HomeSort by relevance Sort by last modified time
    Searched full:password (Results 1 - 25 of 4372) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_setpasswd/
00_Descriptions.txt 2 tpmtoken_setpasswd change user password
4 tpmtoken_setpasswd change security officer password
6 tpmtoken_setpasswd reset user password
8 tpmtoken_setpasswd reset security officer password
  /external/ltp/testcases/commands/tpm-tools/tpm/tpm_changeauth/
00_Descriptions.txt 2 tpm_changeownerauth changes the current owner password
4 tpm_changeownerauth changes the current SRK password
6 tpm_changeownerauth resets the owner and SRK password
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
PKCS12Key.java 6 * A password based key for use with PKCS#12.
11 private final char[] password; field in class:PKCS12Key
14 * Basic constructor for a password based key - secret key generation parameters will be passed separately..
16 * @param password password to use.
18 public PKCS12Key(char[] password)
20 this(password, false);
27 * @param password password to use.
30 public PKCS12Key(char[] password, boolean useWrongZeroLengthConversion
    [all...]
PKCS12KeyWithParameters.java 8 * A password based key for use with PKCS#12 with full PBE parameters.
18 * Basic constructor for a password based key with generation parameters.
20 * @param password password to use.
24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount)
26 super(password);
34 * Basic constructor for a password based key with generation parameters, specifying the wrong conversion for
37 * @param password password to use.
42 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount
    [all...]
  /external/dagger2/util/
settings.xml 6 <password>${env.CI_DEPLOY_PASSWORD}</password>
  /external/okhttp/.buildscript/
settings.xml 6 <password>${env.CI_DEPLOY_PASSWORD}</password>
  /packages/experimental/FilledApp/res/values/
strings.xml 6 <string name="password">Password</string>
  /tools/test/connectivity/acts/tests/google/wifi/
example_config.json 22 "password": "<your password>"
26 "password": "<your password>"
30 "password": "<your password>"
34 "password": "<your password>"
  /external/wpa_supplicant_8/hostapd/
hostapd.eap_user_sqlite 4 password TEXT,
14 INSERT INTO users(identity,methods,password,phase2) VALUES ('user','TTLS-MSCHAPV2','password',1);
15 INSERT INTO users(identity,methods,password,phase2) VALUES ('DOMAIN\mschapv2 user','TTLS-MSCHAPV2','password',1);
nt_password_hash.c 2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
PBEParametersGenerator.java 6 * super class for all Password Based Encryption (PBE) parameter generator classes.
10 protected byte[] password; field in class:PBEParametersGenerator
24 * @param password the password converted into bytes (see below).
25 * @param salt the salt to be mixed with the password.
30 byte[] password,
34 this.password = password;
40 * return the password byte array.
42 * @return the password byte array
    [all...]
  /device/linaro/bootloader/edk2/SecurityPkg/UserIdentification/PwdCredentialProviderDxe/
PwdCredentialProviderStrings.uni 2 String definitions for the Password Credential Provider.
18 #string STR_CREDENTIAL_TITLE #language en-US "Password Credential Provider"
19 #language fr-FR "Password Credential Provider (French)"
20 #string STR_FORM_TITLE #language en-US "Get Password"
21 #language fr-FR "Get Password(French)"
24 #string STR_INPUT_PASSWORD #language en-US "Please Input Password"
25 #language fr-FR "Please Input Password(French)"
26 #string STR_PROVIDER_NAME #language en-US "INTEL Password Credential Provider"
27 #language fr-FR "INTEL Password Credential Provider(French)"
28 #string STR_PROVIDER_TYPE_NAME #language en-US "Password Credential Provider"
    [all...]
  /external/curl/tests/unit/
unit1304.c 27 static char *password; variable
32 password = strdup("");
34 if(!password || !login) {
35 Curl_safefree(password);
44 Curl_safefree(password);
57 result = Curl_parsenetrc("test.example.com", &login, &password, filename);
59 abort_unless(password != NULL, "returned NULL!");
60 fail_unless(password[0] == 0, "password should not have been changed");
70 result = Curl_parsenetrc("example.com", &login, &password, filename)
141 free(password); variable
156 free(password); variable
174 free(password); variable
    [all...]
