/frameworks/base/core/java/android/webkit/ |
H A D | HttpAuthHandler.java | 62 public void proceed(String username, String password) { argument
|
H A D | WebViewDatabase.java | 26 * <li>Username/password pairs for web forms</li> 27 * <li>HTTP authentication username/password pairs</li> 42 * Gets whether there are any saved username/password pairs for web forms. 45 * @return true if there are any saved username/password pairs 54 * Clears any saved username/password pairs for web forms. 76 * and password stored in WebViewDatabase instance. The username and password are not read from 80 * The username and password used for http authentication might be cached in the network stack 98 * with the correct username and password. 100 * The embedder app can get the username and password an 122 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument [all...] |
/frameworks/base/obex/javax/obex/ |
H A D | PasswordAuthentication.java | 36 * This class holds user name and password combinations. 47 * password provided. 49 * @param password the password to include in the response 50 * @throws NullPointerException if <code>password</code> is 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { argument 59 mPassword = new byte[password.length]; 60 System.arraycopy(password, 0, mPassword, 0, password.length); 73 * Retrieves the password [all...] |
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/ |
H A D | WifiAssociationTest.java | 36 * * adb shell am instrument -e ssid <ssid> -e password <password> \ 64 String password = arguments.getString("password"); 71 WifiConfiguration config = getConfig(ssid, securityType, password); 78 * Get the {@link WifiConfiguration} based on ssid, security, and password. 80 private WifiConfiguration getConfig(String ssid, SecurityType securityType, String password) { argument 89 assertNotNull("password is empty", password); 91 assertTrue(WifiConfigurationHelper.isHex(password, 1 [all...] |
/frameworks/base/core/java/com/android/internal/widget/ |
H A D | LockPatternChecker.java | 146 * Verify a password asynchronously. 149 * @param password The password to check. 155 final String password, 165 return utils.verifyPassword(password, challenge, userId); 182 * Verify a password asynchronously. 185 * @param password The password to check. 191 final String password, 202 return utils.verifyTiedProfileChallenge(password, isPatter 154 verifyPassword(final LockPatternUtils utils, final String password, final long challenge, final int userId, final OnVerifyCallback callback) argument 190 verifyTiedProfileChallenge(final LockPatternUtils utils, final String password, final boolean isPattern, final long challenge, final int userId, final OnVerifyCallback callback) argument 226 checkPassword(final LockPatternUtils utils, final String password, final int userId, final OnCheckCallback callback) argument [all...] |
/frameworks/base/services/core/jni/ |
H A D | com_android_server_SyntheticPasswordManager.cpp | 51 static jbyteArray android_server_SyntheticPasswordManager_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, jbyteArray salt, jint N, jint r, jint p, jint outLen) { argument 52 if (!password || !salt) { 56 int passwordLen = env->GetArrayLength(password); 60 jbyte* passwordPtr = (jbyte*)env->GetByteArrayElements(password, NULL); 67 env->ReleaseByteArrayElements(password, passwordPtr, JNI_ABORT);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | MockSyntheticPasswordManager.java | 91 protected byte[] scrypt(String password, byte[] salt, int N, int r, int p, int outLen) { argument 93 PBEKeySpec spec = new PBEKeySpec(password.toCharArray(), salt, 10, outLen * 8);
|
H A D | SyntheticPasswordTests.java | 48 final String PASSWORD = "user-password"; 49 final String BADPASSWORD = "bad-password"; 76 final String PASSWORD = "testPasswordMigration-password"; 95 private void initializeCredentialUnderSP(String password, int userId) throws RemoteException { argument 97 mService.setLockCredential(password, password != null ? LockPatternUtils.CREDENTIAL_TYPE_PASSWORD : LockPatternUtils.CREDENTIAL_TYPE_NONE, null, userId); 101 final String PASSWORD = "testSyntheticPasswordChangeCredential-password"; 114 final String PASSWORD = "testSyntheticPasswordVerifyCredential-password"; 126 final String PASSWORD = "testSyntheticPasswordClearCredential-password"; 131 // clear password [all...] |
H A D | LockSettingsServiceTestable.java | 119 protected void tieProfileLockToParent(int userId, String password) { argument 120 mStorage.writeChildProfileLock(userId, password.getBytes());
