/frameworks/base/core/java/android/accounts/ |
H A D | AccountManager.java | 61 * online accounts. The user enters credentials (username and password) once 74 * the user's actual password. (Auth tokens are normally created with a 194 * Bundle key used to supply the password directly in options to 196 * the standard password prompt. 198 public static final String KEY_PASSWORD = "password"; 275 * account's credentials (saved password, etc) are changed. 335 * Gets the saved password associated with the account. 348 * @param account The account to query for a password. Must not be {@code null}. 349 * @return The account's password, null if none or if the account doesn't exist 724 * @param password Th 730 addAccountExplicitly(Account account, String password, Bundle userdata) argument 1081 setPassword(final Account account, final String password) argument [all...] |
/frameworks/base/core/java/android/app/admin/ |
H A D | DevicePolicyManager.java | 595 * A String extra holding the password of the wifi network in 912 * Activity action: have the user enter a new password. This activity should 915 * enter a new password that meets the current requirements. You can use 917 * have the user select a new password in order to meet the current 919 * password characteristics to see if they are sufficient. 923 * this will trigger entering a new password for the parent of the profile. 924 * For all other cases it will trigger entering a new password for the user 934 * Activity action: have the user enter a new password for the parent profile. 936 * entering a new password for the parent of the profile. In all other cases 1203 * for the password 2223 resetPassword(String password, int flags) argument [all...] |
/frameworks/base/core/java/android/os/storage/ |
H A D | IMountService.java | 615 public int decryptStorage(String password) throws RemoteException { argument 621 _data.writeString(password); 632 public int encryptStorage(int type, String password) throws RemoteException { argument 639 _data.writeString(password); 650 public int changeEncryptionPassword(int type, String password) throws RemoteException { argument 657 _data.writeString(password); 669 public int verifyEncryptionPassword(String password) throws RemoteException { argument 675 _data.writeString(password); 1797 String password = data.readString(); 1798 int result = decryptStorage(password); 2351 decryptStorage(String password) argument 2356 encryptStorage(int type, String password) argument 2361 changeEncryptionPassword(int type, String password) argument 2368 verifyEncryptionPassword(String password) argument [all...] |
/frameworks/base/core/java/android/text/style/ |
H A D | TtsSpan.java | 137 * protocol://username:password@domain:port/path?query_string#fragment_id 404 * Argument used to specify the password part of a URI. Should be set as a 408 public static final String ARG_PASSWORD = "android.arg.password"; 1377 public ElectronicBuilder setPassword(String password) { argument 1378 return setStringArgument(TtsSpan.ARG_PASSWORD, password);
|
/frameworks/base/core/java/android/view/accessibility/ |
H A D | AccessibilityNodeInfo.java | 1794 * Gets whether this node is a password. 1796 * @return True if the node is a password. 1803 * Sets whether this node is a password. 1810 * @param password True if the node is a password. 1814 public void setPassword(boolean password) { argument 1815 setBooleanProperty(BOOLEAN_PROPERTY_PASSWORD, password); 2027 * in a login screen with a TextView that displays an "incorrect password" 3283 builder.append("; password: ").append(isPassword());
|
/frameworks/base/core/java/android/webkit/ |
H A D | HttpAuthHandler.java | 62 public void proceed(String username, String password) { argument
|
H A D | WebView.java | 724 * Sets a username and password pair for the specified host. This data is 725 * used by the Webview to autocomplete username and password fields in web 731 * @param password the password for the given host 737 public void savePassword(String host, String username, String password) { argument 739 mProvider.savePassword(host, username, password); 750 * @param password the password 756 String username, String password) { 758 mProvider.setHttpAuthUsernamePassword(host, realm, username, password); 755 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument [all...] |
H A D | WebViewProvider.java | 94 public void savePassword(String host, String username, String password); argument 97 String username, String password); 96 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument
|
/frameworks/base/core/java/android/widget/ |
H A D | Editor.java | 708 void adjustInputType(boolean password, boolean passwordInputType, argument 711 // Specialize mInputType to [web]password if we have a text class and the original input 712 // type was a password. 714 if (password || passwordInputType) { 794 // Always select all on a password field.
