/aosp_15_r20/external/python/cpython3/Lib/test/ |
D | test_netrc.py | 28 machine host.domain.com password pass1 login log1 account acct1 29 default login log2 password pass2 account acct2 36 machine host.domain.com login log1 password pass1 account acct1 37 default login log2 password pass2 account acct2 65 "machine host.domain.com password", 67 "machine host.domain.com login \"\" password", 68 "machine host.domain.com account \"\" password" 77 "default password", 79 "default login \"\" password", 80 "default account \"\" password" [all …]
|
/aosp_15_r20/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/compliance/ |
D | VapeInteropTest.py | 52 self.password = utils.rand_ascii_str( 56 password=self.password, 97 password=self.password) 100 target_pwd=self.password, 118 password=self.password) 121 target_pwd=self.password, 139 password=self.password) 142 target_pwd=self.password, 160 password=self.password) 163 target_pwd=self.password, [all …]
|
D | WlanSecurityComplianceABGTest.py | 102 password = generate_random_password( 105 password = str( 110 password = generate_random_password(length=5) 112 password = generate_random_password(length=13) 114 password = str(generate_random_password(length=10, 117 password = str(generate_random_password(length=26, 121 password = utf8_password_2g_french 123 password = utf8_password_2g_german 125 password = utf8_password_2g_dutch 127 password = utf8_password_2g_swedish [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/url/tests/ |
D | urltestdata.json | 11 "password": "", string 26 "password": "pass", string 41 "password": "", string 56 "password": "", string 71 "password": "", string 86 "password": "", string 101 "password": "", string 116 "password": "", string 131 "password": "", string 146 "password": "", string [all …]
|
/aosp_15_r20/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/functional/ |
D | WlanTargetSecurityTest.py | 73 Tuple, (ssid, password). Returns a password even if for open 79 password = utils.rand_ascii_str(13) 84 password=password) 92 return (ssid, password) 100 ssid, password = self.setup_ap() 104 target_pwd=password), 108 ssid, password = self.setup_ap() 112 target_pwd=password), 116 ssid, password = self.setup_ap() 120 target_pwd=password), [all …]
|
/aosp_15_r20/hardware/interfaces/gatekeeper/aidl/vts/functional/ |
H A D | VtsHalGatekeeperTargetTest.cpp | 100 void generatePassword(std::vector<uint8_t>& password, uint8_t seed) { in generatePassword() argument 101 password.resize(16); in generatePassword() 102 memset(password.data(), seed, password.size()); in generatePassword() 132 void enrollNewPassword(std::vector<uint8_t>& password, GatekeeperEnrollResponse& rsp, in enrollNewPassword() argument 135 req.newPwd = password; in enrollNewPassword() 140 void verifyPassword(std::vector<uint8_t>& password, std::vector<uint8_t>& passwordHandle, in verifyPassword() argument 145 // build verify request for the same password (we want it to succeed) in verifyPassword() 146 verifyReq.newPwd = password; in verifyPassword() 147 // use enrolled password handle we've got in verifyPassword() 181 * Ensure we can enroll new password [all …]
|
/aosp_15_r20/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
H A D | VtsHalGatekeeperV1_0TargetTest.cpp | 132 void generatePassword(hidl_vec<uint8_t> &password, uint8_t seed) { in generatePassword() argument 133 password.resize(16); in generatePassword() 134 memset(password.data(), seed, password.size()); in generatePassword() 163 void enrollNewPassword(hidl_vec<uint8_t> &password, GatekeeperResponse &rsp, in enrollNewPassword() argument 166 req.newPwd.setToExternal(password.data(), password.size()); in enrollNewPassword() 171 void verifyPassword(hidl_vec<uint8_t> &password, in verifyPassword() argument 176 // build verify request for the same password (we want it to succeed) in verifyPassword() 177 verifyReq.newPwd = password; in verifyPassword() 178 // use enrolled password handle we've got in verifyPassword() 205 * Ensure we can enroll new password [all …]
|
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/26/libcore/ojluni/src/main/java/javax/crypto/spec/ |
