Searched refs:password (Results 1 - 25 of 57) sorted by relevance

123

/packages/apps/Settings/tests/src/com/android/settings/vpn2/
H A DVpnInfo.java32 public VpnInfo(VpnProfile vpnProfile, String certFile, String password) { argument
35 mPassword = password;
50 public void setPassword(String password) { argument
51 mPassword = password;
H A DCertInstallerHelper.java61 /* Define a password to unlock keystore after it is reset */
62 private static final String CERT_STORE_PASSWORD = "password";
70 * Unlock keystore and set password
74 mKeyStore.password(CERT_STORE_PASSWORD);
77 private void extractCertificate(String certFile, String password) { argument
82 // Read .p12 file from SDCARD and extract with password
88 PasswordProtection passwordProtection = new PasswordProtection(password.toCharArray());
170 * @param password password to extract the .p12 file
172 public void installCertificate(VpnProfile profile, String certFile, String password) { argument
[all...]
H A DVpnProfileParser.java48 boolean password;
85 if (tagName.equalsIgnoreCase("password")) {
86 password = true;
121 if (tagName.equalsIgnoreCase("cert-file-password")) {
157 if (password) {
158 profile.password = strValue;
159 password = false;
H A DVpnTests.java74 * <password></password>
129 Log.d(TAG, "password for the certificate file is: " + vpnInfo.getPassword());
166 Log.v(TAG, "password: " + profile.password);
315 * @param password password to extract certificate file
317 private void installCertificatesFromFile(VpnProfile profile, String fileName, String password) argument
319 if (profile == null || fileName == null || password == null) {
320 throw new Exception ("vpn profile, certificate file name and password ca
[all...]
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/
H A DWifiConfig.java45 public int addNetwork(String ssid, boolean hidden, String type, String password, argument
58 // If we have a password, and no security type, assume WPA.
60 if (securityType.equals(SecurityType.NONE) && !TextUtils.isEmpty(password)) {
73 updateForWPAConfiguration(wifiConf, password);
76 updateForWEPConfiguration(wifiConf, password);
107 protected void updateForWEPConfiguration(WifiConfiguration wifiConf, String password) { argument
115 int length = password.length();
116 if ((length == 10 || length == 26 || length == 58) && password.matches("[0-9A-Fa-f]*")) {
117 wifiConf.wepKeys[0] = password;
119 wifiConf.wepKeys[0] = '"' + password
[all...]
/packages/apps/KeyChain/support/src/com/android/keychain/tests/support/
H A DIKeyChainServiceTestSupport.aidl34 boolean keystorePassword(String password);
H A DKeyChainServiceTestSupport.java38 @Override public boolean keystorePassword(String password) {
40 return mKeyStore.password(password);
/packages/apps/OMA-DM/engine/dmlib/dmengine/dm_security/src/
H A DGeneratePassword.cc23 // Based on an IMEI and serverId input, the algorithm for generating the OMADM client password
24 // and server password actually has following three steps,
26 // Step 1 Generate the client password key and server password key:
32 // It defines a client password dictionary and a server password dictionary which contain
33 // 15 numbers, we use client password dictionary to generate client password key and server
34 // password dictionary to generate server password ke
196 char * password = generatePassword(imei, serverId, key); local
214 char * password = generatePassword(imei, serverId, key); local
234 char * password = generatePassword(imei, serverId, key); local
254 char * password = generatePassword(imei, serverId, key); local
512 char * password = (char *) DmAllocMem(sizeof(char) * ( PWLength + 1)); local
[all...]
/packages/apps/OMA-DM/engine/dmlib/dmengine/dm_ssession/hdr/
H A DdmServerAuthentication.h40 void CheckCredentials(SYNCML_DM_AuthContext_T& AuthContext,const DMString& password, const DMBuffer& data, BOOLEAN bDecodeNonce);
/packages/apps/OMA-DM/engine/dmlib/dmengine/dm_ssession/src/
H A DdmServerAuthentication.cc39 void DMServerAuthentication::CheckCredentials( SYNCML_DM_AuthContext_T& AuthContext, const DMString& password, const DMBuffer& data, BOOLEAN bDecodeNonce ) argument
58 hmacSecInfo.pb_password = (UINT8*)password.c_str();
179 DMString password( oAuthSecret.getCharData() );
181 result = SYNCML_DM_BuildPackage::GetServerAuthValues( device_id, AuthContext._pServerId, password );
186 CheckCredentials( AuthContext, password, oAuthData.m_oData, TRUE );
219 DMString password( oAuthSecret.getCharData() );
221 result = SYNCML_DM_BuildPackage::GetServerAuthValues( device_id,AuthContext._pServerId, password );
225 CheckCredentials( AuthContext, password, oAuthData.m_oData, TRUE ); // decode nonce before calculating digest
230 CheckCredentials( AuthContext, password, oAuthData.m_oData, FALSE ); // do NOT decode nonce before calculating digest
239 CheckCredentials( AuthContext, password, oAuthDat
[all...]
/packages/apps/Email/src/com/android/email/mail/store/
H A DServiceStore.java82 public Bundle autoDiscover(Context context, String username, String password) { argument
84 return getService().autoDiscover(username, password);
/packages/apps/OMA-DM/engine/javaplugin/api/com/android/omadm/plugin/
H A DIDMClientService.aidl46 * @param password the password for digest authentication, or null
50 String alertType, String redirectURI, String username, String password);
/packages/apps/OMA-DM/engine/dmlib/tool-src/servercred/src/
H A DGeneratePassword.cc21 // Based on an IMEI and serverId input, the algorithm for generating the OMADM client password
22 // and server password actually has following three steps,
24 // Step 1 Generate the client password key and server password key:
30 // It defines a client password dictionary and a server password dictionary which contain
