message response) {
368 String password, int serviceClass, String appId, Message response) {
564 String password, Message result) {
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/
SipCommandInterface.java 260 String apn, String user, String password, String authType,
353 public void queryFacilityLock(String facility, String password,
358 public void queryFacilityLockForApp(String facility, String password,
364 String password, int serviceClass, Message response) {
369 String password, int serviceClass, String appId, Message response) {
565 String password, Message result) {
  /packages/apps/CertInstaller/src/com/android/certinstaller/
CertInstaller.java 292 void extractPkcs12InBackground(final String password) {
298 return mCredentials.extractPkcs12(password);
342 String password = mView.getText(R.id.credential_password);
343 mNextAction = new Pkcs12ExtractAction(password);
475 Pkcs12ExtractAction(String password) {
476 mPassword = password;

Completed in 1216 milliseconds

1 2 3 4 5 6 78 91011>>