/frameworks/base/core/java/android/webkit/ |
H A D | HttpAuthHandler.java | 62 public void proceed(String username, String password) { argument
|
H A D | WebViewDatabase.java | 27 * <li>Username/password pairs for web forms</li> 28 * <li>HTTP authentication username/password pairs</li> 43 * Gets whether there are any saved username/password pairs for web forms. 46 * @return {@code true} if there are any saved username/password pairs 55 * Clears any saved username/password pairs for web forms. 77 * and password stored in WebViewDatabase instance. The username and password are not read from 81 * The username and password used for http authentication might be cached in the network stack 99 * with the correct username and password. 101 * The embedder app can get the username and password an 123 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument [all...] |
/frameworks/base/obex/javax/obex/ |
H A D | PasswordAuthentication.java | 36 * This class holds user name and password combinations. 47 * password provided. 49 * @param password the password to include in the response 50 * @throws NullPointerException if <code>password</code> is 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { argument 59 mPassword = new byte[password.length]; 60 System.arraycopy(password, 0, mPassword, 0, password.length); 73 * Retrieves the password [all...] |
/frameworks/base/core/java/android/security/ |
H A D | Scrypt.java | 20 * A Java wrapper for the JNI function to perform the password hashing algorithm SCRYPT. 26 native byte[] nativeScrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen); argument 28 /** Computes the password hashing algorithm SCRYPT. */ 29 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { argument 30 return nativeScrypt(password, salt, n, r, p, outLen);
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/ |
H A D | WifiAssociationTest.java | 36 * * adb shell am instrument -e ssid <ssid> -e password <password> \ 64 String password = arguments.getString("password"); 71 WifiConfiguration config = getConfig(ssid, securityType, password); 78 * Get the {@link WifiConfiguration} based on ssid, security, and password. 80 private WifiConfiguration getConfig(String ssid, SecurityType securityType, String password) { argument 89 assertNotNull("password is empty", password); 91 assertTrue(WifiConfigurationHelper.isHex(password, 1 [all...] |
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeyStoreProxy.java | 37 Key getKey(String alias, char[] password) argument
|
H A D | KeyStoreProxyImpl.java | 49 public Key getKey(String alias, char[] password) argument 51 return mKeyStore.getKey(alias, password);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | MockScrypt.java | 31 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { argument 35 password.length + salt.length + Integer.BYTES * 6); 37 byteBuffer.putInt(password.length); 38 byteBuffer.put(password);
|
/frameworks/base/core/jni/ |
H A D | android_security_Scrypt.cpp | 34 static jbyteArray android_security_Scrypt_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, jbyteArray salt, jint N, jint r, jint p, jint outLen) { argument 35 if (!password || !salt) { 39 int passwordLen = env->GetArrayLength(password); 43 jbyte* passwordPtr = (jbyte*)env->GetByteArrayElements(password, NULL); 50 env->ReleaseByteArrayElements(password, passwordPtr, JNI_ABORT);
|
/frameworks/base/core/java/com/android/internal/widget/ |
H A D | LockPatternChecker.java | 146 * Verify a password asynchronously. 149 * @param password The password to check. 155 final String password, 165 return utils.verifyPassword(password, challenge, userId); 182 * Verify a password asynchronously. 185 * @param password The password to check. 191 final String password, 202 return utils.verifyTiedProfileChallenge(password, isPatter 154 verifyPassword(final LockPatternUtils utils, final String password, final long challenge, final int userId, final OnVerifyCallback callback) argument 190 verifyTiedProfileChallenge(final LockPatternUtils utils, final String password, final boolean isPattern, final long challenge, final int userId, final OnVerifyCallback callback) argument 226 checkPassword(final LockPatternUtils utils, final String password, final int userId, final OnCheckCallback callback) argument [all...] |
/frameworks/base/services/core/jni/ |
H A D | com_android_server_locksettings_SyntheticPasswordManager.cpp | 51 static jbyteArray android_server_SyntheticPasswordManager_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, jbyteArray salt, jint N, jint r, jint p, jint outLen) { argument 52 if (!password || !salt) { 56 int passwordLen = env->GetArrayLength(password); 60 jbyte* passwordPtr = (jbyte*)env->GetByteArrayElements(password, NULL); 67 env->ReleaseByteArrayElements(password, passwordPtr, JNI_ABORT);
|
/frameworks/base/core/java/android/app/admin/ |
H A D | PasswordMetrics.java | 28 * A class that represents the metrics of a password that are used to decide whether or not a 29 * password meets the requirements. 35 // consider it a complex PIN/password. 110 public static PasswordMetrics computeForPassword(@NonNull String password) { argument 118 final int length = password.length(); 120 switch (categoryChar(password.charAt(i))) { 140 // Determine the quality of the password 149 quality = maxLengthSequence(password) > MAX_ALLOWED_SEQUENCE
|
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 100 * For simplicity use the same password for the key as that of the keystore 255 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) argument 262 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
