/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/distutils/ |
config.py | 18 password:%s 42 def _store_pypirc(self, username, password): 47 f.write(DEFAULT_PYPIRC % (username, password)) 82 ('password', None)): 98 'password': config.get(server, 'password'),
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/distutils/ |
config.py | 18 password:%s 42 def _store_pypirc(self, username, password): 47 f.write(DEFAULT_PYPIRC % (username, password)) 82 ('password', None)): 98 'password': config.get(server, 'password'),
|
/system/vold/ |
cryptfs.h | 57 #define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password 59 * devices where type is always password.*/ 61 * password */ 138 we will continue to believe the user entered the wrong password. In that 139 case the only solution is for the user to enter a password enough times to 143 wrong, we simply won't recognise a right password, and will continue to 144 prompt. On the first password change, this value will be populated and 153 * configure the phone before asking for the password 237 int cryptfs_get_master_key(struct crypt_mnt_ftr* ftr, const char* password, 239 int cryptfs_set_password(struct crypt_mnt_ftr* ftr, const char* password, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 231 u8 *password = dpos; local 234 password[password_len - 1] == '\0') { 238 "User-Password (PAP)", 239 password, password_len); 240 parse->user_password = password; 252 "EAP-TTLS: CHAP-Password (CHAP)", 503 if (!sm->user || !sm->user->password || sm->user->password_hash || 506 "password configured"); 512 os_memcmp_const(sm->user->password, user_password, 514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); [all...] |
/bionic/tools/bionicbb/ |
presubmit.py | 69 password = config.jenkins_credentials['password'] 71 jenkins = jenkinsapi.api.Jenkins(jenkins_url, username, password) 97 password = config.jenkins_credentials['password'] 99 jenkins = jenkinsapi.api.Jenkins(jenkins_url, username, password)
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 61 public Key engineGetKey(String alias, char[] password) 90 public void engineSetKeyEntry(String alias, Key key, char[] password, 176 public void engineStore(OutputStream stream, char[] password) 199 public void engineLoad(InputStream stream, char[] password)
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/builderTemplate/ |
buildAll.bat | 23 REM FTP user/password, required for Windows to ftp. Without it, no push.
52 echo "usage: buildAll [-mapVersionTag HEAD|<branch name>] [-vm <url to java executable to run build>] [-bc <bootclasspath>] [-target <buildall target to execute>] [-buildID <buildID, e.g. 2.1.2>] [-ftp <userid> <password>] I|M"
|
/external/jetty/src/java/org/eclipse/jetty/server/ |
Authentication.java | 85 * @param password 88 Authentication login(String username,Object password,ServletRequest request);
|
/external/lldb/test/pexpect-2.4/examples/ |
bd_serv.py | 9 --password : (optional) sets the password to login with 14 # Having the password on the command line is not a good idea, but 140 optlist, args = getopt.getopt(sys.argv[1:], 'h?d', ['help','h','?', 'hostname=', 'username=', 'password=', 'port=', 'watch']) 154 password = "" 169 if '--password' in options: 170 password = options['--password'] 172 password = getpass.getpass('password: ' [all...] |
/external/lzma/CPP/7zip/UI/Common/ |
UpdateCallback.cpp | 237 STDMETHODIMP CArchiveUpdateCallback::CryptoGetTextPassword2(Int32 *passwordIsDefined, BSTR *password)
240 return Callback->CryptoGetTextPassword2(passwordIsDefined, password);
244 STDMETHODIMP CArchiveUpdateCallback::CryptoGetTextPassword(BSTR *password)
247 return Callback->CryptoGetTextPassword(password);
|
/external/openssh/ |
authfd.h | 29 int ssh_lock_agent(int sock, int lock, const char *password);
|
sshconnect2.c | 352 {"password", 879 char *password; local 889 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password: ", 891 password = read_passphrase(prompt, 0); 897 packet_put_cstring(password); 898 explicit_bzero(password, strlen(password)); 899 free(password); 917 char *info, *lang, *password = NULL, *retype = NULL; local 940 "Enter %.30s@%.128s's old password: " [all...] |
/external/pdfium/public/ |
fpdf_dataavail.h | 133 * password - Optional password for decrypting the PDF file. 141 FPDF_BYTESTRING password);
|
/external/wpa_supplicant_8/src/common/ |
sae.h | 59 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_pwd_common.h | 60 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 50 * password - Password string for EAP 52 * This field can include either the plaintext password (default 54 * presentation of the password) if flags field has 65 u8 *password; member in struct:eap_peer_config 68 * password_len - Length of password field 156 * private_key_passwd - Password for private key file 306 * private_key2_passwd - Password for private key file 439 * be used to disable MSCHAPv2 password retry in authentication failure 573 * otp - One-time-password [all...] |
