/frameworks/base/obex/javax/obex/ |
H A D | PasswordAuthentication.java | 36 * This class holds user name and password combinations. 47 * password provided. 49 * @param password the password to include in the response 50 * @throws NullPointerException if <code>password</code> is 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { argument 59 mPassword = new byte[password.length]; 60 System.arraycopy(password, 0, mPassword, 0, password.length); 73 * Retrieves the password [all...] |
H A D | ObexSession.java | 79 * and password to use. 138 * If no password is provided then we not resent the request 144 byte[] password = result.getPassword(); 145 if (password == null) { 169 byte[] digest = new byte[challenge.length + password.length + 1]; 171 // Insert colon between challenge and password 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 200 // get the correct password from the application
|
/frameworks/base/core/java/android/webkit/ |
H A D | HttpAuthHandler.java | 62 public void proceed(String username, String password) { argument
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/ |
H A D | WifiAssociationTest.java | 36 * * adb shell am instrument -e ssid <ssid> -e password <password> \ 64 String password = arguments.getString("password"); 76 WifiConfiguration config = getConfig(ssid, securityType, password); 105 * Get the {@link WifiConfiguration} based on ssid, security, and password. 107 private WifiConfiguration getConfig(String ssid, SecurityType securityType, String password) { argument 116 assertNotNull("password is empty", password); 118 assertTrue(WifiConfigurationHelper.isHex(password, 1 [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
H A D | DataProfile.java | 40 //the password for APN, or NULL 41 public final String password; field in class:DataProfile 57 String user, String password, int type, int maxConnsTime, int maxConns, 65 this.password = password; 75 apn.authType, apn.user, apn.password, apn.bearerBitmask == 0 94 pc.writeString(dps[i].password); 107 + "/" + user + "/" + password + "/" + type + "/" + maxConnsTime 56 DataProfile(int profileId, String apn, String protocol, int authType, String user, String password, int type, int maxConnsTime, int maxConns, int waitTime, boolean enabled) argument
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
H A D | WifiConfigurationHelper.java | 68 * @param password Either a 10, 26, or 58 character hex string or the plain text password 71 public static WifiConfiguration createWepConfig(String ssid, String password) { argument 74 if (isHex(password, 10) || isHex(password, 26) || isHex(password, 58)) { 75 config.wepKeys[0] = password; 77 config.wepKeys[0] = quotedString(password); 90 * @param password Either a 64 character hex string or the plain text password 93 createPskConfig(String ssid, String password) argument 118 createEapConfig(String ssid, String password, int eapMethod, Integer phase2, String identity, String anonymousIdentity, String caCert, String clientCert) argument [all...] |
H A D | ConnectivityManagerTestRunner.java | 62 String password = (String) icicle.get("password"); 63 if (password != null) { 64 mPassword = password;
|
H A D | ConnectivityManagerTestBase.java | 319 protected boolean connectToWifi(String ssid, String password) { argument 321 if (password == null) { 324 config = WifiConfigurationHelper.createPskConfig(ssid, password);
|
/frameworks/base/core/java/com/android/internal/widget/ |
H A D | ILockSettings.aidl | 34 void setLockPassword(in String password, in String savedPassword, int userId); 35 VerifyCredentialResponse checkPassword(in String password, int userId); 36 VerifyCredentialResponse verifyPassword(in String password, long challenge, int userId); 37 VerifyCredentialResponse verifyTiedProfileChallenge(String password, boolean isPattern, long challenge, int userId);
|
H A D | LockPatternChecker.java | 112 * Verify a password asynchronously. 115 * @param password The password to check. 121 final String password, 131 return utils.verifyPassword(password, challenge, userId); 148 * Verify a password asynchronously. 151 * @param password The password to check. 157 final String password, 168 return utils.verifyTiedProfileChallenge(password, isPatter 120 verifyPassword(final LockPatternUtils utils, final String password, final long challenge, final int userId, final OnVerifyCallback callback) argument 156 verifyTiedProfileChallenge(final LockPatternUtils utils, final String password, final boolean isPattern, final long challenge, final int userId, final OnVerifyCallback callback) argument 192 checkPassword(final LockPatternUtils utils, final String password, final int userId, final OnCheckCallback callback) argument [all...] |
