/frameworks/base/obex/javax/obex/ |
H A D | PasswordAuthentication.java | 36 * This class holds user name and password combinations. 47 * password provided. 49 * @param password the password to include in the response 50 * @throws NullPointerException if <code>password</code> is 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { argument 59 mPassword = new byte[password.length]; 60 System.arraycopy(password, 0, mPassword, 0, password.length); 73 * Retrieves the password [all...] |
H A D | ObexSession.java | 74 * and password to use. 132 * If no password is provided then we not resent the request 138 byte[] password = result.getPassword(); 139 if (password == null) { 163 byte[] digest = new byte[challenge.length + password.length + 1]; 165 // Insert colon between challenge and password 167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 194 // get the correct password from the application
|
/frameworks/base/keystore/java/android/security/ |
H A D | KeyStore.java | 118 public boolean password(byte[] oldPassword, byte[] newPassword) { method in class:KeyStore 123 public boolean password(String oldPassword, String newPassword) { method in class:KeyStore 124 return password(getBytes(oldPassword), getBytes(newPassword)); 127 public boolean password(byte[] password) { argument 128 return password(password, password); 131 public boolean password(String password) { argument 140 unlock(byte[] password) argument 145 unlock(String password) argument [all...] |
/frameworks/base/packages/VpnServices/src/com/android/server/vpn/ |
H A D | L2tpService.java | 28 protected void connect(String serverIp, String username, String password) argument 33 username, password);
|
H A D | PptpService.java | 28 protected void connect(String serverIp, String username, String password) argument 31 getDaemons().startPptp(serverIp, username, password,
|
H A D | L2tpIpsecPskService.java | 31 protected void connect(String serverIp, String username, String password) argument 45 username, password);
|
H A D | L2tpIpsecService.java | 31 protected void connect(String serverIp, String username, String password) argument 48 username, password);
|
H A D | VpnDaemons.java | 49 String username, String password) throws IOException { 50 return startMtpd(L2TP, serverIp, L2TP_PORT, secret, username, password, 55 String password, boolean encryption) throws IOException { 56 return startMtpd(PPTP, serverIp, PPTP_PORT, null, username, password, 120 String password, boolean encryption) throws IOException { 125 addPppArguments(args, serverIp, username, password, encryption); 133 String username, String password, boolean encryption) 138 "password", password, 48 startL2tp(String serverIp, String secret, String username, String password) argument 54 startPptp(String serverIp, String username, String password, boolean encryption) argument 118 startMtpd(String protocol, String serverIp, String port, String secret, String username, String password, boolean encryption) argument 132 addPppArguments(ArrayList<String> args, String serverIp, String username, String password, boolean encryption) argument
|
H A D | VpnServiceBinder.java | 63 public boolean connect(VpnProfile p, String username, String password) { 64 return VpnServiceBinder.this.connect(p, username, password); 111 final String username, final String password) { 117 s.onConnect(username, password); 110 connect(final VpnProfile p, final String username, final String password) argument
|
/frameworks/base/vpn/java/android/net/vpn/ |
H A D | IVpnService.aidl | 30 * @param password the corresponding password for authentication 32 boolean connect(in VpnProfile profile, String username, String password);
|
/frameworks/base/keystore/tests/src/android/security/ |
H A D | KeyStoreTest.java | 70 //assertFalse(mKeyStore.password(TEST_EMPTY_PASSWD)); 71 //assertFalse(mKeyStore.password(TEST_SHORT_PASSWD)); 73 assertTrue(mKeyStore.password(TEST_PASSWD)); 76 assertFalse(mKeyStore.password(TEST_PASSWD2, TEST_PASSWD2)); 77 //assertFalse(mKeyStore.password(TEST_PASSWD, TEST_SHORT_PASSWD)); 79 assertTrue(mKeyStore.password(TEST_PASSWD, TEST_PASSWD2)); 85 mKeyStore.password(TEST_PASSWD); 92 mKeyStore.password(TEST_I18N); 99 mKeyStore.password(TEST_PASSWD); 109 mKeyStore.password(TEST_PASSW [all...] |
/frameworks/base/core/java/android/webkit/ |
H A D | HttpAuthHandler.java | 87 String password = msg.getData().getString("password"); 89 loader.handleAuthResponse(username, password); 106 * @param password The password to use for authentication 110 private boolean handleResponseForSynchronousRequest(String username, String password) { argument 117 mPassword = password; 137 * @param password The password to use for authentication 139 public void proceed(String username, String password) { argument 275 onReceivedCredentials(LoadListener loader, String host, String realm, String username, String password) argument [all...] |
H A D | FrameLoader.java | 375 String password; 379 password = mNetwork.getProxyPassword(); 381 if (username != null && password != null) { 386 username, password));
|
H A D | LoadListener.java | 142 String username, String password) { 147 username, password); 157 String username, String password) { 174 mPassword = password; 679 // password supplied in the URL, if present. 875 void handleAuthResponse(String username, String password) { argument 879 + " password: " + password); 881 if (username != null && password != null) { 882 makeAuthResponse(username, password); 138 getLoadListener(Context context, BrowserFrame frame, String url, int nativeLoader, boolean synchronous, boolean isMainPageLoader, boolean isMainResource, boolean userGesture, long postIdentifier, String username, String password) argument 154 LoadListener(Context context, BrowserFrame frame, String url, int nativeLoader, boolean synchronous, boolean isMainPageLoader, boolean isMainResource, boolean userGesture, long postIdentifier, String username, String password) argument 890 makeAuthResponse(String username, String password) argument [all...] |
