/external/autotest/client/common_lib/cros/network/ |
wifi_rack_constants.py | 8 PASSWORD = 'chromeos'
|
/external/curl/tests/libtest/ |
lib1507.c | 32 #define PASSWORD "123qwerty" 70 curl_easy_setopt(curl, CURLOPT_PASSWORD, PASSWORD);
|
/external/mockftpserver/MockFtpServer/src/test/java/org/mockftpserver/stub/example/ |
RemoteFile.java | 32 public static final String PASSWORD = "password";
41 ftpClient.login(USERNAME, PASSWORD);
|
/packages/apps/Settings/src/com/android/settings/password/ |
ScreenLockType.java | 17 package com.android.settings.password; 40 PASSWORD( 59 * The highest quality for the given type of lock. For example, in the case of password, the 93 return ScreenLockType.PASSWORD;
|
/external/droiddriver/src/io/appium/droiddriver/finders/ |
Attribute.java | 30 PASSWORD("password"),
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
CachedSyntheticPasswordTests.java | 40 * Run the synthetic password tests with caching enabled. 59 final String PASSWORD = "testSyntheticPasswordClearCredential-password"; 62 initializeCredentialUnderSP(PASSWORD, PRIMARY_USER_ID); 64 // clear password 69 // set a new password 79 final String PASSWORD = "testSyntheticPasswordClearCredential-password"; 82 initializeCredentialUnderSP(PASSWORD, PRIMARY_USER_ID); 84 // Untrusted change password [all...] |
LockSettingsServiceTests.java | 53 testCreateCredential(PRIMARY_USER_ID, "password", CREDENTIAL_TYPE_PASSWORD, 74 final String FAILED_MESSAGE = "Failed to enroll password"; 75 initializeStorageWithCredential(PRIMARY_USER_ID, "password", CREDENTIAL_TYPE_PASSWORD, sid); 84 assertVerifyCredentials(PRIMARY_USER_ID, "password", CREDENTIAL_TYPE_PASSWORD, sid); 88 final String PASSWORD = "password"; 89 initializeStorageWithCredential(PRIMARY_USER_ID, PASSWORD, CREDENTIAL_TYPE_PASSWORD, 1234); 90 mService.setLockCredential(null, CREDENTIAL_TYPE_NONE, PASSWORD, 134 // Change primary password and verify that profile SID remains
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
SecretKeyFactoryTest.java | 32 private static final char[] PASSWORD = "google".toCharArray(); 53 // PBEKeySpecs password only constructor 67 KeySpec ks = new PBEKeySpec(PASSWORD); 88 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS); 108 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS, KEY_LENGTH); 119 test_PBKDF2_UTF8(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, expected); 120 test_PBKDF2_8BIT(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, expected); 129 char[] password = "password".toCharArray(); local 140 test_PBKDF2_UTF8(password, salt, iterations, keyLength, expected) 150 char[] password = ("All n-entities must communicate with other " local 175 char[] password = "\\u0141\\u0142".toCharArray(); local [all...] |
/external/autotest/client/cros/enterprise/ |
enterprise_policy_base.py | 52 # Username and password for the fake dm server can be anything, since 55 PASSWORD = 'fakepassword' 79 username=USERNAME, password=PASSWORD, gaia_id=GAIA_ID): 85 @param password: String password login credential. 92 self.password = password 117 logging.info(' Password: %r', self.password) [all...] |
/external/libmicrohttpd/doc/examples/ |
tlsauthentication.c | 20 #define PASSWORD "and his password" 155 const char *username, const char *password) 170 expected = malloc (strlen (username) + 1 + strlen (password) + 1); 176 strcat (expected, password); 226 if (!is_authenticated (connection, USER, PASSWORD))
|
/packages/apps/Contacts/tests/src/com/android/contacts/tests/testauth/ |
TestAuthenticator.java | 34 private static final String PASSWORD = "xxx"; // any string will do. 72 AccountManager.get(mContext).addAccountExplicitly(account, PASSWORD, null);
|
/packages/apps/TvSettings/Settings/src/com/android/tv/settings/connectivity/setup/ |
UserChoiceInfo.java | 34 public static final int PASSWORD = 2; 40 PASSWORD, 167 * Determine whether the password is hidden. 176 * Set whether the password is hidden.
|
/test/framework/harnesses/host_controller/build/ |
build_provider_pab.py | 69 PASSWORD: string, password constant for userinfo JSON 74 _userinfo_file: location of file containing email and password 100 PASSWORD = 'password' 117 "email" and "password" string fields. 121 # this should be a JSON file with "email" and "password" string fields 146 def GetXSRFToken(self, email=None, password=None): 147 """Get XSRF token. Prompt if email/password not provided. 151 password: string, optional. Password of user logging i [all...] |
/cts/tests/tests/net/src/android/net/wifi/cts/ |
WifiEnterpriseConfigTest.java | 40 private static final String PASSWORD = "password"; 807 final String password = "PasswordIsNotOkayToBeDisplayedHere"; local [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Tools/faqwiz/ |
faqconf.py | 19 PASSWORD = "" # Password for editing
371 <TD>Password:
372 <TD><INPUT TYPE=password SIZE=20 NAME=password VALUE="%(password)s">
403 NEED_PASSWD = "<LI>You must provide the correct password.\n"
535 <LI>The Password field contains the proper password.
