Home
last modified time | relevance | path

Searched full:password (Results 1 – 25 of 8776) sorted by relevance

12345678910>>...352

/aosp_15_r20/external/python/cpython3/Lib/test/
Dtest_netrc.py28 machine host.domain.com password pass1 login log1 account acct1
29 default login log2 password pass2 account acct2
36 machine host.domain.com login log1 password pass1 account acct1
37 default login log2 password pass2 account acct2
65 "machine host.domain.com password",
67 "machine host.domain.com login \"\" password",
68 "machine host.domain.com account \"\" password"
77 "default password",
79 "default login \"\" password",
80 "default account \"\" password"
[all …]
/aosp_15_r20/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/compliance/
DVapeInteropTest.py52 self.password = utils.rand_ascii_str(
56 password=self.password,
97 password=self.password)
100 target_pwd=self.password,
118 password=self.password)
121 target_pwd=self.password,
139 password=self.password)
142 target_pwd=self.password,
160 password=self.password)
163 target_pwd=self.password,
[all …]
DWlanSecurityComplianceABGTest.py102 password = generate_random_password(
105 password = str(
110 password = generate_random_password(length=5)
112 password = generate_random_password(length=13)
114 password = str(generate_random_password(length=10,
117 password = str(generate_random_password(length=26,
121 password = utf8_password_2g_french
123 password = utf8_password_2g_german
125 password = utf8_password_2g_dutch
127 password = utf8_password_2g_swedish
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/url/tests/
Durltestdata.json11 "password": "", string
26 "password": "pass", string
41 "password": "", string
56 "password": "", string
71 "password": "", string
86 "password": "", string
101 "password": "", string
116 "password": "", string
131 "password": "", string
146 "password": "", string
[all …]
/aosp_15_r20/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/functional/
DWlanTargetSecurityTest.py73 Tuple, (ssid, password). Returns a password even if for open
79 password = utils.rand_ascii_str(13)
84 password=password)
92 return (ssid, password)
100 ssid, password = self.setup_ap()
104 target_pwd=password),
108 ssid, password = self.setup_ap()
112 target_pwd=password),
116 ssid, password = self.setup_ap()
120 target_pwd=password),
[all …]
/aosp_15_r20/hardware/interfaces/gatekeeper/aidl/vts/functional/
H A DVtsHalGatekeeperTargetTest.cpp100 void generatePassword(std::vector<uint8_t>& password, uint8_t seed) { in generatePassword() argument
101 password.resize(16); in generatePassword()
102 memset(password.data(), seed, password.size()); in generatePassword()
132 void enrollNewPassword(std::vector<uint8_t>& password, GatekeeperEnrollResponse& rsp, in enrollNewPassword() argument
135 req.newPwd = password; in enrollNewPassword()
140 void verifyPassword(std::vector<uint8_t>& password, std::vector<uint8_t>& passwordHandle, in verifyPassword() argument
145 // build verify request for the same password (we want it to succeed) in verifyPassword()
146 verifyReq.newPwd = password; in verifyPassword()
147 // use enrolled password handle we've got in verifyPassword()
181 * Ensure we can enroll new password
[all …]
/aosp_15_r20/hardware/interfaces/gatekeeper/1.0/vts/functional/
H A DVtsHalGatekeeperV1_0TargetTest.cpp132 void generatePassword(hidl_vec<uint8_t> &password, uint8_t seed) { in generatePassword() argument
133 password.resize(16); in generatePassword()
134 memset(password.data(), seed, password.size()); in generatePassword()
163 void enrollNewPassword(hidl_vec<uint8_t> &password, GatekeeperResponse &rsp, in enrollNewPassword() argument
166 req.newPwd.setToExternal(password.data(), password.size()); in enrollNewPassword()
171 void verifyPassword(hidl_vec<uint8_t> &password, in verifyPassword() argument
176 // build verify request for the same password (we want it to succeed) in verifyPassword()
177 verifyReq.newPwd = password; in verifyPassword()
178 // use enrolled password handle we've got in verifyPassword()
205 * Ensure we can enroll new password
[all …]
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/26/libcore/ojluni/src/main/java/javax/crypto/spec/
DPBEKeySpec.java32 * A user-chosen password that can be used with password-based encryption
35 * <p>The password can be viewed as some kind of raw key material, from which
38 * <p>Different PBE mechanisms may consume different bits of each password