/frameworks/base/core/java/android/net/http/ |
H A D | RequestHandle.java | 223 public void setupBasicAuthResponse(boolean isProxy, String username, String password) { argument 224 String response = computeBasicAuthResponse(username, password); 237 String password, 245 username, password, realm, nonce, QOP, algorithm, opaque); 272 * @return Basic-scheme authentication response: BASE64(username:password). 274 public static String computeBasicAuthResponse(String username, String password) { argument 276 Assert.assertNotNull(password); 278 // encode username:password to base64 279 return new String(Base64.encodeBase64((username + ':' + password).getBytes())); 296 String password, 235 setupDigestAuthResponse(boolean isProxy, String username, String password, String realm, String nonce, String QOP, String algorithm, String opaque) argument 295 computeDigestAuthResponse(String username, String password, String realm, String nonce, String QOP, String algorithm, String opaque) argument [all...] |
H A D | HttpAuthHeader.java | 55 * new username and password. 61 * password to use. 151 * @return The password string. 158 * Sets the password string. 160 public void setPassword(String password) { argument 161 mPassword = password;
|
/frameworks/base/telephony/java/com/android/internal/telephony/gsm/ |
H A D | ApnSetting.java | 35 String password; field in class:ApnSetting 46 String user, String password, int authType, String[] types, 58 this.password = password; 75 * <mmsport>, <user>, <password>, <authtype>, <mcc>,<mnc>, 80 * <mmsport>, <user>, <password, <authtype>, <mcc>, <mnc>, 84 * and password and thus cannot be read by this method. 43 ApnSetting(int id, String numeric, String carrier, String apn, String proxy, String port, String mmsc, String mmsProxy, String mmsPort, String user, String password, int authType, String[] types, String protocol, String roamingProtocol) argument
|
/frameworks/base/core/java/com/android/internal/widget/ |
H A D | LockPatternUtils.java | 56 private static final String LOCK_PASSWORD_FILE = "password.key"; 144 Log.d(TAG, "lock password file changed"); 159 * Gets the device policy password mode. If the mode is non-specific, returns 167 * Returns the actual password mode, as set by keyguard after updating the password. 205 * Check to see if a password matches the saved password. If no password exists, 207 * @param password The password t 210 checkPassword(String password) argument 337 computePasswordQuality(String password) argument 368 saveLockPassword(String password, int quality) argument 499 passwordToHash(String password) argument [all...] |
/frameworks/base/core/java/android/app/admin/ |
H A D | IDevicePolicyManager.aidl | 40 boolean resetPassword(String password, int flags);
|
/frameworks/base/telephony/tests/telephonytests/src/com/android/internal/telephony/gsm/ |
H A D | ApnSettingTest.java | 36 assertEquals(a1.password, a2.password); 100 "mmsc", "mmsproxy", "mmsport", "user", "password", 0,
|
/frameworks/base/tools/layoutlib/bridge/src/android/webkit/ |
H A D | WebView.java | 82 public void savePassword(String host, String username, String password) { argument 86 String username, String password) { 85 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument
|
/frameworks/base/core/java/android/accounts/ |
H A D | IAccountManager.aidl | 36 boolean addAccount(in Account account, String password, in Bundle extras); 41 void setPassword(in Account account, String password);
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
H A D | AccessPointParserHelper.java | 41 * security, eap, phase2, identity, password, anonymousidentity, cacert, usercert, 54 * <password>abcdefgh</password> 118 boolean password = false; 146 if (tagName.equalsIgnoreCase("password")) { 147 password = true; 233 if (password) { 253 config.password.setValue(passwordStr); 257 password = false;
|
/frameworks/base/telephony/java/com/android/internal/telephony/sip/ |
H A D | SipCommandInterface.java | 187 public void setupDefaultPDP(String apn, String user, String password, argument 195 String apn, String user, String password, String authType, 261 public void queryFacilityLock (String facility, String password, argument 266 String password, int serviceClass, Message response) { 194 setupDataCall(String radioTechnology, String profile, String apn, String user, String password, String authType, String protcol, Message result) argument 265 setFacilityLock(String facility, boolean lockState, String password, int serviceClass, Message response) argument
|
/frameworks/base/cmds/keystore/ |
H A D | keystore.c | 46 * user-defined password. To keep things simple, buffers are always larger than 356 static void set_key(uint8_t *key, uint8_t *password, int length, uint8_t *salt) argument 359 PKCS5_PBKDF2_HMAC_SHA1((char *)password, length, salt, SALT_SIZE, 362 PKCS5_PBKDF2_HMAC_SHA1((char *)password, length, (uint8_t *)"keystore", 369 * file using the same password when the user unlock it for the first time. If 373 static int8_t password() function 449 return password(); 481 {password, 'p', 0, PASSWORD, {PASSWORD_SIZE, PASSWORD_SIZE}},
|