Searched defs:password (Results 1 - 25 of 68) sorted by relevance

123

/frameworks/base/core/java/android/webkit/
H A DHttpAuthHandler.java62 public void proceed(String username, String password) { argument
H A DWebViewDatabase.java27 * <li>Username/password pairs for web forms</li>
28 * <li>HTTP authentication username/password pairs</li>
43 * Gets whether there are any saved username/password pairs for web forms.
46 * @return {@code true} if there are any saved username/password pairs
55 * Clears any saved username/password pairs for web forms.
77 * and password stored in WebViewDatabase instance. The username and password are not read from
81 * The username and password used for http authentication might be cached in the network stack
99 * with the correct username and password.
101 * The embedder app can get the username and password an
123 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument
[all...]
/frameworks/base/obex/javax/obex/
H A DPasswordAuthentication.java36 * This class holds user name and password combinations.
47 * password provided.
49 * @param password the password to include in the response
50 * @throws NullPointerException if <code>password</code> is
53 public PasswordAuthentication(final byte[] userName, final byte[] password) { argument
59 mPassword = new byte[password.length];
60 System.arraycopy(password, 0, mPassword, 0, password.length);
73 * Retrieves the password
[all...]
/frameworks/base/core/java/android/security/
H A DScrypt.java20 * A Java wrapper for the JNI function to perform the password hashing algorithm SCRYPT.
26 native byte[] nativeScrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen); argument
28 /** Computes the password hashing algorithm SCRYPT. */
29 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { argument
30 return nativeScrypt(password, salt, n, r, p, outLen);
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/
H A DWifiAssociationTest.java36 * * adb shell am instrument -e ssid <ssid> -e password <password> \
64 String password = arguments.getString("password");
71 WifiConfiguration config = getConfig(ssid, securityType, password);
78 * Get the {@link WifiConfiguration} based on ssid, security, and password.
80 private WifiConfiguration getConfig(String ssid, SecurityType securityType, String password) { argument
89 assertNotNull("password is empty", password);
91 assertTrue(WifiConfigurationHelper.isHex(password, 1
[all...]
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/
H A DKeyStoreProxy.java37 Key getKey(String alias, char[] password) argument
H A DKeyStoreProxyImpl.java49 public Key getKey(String alias, char[] password) argument
51 return mKeyStore.getKey(alias, password);
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
H A DMockScrypt.java31 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { argument
35 password.length + salt.length + Integer.BYTES * 6);
37 byteBuffer.putInt(password.length);
38 byteBuffer.put(password);
/frameworks/base/core/jni/
H A Dandroid_security_Scrypt.cpp34 static jbyteArray android_security_Scrypt_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, jbyteArray salt, jint N, jint r, jint p, jint outLen) { argument
35 if (!password || !salt) {
39 int passwordLen = env->GetArrayLength(password);
43 jbyte* passwordPtr = (jbyte*)env->GetByteArrayElements(password, NULL);
50 env->ReleaseByteArrayElements(password, passwordPtr, JNI_ABORT);
/frameworks/base/core/java/com/android/internal/widget/
H A DLockPatternChecker.java146 * Verify a password asynchronously.
149 * @param password The password to check.
155 final String password,
165 return utils.verifyPassword(password, challenge, userId);
182 * Verify a password asynchronously.
185 * @param password The password to check.
191 final String password,
202 return utils.verifyTiedProfileChallenge(password, isPatter
154 verifyPassword(final LockPatternUtils utils, final String password, final long challenge, final int userId, final OnVerifyCallback callback) argument
190 verifyTiedProfileChallenge(final LockPatternUtils utils, final String password, final boolean isPattern, final long challenge, final int userId, final OnVerifyCallback callback) argument
226 checkPassword(final LockPatternUtils utils, final String password, final int userId, final OnCheckCallback callback) argument
[all...]
/frameworks/base/services/core/jni/
H A Dcom_android_server_locksettings_SyntheticPasswordManager.cpp51 static jbyteArray android_server_SyntheticPasswordManager_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, jbyteArray salt, jint N, jint r, jint p, jint outLen) { argument
52 if (!password || !salt) {
56 int passwordLen = env->GetArrayLength(password);
60 jbyte* passwordPtr = (jbyte*)env->GetByteArrayElements(password, NULL);
67 env->ReleaseByteArrayElements(password, passwordPtr, JNI_ABORT);
/frameworks/base/core/java/android/app/admin/
H A DPasswordMetrics.java28 * A class that represents the metrics of a password that are used to decide whether or not a
29 * password meets the requirements.
35 // consider it a complex PIN/password.
110 public static PasswordMetrics computeForPassword(@NonNull String password) { argument
118 final int length = password.length();
120 switch (categoryChar(password.charAt(i))) {
140 // Determine the quality of the password
149 quality = maxLengthSequence(password) > MAX_ALLOWED_SEQUENCE
/frameworks/base/core/java/org/apache/http/conn/ssl/
H A DSSLSocketFactory.java100 * For simplicity use the same password for the key as that of the keystore
255 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) argument
262 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
H A DWifiConfigurationHelper.java68 * @param password Either a 10, 26, or 58 character hex string or the plain text password
71 public static WifiConfiguration createWepConfig(String ssid, String password) { argument
74 if (isHex(password, 10) || isHex(password, 26) || isHex(password, 58)) {