44 * <p>You convert the password characters to a PBE key by creating an
47 * of each password character, whereas a secret-key factory for PKCS #12 will
53 * internal value when the password stored in it is no longer needed. Hence,
54 * this class requests the password as a char array, so it can be overwritten
66 private char[] password; field in PBEKeySpec
72 * Constructor that takes a password. An empty char[] is used if
75 * <p> Note: <code>password</code> is cloned before it is stored in
[all …]
/aosp_15_r20/libcore/ojluni/src/main/java/javax/crypto/spec/
H A DPBEKeySpec.java32 * A user-chosen password that can be used with password-based encryption
35 * <p>The password can be viewed as some kind of raw key material, from which
38 * <p>Different PBE mechanisms may consume different bits of each password
44 * <p>You convert the password characters to a PBE key by creating an
47 * of each password character, whereas a secret-key factory for PKCS #12 will
53 * internal value when the password stored in it is no longer needed. Hence,
54 * this class requests the password as a char array, so it can be overwritten
66 private char[] password; field in PBEKeySpec
72 * Constructor that takes a password. An empty char[] is used if
75 * <p> Note: <code>password</code> is cloned before it is stored in
[all …]
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/gensrcs/libcore/ojluni/src/main/java/javax/crypto/spec/
DPBEKeySpec.java32 * A user-chosen password that can be used with password-based encryption
35 * <p>The password can be viewed as some kind of raw key material, from which
38 * <p>Different PBE mechanisms may consume different bits of each password
44 * <p>You convert the password characters to a PBE key by creating an
47 * of each password character, whereas a secret-key factory for PKCS #12 will
53 * internal value when the password stored in it is no longer needed. Hence,
54 * this class requests the password as a char array, so it can be overwritten
66 private char[] password; field in PBEKeySpec
72 * Constructor that takes a password. An empty char[] is used if
75 * <p> Note: <code>password</code> is cloned before it is stored in
[all …]
/aosp_15_r20/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
H A DSyntheticPasswordTests.java106 final LockscreenCredential password = newPassword("user-password"); in testNonNoneLskfBasedProtector() local
107 final LockscreenCredential badPassword = newPassword("bad-password"); in testNonNoneLskfBasedProtector()
112 long protectorId = manager.createLskfBasedProtector(mGateKeeperService, password, sp, in testNonNoneLskfBasedProtector()
119 protectorId, password, USER_ID, null); in testNonNoneLskfBasedProtector()
166 mService.setLockCredential(newPassword("password"), nonePassword(), PRIMARY_USER_ID); in testNonEmptyFrpCredentialSyncedIfDeviceNotProvisioned()
172 final LockscreenCredential password = newPassword("password"); in testChangeCredential() local
175 initSpAndSetCredential(PRIMARY_USER_ID, password); in testChangeCredential()
177 mService.setLockCredential(newPassword, password, PRIMARY_USER_ID); in testChangeCredential()
185 LockscreenCredential password = newPassword("password"); in testVerifyCredential() local
188 initSpAndSetCredential(PRIMARY_USER_ID, password); in testVerifyCredential()
[all …]
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r530567b/python3/lib/python3.11/site-packages/pip/_internal/network/
Dauth.py41 password: str
54 def save_auth_info(self, url: str, username: str, password: str) -> None:
66 def save_auth_info(self, url: str, username: str, password: str) -> None:
88 return cred.username, cred.password
92 logger.debug("Getting password from keyring for %s", url)
93 password = self.keyring.get_password(url, username)
94 if password:
95 return username, password
98 def save_auth_info(self, url: str, username: str, password: str) -> None:
99 self.keyring.set_password(url, username, password)
[all …]
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r536225/python3/lib/python3.11/site-packages/pip/_internal/network/
Dauth.py41 password: str
54 def save_auth_info(self, url: str, username: str, password: str) -> None:
66 def save_auth_info(self, url: str, username: str, password: str) -> None:
88 return cred.username, cred.password
92 logger.debug("Getting password from keyring for %s", url)
93 password = self.keyring.get_password(url, username)