D | PBEKeySpec.java | 32 * A user-chosen password that can be used with password-based encryption 35 * <p>The password can be viewed as some kind of raw key material, from which 38 * <p>Different PBE mechanisms may consume different bits of each password 44 * <p>You convert the password characters to a PBE key by creating an 47 * of each password character, whereas a secret-key factory for PKCS #12 will 53 * internal value when the password stored in it is no longer needed. Hence, 54 * this class requests the password as a char array, so it can be overwritten 66 private char[] password; field in PBEKeySpec 72 * Constructor that takes a password. An empty char[] is used if 75 * <p> Note: <code>password</code> is cloned before it is stored in [all …]
|
/aosp_15_r20/libcore/ojluni/src/main/java/javax/crypto/spec/ |
H A D | PBEKeySpec.java | 32 * A user-chosen password that can be used with password-based encryption 35 * <p>The password can be viewed as some kind of raw key material, from which 38 * <p>Different PBE mechanisms may consume different bits of each password 44 * <p>You convert the password characters to a PBE key by creating an 47 * of each password character, whereas a secret-key factory for PKCS #12 will 53 * internal value when the password stored in it is no longer needed. Hence, 54 * this class requests the password as a char array, so it can be overwritten 66 private char[] password; field in PBEKeySpec 72 * Constructor that takes a password. An empty char[] is used if 75 * <p> Note: <code>password</code> is cloned before it is stored in [all …]
|
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/gensrcs/libcore/ojluni/src/main/java/javax/crypto/spec/ |
D | PBEKeySpec.java | 32 * A user-chosen password that can be used with password-based encryption 35 * <p>The password can be viewed as some kind of raw key material, from which 38 * <p>Different PBE mechanisms may consume different bits of each password 44 * <p>You convert the password characters to a PBE key by creating an 47 * of each password character, whereas a secret-key factory for PKCS #12 will 53 * internal value when the password stored in it is no longer needed. Hence, 54 * this class requests the password as a char array, so it can be overwritten 66 private char[] password; field in PBEKeySpec 72 * Constructor that takes a password. An empty char[] is used if 75 * <p> Note: <code>password</code> is cloned before it is stored in [all …]
|
/aosp_15_r20/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | SyntheticPasswordTests.java | 106 final LockscreenCredential password = newPassword("user-password"); in testNonNoneLskfBasedProtector() local 107 final LockscreenCredential badPassword = newPassword("bad-password"); in testNonNoneLskfBasedProtector() 112 long protectorId = manager.createLskfBasedProtector(mGateKeeperService, password, sp, in testNonNoneLskfBasedProtector() 119 protectorId, password, USER_ID, null); in testNonNoneLskfBasedProtector() 166 mService.setLockCredential(newPassword("password"), nonePassword(), PRIMARY_USER_ID); in testNonEmptyFrpCredentialSyncedIfDeviceNotProvisioned() 172 final LockscreenCredential password = newPassword("password"); in testChangeCredential() local 175 initSpAndSetCredential(PRIMARY_USER_ID, password); in testChangeCredential() 177 mService.setLockCredential(newPassword, password, PRIMARY_USER_ID); in testChangeCredential() 185 LockscreenCredential password = newPassword("password"); in testVerifyCredential() local 188 initSpAndSetCredential(PRIMARY_USER_ID, password); in testVerifyCredential() [all …]
|
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r530567b/python3/lib/python3.11/site-packages/pip/_internal/network/ |
D | auth.py | 41 password: str 54 def save_auth_info(self, url: str, username: str, password: str) -> None: 66 def save_auth_info(self, url: str, username: str, password: str) -> None: 88 return cred.username, cred.password 92 logger.debug("Getting password from keyring for %s", url) 93 password = self.keyring.get_password(url, username) 94 if password: 95 return username, password 98 def save_auth_info(self, url: str, username: str, password: str) -> None: 99 self.keyring.set_password(url, username, password) [all …]
|
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r536225/python3/lib/python3.11/site-packages/pip/_internal/network/ |