|
/frameworks/base/core/java/com/android/internal/net/ |
H A D | VpnProfile.java | 54 public String password = ""; // 4 field in class:VpnProfile 79 password = in.readString(); 100 out.writeString(password); 134 profile.password = values[4]; 146 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); 159 builder.append('\0').append(saveLogin ? password : "");
|
/frameworks/base/core/java/com/android/internal/widget/ |
H A D | LockPatternChecker.java | 112 * Verify a password asynchronously. 115 * @param password The password to check. 121 final String password, 131 return utils.verifyPassword(password, challenge, userId); 148 * Verify a password asynchronously. 151 * @param password The password to check. 157 final String password, 168 return utils.verifyTiedProfileChallenge(password, isPatter 120 verifyPassword(final LockPatternUtils utils, final String password, final long challenge, final int userId, final OnVerifyCallback callback) argument 156 verifyTiedProfileChallenge(final LockPatternUtils utils, final String password, final boolean isPattern, final long challenge, final int userId, final OnVerifyCallback callback) argument 192 checkPassword(final LockPatternUtils utils, final String password, final int userId, final OnCheckCallback callback) argument [all...] |
H A D | LockPatternUtils.java | 96 * The minimum size of a valid password. 141 // consider it a complex PIN/password. 249 * Gets the device policy password mode. If the mode is non-specific, returns 362 * Check to see if a password matches the saved password. 363 * If password matches, return an opaque attestation that the challenge 366 * @param password The password to check. 367 * @param challenge The challenge to verify against the password 370 public byte[] verifyPassword(String password, lon argument 399 verifyTiedProfileChallenge(String password, boolean isPattern, long challenge, int userId) argument 425 checkPassword(String password, int userId) argument 462 checkPasswordHistory(String password, int userId) argument 708 computePasswordQuality(String password) argument 796 updateEncryptionPassword(final int type, final String password) argument 829 saveLockPassword(String password, String savedPassword, int quality, int userHandle) argument 1116 passwordToHash(String password, int userId) argument [all...] |
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 100 * For simplicity use the same password for the key as that of the keystore 255 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) argument 262 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
H A D | ConnectivityManagerTestBase.java | 319 protected boolean connectToWifi(String ssid, String password) { argument 321 if (password == null) { 324 config = WifiConfigurationHelper.createPskConfig(ssid, password);
|
H A D | WifiConfigurationHelper.java | 68 * @param password Either a 10, 26, or 58 character hex string or the plain text password 71 public static WifiConfiguration createWepConfig(String ssid, String password) { argument 74 if (isHex(password, 10) || isHex(password, 26) || isHex(password, 58)) { 75 config.wepKeys[0] = password; 77 config.wepKeys[0] = quotedString(password); 90 * @param password Either a 64 character hex string or the plain text password 93 createPskConfig(String ssid, String password) argument 118 createEapConfig(String ssid, String password, int eapMethod, Integer phase2, String identity, String anonymousIdentity, String caCert, String clientCert) argument [all...] |
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/ |
H A D | WifiAssociationTest.java | 36 * * adb shell am instrument -e ssid <ssid> -e password <password> \ 64 String password = arguments.getString("password"); 76 WifiConfiguration config = getConfig(ssid, securityType, password); 105 * Get the {@link WifiConfiguration} based on ssid, security, and password. 107 private WifiConfiguration getConfig(String ssid, SecurityType securityType, String password) { argument 116 assertNotNull("password is empty", password); 118 assertTrue(WifiConfigurationHelper.isHex(password, 1 [all...] |
/frameworks/base/keystore/java/android/security/ |