94 if password:
95 return username, password
98 def save_auth_info(self, url: str, username: str, password: str) -> None:
99 self.keyring.set_password(url, username, password)
[all …]
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r530567/python3/lib/python3.11/site-packages/pip/_internal/network/
Dauth.py41 password: str
54 def save_auth_info(self, url: str, username: str, password: str) -> None:
66 def save_auth_info(self, url: str, username: str, password: str) -> None:
88 return cred.username, cred.password
92 logger.debug("Getting password from keyring for %s", url)
93 password = self.keyring.get_password(url, username)
94 if password:
95 return username, password
98 def save_auth_info(self, url: str, username: str, password: str) -> None:
99 self.keyring.set_password(url, username, password)
[all …]
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r522817/python3/lib/python3.11/site-packages/pip/_internal/network/
Dauth.py41 password: str
54 def save_auth_info(self, url: str, username: str, password: str) -> None:
66 def save_auth_info(self, url: str, username: str, password: str) -> None:
88 return cred.username, cred.password
92 logger.debug("Getting password from keyring for %s", url)
93 password = self.keyring.get_password(url, username)
94 if password:
95 return username, password
98 def save_auth_info(self, url: str, username: str, password: str) -> None:
99 self.keyring.set_password(url, username, password)
[all …]
/aosp_15_r20/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan_policy/
DSavedNetworksTest.py42 PASSWORD = "password" variable
76 def save_bad_network(self, fd, ssid, security_type, password=""): argument
83 password: The password to save for the network. Empty string represents
84 no password, and PSK should be provided as 64 character hex string.
88 password=password):
105 "none", "password", or "psk".
157 def save_and_check_network(self, ssid, security_type, password=""): argument
164 password: The password of the network. PSK should be given as 64
169 ssid, security_type, password=password):
172 self.credentialType(password),
[all …]
/aosp_15_r20/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
H A DPBEKeySpecTest.java38 * PBEKeySpec(char[] password) method testing. Tests the behavior of
51 char[] password = new char[] {'1', '2', '3', '4', '5'}; in testPBEKeySpec1() local
52 PBEKeySpec pbeks = new PBEKeySpec(password); in testPBEKeySpec1()
53 password[0] ++; in testPBEKeySpec1()
54 assertFalse("The change of password specified in the constructor " in testPBEKeySpec1()
56 password[0] == pbeks.getPassword()[0]); in testPBEKeySpec1()
60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
66 char[] password = new char[] {'1', '2', '3', '4', '5'}; in testPBEKeySpec2() local
83 new PBEKeySpec(password, null, iterationCount, keyLength); in testPBEKeySpec2()
92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength); in testPBEKeySpec2()
[all …]
/aosp_15_r20/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/
H A DPBEParametersGenerator.java7 * super class for all Password Based Encryption (PBE) parameter generator classes.
12 protected byte[] password; field in PBEParametersGenerator
26 * @param password the password converted into bytes (see below).
27 * @param salt the salt to be mixed with the password.
32 byte[] password, in init() argument
36 this.password = password; in init()
42 * return the password byte array.
44 * @return the password byte array.
48 return password; in getPassword()
99 * converts a password to a byte array according to the scheme in
[all …]
/aosp_15_r20/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
H A DPBEParametersGenerator.java6 * super class for all Password Based Encryption (PBE) parameter generator classes.
10 protected byte[] password; field in PBEParametersGenerator
24 * @param password the password converted into bytes (see below).
25 * @param salt the salt to be mixed with the password.
30 byte[] password, in init() argument
34 this.password = password; in init()
40 * return the password byte array.
42 * @return the password byte array.
46 return password; in getPassword()
97 * converts a password to a byte array according to the scheme in
[all …]
/aosp_15_r20/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/crypto/
H A DPBEParametersGenerator.java7 * super class for all Password Based Encryption (PBE) parameter generator classes.