|
H A D | MockGateKeeperService.java | 33 public byte[] password; field in class:MockGateKeeperService.VerifyHandle 36 public VerifyHandle(byte[] password, long sid) { argument 37 this.password = password; 47 password = new byte[buffer.remaining()]; 48 buffer.get(password); 52 ByteBuffer buffer = ByteBuffer.allocate(1 + Long.BYTES + password.length); 55 buffer.put(password); 98 if (Arrays.equals(currentPassword, handle.password)) { 128 if (Arrays.equals(handle.password, providedPasswor [all...] |
H A D | LockSettingsStorageTests.java | 309 assertEquals("/data/system/password.key", storage.getLegacyLockPasswordFilename(0)); 311 assertEquals("/data/system/gatekeeper.password.key", storage.getLockPasswordFilename(0)); 318 assertEquals("/data/system/users/1/gatekeeper.password.key", storage.getLockPasswordFilename(1)); 325 assertEquals("/data/system/users/2/gatekeeper.password.key", storage.getLockPasswordFilename(2)); 332 assertEquals("/data/system/users/3/gatekeeper.password.key", storage.getLockPasswordFilename(3)); 352 private void writePasswordBytes(byte[] password, int userId) { argument 354 password, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD), userId); 362 private void assertPasswordBytes(byte[] password, int userId) { argument 365 assertArrayEquals(password, cred.hash);
|
/frameworks/base/core/java/android/app/admin/ |
H A D | PasswordMetrics.java | 30 * A class that represents the metrics of a password that are used to decide whether or not a 31 * password meets the requirements. 37 // consider it a complex PIN/password. 112 public static PasswordMetrics computeForPassword(@NonNull String password) { argument 120 final int length = password.length(); 122 switch (categoryChar(password.charAt(i))) { 142 // Determine the quality of the password 151 quality = maxLengthSequence(password) > MAX_ALLOWED_SEQUENCE
|
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 100 * For simplicity use the same password for the key as that of the keystore 255 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) argument 262 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
H A D | WifiConfigurationHelper.java | 68 * @param password Either a 10, 26, or 58 character hex string or the plain text password 71 public static WifiConfiguration createWepConfig(String ssid, String password) { argument 74 if (isHex(password, 10) || isHex(password, 26) || isHex(password, 58)) { 75 config.wepKeys[0] = password; 77 config.wepKeys[0] = quotedString(password); 90 * @param password Either a 64 character hex string or the plain text password 93 createPskConfig(String ssid, String password) argument 118 createEapConfig(String ssid, String password, int eapMethod, Integer phase2, String identity, String anonymousIdentity, String caCert, String clientCert) argument [all...] |
H A D | ConnectivityManagerTestBase.java | 319 protected boolean connectToWifi(String ssid, String password) { argument 321 if (password == null) { 324 config = WifiConfigurationHelper.createPskConfig(ssid, password);
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
H A D | HTTPHandler.java | 49 String user, byte[] password) throws IOException { 56 mPassword = password; 48 HTTPHandler(Charset charset, OSUSocketFactory socketFactory, String user, byte[] password) argument
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
H A D | WifiConfigurationUtilTest.java | 80 .setIdentity("username", "password") 122 .setIdentity("username", "password"); 126 .setIdentity("username", "password") 140 .setIdentity("username", "password") 145 .setIdentity("username", "password") 159 .setIdentity("username", "password") 164 .setIdentity("username", "password") 178 .setIdentity("username", "password") 184 .setIdentity("username", "password") 358 public String password; field in class:WifiConfigurationUtilTest.EnterpriseConfig 374 setIdentity(String identity, String password) argument [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
H A D | DataProfile.java | 42 //the password for APN, or NULL 43 public final String password; field in class:DataProfile 75 String user, String password, int type, int maxConnsTime, int maxConns, 89 this.password = password; 111 apn.authType, apn.user, apn.password, apn.bearerBitmask == 0 122 + "/" + user + "/" + password + "/" + type + "/" + maxConnsTime 74 DataProfile(int profileId, String apn, String protocol, int authType, String user, String password, int type, int maxConnsTime, int maxConns, int waitTime, boolean enabled, int supportedApnTypesBitmap, String roamingProtocol, int bearerBitmap, int mtu, String mvnoType, String mvnoMatchData, boolean modemCognitive) argument
