HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 101 - 125 of 1437) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/autotest/site_utils/rpm_control_system/
dli.py 34 def __init__(self,userid='admin',password='4321',hostname='192.168.0.100'):
36 self.password=password
48 curl.setopt(curl.URL, 'http://%s:%s@%s/%s' % (self.userid,self.password,self.hostname,url))
102 parser.add_option('--password',dest='password',default="4321")
105 switch=powerswitch(userid=options.user,password=options.password,hostname=options.hostname)
dli_urllib.py 17 path = 'http://%s:%s@%s:80/%s' % (self.userid,self.password,
  /external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
SslContextBuilder.java 92 char[] password = "password".toCharArray(); local
93 KeyStore keyStore = newEmptyKeyStore(password);
100 keyStore.setKeyEntry("private", chain[0].keyPair.getPrivate(), password, certificates);
110 keyManagerFactory.init(keyStore, password);
120 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException {
124 keyStore.load(in, password);
  /external/wpa_supplicant_8/src/eap_peer/
eap_gtc.c 50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured");
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
eap_md5.c 34 const u8 *pos, *challenge, *password; local
38 password = eap_get_config_password(sm, &password_len);
39 if (password == NULL) {
40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
mschapv2.h 19 const u8 *password, size_t password_len,
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/
DataProfile.java 42 //the password for APN, or NULL
43 public final String password; field in class:DataProfile
75 String user, String password, int type, int maxConnsTime, int maxConns,
89 this.password = password;
111 apn.authType, apn.user, apn.password, apn.bearerBitmask == 0
122 + "/" + user + "/" + password + "/" + type + "/" + maxConnsTime
  /libcore/luni/src/test/java/libcore/javax/crypto/
SecretKeyFactoryTest.java 32 private static final char[] PASSWORD = "google".toCharArray();
53 // PBEKeySpecs password only constructor
67 KeySpec ks = new PBEKeySpec(PASSWORD);
88 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS);
108 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS, KEY_LENGTH);
119 test_PBKDF2_UTF8(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, expected);
120 test_PBKDF2_8BIT(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, expected);
129 char[] password = "password".toCharArray(); local
140 test_PBKDF2_UTF8(password, salt, iterations, keyLength, expected)
150 char[] password = ("All n-entities must communicate with other " local
175 char[] password = "\\u0141\\u0142".toCharArray(); local
    [all...]
  /cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/
ResetPasswordTest.java 28 * <p>These tests verify that the device password:
42 * Test: a Device Owner or (un-managed) Profile Owner can create, change and remove a password.
49 * Test: a managed Profile Owner can create and change, but not remove, a password.
57 * password when FBE is locked.
73 private void assertResetPasswordEnabled(boolean enabled, String password) {
76 passwordChanged = mDevicePolicyManager.resetPassword(password, 0);
85 assertTrue("Failed to change password", passwordChanged);
87 assertFalse("Failed to prevent password change", passwordChanged);
  /developers/build/prebuilts/gradle/AutofillFramework/kotlinApp/Application/src/main/java/com/example/android/autofillframework/app/
StandardSignInActivity.kt 50 val password = passwordField.text.toString()
51 val valid = isValidCredentials(username, password)
65 fun isValidCredentials(username: String, password: String): Boolean {
66 return username == password
  /developers/samples/android/input/autofill/AutofillFramework/kotlinApp/Application/src/main/java/com/example/android/autofillframework/app/
StandardSignInActivity.kt 50 val password = passwordField.text.toString()
51 val valid = isValidCredentials(username, password)
65 fun isValidCredentials(username: String, password: String): Boolean {
66 return username == password
  /external/curl/lib/
curl_ntlm_core.h 68 const char *password,
73 const char *password,
  /external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/command/
