HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 251 - 275 of 1357) sorted by null

<<11121314151617181920>>

  /libcore/ojluni/src/main/java/javax/net/ssl/
KeyManagerFactory.java 255 * The KeyStore is generally password-protected.
262 * @param password the password for recovering keys in the KeyStore
267 * (e.g. the given password is wrong).
269 public final void init(KeyStore ks, char[] password) throws
272 factorySpi.engineInit(ks, password);
281 * and password may be needed by a provider. Users of that
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/service/
IEmailService.aidl 56 Bundle autoDiscover(String userName, String password);
  /packages/apps/KeyChain/support/src/com/android/keychain/tests/support/
KeyChainServiceTestSupport.java 38 @Override public boolean keystoreSetPassword(String password) {
40 return mKeyStore.onUserPasswordChanged(password);
  /packages/apps/Settings/src/com/android/settings/
SetupChooseLockPassword.java 46 int minLength, final int maxLength, boolean requirePasswordToDecrypt, String password) {
48 requirePasswordToDecrypt, password);
  /frameworks/base/core/java/com/android/internal/net/
VpnProfile.java 53 public String password = ""; // 4 field in class:VpnProfile
78 password = in.readString();
99 out.writeString(password);
133 profile.password = values[4];
145 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty();
158 builder.append('\0').append(saveLogin ? password : "");
  /packages/apps/Car/Settings/src/com/android/car/settings/wifi/
AddWifiActivity.java 109 String password = mWifiPasswordInput.getText().toString(); local
110 wifiConfig.wepKeys[0] = isHexString(password) ? password : "\"" + password + "\"";
126 private boolean isHexString(String password) {
127 return HEX_PATTERN.matcher(password).matches();
  /external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/
UserAccountTest.groovy 33 private static final PASSWORD = "password123"
40 def acct = new UserAccount(USERNAME, PASSWORD, HOME_DIR)
42 assert acct.password == PASSWORD
61 userAccount.password = PASSWORD
62 assert userAccount.isValidPassword(PASSWORD)
70 userAccount.password = PASSWORD
71 shouldFailWithMessageContaining('username') { userAccount.isValidPassword(PASSWORD) }
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.c 104 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
105 * @password_len: Length of password
109 int nt_password_hash(const u8 *password, size_t password_len,
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
163 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
164 * @password_len: Length of password
170 const u8 *password, size_t password_len,
178 nt_password_hash(password, password_len, password_hash)
    [all...]
  /prebuilts/go/darwin-x86/src/net/smtp/
auth.go 42 identity, username, password string
48 // The returned Auth uses the given username and password to authenticate
51 func PlainAuth(identity, username, password, host string) Auth {
52 return &plainAuth{identity, username, password, host}
71 resp := []byte(a.identity + "\x00" + a.username + "\x00" + a.password)
  /prebuilts/go/linux-x86/src/net/smtp/
auth.go 42 identity, username, password string
48 // The returned Auth uses the given username and password to authenticate
51 func PlainAuth(identity, username, password, host string) Auth {
52 return &plainAuth{identity, username, password, host}
71 resp := []byte(a.identity + "\x00" + a.username + "\x00" + a.password)
  /prebuilts/go/darwin-x86/src/crypto/x509/
pem_decrypt_test.go 23 der, err := DecryptPEMBlock(block, data.password)
48 password := []byte("kremvax1")
49 block, err := EncryptPEMBlock(rand.Reader, "RSA PRIVATE KEY", plainDER, password, data.kind)
63 der, err := DecryptPEMBlock(block, password)
76 password []byte
82 password: []byte("asdf"),
107 password: []byte("asdf"),
132 password: []byte("asdf"),
157 password: []byte("asdf"),
182 password: []byte("asdf")
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
pem_decrypt_test.go 23 der, err := DecryptPEMBlock(block, data.password)
48 password := []byte("kremvax1")
49 block, err := EncryptPEMBlock(rand.Reader, "RSA PRIVATE KEY", plainDER, password, data.kind)
63 der, err := DecryptPEMBlock(block, password)
76 password []byte
82 password: []byte("asdf"),
107 password: []byte("asdf"),
132 password: []byte("asdf"),
157 password: []byte("asdf"),
182 password: []byte("asdf")
    [all...]
  /system/nvram/hal/tests/
nvram_hal_test.cc 338 std::string password = "hunter2";
342 password);
347 EXPECT_EQ(NV_RESULT_SUCCESS, device.WriteSpace(kTestIndex1, data, password));
427 std::string password = "hunter2";
430 password);
431 EXPECT_EQ(NV_RESULT_SUCCESS, device.WriteSpace(index, "test", password));
441 EXPECT_EQ(NV_RESULT_SUCCESS, device.ReadSpace(index, 4, password, &data));