H A D | LockPatternUtils.java | 96 * The minimum size of a valid password. 141 // consider it a complex PIN/password. 249 * Gets the device policy password mode. If the mode is non-specific, returns 362 * Check to see if a password matches the saved password. 363 * If password matches, return an opaque attestation that the challenge 366 * @param password The password to check. 367 * @param challenge The challenge to verify against the password 370 public byte[] verifyPassword(String password, lon argument 399 verifyTiedProfileChallenge(String password, boolean isPattern, long challenge, int userId) argument 425 checkPassword(String password, int userId) argument 462 checkPasswordHistory(String password, int userId) argument 708 computePasswordQuality(String password) argument 796 updateEncryptionPassword(final int type, final String password) argument 829 saveLockPassword(String password, String savedPassword, int quality, int userHandle) argument 1116 passwordToHash(String password, int userId) argument [all...] |
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/dataconnection/ |
H A D | DataProfileTest.java | 37 "passwd", // password 65 "passwd", // password 90 assertEquals(mApn1.password, dp.password); 115 assertEquals("i = " + i, mApn1.password, p.readString());
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | IccCard.java | 145 * @param password needed to change the ICC pin state, aka. Pin1 152 String password, Message onComplete); 159 * @param password needed to change the ICC fdn enable, aka Pin2 166 String password, Message onComplete); 169 * Change the ICC password used in ICC pin lock 172 * @param oldPassword is the old password 173 * @param newPassword is the new password 183 * Change the ICC password used in ICC fdn enable 186 * @param oldPassword is the old password 187 * @param newPassword is the new password 151 setIccLockEnabled(boolean enabled, String password, Message onComplete) argument 165 setIccFdnEnabled(boolean enabled, String password, Message onComplete) argument [all...] |
/frameworks/base/core/java/com/android/internal/net/ |
H A D | VpnProfile.java | 54 public String password = ""; // 4 field in class:VpnProfile 79 password = in.readString(); 100 out.writeString(password); 134 profile.password = values[4]; 146 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); 159 builder.append('\0').append(saveLogin ? password : "");
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/pps/ |
H A D | Credential.java | 39 EAPMethod eapMethod, String userName, String password, 48 if (!TextUtils.isEmpty(password)) { 49 byte[] pwOctets = Base64.decode(password, Base64.DEFAULT); 106 public Credential(Credential other, String password) { argument 112 mPassword = password; 38 Credential(long ctime, long expTime, String realm, boolean checkAAACert, EAPMethod eapMethod, String userName, String password, boolean machineManaged, String stApp, boolean share) argument
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | LockSettingsService.java | 105 * Keeps the lock pattern/password data and related settings for each user. 219 * @param managedUserPassword Managed profile original password (when it has separated lock). 250 // password directly, so we always store a password. 469 // No need to move the password / pattern files. They're already in the right place. 505 // No need to move the password / pattern files. They're already in the right place. 565 // When managed profile has a unified lock, the password quality stored has 2 569 // 2). PASSWORD_QUALITY_ALPHANUMERIC, which is the actual password quality for 719 private void setKeystorePassword(String password, int userHandle) { argument 721 ks.onUserPasswordChanged(userHandle, password); 724 unlockKeystore(String password, int userHandle) argument 959 setLockPassword(String password, String savedCredential, int userId) argument 968 setLockPasswordInternal(String password, String savedCredential, int userId) argument 1016 tieProfileLockToParent(int userId, String password) argument 1264 checkPassword(String password, int userId) argument 1270 verifyPassword(String password, long challenge, int userId) argument 1276 verifyTiedProfileChallenge(String password, boolean isPattern, long challenge, int userId) argument 1306 doVerifyPassword(String password, boolean hasChallenge, long challenge, int userId) argument 1313 doVerifyPassword(String password, CredentialHash storedHash, boolean hasChallenge, long challenge, int userId) argument [all...] |