PassCommandHandler.java 27 * <li>If the required password parameter is missing, then reply with 501</li>
30 * <li>If the specified password is not correct, then reply with 530</li>
40 String password = command.getRequiredParameter(0); local
45 if (userAccount.isValidPassword(password)) {
  /external/webrtc/webrtc/libjingle/xmpp/
plainsaslhandler.h 23 PlainSaslHandler(const Jid & jid, const rtc::CryptString & password,
24 bool allow_plain) : jid_(jid), password_(password),
  /packages/apps/KeyChain/support/src/com/android/keychain/tests/support/
IKeyChainServiceTestSupport.aidl 34 boolean keystoreSetPassword(String password);
  /cts/tests/autofillservice/src/android/autofillservice/cts/
VirtualContainerActivity.java 35 * <li>Password
58 mPassword = mCustomView.addLine(ID_PASSWORD_LABEL, "Password", ID_PASSWORD, BLANK_VALUE);
72 void expectAutoFill(String username, String password) {
73 mExpectation = new FillExpectation(username, password);
95 private FillExpectation(String username, String password) {
97 ccPasswordWatcher = mPassword.new OneTimeLineWatcher(password);
LoginActivity.java 39 * <li>Password EditText (id: "username", input-type textPassword)
90 mPasswordEditText = findViewById(R.id.password);
113 final String password = mPasswordEditText.getText().toString(); local
114 final boolean valid = username.equals(password)
115 || (TextUtils.isEmpty(username) && TextUtils.isEmpty(password))
116 || password.contains(BACKDOOR_PASSWORD_SUBSTRING)
143 * Explicitly forces the AutofillManager to save the username and password.
156 void expectAutoFill(String username, String password) {
157 mExpectation = new FillExpectation(username, password);
172 * Sets the expectation for an autofill request (for password only), so it can be asserte
    [all...]
  /external/boringssl/src/crypto/evp/
pbkdf.c 65 int PKCS5_PBKDF2_HMAC(const char *password, size_t password_len,
75 if (!HMAC_Init_ex(&hctx, password, password_len, digest, NULL)) {
140 int PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len,
144 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
  /external/conscrypt/platform/src/main/java/org/conscrypt/
TrustedCertificateKeyStoreSpi.java 39 public Key engineGetKey(String alias, char[] password) {
66 String alias, Key key, char[] password, Certificate[] chain) {
122 public void engineStore(OutputStream stream, char[] password) {
127 public void engineLoad(InputStream stream, char[] password) {
  /external/curl/docs/cmdline-opts/
digest.d 8 prevents the password from being sent over the wire in clear text. Use this in
9 combination with the normal --user option to set user name and password.
  /external/lzma/CPP/7zip/UI/Console/
List.h 19 bool &passwordEnabled, UString &password,
  /frameworks/base/core/java/android/webkit/
WebViewDatabase.java 26 * <li>Username/password pairs for web forms</li>
27 * <li>HTTP authentication username/password pairs</li>
42 * Gets whether there are any saved username/password pairs for web forms.
45 * @return true if there are any saved username/password pairs
54 * Clears any saved username/password pairs for web forms.
76 * and password stored in WebViewDatabase instance. The username and password are not read from
80 * The username and password used for http authentication might be cached in the network stack
98 * with the correct username and password.
100 * The embedder app can get the username and password any way it chooses, and does not have t
    [all...]
  /external/autotest/client/site_tests/enterprise_RemoraRequisition/
enterprise_RemoraRequisition.py 35 user_id, password = utils.get_signin_credentials(os.path.join(
37 if not (user_id and password):
43 enrollment.RemoraEnrollment(cr.browser, user_id, password)
  /external/autotest/client/site_tests/platform_CryptohomeMigrateChapsTokenClient/
platform_CryptohomeMigrateChapsTokenClient.py 25 password = "test_password"
33 self._cryptohome_proxy.ensure_clean_cryptohome_for(user, password)
41 result = self._cryptohome_proxy.mount(user, password)
  /external/libchrome/crypto/
ec_private_key.h 60 const std::string& password,
71 const std::string& password,
96 // The |password| and |iterations| are used as inputs to the key derivation
102 bool ExportEncryptedPrivateKey(const std::string& password,

Completed in 1652 milliseconds

1 2 3 45 6 7 8 91011>>