HomeSort by relevance Sort by last modified time
    Searched full:password (Results 1 - 25 of 3313) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium-trace/catapult/telemetry/examples/
credentials_example.json 4 "password": "<your google password here>"
8 "password": "<your google password here>"
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
PKCS12Key.java 6 * A password based key for use with PKCS#12.
11 private final char[] password; field in class:PKCS12Key
14 * Basic constructor for a password based key - secret key generation parameters will be passed separately..
16 * @param password password to use.
18 public PKCS12Key(char[] password)
20 this(password, false);
27 * @param password password to use.
30 public PKCS12Key(char[] password, boolean useWrongZeroLengthConversion
    [all...]
PKCS12KeyWithParameters.java 8 * A password based key for use with PKCS#12 with full PBE parameters.
18 * Basic constructor for a password based key with generation parameters.
20 * @param password password to use.
24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount)
26 super(password);
34 * Basic constructor for a password based key with generation parameters, specifying the wrong conversion for
37 * @param password password to use.
42 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount
    [all...]
  /external/dagger2/util/
settings.xml 6 <password>${env.CI_DEPLOY_PASSWORD}</password>
  /external/wpa_supplicant_8/hostapd/
hostapd.eap_user_sqlite 4 password TEXT,
14 INSERT INTO users(identity,methods,password,phase2) VALUES ('user','TTLS-MSCHAPV2','password',1);
15 INSERT INTO users(identity,methods,password,phase2) VALUES ('DOMAIN\mschapv2 user','TTLS-MSCHAPV2','password',1);
nt_password_hash.c 2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
PBEParametersGenerator.java 6 * super class for all Password Based Encryption (PBE) parameter generator classes.
10 protected byte[] password; field in class:PBEParametersGenerator
24 * @param password the password converted into bytes (see below).
25 * @param salt the salt to be mixed with the password.
30 byte[] password,
34 this.password = password;
40 * return the password byte array.
42 * @return the password byte array
    [all...]
  /external/curl/tests/unit/
unit1304.c 27 static char *password; variable
32 password = strdup("");
34 if (!password || !login) {
35 Curl_safefree(password);
44 Curl_safefree(password);
57 result = Curl_parsenetrc("test.example.com", &login, &password, filename);
59 abort_unless(password != NULL, "returned NULL!");
60 fail_unless(password[0] == 0, "password should not have been changed");
70 result = Curl_parsenetrc("example.com", &login, &password, filename)
137 free(password); variable
152 free(password); variable
170 free(password); variable
    [all...]
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/res/xml/
device_admin.xml 3 <reset-password />
4 <limit-password />
  /external/nanohttpd/
settings.xml 8 <password>${env.CI_DEPLOY_PASSWORD}</password>
  /external/autotest/tko/
db_postgres.py 5 def connect(self, host, database, user, password):
6 return driver.connect("dbname=%s user=%s password=%s" % \
7 (database, user, password))
  /external/e2fsprogs/lib/et/test_cases/
continuation.et 4 "New password was found in a dictionary of possible passwords and\n\
5 therefore may be easily guessed. Please choose another password.\n\
6 See the ovpasswd man page for help in choosing a good password."
  /external/lzma/CPP/7zip/UI/FileManager/
PasswordDialog.rc 8 CAPTION "Enter password"
10 LTEXT "&Enter password:", IDT_PASSWORD_ENTER, m, m, xc, 8
12 CONTROL "&Show password", IDX_PASSWORD_SHOW, MY_CHECKBOX, m, 42, xc, 10
  /external/chromium-trace/catapult/third_party/webapp2/tests/
extras_security_test.py 32 password = 'foo'
33 hashval = security.generate_password_hash(password, 'sha1')
34 self.assertTrue(security.check_password_hash(password, hashval))
36 hashval = security.generate_password_hash(password, 'sha1', pepper='bar')
37 self.assertTrue(security.check_password_hash(password, hashval,
40 hashval = security.generate_password_hash(password, 'md5')
41 self.assertTrue(security.check_password_hash(password, hashval))
43 hashval = security.generate_password_hash(password, 'plain')
44 self.assertTrue(security.check_password_hash(password, hashval))
46 hashval = security.generate_password_hash(password, 'plain'
    [all...]