D | auth.py | 41 password: str 54 def save_auth_info(self, url: str, username: str, password: str) -> None: 66 def save_auth_info(self, url: str, username: str, password: str) -> None: 88 return cred.username, cred.password 92 logger.debug("Getting password from keyring for %s", url) 93 password = self.keyring.get_password(url, username) 94 if password: 95 return username, password 98 def save_auth_info(self, url: str, username: str, password: str) -> None: 99 self.keyring.set_password(url, username, password) [all …]
|
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r530567/python3/lib/python3.11/site-packages/pip/_internal/network/ |
D | auth.py | 41 password: str 54 def save_auth_info(self, url: str, username: str, password: str) -> None: 66 def save_auth_info(self, url: str, username: str, password: str) -> None: 88 return cred.username, cred.password 92 logger.debug("Getting password from keyring for %s", url) 93 password = self.keyring.get_password(url, username) 94 if password: 95 return username, password 98 def save_auth_info(self, url: str, username: str, password: str) -> None: 99 self.keyring.set_password(url, username, password) [all …]
|
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r522817/python3/lib/python3.11/site-packages/pip/_internal/network/ |
D | auth.py | 41 password: str 54 def save_auth_info(self, url: str, username: str, password: str) -> None: 66 def save_auth_info(self, url: str, username: str, password: str) -> None: 88 return cred.username, cred.password 92 logger.debug("Getting password from keyring for %s", url) 93 password = self.keyring.get_password(url, username) 94 if password: 95 return username, password 98 def save_auth_info(self, url: str, username: str, password: str) -> None: 99 self.keyring.set_password(url, username, password) [all …]
|
/aosp_15_r20/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan_policy/ |
D | SavedNetworksTest.py | 42 PASSWORD = "password" variable 76 def save_bad_network(self, fd, ssid, security_type, password=""): argument 83 password: The password to save for the network. Empty string represents 84 no password, and PSK should be provided as 64 character hex string. 88 password=password): 105 "none", "password", or "psk". 157 def save_and_check_network(self, ssid, security_type, password=""): argument 164 password: The password of the network. PSK should be given as 64 169 ssid, security_type, password=password): 172 self.credentialType(password), [all …]
|
/aosp_15_r20/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
H A D | PBEKeySpecTest.java | 38 * PBEKeySpec(char[] password) method testing. Tests the behavior of 51 char[] password = new char[] {'1', '2', '3', '4', '5'}; in testPBEKeySpec1() local 52 PBEKeySpec pbeks = new PBEKeySpec(password); in testPBEKeySpec1() 53 password[0] ++; in testPBEKeySpec1() 54 assertFalse("The change of password specified in the constructor " in testPBEKeySpec1() 56 password[0] == pbeks.getPassword()[0]); in testPBEKeySpec1() 60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int 66 char[] password = new char[] {'1', '2', '3', '4', '5'}; in testPBEKeySpec2() local 83 new PBEKeySpec(password, null, iterationCount, keyLength); in testPBEKeySpec2() 92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength); in testPBEKeySpec2() [all …]
|
/aosp_15_r20/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/ |
H A D | PBEParametersGenerator.java | 7 * super class for all Password Based Encryption (PBE) parameter generator classes. 12 protected byte[] password; field in PBEParametersGenerator 26 * @param password the password converted into bytes (see below). 27 * @param salt the salt to be mixed with the password. 32 byte[] password, in init() argument 36 this.password = password; in init() 42 * return the password byte array. 44 * @return the password byte array. 48 return password; in getPassword() 99 * converts a password to a byte array according to the scheme in [all …]
|
/aosp_15_r20/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
H A D | PBEParametersGenerator.java | 6 * super class for all Password Based Encryption (PBE) parameter generator classes. 10 protected byte[] password; field in PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, in init() argument 34 this.password = password; in init() 40 * return the password byte array. 42 * @return the password byte array. 46 return password; in getPassword() 97 * converts a password to a byte array according to the scheme in [all …]
