/libcore/ojluni/src/main/java/javax/net/ssl/ |
KeyManagerFactory.java | 255 * The KeyStore is generally password-protected. 262 * @param password the password for recovering keys in the KeyStore 267 * (e.g. the given password is wrong). 269 public final void init(KeyStore ks, char[] password) throws 272 factorySpi.engineInit(ks, password); 281 * and password may be needed by a provider. Users of that
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/service/ |
IEmailService.aidl | 56 Bundle autoDiscover(String userName, String password);
|
/packages/apps/KeyChain/support/src/com/android/keychain/tests/support/ |
KeyChainServiceTestSupport.java | 38 @Override public boolean keystoreSetPassword(String password) { 40 return mKeyStore.onUserPasswordChanged(password);
|
/packages/apps/Settings/src/com/android/settings/ |
SetupChooseLockPassword.java | 46 int minLength, final int maxLength, boolean requirePasswordToDecrypt, String password) { 48 requirePasswordToDecrypt, password);
|
/frameworks/base/core/java/com/android/internal/net/ |
VpnProfile.java | 53 public String password = ""; // 4 field in class:VpnProfile 78 password = in.readString(); 99 out.writeString(password); 133 profile.password = values[4]; 145 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); 158 builder.append('\0').append(saveLogin ? password : "");
|
/packages/apps/Car/Settings/src/com/android/car/settings/wifi/ |
AddWifiActivity.java | 109 String password = mWifiPasswordInput.getText().toString(); local 110 wifiConfig.wepKeys[0] = isHexString(password) ? password : "\"" + password + "\""; 126 private boolean isHexString(String password) { 127 return HEX_PATTERN.matcher(password).matches();
|
/external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/ |
UserAccountTest.groovy | 33 private static final PASSWORD = "password123" 40 def acct = new UserAccount(USERNAME, PASSWORD, HOME_DIR) 42 assert acct.password == PASSWORD 61 userAccount.password = PASSWORD 62 assert userAccount.isValidPassword(PASSWORD) 70 userAccount.password = PASSWORD 71 shouldFailWithMessageContaining('username') { userAccount.isValidPassword(PASSWORD) } [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.c | 104 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 105 * @password_len: Length of password 109 int nt_password_hash(const u8 *password, size_t password_len, 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 163 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 164 * @password_len: Length of password 170 const u8 *password, size_t password_len, 178 nt_password_hash(password, password_len, password_hash) [all...] |
/prebuilts/go/darwin-x86/src/net/smtp/ |
auth.go | 42 identity, username, password string 48 // The returned Auth uses the given username and password to authenticate 51 func PlainAuth(identity, username, password, host string) Auth { 52 return &plainAuth{identity, username, password, host} 71 resp := []byte(a.identity + "\x00" + a.username + "\x00" + a.password)
|
/prebuilts/go/linux-x86/src/net/smtp/ |
auth.go | 42 identity, username, password string 48 // The returned Auth uses the given username and password to authenticate 51 func PlainAuth(identity, username, password, host string) Auth { 52 return &plainAuth{identity, username, password, host} 71 resp := []byte(a.identity + "\x00" + a.username + "\x00" + a.password)
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
pem_decrypt_test.go | 23 der, err := DecryptPEMBlock(block, data.password) 48 password := []byte("kremvax1") 49 block, err := EncryptPEMBlock(rand.Reader, "RSA PRIVATE KEY", plainDER, password, data.kind) 63 der, err := DecryptPEMBlock(block, password) 76 password []byte 82 password: []byte("asdf"), 107 password: []byte("asdf"), 132 password: []byte("asdf"), 157 password: []byte("asdf"), 182 password: []byte("asdf") [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
pem_decrypt_test.go | 23 der, err := DecryptPEMBlock(block, data.password) 48 password := []byte("kremvax1") 49 block, err := EncryptPEMBlock(rand.Reader, "RSA PRIVATE KEY", plainDER, password, data.kind) 63 der, err := DecryptPEMBlock(block, password) 76 password []byte 82 password: []byte("asdf"), 107 password: []byte("asdf"), 132 password: []byte("asdf"), 157 password: []byte("asdf"), 182 password: []byte("asdf") [all...] |
/system/nvram/hal/tests/ |
nvram_hal_test.cc | 338 std::string password = "hunter2"; 342 password); 347 EXPECT_EQ(NV_RESULT_SUCCESS, device.WriteSpace(kTestIndex1, data, password)); 427 std::string password = "hunter2"; 430 password); 431 EXPECT_EQ(NV_RESULT_SUCCESS, device.WriteSpace(index, "test", password)); 441 EXPECT_EQ(NV_RESULT_SUCCESS, device.ReadSpace(index, 4, password, &data)); 446 std::string password = "hunter2"; 449 password); 450 ASSERT_EQ(NV_RESULT_SUCCESS, device.WriteSpace(index, "test", password)); [all...] |
