/packages/apps/Settings/tests/src/com/android/settings/vpn2/ |
H A D | VpnInfo.java | 32 public VpnInfo(VpnProfile vpnProfile, String certFile, String password) { argument 35 mPassword = password; 50 public void setPassword(String password) { argument 51 mPassword = password;
|
H A D | CertInstallerHelper.java | 61 /* Define a password to unlock keystore after it is reset */ 62 private static final String CERT_STORE_PASSWORD = "password"; 70 * Unlock keystore and set password 74 mKeyStore.password(CERT_STORE_PASSWORD); 77 private void extractCertificate(String certFile, String password) { argument 82 // Read .p12 file from SDCARD and extract with password 88 PasswordProtection passwordProtection = new PasswordProtection(password.toCharArray()); 170 * @param password password to extract the .p12 file 172 public void installCertificate(VpnProfile profile, String certFile, String password) { argument [all...] |
H A D | VpnProfileParser.java | 48 boolean password; 85 if (tagName.equalsIgnoreCase("password")) { 86 password = true; 121 if (tagName.equalsIgnoreCase("cert-file-password")) { 157 if (password) { 158 profile.password = strValue; 159 password = false;
|
H A D | VpnTests.java | 74 * <password></password> 129 Log.d(TAG, "password for the certificate file is: " + vpnInfo.getPassword()); 166 Log.v(TAG, "password: " + profile.password); 315 * @param password password to extract certificate file 317 private void installCertificatesFromFile(VpnProfile profile, String fileName, String password) argument 319 if (profile == null || fileName == null || password == null) { 320 throw new Exception ("vpn profile, certificate file name and password ca [all...] |
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/ |
H A D | WifiConfig.java | 45 public int addNetwork(String ssid, boolean hidden, String type, String password, argument 58 // If we have a password, and no security type, assume WPA. 60 if (securityType.equals(SecurityType.NONE) && !TextUtils.isEmpty(password)) { 73 updateForWPAConfiguration(wifiConf, password); 76 updateForWEPConfiguration(wifiConf, password); 107 protected void updateForWEPConfiguration(WifiConfiguration wifiConf, String password) { argument 115 int length = password.length(); 116 if ((length == 10 || length == 26 || length == 58) && password.matches("[0-9A-Fa-f]*")) { 117 wifiConf.wepKeys[0] = password; 119 wifiConf.wepKeys[0] = '"' + password [all...] |
/packages/apps/KeyChain/support/src/com/android/keychain/tests/support/ |
H A D | IKeyChainServiceTestSupport.aidl | 34 boolean keystorePassword(String password);
|
H A D | KeyChainServiceTestSupport.java | 38 @Override public boolean keystorePassword(String password) { 40 return mKeyStore.password(password);
|
/packages/apps/OMA-DM/engine/dmlib/dmengine/dm_security/src/ |
H A D | GeneratePassword.cc | 23 // Based on an IMEI and serverId input, the algorithm for generating the OMADM client password 24 // and server password actually has following three steps, 26 // Step 1 Generate the client password key and server password key: 32 // It defines a client password dictionary and a server password dictionary which contain 33 // 15 numbers, we use client password dictionary to generate client password key and server 34 // password dictionary to generate server password ke 196 char * password = generatePassword(imei, serverId, key); local 214 char * password = generatePassword(imei, serverId, key); local 234 char * password = generatePassword(imei, serverId, key); local 254 char * password = generatePassword(imei, serverId, key); local 512 char * password = (char *) DmAllocMem(sizeof(char) * ( PWLength + 1)); local [all...] |
/packages/apps/OMA-DM/engine/dmlib/dmengine/dm_ssession/hdr/ |
H A D | dmServerAuthentication.h | 40 void CheckCredentials(SYNCML_DM_AuthContext_T& AuthContext,const DMString& password, const DMBuffer& data, BOOLEAN bDecodeNonce);
