/external/autotest/site_utils/rpm_control_system/ |
dli.py | 34 def __init__(self,userid='admin',password='4321',hostname='192.168.0.100'): 36 self.password=password 48 curl.setopt(curl.URL, 'http://%s:%s@%s/%s' % (self.userid,self.password,self.hostname,url)) 102 parser.add_option('--password',dest='password',default="4321") 105 switch=powerswitch(userid=options.user,password=options.password,hostname=options.hostname)
|
dli_urllib.py | 17 path = 'http://%s:%s@%s:80/%s' % (self.userid,self.password,
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
SslContextBuilder.java | 92 char[] password = "password".toCharArray(); local 93 KeyStore keyStore = newEmptyKeyStore(password); 100 keyStore.setKeyEntry("private", chain[0].keyPair.getPrivate(), password, certificates); 110 keyManagerFactory.init(keyStore, password); 120 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { 124 keyStore.load(in, password);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured"); 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
eap_md5.c | 34 const u8 *pos, *challenge, *password; local 38 password = eap_get_config_password(sm, &password_len); 39 if (password == NULL) { 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
mschapv2.h | 19 const u8 *password, size_t password_len,
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
DataProfile.java | 42 //the password for APN, or NULL 43 public final String password; field in class:DataProfile 75 String user, String password, int type, int maxConnsTime, int maxConns, 89 this.password = password; 111 apn.authType, apn.user, apn.password, apn.bearerBitmask == 0 122 + "/" + user + "/" + password + "/" + type + "/" + maxConnsTime
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
SecretKeyFactoryTest.java | 32 private static final char[] PASSWORD = "google".toCharArray(); 53 // PBEKeySpecs password only constructor 67 KeySpec ks = new PBEKeySpec(PASSWORD); 88 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS); 108 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS, KEY_LENGTH); 119 test_PBKDF2_UTF8(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, expected); 120 test_PBKDF2_8BIT(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, expected); 129 char[] password = "password".toCharArray(); local 140 test_PBKDF2_UTF8(password, salt, iterations, keyLength, expected) 150 char[] password = ("All n-entities must communicate with other " local 175 char[] password = "\\u0141\\u0142".toCharArray(); local [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
ResetPasswordTest.java | 28 * <p>These tests verify that the device password: 42 * Test: a Device Owner or (un-managed) Profile Owner can create, change and remove a password. 49 * Test: a managed Profile Owner can create and change, but not remove, a password. 57 * password when FBE is locked. 73 private void assertResetPasswordEnabled(boolean enabled, String password) { 76 passwordChanged = mDevicePolicyManager.resetPassword(password, 0); 85 assertTrue("Failed to change password", passwordChanged); 87 assertFalse("Failed to prevent password change", passwordChanged);
|
/developers/build/prebuilts/gradle/AutofillFramework/kotlinApp/Application/src/main/java/com/example/android/autofillframework/app/ |
StandardSignInActivity.kt | 50 val password = passwordField.text.toString() 51 val valid = isValidCredentials(username, password) 65 fun isValidCredentials(username: String, password: String): Boolean { 66 return username == password
|
/developers/samples/android/input/autofill/AutofillFramework/kotlinApp/Application/src/main/java/com/example/android/autofillframework/app/ |
StandardSignInActivity.kt | 50 val password = passwordField.text.toString() 51 val valid = isValidCredentials(username, password) 65 fun isValidCredentials(username: String, password: String): Boolean { 66 return username == password
|
/external/curl/lib/ |
curl_ntlm_core.h | 68 const char *password, 73 const char *password,
|
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/command/ |
PassCommandHandler.java | 27 * <li>If the required password parameter is missing, then reply with 501</li>
