/external/e2fsprogs/lib/et/test_cases/ |
continuation.et | 4 "New password was found in a dictionary of possible passwords and\n\
|
continuation.c | 11 N_("New password was found in a dictionary of possible passwords and\ntherefore may be easily guessed. Please choose another password.\nSee the ovpasswd man page for help in choosing a good password."),
|
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
PasswordRetriever.java | 39 * Retriever of passwords based on password specs supported by {@code apksigner} tool. 41 * <p>apksigner supports retrieving multiple passwords from the same source (e.g., file, standard 46 * {@link #getPasswords(String, String, Charset...)} to retrieve passwords, and then invoke 64 * Returns the passwords described by the provided spec. The reason there may be more than one 66 * use the form of passwords encoded using the console's character encoding or the JVM default 79 * <p>When the same file (including standard input) is used for providing multiple passwords, 80 * the passwords are read from the file one line at a time. 92 // IMPLEMENTATION NOTE: Java KeyStore and PBEKeySpec APIs take passwords as arrays of 94 // jarsigner in some cases use passwords which are the encoded form obtained using the 200 List<char[]> passwords = new ArrayList<>(3) local 214 List<char[]> passwords = new ArrayList<>(4); local [all...] |
/external/syslinux/com32/cmenu/libmenu/ |
passwords.h | 8 // Initialise the list of of user passwords permissions from file
|
/prebuilts/jdk/jdk8/darwin-x86/sample/jmx/jmx-scandir/src/etc/ |
password.properties | 6 # file defines the different roles and their passwords. The access 20 # Since there are cleartext passwords stored in this file, 34 # contain spaces or tabs. Note that passwords appear in the clear in 35 # this file, so it is a good idea not to use valuable passwords.
|
/prebuilts/jdk/jdk8/linux-x86/sample/jmx/jmx-scandir/src/etc/ |
password.properties | 6 # file defines the different roles and their passwords. The access 20 # Since there are cleartext passwords stored in this file, 34 # contain spaces or tabs. Note that passwords appear in the clear in 35 # this file, so it is a good idea not to use valuable passwords.
|
/external/python/cpython2/Doc/library/ |
crypt.rst | 2 :mod:`crypt` --- Function to check Unix passwords 7 :synopsis: The crypt() function used to check Unix passwords. 20 accept typed passwords from the user, or attempting to crack Unix passwords with 56 "Sorry, currently no support for shadow passwords")
|
netrc.rst | 28 If no argument is specified on a POSIX system, the presence of passwords in 83 Passwords are limited to a subset of the ASCII character set. Versions of 85 ASCII punctuation is allowed in passwords. However, note that whitespace and 86 non-printable characters are not allowed in passwords. This is a limitation
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
UserCredentialHash.java | 8 * hash rather than plain text passwords because it offers better security.
|
/external/python/cpython3/Doc/library/ |
netrc.rst | 26 If no argument is specified on a POSIX system, the presence of passwords in 81 Passwords are limited to a subset of the ASCII character set. All ASCII 82 punctuation is allowed in passwords, however, note that whitespace and 83 non-printable characters are not allowed in passwords. This is a limitation
|
crypt.rst | 1 :mod:`crypt` --- Function to check Unix passwords 6 :synopsis: The crypt() function used to check Unix passwords. 22 page for further details. Possible uses include storing hashed passwords 23 so you can check passwords without storing the actual password, or attempting 24 to crack Unix passwords with a dictionary. 142 raise ValueError('no support for shadow passwords')
|
/external/selinux/policycoreutils/run_init/ |
run_init.8 | 19 /etc/shadow - encrypted passwords and age information
|
/prebuilts/jdk/jdk8/darwin-x86/jre/lib/management/ |
jmxremote.password.template | 17 # file defines the different roles and their passwords. The access 31 # Since there are cleartext passwords stored in this file, 45 # contain spaces or tabs. Note that passwords appear in the clear in 46 # this file, so it is a good idea not to use valuable passwords.
|
/prebuilts/jdk/jdk8/linux-x86/jre/lib/management/ |
jmxremote.password.template | 17 # file defines the different roles and their passwords. The access 31 # Since there are cleartext passwords stored in this file, 45 # contain spaces or tabs. Note that passwords appear in the clear in 46 # this file, so it is a good idea not to use valuable passwords.
|
/prebuilts/jdk/jdk9/darwin-x86/conf/management/ |
jmxremote.password.template | 17 # file defines the different roles and their passwords. The access 31 # Since there are cleartext passwords stored in this file, 45 # contain spaces or tabs. Note that passwords appear in the clear in 46 # this file, so it is a good idea not to use valuable passwords.
|
/prebuilts/jdk/jdk9/linux-x86/conf/management/ |
jmxremote.password.template | 17 # file defines the different roles and their passwords. The access 31 # Since there are cleartext passwords stored in this file, 45 # contain spaces or tabs. Note that passwords appear in the clear in 46 # this file, so it is a good idea not to use valuable passwords.
|
/external/kernel-headers/original/uapi/linux/ |
sed-opal.h | 90 * passwords we need to set them via ADMIN authority. 91 * After passwords are changed, we can set them via,
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/net/ |
PasswordAuthenticationTest.java | 37 assertTrue("Passwords not equal length", 40 assertTrue("Passwords not equal",
|
/system/tpm/tpm_manager/server/ |
tpm2_initializer_impl.h | 41 // lockout passwords, intializes the SRK with empty authorization, and persists 42 // the passwords to disk until all the owner dependencies are satisfied.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKCS12Key.java | 25 * passwords.
|
PKCS12KeyWithParameters.java | 35 * zero length passwords.
|
/external/selinux/python/sepolicy/sepolicy/help/ |
lockdown_ptrace.txt | 6 Most people do not realize that any program they run can examine the memory of any other process run by them. Meaning the computer game you are running on your desktop can watch everything going on in Firefox or a programs like pwsafe or kinit or other program that attempts to hide passwords..
|
/external/syslinux/gpxe/src/util/ |
mucurses_test.c | 56 mvwprintw( secret, 10, 3, "Passwords do not match" );
|
/external/vboot_reference/utility/ |
tpm-dad-lock | 16 echo "please use random, non-empty passwords"
|
/frameworks/base/core/java/android/text/method/ |
TransformationMethod.java | 24 * characters of passwords with dots, or keeping the newline characters
|