HomeSort by relevance Sort by last modified time
    Searched defs:PASSWORD (Results 1 - 25 of 102) sorted by null

1 2 3 4 5

  /external/autotest/client/common_lib/cros/network/
wifi_rack_constants.py 8 PASSWORD = 'chromeos'
  /external/curl/tests/libtest/
lib1507.c 32 #define PASSWORD "123qwerty"
70 curl_easy_setopt(curl, CURLOPT_PASSWORD, PASSWORD);
  /external/mockftpserver/MockFtpServer/src/test/java/org/mockftpserver/stub/example/
RemoteFile.java 32 public static final String PASSWORD = "password";
41 ftpClient.login(USERNAME, PASSWORD);
  /packages/apps/Settings/src/com/android/settings/password/
ScreenLockType.java 17 package com.android.settings.password;
40 PASSWORD(
59 * The highest quality for the given type of lock. For example, in the case of password, the
93 return ScreenLockType.PASSWORD;
  /external/droiddriver/src/io/appium/droiddriver/finders/
Attribute.java 30 PASSWORD("password"),
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
CachedSyntheticPasswordTests.java 40 * Run the synthetic password tests with caching enabled.
59 final String PASSWORD = "testSyntheticPasswordClearCredential-password";
62 initializeCredentialUnderSP(PASSWORD, PRIMARY_USER_ID);
64 // clear password
69 // set a new password
79 final String PASSWORD = "testSyntheticPasswordClearCredential-password";
82 initializeCredentialUnderSP(PASSWORD, PRIMARY_USER_ID);
84 // Untrusted change password
    [all...]
LockSettingsServiceTests.java 53 testCreateCredential(PRIMARY_USER_ID, "password", CREDENTIAL_TYPE_PASSWORD,
74 final String FAILED_MESSAGE = "Failed to enroll password";
75 initializeStorageWithCredential(PRIMARY_USER_ID, "password", CREDENTIAL_TYPE_PASSWORD, sid);
84 assertVerifyCredentials(PRIMARY_USER_ID, "password", CREDENTIAL_TYPE_PASSWORD, sid);
88 final String PASSWORD = "password";
89 initializeStorageWithCredential(PRIMARY_USER_ID, PASSWORD, CREDENTIAL_TYPE_PASSWORD, 1234);
90 mService.setLockCredential(null, CREDENTIAL_TYPE_NONE, PASSWORD,
134 // Change primary password and verify that profile SID remains
  /libcore/luni/src/test/java/libcore/javax/crypto/
SecretKeyFactoryTest.java 32 private static final char[] PASSWORD = "google".toCharArray();
53 // PBEKeySpecs password only constructor
67 KeySpec ks = new PBEKeySpec(PASSWORD);
88 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS);
108 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS, KEY_LENGTH);
119 test_PBKDF2_UTF8(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, expected);
120 test_PBKDF2_8BIT(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, expected);
129 char[] password = "password".toCharArray(); local
140 test_PBKDF2_UTF8(password, salt, iterations, keyLength, expected)
150 char[] password = ("All n-entities must communicate with other " local
175 char[] password = "\\u0141\\u0142".toCharArray(); local
    [all...]
  /external/autotest/client/cros/enterprise/
enterprise_policy_base.py 52 # Username and password for the fake dm server can be anything, since
55 PASSWORD = 'fakepassword'
79 username=USERNAME, password=PASSWORD, gaia_id=GAIA_ID):
85 @param password: String password login credential.
92 self.password = password
117 logging.info(' Password: %r', self.password)
    [all...]
  /external/libmicrohttpd/doc/examples/
tlsauthentication.c 20 #define PASSWORD "and his password"
155 const char *username, const char *password)
170 expected = malloc (strlen (username) + 1 + strlen (password) + 1);
176 strcat (expected, password);
226 if (!is_authenticated (connection, USER, PASSWORD))
  /packages/apps/Contacts/tests/src/com/android/contacts/tests/testauth/
TestAuthenticator.java 34 private static final String PASSWORD = "xxx"; // any string will do.
72 AccountManager.get(mContext).addAccountExplicitly(account, PASSWORD, null);
  /packages/apps/TvSettings/Settings/src/com/android/tv/settings/connectivity/setup/
UserChoiceInfo.java 34 public static final int PASSWORD = 2;
40 PASSWORD,
167 * Determine whether the password is hidden.
176 * Set whether the password is hidden.
  /test/framework/harnesses/host_controller/build/
build_provider_pab.py 69 PASSWORD: string, password constant for userinfo JSON
74 _userinfo_file: location of file containing email and password
100 PASSWORD = 'password'
117 "email" and "password" string fields.
121 # this should be a JSON file with "email" and "password" string fields
146 def GetXSRFToken(self, email=None, password=None):
147 """Get XSRF token. Prompt if email/password not provided.
151 password: string, optional. Password of user logging i
    [all...]
  /cts/tests/tests/net/src/android/net/wifi/cts/
WifiEnterpriseConfigTest.java 40 private static final String PASSWORD = "password";
807 final String password = "PasswordIsNotOkayToBeDisplayedHere"; local
    [all...]
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Tools/faqwiz/
faqconf.py 19 PASSWORD = "" # Password for editing
371 <TD>Password:
372 <TD><INPUT TYPE=password SIZE=20 NAME=password VALUE="%(password)s">
403 NEED_PASSWD = "<LI>You must provide the correct password.\n"
535 <LI>The Password field contains the proper password.
541 <H2>What is the password?</H2>
    [all...]
  /external/autotest/client/cros/
vpn_server.py 122 '%(xauth-user)s : XAUTH "%(xauth-password)s"\n',