30 * <li>If the specified password is not correct, then reply with 530</li>
40 String password = command.getRequiredParameter(0);
local 45 if (userAccount.isValidPassword(password)) {
|
/external/webrtc/webrtc/libjingle/xmpp/ |
plainsaslhandler.h | 23 PlainSaslHandler(const Jid & jid, const rtc::CryptString & password, 24 bool allow_plain) : jid_(jid), password_(password),
|
/packages/apps/KeyChain/support/src/com/android/keychain/tests/support/ |
IKeyChainServiceTestSupport.aidl | 34 boolean keystoreSetPassword(String password);
|
/cts/tests/autofillservice/src/android/autofillservice/cts/ |
VirtualContainerActivity.java | 35 * <li>Password 58 mPassword = mCustomView.addLine(ID_PASSWORD_LABEL, "Password", ID_PASSWORD, BLANK_VALUE); 72 void expectAutoFill(String username, String password) { 73 mExpectation = new FillExpectation(username, password); 95 private FillExpectation(String username, String password) { 97 ccPasswordWatcher = mPassword.new OneTimeLineWatcher(password);
|
LoginActivity.java | 39 * <li>Password EditText (id: "username", input-type textPassword) 90 mPasswordEditText = findViewById(R.id.password); 113 final String password = mPasswordEditText.getText().toString(); local 114 final boolean valid = username.equals(password) 115 || (TextUtils.isEmpty(username) && TextUtils.isEmpty(password)) 116 || password.contains(BACKDOOR_PASSWORD_SUBSTRING) 143 * Explicitly forces the AutofillManager to save the username and password. 156 void expectAutoFill(String username, String password) { 157 mExpectation = new FillExpectation(username, password); 172 * Sets the expectation for an autofill request (for password only), so it can be asserte [all...] |
/external/boringssl/src/crypto/evp/ |
pbkdf.c | 65 int PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, 75 if (!HMAC_Init_ex(&hctx, password, password_len, digest, NULL)) { 140 int PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len, 144 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
TrustedCertificateKeyStoreSpi.java | 39 public Key engineGetKey(String alias, char[] password) { 66 String alias, Key key, char[] password, Certificate[] chain) { 122 public void engineStore(OutputStream stream, char[] password) { 127 public void engineLoad(InputStream stream, char[] password) {
|
/external/curl/docs/cmdline-opts/ |
digest.d | 8 prevents the password from being sent over the wire in clear text. Use this in 9 combination with the normal --user option to set user name and password.
|
/external/lzma/CPP/7zip/UI/Console/ |
List.h | 19 bool &passwordEnabled, UString &password,
|
/frameworks/base/core/java/android/webkit/ |
WebViewDatabase.java | 26 * <li>Username/password pairs for web forms</li> 27 * <li>HTTP authentication username/password pairs</li> 42 * Gets whether there are any saved username/password pairs for web forms. 45 * @return true if there are any saved username/password pairs 54 * Clears any saved username/password pairs for web forms. 76 * and password stored in WebViewDatabase instance. The username and password are not read from 80 * The username and password used for http authentication might be cached in the network stack 98 * with the correct username and password. 100 * The embedder app can get the username and password any way it chooses, and does not have t [all...] |
/external/autotest/client/site_tests/enterprise_RemoraRequisition/ |
enterprise_RemoraRequisition.py | 35 user_id, password = utils.get_signin_credentials(os.path.join( 37 if not (user_id and password): 43 enrollment.RemoraEnrollment(cr.browser, user_id, password)
|
/external/autotest/client/site_tests/platform_CryptohomeMigrateChapsTokenClient/ |
platform_CryptohomeMigrateChapsTokenClient.py | 25 password = "test_password" 33 self._cryptohome_proxy.ensure_clean_cryptohome_for(user, password) 41 result = self._cryptohome_proxy.mount(user, password)
|
/external/libchrome/crypto/ |
ec_private_key.h | 60 const std::string& password, 71 const std::string& password, 96 // The |password| and |iterations| are used as inputs to the key derivation 102 bool ExportEncryptedPrivateKey(const std::string& password,
|