12 protected byte[] password; field in PBEParametersGenerator
26 * @param password the password converted into bytes (see below).
27 * @param salt the salt to be mixed with the password.
32 byte[] password, in init() argument
36 this.password = password; in init()
42 * return the password byte array.
44 * @return the password byte array.
48 return password; in getPassword()
99 * converts a password to a byte array according to the scheme in
[all …]
/aosp_15_r20/frameworks/base/packages/SystemUI/multivalentTests/src/com/android/systemui/bouncer/ui/viewmodel/
H A DPasswordBouncerViewModelTest.kt92 val password by collectLastValue(underTest.password) in onShown() constant
95 assertThat(password).isEmpty() in onShown()
97 assertThat(underTest.authenticationMethod).isEqualTo(AuthenticationMethodModel.Password) in onShown()
103 val password by collectLastValue(underTest.password) in onHidden_resetsPasswordInputAndMessage() constant
106 underTest.onPasswordInputChanged("password") in onHidden_resetsPasswordInputAndMessage()
107 assertThat(password).isNotEmpty() in onHidden_resetsPasswordInputAndMessage()
110 assertThat(password).isEmpty() in onHidden_resetsPasswordInputAndMessage()
117 val password by collectLastValue(underTest.password) in onPasswordInputChanged() constant
120 underTest.onPasswordInputChanged("password") in onPasswordInputChanged()
122 assertThat(password).isEqualTo("password") in onPasswordInputChanged()
[all …]
/aosp_15_r20/external/autotest/server/site_tests/firmware_Cr50Password/
H A Dfirmware_Cr50Password.py12 """Verify cr50 set password."""
18 """Check we can set the cr50 password."""
19 # Make sure to enable testlab mode, so we can guarantee the password
24 # Set the password.
27 raise error.TestFail('Failed to set password')
29 # Test 'ccd reset' clears the password.
32 raise error.TestFail('ccd reset did not clear the password')
34 # ccd with a console command if the password is set. This is cleared
38 # Set the password again while cr50 is open.
41 raise error.TestFail('Failed to set password')
[all …]
/aosp_15_r20/tools/test/connectivity/acts_tests/tests/google/wifi/
DWifiRoamingTest.py333 Change AP2's password.
334 DUT try roaming from AP1 to AP2 with mismatched password.
335 Change AP2's password back to original one.
354 # Change AP2 2G to password.
368 self.openwrt2.set_password(pwd_2g=ap2_network["password"])
379 network = {'SSID':'test_roaming_fail', 'password':'roam123456@'}
380 # AP2 network with incorrect password.
381 network_fail = {'SSID':'test_roaming_fail', 'password':'roam123456@#$%^'}
382 # Setup AP1 with the correct password.
386 # Setup AP2 with the incorrect password.
[all …]
/aosp_15_r20/libcore/ojluni/src/main/java/java/security/
H A DKeyStoreSpi.java59 * password to recover it. The key must have been associated with
65 * @param password the password for recovering the key
73 * (e.g., the given password is wrong).
75 public abstract Key engineGetKey(String alias, char[] password) in engineGetKey() argument
128 * password.
140 * @param password the password to protect the key
149 char[] password, in engineSetKeyEntry() argument
285 * integrity with the given password.
288 * @param password the password to generate the keystore integrity check
296 public abstract void engineStore(OutputStream stream, char[] password) in engineStore() argument
[all …]
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/13/libcore/ojluni/src/main/java/java/security/
DKeyStoreSpi.java59 * password to recover it. The key must have been associated with
65 * @param password the password for recovering the key
73 * (e.g., the given password is wrong).
75 public abstract Key engineGetKey(String alias, char[] password) in engineGetKey() argument
128 * password.
140 * @param password the password to protect the key
149 char[] password, in engineSetKeyEntry() argument
285 * integrity with the given password.
288 * @param password the password to generate the keystore integrity check
296 public abstract void engineStore(OutputStream stream, char[] password) in engineStore() argument
[all …]

12345678910>>...352