  /external/lzma/CPP/7zip/UI/Console/
OpenCallbackConsole.cpp 29 HRESULT COpenCallbackConsole::Open_CryptoGetTextPassword(BSTR *password)
35 Password = GetPassword(OutStream);
38 return StringToBstr(Password, password);
41 HRESULT COpenCallbackConsole::Open_GetPasswordIfAny(bool &passwordIsDefined, UString &password)
44 password = Password;
  /libcore/ojluni/src/main/java/javax/crypto/spec/
PBEKeySpec.java 31 * A user-chosen password that can be used with password-based encryption
34 * <p>The password can be viewed as some kind of raw key material, from which
37 * <p>Different PBE mechanisms may consume different bits of each password
43 * <p>You convert the password characters to a PBE key by creating an
46 * of each password character, whereas a secret-key factory for PKCS #12 will
52 * internal value when the password stored in it is no longer needed. Hence,
53 * this class requests the password as a char array, so it can be overwritten
65 private char[] password; field in class:PBEKeySpec
71 * Constructor that takes a password. An empty char[] is used i
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/
PKCS12StoreParameter.java 13 public PKCS12StoreParameter(OutputStream out, char[] password)
15 super(out, password, false);
23 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding)
25 super(out, new KeyStore.PasswordProtection(password), forDEREncoding);
  /external/clang/test/Analysis/
default-diagnostic-visitors.c 8 int *password; // expected-note {{'password' declared without an initial value}} local
9 if (password == 0) { // expected-warning {{The left operand of '==' is a garbage value}} // expected-note {{The left operand of '==' is a garbage value}}
10 err = *password;
  /external/selinux/policycoreutils/newrole/
newrole-lspp.pamd 4 password include system-auth
  /system/core/gatekeeperd/tests/
gatekeeper_test.cpp 36 SizedBuffer password; local
38 password.buffer.reset(new uint8_t[16]);
39 password.length = 16;
40 memset(password.buffer.get(), 0, 16);
41 EnrollRequest request(0, NULL, &password, NULL);
55 SizedBuffer password; local
58 EnrollRequest request(0, NULL, &password, NULL);
100 // do_enroll enrolls an all 0 password
113 // verify first password
124 // enroll new password
128 SizedBuffer password; local
173 SizedBuffer password; local
    [all...]
  /external/curl/tests/data/
test1304 25 machine example.com login admin password passwd
26 machine curl.example.com login none password none
  /external/lzma/CPP/7zip/
IPassword.h 15 STDMETHOD(CryptoGetTextPassword)(BSTR *password) PURE;
20 STDMETHOD(CryptoGetTextPassword2)(Int32 *passwordIsDefined, BSTR *password) PURE;
  /external/wpa_supplicant_8/wpa_supplicant/examples/
ieee8021x.conf 11 password="password"
  /libcore/ojluni/src/main/java/java/net/
PasswordAuthentication.java 31 * Authenticator. It is simply a repository for a user name and a password.
43 private char[] password; field in class:PasswordAuthentication
47 * user name and password.
49 * <p> Note that the given user password is cloned before it is stored in
53 * @param password the user's password
55 public PasswordAuthentication(String userName, char[] password) {
57 this.password = password.clone();
70 * Returns the user password
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
UserCredentialHash.java 5 * hash(user:domain:password). This is more secure than simply supplying
6 * password because the password cannot be extracted. Implementations
30 * Get the MD5(userName:sipdomain:password)
32 * @return the MD5 hash of userName:sipDomain:password.

Completed in 2401 milliseconds

1 2 3 4 5 6 7 8 91011>>