/external/chromium-trace/catapult/telemetry/examples/ |
credentials_example.json | 4 "password": "<your google password here>" 8 "password": "<your google password here>"
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKCS12Key.java | 6 * A password based key for use with PKCS#12. 11 private final char[] password; field in class:PKCS12Key 14 * Basic constructor for a password based key - secret key generation parameters will be passed separately.. 16 * @param password password to use. 18 public PKCS12Key(char[] password) 20 this(password, false); 27 * @param password password to use. 30 public PKCS12Key(char[] password, boolean useWrongZeroLengthConversion [all...] |
PKCS12KeyWithParameters.java | 8 * A password based key for use with PKCS#12 with full PBE parameters. 18 * Basic constructor for a password based key with generation parameters. 20 * @param password password to use. 24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) 26 super(password); 34 * Basic constructor for a password based key with generation parameters, specifying the wrong conversion for 37 * @param password password to use. 42 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount [all...] |
/external/dagger2/util/ |
settings.xml | 6 <password>${env.CI_DEPLOY_PASSWORD}</password>
|
/external/wpa_supplicant_8/hostapd/ |
hostapd.eap_user_sqlite | 4 password TEXT, 14 INSERT INTO users(identity,methods,password,phase2) VALUES ('user','TTLS-MSCHAPV2','password',1); 15 INSERT INTO users(identity,methods,password,phase2) VALUES ('DOMAIN\mschapv2 user','TTLS-MSCHAPV2','password',1);
|
nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 6 * super class for all Password Based Encryption (PBE) parameter generator classes. 10 protected byte[] password; field in class:PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, 34 this.password = password; 40 * return the password byte array. 42 * @return the password byte array [all...] |
/external/curl/tests/unit/ |
unit1304.c | 27 static char *password; variable 32 password = strdup(""); 34 if (!password || !login) { 35 Curl_safefree(password); 44 Curl_safefree(password); 57 result = Curl_parsenetrc("test.example.com", &login, &password, filename); 59 abort_unless(password != NULL, "returned NULL!"); 60 fail_unless(password[0] == 0, "password should not have been changed"); 70 result = Curl_parsenetrc("example.com", &login, &password, filename) 137 free(password); variable 152 free(password); variable 170 free(password); variable [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/res/xml/ |
device_admin.xml | 3 <reset-password /> 4 <limit-password />
|
/external/nanohttpd/ |
settings.xml | 8 <password>${env.CI_DEPLOY_PASSWORD}</password>
|
/external/autotest/tko/ |
db_postgres.py | 5 def connect(self, host, database, user, password): 6 return driver.connect("dbname=%s user=%s password=%s" % \ 7 (database, user, password))
|
/external/e2fsprogs/lib/et/test_cases/ |
continuation.et | 4 "New password was found in a dictionary of possible passwords and\n\ 5 therefore may be easily guessed. Please choose another password.\n\ 6 See the ovpasswd man page for help in choosing a good password."
|
/external/lzma/CPP/7zip/UI/FileManager/ |
PasswordDialog.rc | 8 CAPTION "Enter password"
10 LTEXT "&Enter password:", IDT_PASSWORD_ENTER, m, m, xc, 8
12 CONTROL "&Show password", IDX_PASSWORD_SHOW, MY_CHECKBOX, m, 42, xc, 10
|
/external/chromium-trace/catapult/third_party/webapp2/tests/ |
extras_security_test.py | 32 password = 'foo' 33 hashval = security.generate_password_hash(password, 'sha1') 34 self.assertTrue(security.check_password_hash(password, hashval)) 36 hashval = security.generate_password_hash(password, 'sha1', pepper='bar') 37 self.assertTrue(security.check_password_hash(password, hashval, 40 hashval = security.generate_password_hash(password, 'md5') 41 self.assertTrue(security.check_password_hash(password, hashval)) 43 hashval = security.generate_password_hash(password, 'plain') 44 self.assertTrue(security.check_password_hash(password, hashval)) 46 hashval = security.generate_password_hash(password, 'plain' [all...] |
/external/lzma/CPP/7zip/UI/Console/ |
OpenCallbackConsole.cpp | 29 HRESULT COpenCallbackConsole::Open_CryptoGetTextPassword(BSTR *password)
35 Password = GetPassword(OutStream);
38 return StringToBstr(Password, password);
41 HRESULT COpenCallbackConsole::Open_GetPasswordIfAny(bool &passwordIsDefined, UString &password)
44 password = Password;
|
/libcore/ojluni/src/main/java/javax/crypto/spec/ |
PBEKeySpec.java | 31 * A user-chosen password that can be used with password-based encryption 34 * <p>The password can be viewed as some kind of raw key material, from which 37 * <p>Different PBE mechanisms may consume different bits of each password 43 * <p>You convert the password characters to a PBE key by creating an 46 * of each password character, whereas a secret-key factory for PKCS #12 will 52 * internal value when the password stored in it is no longer needed. Hence, 53 * this class requests the password as a char array, so it can be overwritten 65 private char[] password; field in class:PBEKeySpec 71 * Constructor that takes a password. An empty char[] is used i [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
PKCS12StoreParameter.java | 13 public PKCS12StoreParameter(OutputStream out, char[] password) 15 super(out, password, false); 23 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding) 25 super(out, new KeyStore.PasswordProtection(password), forDEREncoding);
|
/external/clang/test/Analysis/ |
default-diagnostic-visitors.c | 8 int *password; // expected-note {{'password' declared without an initial value}} local 9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}} 10 err = *password;
|
/external/selinux/policycoreutils/newrole/ |
newrole-lspp.pamd | 4 password include system-auth
|
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 36 SizedBuffer password; local 38 password.buffer.reset(new uint8_t[16]); 39 password.length = 16; 40 memset(password.buffer.get(), 0, 16); 41 EnrollRequest request(0, NULL, &password, NULL); 55 SizedBuffer password; local 58 EnrollRequest request(0, NULL, &password, NULL); 100 // do_enroll enrolls an all 0 password 113 // verify first password 124 // enroll new password 128 SizedBuffer password; local 173 SizedBuffer password; local [all...] |
/external/curl/tests/data/ |
test1304 | 25 machine example.com login admin password passwd 26 machine curl.example.com login none password none
|
/external/lzma/CPP/7zip/ |
IPassword.h | 15 STDMETHOD(CryptoGetTextPassword)(BSTR *password) PURE;
20 STDMETHOD(CryptoGetTextPassword2)(Int32 *passwordIsDefined, BSTR *password) PURE;
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
ieee8021x.conf | 11 password="password"
|
/libcore/ojluni/src/main/java/java/net/ |
PasswordAuthentication.java | 31 * Authenticator. It is simply a repository for a user name and a password. 43 private char[] password; field in class:PasswordAuthentication 47 * user name and password. 49 * <p> Note that the given user password is cloned before it is stored in 53 * @param password the user's password 55 public PasswordAuthentication(String userName, char[] password) { 57 this.password = password.clone(); 70 * Returns the user password [all...] |
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
UserCredentialHash.java | 5 * hash(user:domain:password). This is more secure than simply supplying 6 * password because the password cannot be extracted. Implementations 30 * Get the MD5(userName:sipdomain:password) 32 * @return the MD5 hash of userName:sipDomain:password.
|