75 config.wepKeys[0] = password;
77 config.wepKeys[0] = quotedString(password);
90 * @param password Either a 64 character hex string or the plain text password
93 createPskConfig(String ssid, String password) argument
118 createEapConfig(String ssid, String password, int eapMethod, Integer phase2, String identity, String anonymousIdentity, String caCert, String clientCert) argument
[all...]
H A DConnectivityManagerTestBase.java313 protected boolean connectToWifi(String ssid, String password) { argument
315 if (password == null) {
318 config = WifiConfigurationHelper.createPskConfig(ssid, password);
/frameworks/base/services/tests/servicestests/src/com/android/server/backup/
H A DBackupPasswordManagerTest.java96 String password = "password1234";
97 mPasswordManager.setBackupPassword(null, password);
98 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue();
109 String password = "corgi\uFFFF";
111 writeV1HashToFile(password, saltFixture());
116 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue();
121 // The algorithms produce identical hashes except if the password contains higher-order
124 String password = "corgi\uFFFF";
126 writeV1HashToFile(password, saltFixture());
131 assertThat(mPasswordManager.backupPasswordMatches(password))
193 writeV1HashToFile(String password, byte[] salt) argument
[all...]
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
H A DFakeGateKeeperService.java33 public byte[] password; field in class:FakeGateKeeperService.VerifyHandle
36 public VerifyHandle(byte[] password, long sid) { argument
37 this.password = password;
47 password = new byte[buffer.remaining()];
48 buffer.get(password);
52 ByteBuffer buffer = ByteBuffer.allocate(1 + Long.BYTES + password.length);
55 buffer.put(password);
97 if (Arrays.equals(currentPassword, handle.password)) {
104 // current password i
[all...]
H A DLockSettingsServiceTestable.java123 protected void tieProfileLockToParent(int userId, String password) { argument
124 mStorage.writeChildProfileLock(userId, password.getBytes());
H A DMockSyntheticPasswordManager.java96 protected byte[] scrypt(String password, byte[] salt, int N, int r, int p, int outLen) { argument
98 PBEKeySpec spec = new PBEKeySpec(password.toCharArray(), salt, 10, outLen * 8);
H A DSyntheticPasswordTests.java68 final String PASSWORD = "user-password";
69 final String BADPASSWORD = "bad-password";
100 final String PASSWORD = "testPasswordMigration-password";
123 protected void initializeCredentialUnderSP(String password, int userId) throws RemoteException { argument
125 int quality = password != null ? PASSWORD_QUALITY_ALPHABETIC
127 int type = password != null ? LockPatternUtils.CREDENTIAL_TYPE_PASSWORD
129 mService.setLockCredential(password, type, null, quality, userId);
133 final String PASSWORD = "testSyntheticPasswordChangeCredential-password";
147 final String PASSWORD = "testSyntheticPasswordVerifyCredential-password";
161 final String PASSWORD = "testSyntheticPasswordClearCredential-password";
[all...]
H A DLockSettingsStorageTests.java318 assertEquals("/data/system/password.key", storage.getLegacyLockPasswordFilename(0));
320 assertEquals("/data/system/gatekeeper.password.key", storage.getLockPasswordFilename(0));
327 assertEquals("/data/system/users/1/gatekeeper.password.key", storage.getLockPasswordFilename(1));
334 assertEquals("/data/system/users/2/gatekeeper.password.key", storage.getLockPasswordFilename(2));
341 assertEquals("/data/system/users/3/gatekeeper.password.key", storage.getLockPasswordFilename(3));
477 private void writePasswordBytes(byte[] password, int userId) { argument
479 password, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD), userId);
487 private void assertPasswordBytes(byte[] password, int userId) { argument
490 assertArrayEquals(password, cred.hash);
/frameworks/base/core/java/com/android/internal/net/
H A DVpnProfile.java53 public String password = ""; // 4 field in class:VpnProfile
78 password = in.readString();
99 out.writeString(password);
133 profile.password = values[4];
145 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty();
158 builder.append('\0').append(saveLogin ? password : "");
/frameworks/base/keystore/java/android/security/keystore/
H A DAndroidKeyStoreSpi.java93 public Key engineGetKey(String alias, char[] password) throws NoSuchAlgorithmException, argument
271 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument
273 if ((password != null) && (password.length > 0)) {
1002 public void engineStore(OutputStream stream, char[] password) throws IOException, argument
1008 public void engineLoad(InputStream stream, char[] password) throws IOException, argument
1014 if (password != null) {
1015 throw new IllegalArgumentException("password not supported");
/frameworks/base/services/backup/java/com/android/server/backup/
H A DBackupPasswordManager.java35 * <p>Does not persist the password itself, but persists a PBKDF2 hash with a randomly chosen (also
64 * Creates an instance enforcing permissions using the {@code context} and persisting password
67 * @param context The context, for enforcing permissions around setting the password.
68 * @param baseStateDir A directory within which to persist password data.
69 * @param secureRandom Random number generator with which to generate password salts.
79 * Returns {@code true} if a password for backup is set.
91 * Returns {@code true} if {@code password} matches the persisted password.
96 boolean backupPasswordMatches(String password) { argument
97 if (hasBackupPassword() && !passwordMatchesSaved(password)) {
[all...]
/frameworks/base/wifi/java/android/net/wifi/hotspot2/pps/
H A DUpdateParameter.java78 * Maximum bytes for password.
147 * Base64 encoded password used to authenticate with the policy server.
150 public void setBase64EncodedPassword(String password) { argument
151 mBase64EncodedPassword = password;
325 Log.d(TAG, "Invalid encoding for password: " + mBase64EncodedPassword);

Completed in 684 milliseconds

123