eap_ttls.c | 434 const u8 *identity, *password; local 441 password = eap_get_config_password2(sm, &password_len, &pwhash); 442 if (identity == NULL || password == NULL) 489 if (mschapv2_derive_response(identity, identity_len, password, 523 const u8 *identity, *password; local 530 password = eap_get_config_password2(sm, &password_len, &pwhash); 531 if (identity == NULL || password == NULL) 570 challenge_response(challenge, password, pos); /* NT-Response */ 571 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash", 572 password, 16) 606 const u8 *identity, *password; local 659 const u8 *identity, *password; local [all...] |
/libcore/luni/src/main/java/java/security/ |
KeyStoreSpi.java | 40 * Returns the key with the given alias, using the password to recover the 45 * @param password 46 * the password used to recover the key. 54 public abstract Key engineGetKey(String alias, char[] password) 88 * Associates the given alias with the key, password and certificate chain. 96 * @param password 97 * the password. 108 char[] password, Certificate[] chain) throws KeyStoreException; 219 * specified password. 223 * @param password [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 63 public Key engineGetKey(String alias, char[] password) 92 public void engineSetKeyEntry(String alias, Key key, char[] password, 178 public void engineStore(OutputStream stream, char[] password) 201 public void engineLoad(InputStream stream, char[] password)
|
/packages/apps/Settings/tests/src/com/android/settings/vpn2/ |
CertInstallerHelper.java | 61 /* Define a password to unlock keystore after it is reset */ 62 private static final String CERT_STORE_PASSWORD = "password"; 70 * Unlock keystore and set password 77 private void extractCertificate(String certFile, String password) { 82 // Read .p12 file from SDCARD and extract with password 88 PasswordProtection passwordProtection = new PasswordProtection(password.toCharArray()); 170 * @param password password to extract the .p12 file 172 public void installCertificate(VpnProfile profile, String certFile, String password) { 174 extractCertificate(certFile, password); [all...] |
/packages/apps/Browser/src/com/android/browser/ |
PageDialogsHandler.java | 92 public void onOk(String host, String realm, String username, String password) { 93 setHttpAuthUsernamePassword(host, realm, username, password); 94 handler.proceed(username, password); 109 * Set HTTP authentication password. 111 * @param host The host for the password 112 * @param realm The realm for the password 113 * @param username The username for the password. If it is null, it means 114 * password can't be saved. 115 * @param password The password [all...] |
/external/chromium-trace/trace-viewer/third_party/webapp2/webapp2_extras/ |
auth.py | 75 """Raised when a user password doesn't match.""" 135 def get_user_by_auth_password(self, auth_id, password, silent=False): 136 """Returns a user dict based on auth_id and password. 140 :param password: 141 User password. 143 If True, raises an exception if auth_id or password are invalid. 150 user = self.user_model.get_by_auth_password(auth_id, password) 261 def validate_password(self, auth_id, password, silent=False): 262 """Validates a password. 269 :param password [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/imsphone/ |
ImsPhoneCommandInterface.java | 259 String apn, String user, String password, String authType, 352 public void queryFacilityLock(String facility, String password, 357 public void queryFacilityLockForApp(String facility, String password, 363 String password, int serviceClass, Message response) { 368 String password, int serviceClass, String appId, Message response) { 564 String password, Message result) {
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/ |
SipCommandInterface.java | 260 String apn, String user, String password, String authType, 353 public void queryFacilityLock(String facility, String password, 358 public void queryFacilityLockForApp(String facility, String password, 364 String password, int serviceClass, Message response) { 369 String password, int serviceClass, String appId, Message response) { 565 String password, Message result) {
|
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CertInstaller.java | 292 void extractPkcs12InBackground(final String password) { 298 return mCredentials.extractPkcs12(password); 342 String password = mView.getText(R.id.credential_password); 343 mNextAction = new Pkcs12ExtractAction(password); 475 Pkcs12ExtractAction(String password) { 476 mPassword = password;
|