|
/packages/apps/OMA-DM/engine/dmlib/dmengine/dm_ssession/src/ |
H A D | dmServerAuthentication.cc | 39 void DMServerAuthentication::CheckCredentials( SYNCML_DM_AuthContext_T& AuthContext, const DMString& password, const DMBuffer& data, BOOLEAN bDecodeNonce ) argument 58 hmacSecInfo.pb_password = (UINT8*)password.c_str(); 179 DMString password( oAuthSecret.getCharData() ); 181 result = SYNCML_DM_BuildPackage::GetServerAuthValues( device_id, AuthContext._pServerId, password ); 186 CheckCredentials( AuthContext, password, oAuthData.m_oData, TRUE ); 219 DMString password( oAuthSecret.getCharData() ); 221 result = SYNCML_DM_BuildPackage::GetServerAuthValues( device_id,AuthContext._pServerId, password ); 225 CheckCredentials( AuthContext, password, oAuthData.m_oData, TRUE ); // decode nonce before calculating digest 230 CheckCredentials( AuthContext, password, oAuthData.m_oData, FALSE ); // do NOT decode nonce before calculating digest 239 CheckCredentials( AuthContext, password, oAuthDat [all...] |
/packages/apps/Email/src/com/android/email/mail/store/ |
H A D | ServiceStore.java | 82 public Bundle autoDiscover(Context context, String username, String password) { argument 84 return getService().autoDiscover(username, password);
|
/packages/apps/OMA-DM/engine/javaplugin/api/com/android/omadm/plugin/ |
H A D | IDMClientService.aidl | 46 * @param password the password for digest authentication, or null 50 String alertType, String redirectURI, String username, String password);
|
/packages/apps/OMA-DM/engine/dmlib/tool-src/servercred/src/ |
H A D | GeneratePassword.cc | 21 // Based on an IMEI and serverId input, the algorithm for generating the OMADM client password 22 // and server password actually has following three steps, 24 // Step 1 Generate the client password key and server password key: 30 // It defines a client password dictionary and a server password dictionary which contain 31 // 15 numbers, we use client password dictionary to generate client password key and server 32 // password dictionary to generate server password ke 543 char * password = (char *) malloc(sizeof(char) * ( PWLength + 1)); local [all...] |
/packages/apps/Browser/src/com/android/browser/ |
H A D | HttpAuthenticationDialog.java | 92 String password = getPassword(); 100 if (password != null) { 101 mPasswordView.setText(password); 157 void onOk(String host, String realm, String username, String password); argument
|
H A D | PageDialogsHandler.java | 92 public void onOk(String host, String realm, String username, String password) { 93 setHttpAuthUsernamePassword(host, realm, username, password); 94 handler.proceed(username, password); 109 * Set HTTP authentication password. 111 * @param host The host for the password 112 * @param realm The realm for the password 113 * @param username The username for the password. If it is null, it means 114 * password can't be saved. 115 * @param password The password 117 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument [all...] |
/packages/apps/Email/emailcommon/src/com/android/emailcommon/service/ |
H A D | IEmailService.aidl | 56 Bundle autoDiscover(String userName, String password);
|
/packages/apps/TvSettings/Settings/src/com/android/tv/settings/connectivity/ |
H A D | WifiMultiPagedFormActivity.java | 144 WifiConfiguration wifiConfiguration, WifiSecurity wifiSecurity, String password) { 146 int length = password.length(); 149 && password.matches("[0-9A-Fa-f]*")) { 150 wifiConfiguration.wepKeys[0] = password; 152 wifiConfiguration.wepKeys[0] = '"' + password + '"'; 155 wifiConfiguration.preSharedKey = '"' + password + '"'; 143 setWifiConfigurationPassword( WifiConfiguration wifiConfiguration, WifiSecurity wifiSecurity, String password) argument
|
/packages/apps/Settings/src/com/android/settings/ |
