/frameworks/base/obex/javax/obex/ |
H A D | PasswordAuthentication.java | 36 * This class holds user name and password combinations. 47 * password provided. 49 * @param password the password to include in the response 50 * @throws NullPointerException if <code>password</code> is 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { argument 59 mPassword = new byte[password.length]; 60 System.arraycopy(password, 0, mPassword, 0, password.length); 73 * Retrieves the password [all...] |
H A D | ObexSession.java | 79 * and password to use. 138 * If no password is provided then we not resent the request 144 byte[] password = result.getPassword(); 145 if (password == null) { 169 byte[] digest = new byte[challenge.length + password.length + 1]; 171 // Insert colon between challenge and password 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 200 // get the correct password from the application
|
/frameworks/base/core/java/android/webkit/ |
H A D | HttpAuthHandler.java | 62 public void proceed(String username, String password) { argument
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/ |
H A D | WifiAssociationTest.java | 36 * * adb shell am instrument -e ssid <ssid> -e password <password> \ 64 String password = arguments.getString("password"); 76 WifiConfiguration config = getConfig(ssid, securityType, password); 105 * Get the {@link WifiConfiguration} based on ssid, security, and password. 107 private WifiConfiguration getConfig(String ssid, SecurityType securityType, String password) { argument 116 assertNotNull("password is empty", password); 118 assertTrue(WifiConfigurationHelper.isHex(password, 1 [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
H A D | DataProfile.java | 40 //the password for APN, or NULL 41 public final String password; field in class:DataProfile 57 String user, String password, int type, int maxConnsTime, int maxConns, 65 this.password = password; 75 apn.authType, apn.user, apn.password, apn.bearerBitmask == 0 ? TYPE_COMMON : 93 pc.writeString(dps[i].password); 106 + "/" + user + "/" + password + "/" + type + "/" + maxConnsTime 56 DataProfile(int profileId, String apn, String protocol, int authType, String user, String password, int type, int maxConnsTime, int maxConns, int waitTime, boolean enabled) argument
|
H A D | ApnSetting.java | 46 public final String password; field in class:ApnSetting 101 String user, String password, int authType, String[] types, 115 this.password = password; 146 * <carrier>, <apn>, <proxy>, <port>, <user>, <password>, <server>, 151 * [ApnSettingV2] <carrier>, <apn>, <proxy>, <port>, <user>, <password>, <server>, 156 * [ApnSettingV3] <carrier>, <apn>, <proxy>, <port>, <user>, <password>, <server>, 163 * and password and thus cannot be read by this method. 98 ApnSetting(int id, String numeric, String carrier, String apn, String proxy, String port, String mmsc, String mmsProxy, String mmsPort, String user, String password, int authType, String[] types, String protocol, String roamingProtocol, boolean carrierEnabled, int bearer, int bearerBitmask, int profileId, boolean modemCognitive, int maxConns, int waitTime, int maxConnsTime, int mtu, String mvnoType, String mvnoMatchData) argument
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
H A D | WifiConfigurationHelper.java | 68 * @param password Either a 10, 26, or 58 character hex string or the plain text password 71 public static WifiConfiguration createWepConfig(String ssid, String password) { argument 74 if (isHex(password, 10) || isHex(password, 26) || isHex(password, 58)) { 75 config.wepKeys[0] = password; 77 config.wepKeys[0] = quotedString(password); 90 * @param password Either a 64 character hex string or the plain text password 93 createPskConfig(String ssid, String password) argument 118 createEapConfig(String ssid, String password, int eapMethod, Integer phase2, String identity, String anonymousIdentity, String caCert, String clientCert) argument [all...] |
H A D | ConnectivityManagerTestRunner.java | 62 String password = (String) icicle.get("password"); 63 if (password != null) { 64 mPassword = password;
|
H A D | ConnectivityManagerTestBase.java | 319 protected boolean connectToWifi(String ssid, String password) { argument 321 if (password == null) { 324 config = WifiConfigurationHelper.createPskConfig(ssid, password);
|
/frameworks/base/core/java/com/android/internal/widget/ |
H A D | ILockSettings.aidl | 32 void setLockPassword(in String password, in String savedPassword, int userId); 33 VerifyCredentialResponse checkPassword(in String password, int userId); 34 VerifyCredentialResponse verifyPassword(in String password, long challenge, int userId);
|
H A D | LockPatternChecker.java | 112 * Verify a password asynchronously. 115 * @param password The password to check. 121 final String password, 131 return utils.verifyPassword(password, challenge, userId); 148 * Checks a password asynchronously. 151 * @param password The password to check. 156 final String password, 165 return utils.checkPassword(password, userI 120 verifyPassword(final LockPatternUtils utils, final String password, final long challenge, final int userId, final OnVerifyCallback callback) argument 155 checkPassword(final LockPatternUtils utils, final String password, final int userId, final OnCheckCallback callback) argument [all...] |
H A D | LockPatternUtils.java | 86 * The minimum size of a valid password. 128 // consider it a complex PIN/password. 193 * Gets the device policy password mode. If the mode is non-specific, returns 295 * Check to see if a password matches the saved password. 296 * If password matches, return an opaque attestation that the challenge 299 * @param password The password to check. 300 * @param challenge The challenge to verify against the password 303 public byte[] verifyPassword(String password, lon argument 327 checkPassword(String password, int userId) argument 363 checkPasswordHistory(String password, int userId) argument 575 computePasswordQuality(String password) argument 663 updateEncryptionPassword(final int type, final String password) argument 696 saveLockPassword(String password, String savedPassword, int quality, int userHandle) argument 934 passwordToHash(String password, int userId) argument [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | IccCard.java | 145 * @param password needed to change the ICC pin state, aka. Pin1 152 String password, Message onComplete); 159 * @param password needed to change the ICC fdn enable, aka Pin2 166 String password, Message onComplete); 169 * Change the ICC password used in ICC pin lock 172 * @param oldPassword is the old password 173 * @param newPassword is the new password 183 * Change the ICC password used in ICC fdn enable 186 * @param oldPassword is the old password 187 * @param newPassword is the new password 151 setIccLockEnabled(boolean enabled, String password, Message onComplete) argument 165 setIccFdnEnabled(boolean enabled, String password, Message onComplete) argument [all...] |