  /external/curl/docs/cmdline-opts/
tlspassword.d 2 Help: TLS password
5 Set password for use with the TLS authentication method specified with
socks5-basic.d 2 Help: Enable username/password auth for SOCKS5 proxies
5 Tells curl to use username/password authentication when connecting to a SOCKS5
6 proxy. The username/password authentication is enabled by default. Use
  /external/nanohttpd/
settings.xml 8 <password>${env.CI_DEPLOY_PASSWORD}</password>
  /packages/experimental/FillService/res/values/
strings.xml 6 <string name="password">Password</string>
  /packages/apps/Settings/tests/robotests/assets/
grandfather_not_implementing_instrumentable 4 com.android.settings.password.ChooseLockPassword$SaveAndFinishWorker
5 com.android.settings.password.ChooseLockPattern$SaveAndFinishWorker
7 com.android.settings.password.ConfirmDeviceCredentialBaseFragment$LastTryDialog
8 com.android.settings.password.CredentialCheckResultTracker
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/res/xml/
device_admin.xml 3 <reset-password />
4 <limit-password />
5 <expire-password />
  /cts/hostsidetests/devicepolicy/app/TransferOwnerOutgoingApp/res/xml/
device_admin.xml 3 <limit-password/>
5 <reset-password/>
8 <expire-password/>
  /external/e2fsprogs/lib/et/test_cases/
continuation.et 4 "New password was found in a dictionary of possible passwords and\n\
5 therefore may be easily guessed. Please choose another password.\n\
6 See the ovpasswd man page for help in choosing a good password."
  /external/lzma/CPP/7zip/UI/FileManager/
PasswordDialog.rc 8 CAPTION "Enter password"
10 LTEXT "&Enter password:", IDT_PASSWORD_ENTER, m, m, xc, 8
12 CONTROL "&Show password", IDX_PASSWORD_SHOW, MY_CHECKBOX, m, 42, xc, 10
  /libcore/ojluni/src/main/java/javax/crypto/spec/
PBEKeySpec.java 31 * A user-chosen password that can be used with password-based encryption
34 * <p>The password can be viewed as some kind of raw key material, from which
37 * <p>Different PBE mechanisms may consume different bits of each password
43 * <p>You convert the password characters to a PBE key by creating an
46 * of each password character, whereas a secret-key factory for PKCS #12 will
52 * internal value when the password stored in it is no longer needed. Hence,
53 * this class requests the password as a char array, so it can be overwritten
65 private char[] password; field in class:PBEKeySpec
71 * Constructor that takes a password. An empty char[] is used i
    [all...]
  /external/python/cpython3/Modules/clinic/
_hashopenssl.c.h 8 "scrypt($module, /, password, *, salt=None, n=None, r=None, p=None,\n"
12 "scrypt password-based key derivation function.");
18 _hashlib_scrypt_impl(PyObject *module, Py_buffer *password, Py_buffer *salt,
26 static const char * const _keywords[] = {"password", "salt", "n", "r", "p", "maxmem", "dklen", NULL};
28 Py_buffer password = {NULL, NULL}; local
37 &password, &salt, &PyLong_Type, &n_obj, &PyLong_Type, &r_obj, &PyLong_Type, &p_obj, &maxmem, &dklen)) {
40 return_value = _hashlib_scrypt_impl(module, &password, &salt, n_obj, r_obj, p_obj, maxmem, dklen);
43 /* Cleanup for password */
44 if (password.obj) {
45 PyBuffer_Release(&password);
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/
PKCS12StoreParameter.java 13 public PKCS12StoreParameter(OutputStream out, char[] password)
15 super(out, password, false);
23 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding)
25 super(out, new KeyStore.PasswordProtection(password), forDEREncoding);

Completed in 316 milliseconds

1 2 3 4 5 6 7 8 91011>>