H A D | KeyStore.java | 84 * (or key pair) with the secure lock screen credential (e.g., password, PIN, or pattern). 86 * <p>Note that this requires that the secure lock screen (e.g., password, PIN, pattern) is set 256 * Attempt to unlock the keystore for {@code user} with the password {@code password}. 261 * @param password user's keystore password. Should be the most recent value passed to 266 public boolean unlock(int userId, String password) { argument 268 mError = mBinder.unlock(userId, password); 276 public boolean unlock(String password) { argument 277 return unlock(UserHandle.getUserId(Process.myUid()), password); [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSpi.java | 90 public Key engineGetKey(String alias, char[] password) throws NoSuchAlgorithmException, argument 272 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument 274 if ((password != null) && (password.length > 0)) { 922 public void engineStore(OutputStream stream, char[] password) throws IOException, argument 928 public void engineLoad(InputStream stream, char[] password) throws IOException, argument 934 if (password != null) { 935 throw new IllegalArgumentException("password not supported");
|
/frameworks/base/libs/storage/ |
H A D | IMountService.cpp | 521 int32_t decryptStorage(const String16& password) argument 525 data.writeString16(password); 538 int32_t encryptStorage(const String16& password) argument 542 data.writeString16(password);
|
/frameworks/base/obex/javax/obex/ |
H A D | PasswordAuthentication.java | 36 * This class holds user name and password combinations. 47 * password provided. 49 * @param password the password to include in the response 50 * @throws NullPointerException if <code>password</code> is 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { argument 59 mPassword = new byte[password.length]; 60 System.arraycopy(password, 0, mPassword, 0, password.length); 73 * Retrieves the password [all...] |
/frameworks/base/packages/Keyguard/test/src/com/android/keyguard/test/ |
H A D | KeyguardTestActivity.java | 328 public boolean checkPassword(String password) { argument 329 return password.length() > 4;
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
H A D | HTTPHandler.java | 49 String user, byte[] password) throws IOException { 56 mPassword = password; 48 HTTPHandler(Charset charset, OSUSocketFactory socketFactory, String user, byte[] password) argument
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/pps/ |
H A D | Credential.java | 39 EAPMethod eapMethod, String userName, String password, 48 if (!TextUtils.isEmpty(password)) { 49 byte[] pwOctets = Base64.decode(password, Base64.DEFAULT); 106 public Credential(Credential other, String password) { argument 112 mPassword = password; 38 Credential(long ctime, long expTime, String realm, boolean checkAAACert, EAPMethod eapMethod, String userName, String password, boolean machineManaged, String stApp, boolean share) argument
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/utils/ |
H A D | HTTPRequest.java | 61 public void doAuthenticate(HTTPResponse httpResponse, String userName, byte[] password, argument 64 generateAuthAnswer(httpResponse, userName, password, url, sequence)); 68 byte[] password, URL url, int sequence) 131 String passwordString = new String(password, StandardCharsets.UTF_8); 283 private static void test(String user, String realm, String password, String method, String path, argument 286 byte[] a1 = hash(user, realm, password); 67 generateAuthAnswer(HTTPResponse httpResponse, String userName, byte[] password, URL url, int sequence) argument
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | LockSettingsService.java | 105 * Keeps the lock pattern/password data and related settings for each user. 219 * @param managedUserPassword Managed profile original password (when it has separated lock). 250 // password directly, so we always store a password. 469 // No need to move the password / pattern files. They're already in the right place. 505 // No need to move the password / pattern files. They're already in the right place. 565 // When managed profile has a unified lock, the password quality stored has 2 569 // 2). PASSWORD_QUALITY_ALPHANUMERIC, which is the actual password quality for 719 private void setKeystorePassword(String password, int userHandle) { argument 721 ks.onUserPasswordChanged(userHandle, password); 724 unlockKeystore(String password, int userHandle) argument 959 setLockPassword(String password, String savedCredential, int userId) argument 968 setLockPasswordInternal(String password, String savedCredential, int userId) argument 1016 tieProfileLockToParent(int userId, String password) argument 1264 checkPassword(String password, int userId) argument 1270 verifyPassword(String password, long challenge, int userId) argument 1276 verifyTiedProfileChallenge(String password, boolean isPattern, long challenge, int userId) argument 1306 doVerifyPassword(String password, boolean hasChallenge, long challenge, int userId) argument 1313 doVerifyPassword(String password, CredentialHash storedHash, boolean hasChallenge, long challenge, int userId) argument [all...] |