541 <H2>What is the password?</H2> [all...] |
/external/autotest/client/cros/ |
vpn_server.py | 122 '%(xauth-user)s : XAUTH "%(xauth-password)s"\n', 185 'xauth-password': self.XAUTH_PASSWORD, 231 PASSWORD = 'password' 243 EXPECTED_AUTHENTICATION_FILE : '%(username)s\n%(password)s\n', 283 'password': self.PASSWORD,
|
/external/python/cpython2/Tools/faqwiz/ |
faqconf.py | 19 PASSWORD = "" # Password for editing 371 <TD>Password: 372 <TD><INPUT TYPE=password SIZE=20 NAME=password VALUE="%(password)s"> 403 NEED_PASSWD = "<LI>You must provide the correct password.\n" 535 <LI>The Password field contains the proper password. 541 <H2>What is the password?</H2 [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
X509KeyManagerTest.java | 27 private static final char[] PASSWORD = "1234".toCharArray(); [all...] |
/packages/apps/Settings/src/com/android/settings/security/ |
CryptKeeperSettings.java | 43 import com.android.settings.password.ChooseLockSettingsHelper; 44 import com.android.settings.password.ConfirmLockPattern; 49 private static final String PASSWORD = "password"; 89 * is no keyguard available, we prompt the user to set a password. 95 // TODO replace (or follow) this dialog with an explicit launch into password UI 195 String password = data.getStringExtra(ChooseLockSettingsHelper.EXTRA_KEY_PASSWORD); local 196 if (!TextUtils.isEmpty(password)) { 197 showFinalConfirmation(type, password); 202 private void showFinalConfirmation(int type, String password) { [all...] |
/cts/tests/tests/carrierapi/src/android/carrierapi/cts/ |
ApnDatabaseTest.java | 64 private static final String PASSWORD = "password"; 83 put(Carriers.PASSWORD, PASSWORD);
|
/developers/build/prebuilts/gradle/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 55 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password 122 mPassword = (EditText) v.findViewById(R.id.password); 135 // (password) screen. 174 * Switches to backup (password) screen. This either can happen when fingerprint is not 175 * available or the user chooses to use the password authentication method by pressing the 179 mStage = Stage.PASSWORD; 209 mStoreBackend.enroll("user", "password", verificationKey); 217 * Checks whether the current entered password is correct, and dismisses the the dialog and lets 259 case PASSWORD: 318 PASSWORD [all...] |
/developers/build/prebuilts/gradle/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 38 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password 97 mPassword = (EditText) v.findViewById(R.id.password); 111 // (password) screen. 152 * Switches to backup (password) screen. This either can happen when fingerprint is not 153 * available or the user chooses to use the password authentication method by pressing the 157 mStage = Stage.PASSWORD; 169 * Checks whether the current entered password is correct, and dismisses the the dialog and 194 * @return true if {@code password} is correct, false otherwise 196 private boolean checkPassword(String password) { 197 // Assume the password is always correct [all...] |
/developers/samples/android/security/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 55 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password 122 mPassword = (EditText) v.findViewById(R.id.password); 135 // (password) screen. 174 * Switches to backup (password) screen. This either can happen when fingerprint is not 175 * available or the user chooses to use the password authentication method by pressing the 179 mStage = Stage.PASSWORD; 209 mStoreBackend.enroll("user", "password", verificationKey); 217 * Checks whether the current entered password is correct, and dismisses the the dialog and lets 259 case PASSWORD: 318 PASSWORD [all...] |
/developers/samples/android/security/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 38 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password 97 mPassword = (EditText) v.findViewById(R.id.password); 111 // (password) screen. 152 * Switches to backup (password) screen. This either can happen when fingerprint is not 153 * available or the user chooses to use the password authentication method by pressing the 157 mStage = Stage.PASSWORD; 169 * Checks whether the current entered password is correct, and dismisses the the dialog and 194 * @return true if {@code password} is correct, false otherwise 196 private boolean checkPassword(String password) { 197 // Assume the password is always correct [all...] |
/development/samples/browseable/AsymmetricFingerprintDialog/src/com.example.android.asymmetricfingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 55 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password 122 mPassword = (EditText) v.findViewById(R.id.password); 135 // (password) screen. 174 * Switches to backup (password) screen. This either can happen when fingerprint is not 175 * available or the user chooses to use the password authentication method by pressing the 179 mStage = Stage.PASSWORD; 209 mStoreBackend.enroll("user", "password", verificationKey); 217 * Checks whether the current entered password is correct, and dismisses the the dialog and lets 259 case PASSWORD: 318 PASSWORD [all...] |