|
/aosp_15_r20/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/crypto/ |
H A D | PBEParametersGenerator.java | 7 * super class for all Password Based Encryption (PBE) parameter generator classes. 12 protected byte[] password; field in PBEParametersGenerator 26 * @param password the password converted into bytes (see below). 27 * @param salt the salt to be mixed with the password. 32 byte[] password, in init() argument 36 this.password = password; in init() 42 * return the password byte array. 44 * @return the password byte array. 48 return password; in getPassword() 99 * converts a password to a byte array according to the scheme in [all …]
|
/aosp_15_r20/frameworks/base/packages/SystemUI/multivalentTests/src/com/android/systemui/bouncer/ui/viewmodel/ |
H A D | PasswordBouncerViewModelTest.kt | 92 val password by collectLastValue(underTest.password) in onShown() constant 95 assertThat(password).isEmpty() in onShown() 97 assertThat(underTest.authenticationMethod).isEqualTo(AuthenticationMethodModel.Password) in onShown() 103 val password by collectLastValue(underTest.password) in onHidden_resetsPasswordInputAndMessage() constant 106 underTest.onPasswordInputChanged("password") in onHidden_resetsPasswordInputAndMessage() 107 assertThat(password).isNotEmpty() in onHidden_resetsPasswordInputAndMessage() 110 assertThat(password).isEmpty() in onHidden_resetsPasswordInputAndMessage() 117 val password by collectLastValue(underTest.password) in onPasswordInputChanged() constant 120 underTest.onPasswordInputChanged("password") in onPasswordInputChanged() 122 assertThat(password).isEqualTo("password") in onPasswordInputChanged() [all …]
|
/aosp_15_r20/external/autotest/server/site_tests/firmware_Cr50Password/ |
H A D | firmware_Cr50Password.py | 12 """Verify cr50 set password.""" 18 """Check we can set the cr50 password.""" 19 # Make sure to enable testlab mode, so we can guarantee the password 24 # Set the password. 27 raise error.TestFail('Failed to set password') 29 # Test 'ccd reset' clears the password. 32 raise error.TestFail('ccd reset did not clear the password') 34 # ccd with a console command if the password is set. This is cleared 38 # Set the password again while cr50 is open. 41 raise error.TestFail('Failed to set password') [all …]
|
/aosp_15_r20/tools/test/connectivity/acts_tests/tests/google/wifi/ |
D | WifiRoamingTest.py | 333 Change AP2's password. 334 DUT try roaming from AP1 to AP2 with mismatched password. 335 Change AP2's password back to original one. 354 # Change AP2 2G to password. 368 self.openwrt2.set_password(pwd_2g=ap2_network["password"]) 379 network = {'SSID':'test_roaming_fail', 'password':'roam123456@'} 380 # AP2 network with incorrect password. 381 network_fail = {'SSID':'test_roaming_fail', 'password':'roam123456@#$%^'} 382 # Setup AP1 with the correct password. 386 # Setup AP2 with the incorrect password. [all …]
|
/aosp_15_r20/libcore/ojluni/src/main/java/java/security/ |
H A D | KeyStoreSpi.java | 59 * password to recover it. The key must have been associated with 65 * @param password the password for recovering the key 73 * (e.g., the given password is wrong). 75 public abstract Key engineGetKey(String alias, char[] password) in engineGetKey() argument 128 * password. 140 * @param password the password to protect the key 149 char[] password, in engineSetKeyEntry() argument 285 * integrity with the given password. 288 * @param password the password to generate the keystore integrity check 296 public abstract void engineStore(OutputStream stream, char[] password) in engineStore() argument [all …]
|
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/13/libcore/ojluni/src/main/java/java/security/ |
D | KeyStoreSpi.java | 59 * password to recover it. The key must have been associated with 65 * @param password the password for recovering the key 73 * (e.g., the given password is wrong). 75 public abstract Key engineGetKey(String alias, char[] password) in engineGetKey() argument 128 * password. 140 * @param password the password to protect the key 149 char[] password, in engineSetKeyEntry() argument 285 * integrity with the given password. 288 * @param password the password to generate the keystore integrity check 296 public abstract void engineStore(OutputStream stream, char[] password) in engineStore() argument [all …]
|