|
H A D | ApnSetting.java | 56 public final String password; field in class:ApnSetting 118 String user, String password, int authType, String[] types, 133 this.password = password; 160 apn.mmsPort, apn.user, apn.password, apn.authType, apn.types, apn.protocol, 175 * <carrier>, <apn>, <proxy>, <port>, <user>, <password>, <server>, 180 * [ApnSettingV2] <carrier>, <apn>, <proxy>, <port>, <user>, <password>, <server>, 185 * [ApnSettingV3] <carrier>, <apn>, <proxy>, <port>, <user>, <password>, <server>, 192 * and password and thus cannot be read by this method. 496 && TextUtils.equals(password, othe 115 ApnSetting(int id, String numeric, String carrier, String apn, String proxy, String port, String mmsc, String mmsProxy, String mmsPort, String user, String password, int authType, String[] types, String protocol, String roamingProtocol, boolean carrierEnabled, int bearer, int bearerBitmask, int profileId, boolean modemCognitive, int maxConns, int waitTime, int maxConnsTime, int mtu, String mvnoType, String mvnoMatchData) argument [all...] |
/frameworks/base/core/java/com/android/internal/net/ |
H A D | VpnProfile.java | 53 public String password = ""; // 4 field in class:VpnProfile 78 password = in.readString(); 99 out.writeString(password); 133 profile.password = values[4]; 145 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); 158 builder.append('\0').append(saveLogin ? password : "");
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSpi.java | 90 public Key engineGetKey(String alias, char[] password) throws NoSuchAlgorithmException, argument 272 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument 274 if ((password != null) && (password.length > 0)) { 931 public void engineStore(OutputStream stream, char[] password) throws IOException, argument 937 public void engineLoad(InputStream stream, char[] password) throws IOException, argument 943 if (password != null) { 944 throw new IllegalArgumentException("password not supported");
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/pps/ |
H A D | Credential.java | 39 EAPMethod eapMethod, String userName, String password, 48 if (!TextUtils.isEmpty(password)) { 49 byte[] pwOctets = Base64.decode(password, Base64.DEFAULT); 106 public Credential(Credential other, String password) { argument 112 mPassword = password; 38 Credential(long ctime, long expTime, String realm, boolean checkAAACert, EAPMethod eapMethod, String userName, String password, boolean machineManaged, String stApp, boolean share) argument
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/utils/ |
H A D | HTTPRequest.java | 61 public void doAuthenticate(HTTPResponse httpResponse, String userName, byte[] password, argument 64 generateAuthAnswer(httpResponse, userName, password, url, sequence)); 68 byte[] password, URL url, int sequence) 131 String passwordString = new String(password, StandardCharsets.UTF_8); 283 private static void test(String user, String realm, String password, String method, String path, argument 286 byte[] a1 = hash(user, realm, password); 67 generateAuthAnswer(HTTPResponse httpResponse, String userName, byte[] password, URL url, int sequence) argument
|
/frameworks/base/wifi/java/android/net/wifi/hotspot2/pps/ |
H A D | UpdateParameter.java | 78 * Maximum bytes for password. 147 * Base64 encoded password used to authenticate with the policy server. 150 public void setBase64EncodedPassword(String password) { argument 151 mBase64EncodedPassword = password; 325 Log.d(TAG, "Invalid encoding for password: " + mBase64EncodedPassword);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | IccCard.java | 145 * @param password needed to change the ICC pin state, aka. Pin1 152 String password, Message onComplete); 159 * @param password needed to change the ICC fdn enable, aka Pin2 166 String password, Message onComplete); 169 * Change the ICC password used in ICC pin lock 172 * @param oldPassword is the old password 173 * @param newPassword is the new password 183 * Change the ICC password used in ICC fdn enable 186 * @param oldPassword is the old password 187 * @param newPassword is the new password 151 setIccLockEnabled(boolean enabled, String password, Message onComplete) argument 165 setIccFdnEnabled(boolean enabled, String password, Message onComplete) argument [all...] |