/frameworks/base/core/java/com/android/internal/net/ |
H A D | VpnProfile.java | 54 public String password = ""; // 4 field in class:VpnProfile 79 password = in.readString(); 100 out.writeString(password); 134 profile.password = values[4]; 146 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); 159 builder.append('\0').append(saveLogin ? password : "");
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | LockSettingsService.java | 59 * Keeps the lock pattern/password data and related settings for each user. 156 // No need to move the password / pattern files. They're already in the right place. 193 // No need to move the password / pattern files. They're already in the right place. 363 private void setKeystorePassword(String password, int userHandle) { argument 369 ks.onUserPasswordChanged(pi.id, password); 373 private void unlockKeystore(String password, int userHandle) { argument 379 ks.unlock(pi.id, password); 446 public void setLockPassword(String password, String savedCredential, int userId) argument 450 if (password == null) { 464 byte[] enrolledHandle = enrollCredential(currentHandle, savedCredential, password, userI 555 checkPassword(String password, int userId) argument 561 verifyPassword(String password, long challenge, int userId) argument 566 doVerifyPassword(String password, boolean hasChallenge, long challenge, int userId) argument [all...] |
/frameworks/base/include/storage/ |
H A D | IMountService.h | 72 virtual int32_t decryptStorage(const String16& password) = 0; 73 virtual int32_t encryptStorage(const String16& password) = 0;
|
/frameworks/base/tools/layoutlib/bridge/src/android/webkit/ |
H A D | WebView.java | 82 public void savePassword(String host, String username, String password) { argument 86 String username, String password) { 85 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/imsphone/ |
H A D | ImsPhoneCommandInterface.java | 259 String apn, String user, String password, String authType, 352 public void queryFacilityLock(String facility, String password, argument 357 public void queryFacilityLockForApp(String facility, String password, argument 363 String password, int serviceClass, Message response) { 368 String password, int serviceClass, String appId, Message response) { 564 String password, Message result) { 258 setupDataCall(String radioTechnology, String profile, String apn, String user, String password, String authType, String protocol, Message result) argument 362 setFacilityLock(String facility, boolean lockState, String password, int serviceClass, Message response) argument 367 setFacilityLockForApp(String facility, boolean lockState, String password, int serviceClass, String appId, Message response) argument 563 setInitialAttachApn(String apn, String protocol, int authType, String username, String password, Message result) argument
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/ |
H A D | SipCommandInterface.java | 260 String apn, String user, String password, String authType, 353 public void queryFacilityLock(String facility, String password, argument 358 public void queryFacilityLockForApp(String facility, String password, argument 364 String password, int serviceClass, Message response) { 369 String password, int serviceClass, String appId, Message response) { 565 String password, Message result) { 259 setupDataCall(String radioTechnology, String profile, String apn, String user, String password, String authType, String protocol, Message result) argument 363 setFacilityLock(String facility, boolean lockState, String password, int serviceClass, Message response) argument 368 setFacilityLockForApp(String facility, boolean lockState, String password, int serviceClass, String appId, Message response) argument 564 setInitialAttachApn(String apn, String protocol, int authType, String username, String password, Message result) argument
|
/frameworks/base/tests/TransitionTests/src/com/android/transitiontests/ |
H A D | LoginActivity.java | 55 // Custom transitions in/out of NewUser screen - slide in the 2nd password UI 58 slider.addTransition(new Recolor().addTarget(R.id.password). 66 // Custom transitions with recoloring password field 67 Transition colorizer = new Recolor().addTarget(R.id.password).
|
/frameworks/base/core/java/android/accounts/ |
H A D | IAccountManager.aidl | 41 boolean addAccountExplicitly(in Account account, String password, in Bundle extras); 52 void setPassword(in Account account, String password);
|
/frameworks/base/wifi/java/android/net/wifi/passpoint/ |
H A D | WifiPasspointPolicy.java | 54 private final String INT_PASSWORD = "password"; 188 eap = null, identity = null, password = null, 210 password = tempField; 211 Log.d(TAG, "field " + password.getName() ); 238 // Username, password, EAP Phase 2 242 setValue.invoke(password.get(wfg), mCredential.getPassword());
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/ |
H A D | ApnSettingTest.java.broken | 49 assertEquals(a1.password, a2.password); 143 "mmsc", "mmsproxy", "mmsport", "user", "password", 0,
|
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 100 * For simplicity use the same password for the key as that of the keystore 255 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) argument 262 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/pps/ |
H A D | Credential.java | 48 EAPMethod eapMethod, String userName, String password, 57 if (!TextUtils.isEmpty(password)) { 58 byte[] pwOctets = Base64.decode(password, Base64.DEFAULT); 115 public Credential(Credential other, String password) { argument 121 mPassword = password; 47 Credential(long ctime, long expTime, String realm, boolean checkAAACert, EAPMethod eapMethod, String userName, String password, boolean machineManaged, String stApp, boolean share) argument
|