/frameworks/base/packages/Osu/src/com/android/hotspot2/utils/ |
H A D | HTTPRequest.java | 61 public void doAuthenticate(HTTPResponse httpResponse, String userName, byte[] password, argument 64 generateAuthAnswer(httpResponse, userName, password, url, sequence)); 68 byte[] password, URL url, int sequence) 131 String passwordString = new String(password, StandardCharsets.UTF_8); 283 private static void test(String user, String realm, String password, String method, String path, argument 286 byte[] a1 = hash(user, realm, password); 67 generateAuthAnswer(HTTPResponse httpResponse, String userName, byte[] password, URL url, int sequence) argument
|
/frameworks/base/include/storage/ |
H A D | IMountService.h | 72 virtual int32_t decryptStorage(const String16& password) = 0; 73 virtual int32_t encryptStorage(const String16& password) = 0;
|
/frameworks/base/tools/layoutlib/bridge/src/android/webkit/ |
H A D | WebView.java | 82 public void savePassword(String host, String username, String password) { argument 86 String username, String password) { 85 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/imsphone/ |
H A D | ImsPhoneCommandInterface.java | 259 String apn, String user, String password, int authType, 352 public void queryFacilityLock(String facility, String password, argument 357 public void queryFacilityLockForApp(String facility, String password, argument 363 String password, int serviceClass, Message response) { 368 String password, int serviceClass, String appId, Message response) { 564 String password, Message result) { 258 setupDataCall(int radioTechnology, int profile, String apn, String user, String password, int authType, String protocol, Message result) argument 362 setFacilityLock(String facility, boolean lockState, String password, int serviceClass, Message response) argument 367 setFacilityLockForApp(String facility, boolean lockState, String password, int serviceClass, String appId, Message response) argument 563 setInitialAttachApn(String apn, String protocol, int authType, String username, String password, Message result) argument
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/ |
H A D | SipCommandInterface.java | 260 String apn, String user, String password, int authType, 353 public void queryFacilityLock(String facility, String password, argument 358 public void queryFacilityLockForApp(String facility, String password, argument 364 String password, int serviceClass, Message response) { 369 String password, int serviceClass, String appId, Message response) { 565 String password, Message result) { 259 setupDataCall(int radioTechnology, int profile, String apn, String user, String password, int authType, String protocol, Message result) argument 363 setFacilityLock(String facility, boolean lockState, String password, int serviceClass, Message response) argument 368 setFacilityLockForApp(String facility, boolean lockState, String password, int serviceClass, String appId, Message response) argument 564 setInitialAttachApn(String apn, String protocol, int authType, String username, String password, Message result) argument
|
/frameworks/base/tests/TransitionTests/src/com/android/transitiontests/ |
H A D | LoginActivity.java | 55 // Custom transitions in/out of NewUser screen - slide in the 2nd password UI 58 slider.addTransition(new Recolor().addTarget(R.id.password). 66 // Custom transitions with recoloring password field 67 Transition colorizer = new Recolor().addTarget(R.id.password).
|
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 100 * For simplicity use the same password for the key as that of the keystore 255 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) argument 262 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
|
/frameworks/opt/net/wifi/tests/wifitests/src/android/net/wifi/ |
H A D | WifiEnterpriseConfigTest.java | 261 String password = "supersecret"; 262 mEnterpriseConfig.setPassword(password); 263 assertFalse(mEnterpriseConfig.toString().contains(password));
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/pps/ |
H A D | Credential.java | 48 EAPMethod eapMethod, String userName, String password, 57 if (!TextUtils.isEmpty(password)) { 58 byte[] pwOctets = Base64.decode(password, Base64.DEFAULT); 115 public Credential(Credential other, String password) { argument 121 mPassword = password; 47 Credential(long ctime, long expTime, String realm, boolean checkAAACert, EAPMethod eapMethod, String userName, String password, boolean machineManaged, String stApp, boolean share) argument
|