H A D | WifiConfigurationHelper.java | 68 * @param password Either a 10, 26, or 58 character hex string or the plain text password 71 public static WifiConfiguration createWepConfig(String ssid, String password) { argument 74 if (isHex(password, 10) || isHex(password, 26) || isHex(password, 58)) { 75 config.wepKeys[0] = password; 77 config.wepKeys[0] = quotedString(password); 90 * @param password Either a 64 character hex string or the plain text password 93 createPskConfig(String ssid, String password) argument 118 createEapConfig(String ssid, String password, int eapMethod, Integer phase2, String identity, String anonymousIdentity, String caCert, String clientCert) argument [all...] |
H A D | ConnectivityManagerTestBase.java | 313 protected boolean connectToWifi(String ssid, String password) { argument 315 if (password == null) { 318 config = WifiConfigurationHelper.createPskConfig(ssid, password);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/backup/ |
H A D | BackupPasswordManagerTest.java | 96 String password = "password1234"; 97 mPasswordManager.setBackupPassword(null, password); 98 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue(); 109 String password = "corgi\uFFFF"; 111 writeV1HashToFile(password, saltFixture()); 116 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue(); 121 // The algorithms produce identical hashes except if the password contains higher-order 124 String password = "corgi\uFFFF"; 126 writeV1HashToFile(password, saltFixture()); 131 assertThat(mPasswordManager.backupPasswordMatches(password)) 193 writeV1HashToFile(String password, byte[] salt) argument [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | FakeGateKeeperService.java | 33 public byte[] password; field in class:FakeGateKeeperService.VerifyHandle 36 public VerifyHandle(byte[] password, long sid) { argument 37 this.password = password; 47 password = new byte[buffer.remaining()]; 48 buffer.get(password); 52 ByteBuffer buffer = ByteBuffer.allocate(1 + Long.BYTES + password.length); 55 buffer.put(password); 97 if (Arrays.equals(currentPassword, handle.password)) { 104 // current password i [all...] |
H A D | LockSettingsServiceTestable.java | 123 protected void tieProfileLockToParent(int userId, String password) { argument 124 mStorage.writeChildProfileLock(userId, password.getBytes());
|
H A D | MockSyntheticPasswordManager.java | 96 protected byte[] scrypt(String password, byte[] salt, int N, int r, int p, int outLen) { argument 98 PBEKeySpec spec = new PBEKeySpec(password.toCharArray(), salt, 10, outLen * 8);
|
H A D | SyntheticPasswordTests.java | 68 final String PASSWORD = "user-password"; 69 final String BADPASSWORD = "bad-password"; 100 final String PASSWORD = "testPasswordMigration-password"; 123 protected void initializeCredentialUnderSP(String password, int userId) throws RemoteException { argument 125 int quality = password != null ? PASSWORD_QUALITY_ALPHABETIC 127 int type = password != null ? LockPatternUtils.CREDENTIAL_TYPE_PASSWORD 129 mService.setLockCredential(password, type, null, quality, userId); 133 final String PASSWORD = "testSyntheticPasswordChangeCredential-password"; 147 final String PASSWORD = "testSyntheticPasswordVerifyCredential-password"; 161 final String PASSWORD = "testSyntheticPasswordClearCredential-password"; [all...] |
H A D | LockSettingsStorageTests.java | 318 assertEquals("/data/system/password.key", storage.getLegacyLockPasswordFilename(0)); 320 assertEquals("/data/system/gatekeeper.password.key", storage.getLockPasswordFilename(0)); 327 assertEquals("/data/system/users/1/gatekeeper.password.key", storage.getLockPasswordFilename(1)); 334 assertEquals("/data/system/users/2/gatekeeper.password.key", storage.getLockPasswordFilename(2)); 341 assertEquals("/data/system/users/3/gatekeeper.password.key", storage.getLockPasswordFilename(3)); 477 private void writePasswordBytes(byte[] password, int userId) { argument 479 password, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD), userId); 487 private void assertPasswordBytes(byte[] password, int userId) { argument 490 assertArrayEquals(password, cred.hash);
|
/frameworks/base/core/java/com/android/internal/net/ |
H A D | VpnProfile.java | 53 public String password = ""; // 4 field in class:VpnProfile 78 password = in.readString(); 99 out.writeString(password); 133 profile.password = values[4]; 145 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); 158 builder.append('\0').append(saveLogin ? password : "");
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSpi.java | 93 public Key engineGetKey(String alias, char[] password) throws NoSuchAlgorithmException, argument 271 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument 273 if ((password != null) && (password.length > 0)) { 1002 public void engineStore(OutputStream stream, char[] password) throws IOException, argument 1008 public void engineLoad(InputStream stream, char[] password) throws IOException, argument 1014 if (password != null) { 1015 throw new IllegalArgumentException("password not supported");
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | BackupPasswordManager.java | 35 * <p>Does not persist the password itself, but persists a PBKDF2 hash with a randomly chosen (also 64 * Creates an instance enforcing permissions using the {@code context} and persisting password 67 * @param context The context, for enforcing permissions around setting the password. 68 * @param baseStateDir A directory within which to persist password data. 69 * @param secureRandom Random number generator with which to generate password salts. 79 * Returns {@code true} if a password for backup is set. 91 * Returns {@code true} if {@code password} matches the persisted password. 96 boolean backupPasswordMatches(String password) { argument 97 if (hasBackupPassword() && !passwordMatchesSaved(password)) { [all...] |
/frameworks/base/wifi/java/android/net/wifi/hotspot2/pps/ |
H A D | UpdateParameter.java | 78 * Maximum bytes for password. 147 * Base64 encoded password used to authenticate with the policy server. 150 public void setBase64EncodedPassword(String password) { argument 151 mBase64EncodedPassword = password; 325 Log.d(TAG, "Invalid encoding for password: " + mBase64EncodedPassword);
|