31 // 15 numbers, we use client password dictionary to generate client password key and server
32 // password dictionary to generate server password ke
543 char * password = (char *) malloc(sizeof(char) * ( PWLength + 1)); local
[all...]
/packages/apps/Browser/src/com/android/browser/
H A DHttpAuthenticationDialog.java92 String password = getPassword();
100 if (password != null) {
101 mPasswordView.setText(password);
157 void onOk(String host, String realm, String username, String password); argument
H A DPageDialogsHandler.java92 public void onOk(String host, String realm, String username, String password) {
93 setHttpAuthUsernamePassword(host, realm, username, password);
94 handler.proceed(username, password);
109 * Set HTTP authentication password.
111 * @param host The host for the password
112 * @param realm The realm for the password
113 * @param username The username for the password. If it is null, it means
114 * password can't be saved.
115 * @param password The password
117 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument
[all...]
/packages/apps/Email/emailcommon/src/com/android/emailcommon/service/
H A DIEmailService.aidl56 Bundle autoDiscover(String userName, String password);
/packages/apps/TvSettings/Settings/src/com/android/tv/settings/connectivity/
H A DWifiMultiPagedFormActivity.java144 WifiConfiguration wifiConfiguration, WifiSecurity wifiSecurity, String password) {
146 int length = password.length();
149 && password.matches("[0-9A-Fa-f]*")) {
150 wifiConfiguration.wepKeys[0] = password;
152 wifiConfiguration.wepKeys[0] = '"' + password + '"';
155 wifiConfiguration.preSharedKey = '"' + password + '"';
143 setWifiConfigurationPassword( WifiConfiguration wifiConfiguration, WifiSecurity wifiSecurity, String password) argument
/packages/apps/Settings/src/com/android/settings/
H A DCryptKeeperSettings.java81 * is no keyguard available, we prompt the user to set a password.
87 // TODO replace (or follow) this dialog with an explicit launch into password UI
183 String password = data.getStringExtra(ChooseLockSettingsHelper.EXTRA_KEY_PASSWORD);
184 if (!TextUtils.isEmpty(password)) {
185 showFinalConfirmation(type, password);
190 private void showFinalConfirmation(int type, String password) { argument
195 preference.getExtras().putString("password", password);
H A DChooseLockPassword.java310 * @param password the raw password the user typed in
311 * @return error message to show to user or null if password is OK
313 private String validatePassword(String password) { argument
314 if (password.length() < mPasswordMinLength) {
319 if (password.length() > mPasswordMaxLength) {
330 for (int i = 0; i < password.length(); i++) {
331 char c = password.charAt(i);
358 final int sequence = LockPatternUtils.maxLengthSequence(password);
401 if(mLockPatternUtils.checkPasswordHistory(password)) {
[all...]
/packages/apps/Settings/src/com/android/settings/wifi/
H A DWriteWifiConfigToNfcDialog.java102 mPasswordView = (TextView) mView.findViewById(R.id.password);
122 String password = mPasswordView.getText().toString();
125 String passwordHex = byteArrayToHexString(password.getBytes());
127 String passwordLength = password.length() >= HEX_RADIX
128 ? Integer.toString(password.length(), HEX_RADIX)
129 : "0" + Character.forDigit(password.length(), HEX_RADIX);
/packages/apps/Email/tests/src/com/android/email/activity/setup/
H A DAccountSetupIncomingTests.java63 Intent i = getTestIntent("imap://user:password@server.com:999");
77 Intent i = getTestIntent("imap://user:password@server.com:999");
88 Intent i = getTestIntent("imap://:password@server.com:999");
95 * No password is not OK - not enabled
110 Intent i = getTestIntent("imap://user:password@server.com");
150 // Clear the password - should disable
161 * Check password field for a given password. Should be called in UI thread. Confirms that
162 * the password has not been trimmed.
164 * @param password th
167 checkPassword(String password, boolean expectNext) argument
[all...]
H A DAccountSetupOutgoingTests.java62 Intent i = getTestIntent("smtp://user:password@server.com:999");
85 Intent i = getTestIntent("smtp://:password@server.com:999");
100 * No password is not OK - not enabled
115 Intent i = getTestIntent("smtp://user:password@server.com");
155 // Clear the password - should disable
167 * Check password field for a given password. Should be called in UI thread. Confirms that
168 * the password has not been trimmed.
170 * @param password the password t
173 checkPassword(String password, boolean expectNext) argument
[all...]
/packages/apps/CertInstaller/src/com/android/certinstaller/
H A DCertInstaller.java292 void extractPkcs12InBackground(final String password) { argument
298 return mCredentials.extractPkcs12(password);
342 String password = mView.getText(R.id.credential_password);
343 mNextAction = new Pkcs12ExtractAction(password);
475 Pkcs12ExtractAction(String password) { argument
476 mPassword = password;
/packages/apps/Exchange/src/com/android/exchange/service/
H A DEasService.java154 public Bundle autoDiscover(final String username, final String password) {
159 Bundle result = autoDiscoverInternal(uri, attempt, username, password, true);
171 final String username, final String password,
174 username, password);
179 return autoDiscoverInternal(redirectUri, attempt, username, password, canRetry);
187 return autoDiscoverInternal(uri, attempt, bareUsername, password, false);
/packages/apps/Email/tests/src/com/android/emailcommon/provider/
H A DAccountTest.java66 * @param password a given password
67 * @return a HostAuth that includes the given username and password
69 private static HostAuth getHostAuthJSON(String username, String password) { argument
71 ha.setLogin(username, password);

Completed in 1633 milliseconds

123