446 std::string password = "hunter2";
449 password);
450 ASSERT_EQ(NV_RESULT_SUCCESS, device.WriteSpace(index, "test", password));
    [all...]
  /external/autotest/client/cros/
cryptohome.py 42 def ensure_clean_cryptohome_for(user, password=None):
46 @param password: if unset, a random password will be used.
48 if not password:
49 password = ''.join(random.sample(string.ascii_lowercase, 6))
51 mount_vault(user, password, create=True)
63 'Password': ''
73 match = re.search('TPM Password: (\w*)', out)
74 status['Password'] = ''
76 status['Password'] = match.group(1
    [all...]
  /external/openssh/
auth1.c 68 SSH_CMSG_AUTH_PASSWORD, "password",
121 char *password; local
125 * Read user password. It is in plain text, but was
129 password = packet_get_string(&dlen);
132 /* Try authentication with the password. */
133 authenticated = PRIVSEP(auth_password(authctxt, password));
135 explicit_bzero(password, dlen);
136 free(password);
248 /* If the user has no password, accept authentication immediately. */
  /external/webrtc/talk/app/webrtc/java/src/org/webrtc/
PeerConnection.java 95 public final String password; field in class:PeerConnection.IceServer
102 public IceServer(String uri, String username, String password) {
105 this.password = password;
109 return uri + "[" + username + ":" + password + "]";
  /external/webrtc/webrtc/p2p/base/
candidate.h 48 const std::string& password,
58 password_(password),
112 const std::string & password() const { return password_; } function in class:cricket::Candidate
113 void set_password(const std::string & password) { password_ = password; }
  /external/webrtc/webrtc/p2p/client/
httpportallocator.cc 135 password());
171 ASSERT(!password().empty());
173 "&password=" + rtc::s_url_encode(password());
186 if (!password().empty() && map["password"] != password()) {
187 LOG(LS_WARNING) << "Received unexpected password value from relay server.";
203 map["password"]);
  /external/wpa_supplicant_8/src/ap/
authsrv.c 73 if (eap_user->password) {
74 user->password = os_malloc(eap_user->password_len);
75 if (user->password == NULL)
77 os_memcpy(user->password, eap_user->password,
  /frameworks/base/packages/Osu/src/com/android/hotspot2/pps/
Credential.java 39 EAPMethod eapMethod, String userName, String password,
48 if (!TextUtils.isEmpty(password)) {
49 byte[] pwOctets = Base64.decode(password, Base64.DEFAULT);
106 public Credential(Credential other, String password) {
112 mPassword = password;
  /packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/model/
WifiInfo.java 72 /** Password of the wifi network in {@link #ssid}. */
74 public final String password; field in class:WifiInfo
93 bundle.putString(EXTRA_PROVISIONING_WIFI_PASSWORD, password);
122 password = builder.mPassword;
167 public Builder setPassword(String password) {
168 mPassword = password;
  /packages/apps/Settings/tests/app/src/com/android/settings/vpn2/
VpnProfileParser.java 48 boolean password;
85 if (tagName.equalsIgnoreCase("password")) {
86 password = true;
121 if (tagName.equalsIgnoreCase("cert-file-password")) {
157 if (password) {
158 profile.password = strValue;
159 password = false;
  /system/tpm/tpm_manager/server/
tpm2_initializer_test.cc 108 std::string password = "hunter2"; local
112 DoAll(SetArgPointee<2>(password), Return(trunks::TPM_RC_SUCCESS)));
117 EXPECT_EQ(password, fake_local_data_.owner_password());
118 EXPECT_EQ(password, fake_local_data_.endorsement_password());
119 EXPECT_EQ(password, fake_local_data_.lockout_password());
  /frameworks/base/core/java/com/android/internal/widget/
LockPatternUtils.java 98 * The minimum size of a valid password.
262 * Gets the device policy password mode. If the mode is non-specific, returns
398 * Check to see if a password matches the saved password.
399 * If password matches, return an opaque attestation that the challenge
402 * @param password The password to check.
403 * @param challenge The challenge to verify against the password
406 public byte[] verifyPassword(String password, long challenge, int userId)
409 return verifyCredential(password, CREDENTIAL_TYPE_PASSWORD, challenge, userId)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
PKCS12KeyStoreSpi.java 504 char[] password)
553 char[] password,
610 char[] password,
626 PKCS12Key key = new PKCS12Key(password, wrongPKCS12Zero);
636 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId);
654 char[] password)
657 PBEKeySpec pbeSpec = new PBEKeySpec(password);
684 char[] password,
695 PBEKeySpec pbeSpec = new PBEKeySpec(password);
702 PKCS12Key key = new PKCS12Key(password, wrongPKCS12Zero)
1247 char[] password; local
1263 doStore(bcParam.getOutputStream(), password, bcParam.isForDEREncoding()); local
    [all...]

Completed in 985 milliseconds

<<11121314151617181920>>