/external/autotest/client/cros/ |
cryptohome.py | 42 def ensure_clean_cryptohome_for(user, password=None): 46 @param password: if unset, a random password will be used. 48 if not password: 49 password = ''.join(random.sample(string.ascii_lowercase, 6)) 51 mount_vault(user, password, create=True) 63 'Password': '' 73 match = re.search('TPM Password: (\w*)', out) 74 status['Password'] = '' 76 status['Password'] = match.group(1 [all...] |
/external/openssh/ |
auth1.c | 68 SSH_CMSG_AUTH_PASSWORD, "password", 121 char *password; local 125 * Read user password. It is in plain text, but was 129 password = packet_get_string(&dlen); 132 /* Try authentication with the password. */ 133 authenticated = PRIVSEP(auth_password(authctxt, password)); 135 explicit_bzero(password, dlen); 136 free(password); 248 /* If the user has no password, accept authentication immediately. */
|
/external/webrtc/talk/app/webrtc/java/src/org/webrtc/ |
PeerConnection.java | 95 public final String password; field in class:PeerConnection.IceServer 102 public IceServer(String uri, String username, String password) { 105 this.password = password; 109 return uri + "[" + username + ":" + password + "]";
|
/external/webrtc/webrtc/p2p/base/ |
candidate.h | 48 const std::string& password, 58 password_(password), 112 const std::string & password() const { return password_; } function in class:cricket::Candidate 113 void set_password(const std::string & password) { password_ = password; }
|
/external/webrtc/webrtc/p2p/client/ |
httpportallocator.cc | 135 password()); 171 ASSERT(!password().empty()); 173 "&password=" + rtc::s_url_encode(password()); 186 if (!password().empty() && map["password"] != password()) { 187 LOG(LS_WARNING) << "Received unexpected password value from relay server."; 203 map["password"]);
|
/external/wpa_supplicant_8/src/ap/ |
authsrv.c | 73 if (eap_user->password) { 74 user->password = os_malloc(eap_user->password_len); 75 if (user->password == NULL) 77 os_memcpy(user->password, eap_user->password,
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/pps/ |
Credential.java | 39 EAPMethod eapMethod, String userName, String password, 48 if (!TextUtils.isEmpty(password)) { 49 byte[] pwOctets = Base64.decode(password, Base64.DEFAULT); 106 public Credential(Credential other, String password) { 112 mPassword = password;
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/model/ |
WifiInfo.java | 72 /** Password of the wifi network in {@link #ssid}. */ 74 public final String password; field in class:WifiInfo 93 bundle.putString(EXTRA_PROVISIONING_WIFI_PASSWORD, password); 122 password = builder.mPassword; 167 public Builder setPassword(String password) { 168 mPassword = password;
|
/packages/apps/Settings/tests/app/src/com/android/settings/vpn2/ |
VpnProfileParser.java | 48 boolean password; 85 if (tagName.equalsIgnoreCase("password")) { 86 password = true; 121 if (tagName.equalsIgnoreCase("cert-file-password")) { 157 if (password) { 158 profile.password = strValue; 159 password = false;
|
/system/tpm/tpm_manager/server/ |
tpm2_initializer_test.cc | 108 std::string password = "hunter2"; local 112 DoAll(SetArgPointee<2>(password), Return(trunks::TPM_RC_SUCCESS))); 117 EXPECT_EQ(password, fake_local_data_.owner_password()); 118 EXPECT_EQ(password, fake_local_data_.endorsement_password()); 119 EXPECT_EQ(password, fake_local_data_.lockout_password());
|
/frameworks/base/core/java/com/android/internal/widget/ |
LockPatternUtils.java | 98 * The minimum size of a valid password. 262 * Gets the device policy password mode. If the mode is non-specific, returns 398 * Check to see if a password matches the saved password. 399 * If password matches, return an opaque attestation that the challenge 402 * @param password The password to check. 403 * @param challenge The challenge to verify against the password 406 public byte[] verifyPassword(String password, long challenge, int userId) 409 return verifyCredential(password, CREDENTIAL_TYPE_PASSWORD, challenge, userId) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 504 char[] password) 553 char[] password, 610 char[] password, 626 PKCS12Key key = new PKCS12Key(password, wrongPKCS12Zero); 636 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId); 654 char[] password) 657 PBEKeySpec pbeSpec = new PBEKeySpec(password); 684 char[] password, 695 PBEKeySpec pbeSpec = new PBEKeySpec(password); 702 PKCS12Key key = new PKCS12Key(password, wrongPKCS12Zero) 1247 char[] password; local 1263 doStore(bcParam.getOutputStream(), password, bcParam.isForDEREncoding()); local [all...] |