H A D | CryptKeeperSettings.java | 81 * is no keyguard available, we prompt the user to set a password. 87 // TODO replace (or follow) this dialog with an explicit launch into password UI 183 String password = data.getStringExtra(ChooseLockSettingsHelper.EXTRA_KEY_PASSWORD); 184 if (!TextUtils.isEmpty(password)) { 185 showFinalConfirmation(type, password); 190 private void showFinalConfirmation(int type, String password) { argument 195 preference.getExtras().putString("password", password);
|
H A D | ChooseLockPassword.java | 310 * @param password the raw password the user typed in 311 * @return error message to show to user or null if password is OK 313 private String validatePassword(String password) { argument 314 if (password.length() < mPasswordMinLength) { 319 if (password.length() > mPasswordMaxLength) { 330 for (int i = 0; i < password.length(); i++) { 331 char c = password.charAt(i); 358 final int sequence = LockPatternUtils.maxLengthSequence(password); 401 if(mLockPatternUtils.checkPasswordHistory(password)) { [all...] |
/packages/apps/Settings/src/com/android/settings/wifi/ |
H A D | WriteWifiConfigToNfcDialog.java | 102 mPasswordView = (TextView) mView.findViewById(R.id.password); 122 String password = mPasswordView.getText().toString(); 125 String passwordHex = byteArrayToHexString(password.getBytes()); 127 String passwordLength = password.length() >= HEX_RADIX 128 ? Integer.toString(password.length(), HEX_RADIX) 129 : "0" + Character.forDigit(password.length(), HEX_RADIX);
|
/packages/apps/Email/tests/src/com/android/email/activity/setup/ |
H A D | AccountSetupIncomingTests.java | 63 Intent i = getTestIntent("imap://user:password@server.com:999"); 77 Intent i = getTestIntent("imap://user:password@server.com:999"); 88 Intent i = getTestIntent("imap://:password@server.com:999"); 95 * No password is not OK - not enabled 110 Intent i = getTestIntent("imap://user:password@server.com"); 150 // Clear the password - should disable 161 * Check password field for a given password. Should be called in UI thread. Confirms that 162 * the password has not been trimmed. 164 * @param password th 167 checkPassword(String password, boolean expectNext) argument [all...] |
H A D | AccountSetupOutgoingTests.java | 62 Intent i = getTestIntent("smtp://user:password@server.com:999"); 85 Intent i = getTestIntent("smtp://:password@server.com:999"); 100 * No password is not OK - not enabled 115 Intent i = getTestIntent("smtp://user:password@server.com"); 155 // Clear the password - should disable 167 * Check password field for a given password. Should be called in UI thread. Confirms that 168 * the password has not been trimmed. 170 * @param password the password t 173 checkPassword(String password, boolean expectNext) argument [all...] |
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
H A D | CertInstaller.java | 292 void extractPkcs12InBackground(final String password) { argument 298 return mCredentials.extractPkcs12(password); 342 String password = mView.getText(R.id.credential_password); 343 mNextAction = new Pkcs12ExtractAction(password); 475 Pkcs12ExtractAction(String password) { argument 476 mPassword = password;
|
/packages/apps/Exchange/src/com/android/exchange/service/ |
H A D | EasService.java | 154 public Bundle autoDiscover(final String username, final String password) { 159 Bundle result = autoDiscoverInternal(uri, attempt, username, password, true); 171 final String username, final String password, 174 username, password); 179 return autoDiscoverInternal(redirectUri, attempt, username, password, canRetry); 187 return autoDiscoverInternal(uri, attempt, bareUsername, password, false);
|
/packages/apps/Email/tests/src/com/android/emailcommon/provider/ |
H A D | AccountTest.java | 66 * @param password a given password 67 * @return a HostAuth that includes the given username and password 69 private static HostAuth getHostAuthJSON(String username, String password) { argument 71 ha.setLogin(username, password);
|