HomeSort by relevance Sort by last modified time
    Searched full:passwords (Results 1 - 25 of 444) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/e2fsprogs/lib/et/test_cases/
continuation.et 4 "New password was found in a dictionary of possible passwords and\n\
continuation.c 11 N_("New password was found in a dictionary of possible passwords and\ntherefore may be easily guessed. Please choose another password.\nSee the ovpasswd man page for help in choosing a good password."),
  /tools/apksig/src/apksigner/java/com/android/apksigner/
PasswordRetriever.java 39 * Retriever of passwords based on password specs supported by {@code apksigner} tool.
41 * <p>apksigner supports retrieving multiple passwords from the same source (e.g., file, standard
46 * {@link #getPasswords(String, String, Charset...)} to retrieve passwords, and then invoke
64 * Returns the passwords described by the provided spec. The reason there may be more than one
66 * use the form of passwords encoded using the console's character encoding or the JVM default
79 * <p>When the same file (including standard input) is used for providing multiple passwords,
80 * the passwords are read from the file one line at a time.
92 // IMPLEMENTATION NOTE: Java KeyStore and PBEKeySpec APIs take passwords as arrays of
94 // jarsigner in some cases use passwords which are the encoded form obtained using the
200 List<char[]> passwords = new ArrayList<>(3) local
214 List<char[]> passwords = new ArrayList<>(4); local
    [all...]
  /external/syslinux/com32/cmenu/libmenu/
passwords.h 8 // Initialise the list of of user passwords permissions from file
  /prebuilts/jdk/jdk8/darwin-x86/sample/jmx/jmx-scandir/src/etc/
password.properties 6 # file defines the different roles and their passwords. The access
20 # Since there are cleartext passwords stored in this file,
34 # contain spaces or tabs. Note that passwords appear in the clear in
35 # this file, so it is a good idea not to use valuable passwords.
  /prebuilts/jdk/jdk8/linux-x86/sample/jmx/jmx-scandir/src/etc/
password.properties 6 # file defines the different roles and their passwords. The access
20 # Since there are cleartext passwords stored in this file,
34 # contain spaces or tabs. Note that passwords appear in the clear in
35 # this file, so it is a good idea not to use valuable passwords.
  /external/python/cpython2/Doc/library/
crypt.rst 2 :mod:`crypt` --- Function to check Unix passwords
7 :synopsis: The crypt() function used to check Unix passwords.
20 accept typed passwords from the user, or attempting to crack Unix passwords with
56 "Sorry, currently no support for shadow passwords")
netrc.rst 28 If no argument is specified on a POSIX system, the presence of passwords in
83 Passwords are limited to a subset of the ASCII character set. Versions of
85 ASCII punctuation is allowed in passwords. However, note that whitespace and
86 non-printable characters are not allowed in passwords. This is a limitation
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
UserCredentialHash.java 8 * hash rather than plain text passwords because it offers better security.
  /external/python/cpython3/Doc/library/
netrc.rst 26 If no argument is specified on a POSIX system, the presence of passwords in
81 Passwords are limited to a subset of the ASCII character set. All ASCII
82 punctuation is allowed in passwords, however, note that whitespace and
83 non-printable characters are not allowed in passwords. This is a limitation
crypt.rst 1 :mod:`crypt` --- Function to check Unix passwords
6 :synopsis: The crypt() function used to check Unix passwords.
22 page for further details. Possible uses include storing hashed passwords
23 so you can check passwords without storing the actual password, or attempting
24 to crack Unix passwords with a dictionary.
142 raise ValueError('no support for shadow passwords')
  /external/selinux/policycoreutils/run_init/
run_init.8 19 /etc/shadow - encrypted passwords and age information
  /prebuilts/jdk/jdk8/darwin-x86/jre/lib/management/
jmxremote.password.template 17 # file defines the different roles and their passwords. The access
31 # Since there are cleartext passwords stored in this file,
45 # contain spaces or tabs. Note that passwords appear in the clear in
46 # this file, so it is a good idea not to use valuable passwords.
  /prebuilts/jdk/jdk8/linux-x86/jre/lib/management/
jmxremote.password.template 17 # file defines the different roles and their passwords. The access
31 # Since there are cleartext passwords stored in this file,
45 # contain spaces or tabs. Note that passwords appear in the clear in
46 # this file, so it is a good idea not to use valuable passwords.
  /prebuilts/jdk/jdk9/darwin-x86/conf/management/
jmxremote.password.template 17 # file defines the different roles and their passwords. The access
31 # Since there are cleartext passwords stored in this file,
45 # contain spaces or tabs. Note that passwords appear in the clear in
46 # this file, so it is a good idea not to use valuable passwords.
  /prebuilts/jdk/jdk9/linux-x86/conf/management/
jmxremote.password.template 17 # file defines the different roles and their passwords. The access
31 # Since there are cleartext passwords stored in this file,
45 # contain spaces or tabs. Note that passwords appear in the clear in
46 # this file, so it is a good idea not to use valuable passwords.
  /external/kernel-headers/original/uapi/linux/
sed-opal.h 90 * passwords we need to set them via ADMIN authority.
91 * After passwords are changed, we can set them via,
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/net/
PasswordAuthenticationTest.java 37 assertTrue("Passwords not equal length",
40 assertTrue("Passwords not equal",
  /system/tpm/tpm_manager/server/
tpm2_initializer_impl.h 41 // lockout passwords, intializes the SRK with empty authorization, and persists
42 // the passwords to disk until all the owner dependencies are satisfied.
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
PKCS12Key.java 25 * passwords.
PKCS12KeyWithParameters.java 35 * zero length passwords.
  /external/selinux/python/sepolicy/sepolicy/help/
lockdown_ptrace.txt 6 Most people do not realize that any program they run can examine the memory of any other process run by them. Meaning the computer game you are running on your desktop can watch everything going on in Firefox or a programs like pwsafe or kinit or other program that attempts to hide passwords..
  /external/syslinux/gpxe/src/util/
mucurses_test.c 56 mvwprintw( secret, 10, 3, "Passwords do not match" );
  /external/vboot_reference/utility/
tpm-dad-lock 16 echo "please use random, non-empty passwords"
  /frameworks/base/core/java/android/text/method/
TransformationMethod.java 24 * characters of passwords with dots, or keeping the newline characters

Completed in 675 milliseconds

1 2 3 4 5 6 7 8 91011>>