185 'xauth-password': self.XAUTH_PASSWORD,
231 PASSWORD = 'password'
243 EXPECTED_AUTHENTICATION_FILE : '%(username)s\n%(password)s\n',
283 'password': self.PASSWORD,
  /external/python/cpython2/Tools/faqwiz/
faqconf.py 19 PASSWORD = "" # Password for editing
371 <TD>Password:
372 <TD><INPUT TYPE=password SIZE=20 NAME=password VALUE="%(password)s">
403 NEED_PASSWD = "<LI>You must provide the correct password.\n"
535 <LI>The Password field contains the proper password.
541 <H2>What is the password?</H2
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
X509KeyManagerTest.java 27 private static final char[] PASSWORD = "1234".toCharArray();
    [all...]
  /packages/apps/Settings/src/com/android/settings/security/
CryptKeeperSettings.java 43 import com.android.settings.password.ChooseLockSettingsHelper;
44 import com.android.settings.password.ConfirmLockPattern;
49 private static final String PASSWORD = "password";
89 * is no keyguard available, we prompt the user to set a password.
95 // TODO replace (or follow) this dialog with an explicit launch into password UI
195 String password = data.getStringExtra(ChooseLockSettingsHelper.EXTRA_KEY_PASSWORD); local
196 if (!TextUtils.isEmpty(password)) {
197 showFinalConfirmation(type, password);
202 private void showFinalConfirmation(int type, String password) {
    [all...]
  /cts/tests/tests/carrierapi/src/android/carrierapi/cts/
ApnDatabaseTest.java 64 private static final String PASSWORD = "password";
83 put(Carriers.PASSWORD, PASSWORD);
  /developers/build/prebuilts/gradle/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/
FingerprintAuthenticationDialogFragment.java 55 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password
122 mPassword = (EditText) v.findViewById(R.id.password);
135 // (password) screen.
174 * Switches to backup (password) screen. This either can happen when fingerprint is not
175 * available or the user chooses to use the password authentication method by pressing the
179 mStage = Stage.PASSWORD;
209 mStoreBackend.enroll("user", "password", verificationKey);
217 * Checks whether the current entered password is correct, and dismisses the the dialog and lets
259 case PASSWORD:
318 PASSWORD
    [all...]
  /developers/build/prebuilts/gradle/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/
FingerprintAuthenticationDialogFragment.java 38 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password
97 mPassword = (EditText) v.findViewById(R.id.password);
111 // (password) screen.
152 * Switches to backup (password) screen. This either can happen when fingerprint is not
153 * available or the user chooses to use the password authentication method by pressing the
157 mStage = Stage.PASSWORD;
169 * Checks whether the current entered password is correct, and dismisses the the dialog and
194 * @return true if {@code password} is correct, false otherwise
196 private boolean checkPassword(String password) {
197 // Assume the password is always correct
    [all...]
  /developers/samples/android/security/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/
FingerprintAuthenticationDialogFragment.java 55 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password
122 mPassword = (EditText) v.findViewById(R.id.password);
135 // (password) screen.
174 * Switches to backup (password) screen. This either can happen when fingerprint is not
175 * available or the user chooses to use the password authentication method by pressing the
179 mStage = Stage.PASSWORD;
209 mStoreBackend.enroll("user", "password", verificationKey);
217 * Checks whether the current entered password is correct, and dismisses the the dialog and lets
259 case PASSWORD:
318 PASSWORD
    [all...]
  /developers/samples/android/security/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/
FingerprintAuthenticationDialogFragment.java 38 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password
97 mPassword = (EditText) v.findViewById(R.id.password);
111 // (password) screen.
152 * Switches to backup (password) screen. This either can happen when fingerprint is not
153 * available or the user chooses to use the password authentication method by pressing the
157 mStage = Stage.PASSWORD;
169 * Checks whether the current entered password is correct, and dismisses the the dialog and
194 * @return true if {@code password} is correct, false otherwise
196 private boolean checkPassword(String password) {
197 // Assume the password is always correct
    [all...]
  /development/samples/browseable/AsymmetricFingerprintDialog/src/com.example.android.asymmetricfingerprintdialog/
FingerprintAuthenticationDialogFragment.java 55 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password
122 mPassword = (EditText) v.findViewById(R.id.password);
135 // (password) screen.
174 * Switches to backup (password) screen. This either can happen when fingerprint is not
175 * available or the user chooses to use the password authentication method by pressing the
179 mStage = Stage.PASSWORD;
209 mStoreBackend.enroll("user", "password", verificationKey);
217 * Checks whether the current entered password is correct, and dismisses the the dialog and lets
259 case PASSWORD:
318 PASSWORD
    [all...]

Completed in 1770 milliseconds

1 2 3 4 5