/frameworks/base/keystore/java/android/security/ |
D | KeyStore.java | 116 public boolean password(byte[] oldPassword, byte[] newPassword) { in password() method in KeyStore 121 public boolean password(String oldPassword, String newPassword) { in password() method in KeyStore 122 return password(oldPassword.getBytes(), newPassword.getBytes()); in password() 125 public boolean password(byte[] password) { in password() argument 126 return password(password, password); in password() 129 public boolean password(String password) { in password() method in KeyStore 130 return password(password.getBytes()); in password() 138 public boolean unlock(byte[] password) { in unlock() argument 139 execute('u', password); in unlock() 143 public boolean unlock(String password) { in unlock() argument [all …]
|
/frameworks/base/keystore/tests/src/android/security/ |
D | KeyStoreTest.java | 70 assertTrue(mKeyStore.password(TEST_PASSWD)); in testPassword() 73 assertFalse(mKeyStore.password(TEST_PASSWD2, TEST_PASSWD2)); in testPassword() 76 assertTrue(mKeyStore.password(TEST_PASSWD, TEST_PASSWD2)); in testPassword() 82 mKeyStore.password(TEST_PASSWD); in testPut() 88 mKeyStore.password(TEST_PASSWD); in testDelete() 98 mKeyStore.password(TEST_PASSWD); in testContains() 109 mKeyStore.password(TEST_PASSWD); in testSaw() 120 mKeyStore.password(TEST_PASSWD); in testLock() 128 mKeyStore.password(TEST_PASSWD); in testUnlock()
|
/frameworks/base/obex/javax/obex/ |
D | PasswordAuthentication.java | 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { in PasswordAuthentication() argument 59 mPassword = new byte[password.length]; in PasswordAuthentication() 60 System.arraycopy(password, 0, mPassword, 0, password.length); in PasswordAuthentication()
|
D | ObexSession.java | 138 byte[] password = result.getPassword(); in handleAuthChall() 139 if (password == null) { in handleAuthChall() 163 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall() 167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall()
|
/frameworks/base/packages/VpnServices/src/com/android/server/vpn/ |
D | VpnDaemons.java | 49 String username, String password) throws IOException { in startL2tp() argument 50 return startMtpd(L2TP, serverIp, L2TP_PORT, secret, username, password, in startL2tp() 55 String password, boolean encryption) throws IOException { in startPptp() argument 56 return startMtpd(PPTP, serverIp, PPTP_PORT, null, username, password, in startPptp() 120 String password, boolean encryption) throws IOException { in startMtpd() argument 125 addPppArguments(args, serverIp, username, password, encryption); in startMtpd() 133 String username, String password, boolean encryption) in addPppArguments() argument 138 "password", password, in addPppArguments()
|
D | PptpService.java | 28 protected void connect(String serverIp, String username, String password) in connect() argument 31 getDaemons().startPptp(serverIp, username, password, in connect()
|
D | L2tpService.java | 28 protected void connect(String serverIp, String username, String password) in connect() argument 33 username, password); in connect()
|
D | L2tpIpsecPskService.java | 31 protected void connect(String serverIp, String username, String password) in connect() argument 45 username, password); in connect()
|
D | L2tpIpsecService.java | 31 protected void connect(String serverIp, String username, String password) in connect() argument 48 username, password); in connect()
|
D | VpnServiceBinder.java | 54 public boolean connect(VpnProfile p, String username, String password) { 55 return VpnServiceBinder.this.connect(p, username, password); 102 final String username, final String password) { in connect() argument 108 s.onConnect(username, password); in connect()
|
D | VpnService.java | 85 String password) throws IOException; in connect() argument 127 synchronized boolean onConnect(String username, String password) { in onConnect() argument 135 connect(serverIp, username, password); in onConnect()
|
/frameworks/base/core/java/android/net/http/ |
D | RequestHandle.java | 202 public void setupBasicAuthResponse(boolean isProxy, String username, String password) { in setupBasicAuthResponse() argument 203 String response = computeBasicAuthResponse(username, password); in setupBasicAuthResponse() 216 String password, in setupDigestAuthResponse() argument 224 username, password, realm, nonce, QOP, algorithm, opaque); in setupDigestAuthResponse() 253 public static String computeBasicAuthResponse(String username, String password) { in computeBasicAuthResponse() argument 255 Assert.assertNotNull(password); in computeBasicAuthResponse() 258 return new String(Base64.encodeBase64((username + ':' + password).getBytes())); in computeBasicAuthResponse() 269 String password, in computeDigestAuthResponse() argument 277 Assert.assertNotNull(password); in computeDigestAuthResponse() 280 String A1 = username + ":" + realm + ":" + password; in computeDigestAuthResponse()
|
D | HttpAuthHeader.java | 160 public void setPassword(String password) { in setPassword() argument 161 mPassword = password; in setPassword()
|
/frameworks/base/telephony/java/com/android/internal/telephony/gsm/ |
D | ApnSetting.java | 33 String password; field in ApnSetting 42 String user, String password, int authType, String[] types) { in ApnSetting() argument 53 this.password = password; in ApnSetting()
|
/frameworks/base/core/java/android/webkit/ |
D | HttpAuthHandler.java | 77 String password = msg.getData().getString("password"); in handleMessage() local 79 loader.handleAuthResponse(username, password); in handleMessage() 97 public void proceed(String username, String password) { in proceed() argument 100 msg.getData().putString("password", password); in proceed()
|
D | FrameLoader.java | 326 String password; in populateHeaders() local 330 password = mNetwork.getProxyPassword(); in populateHeaders() 332 if (username != null && password != null) { in populateHeaders() 337 username, password)); in populateHeaders()
|
D | LoadListener.java | 769 void handleAuthResponse(String username, String password) { in handleAuthResponse() argument 773 + " password: " + password); in handleAuthResponse() 777 if (username != null && password != null) { in handleAuthResponse() 780 mAuthHeader.setPassword(password); in handleAuthResponse() 788 username, password); in handleAuthResponse() 801 (isProxy, username, password, realm, in handleAuthResponse()
|
/frameworks/base/core/java/android/accounts/ |
D | IAccountManager.aidl | 35 boolean addAccount(in Account account, String password, in Bundle extras); in addAccount() argument 40 void setPassword(in Account account, String password); in setPassword() argument
|
/frameworks/base/tools/layoutlib/bridge/src/android/webkit/ |
D | WebView.java | 82 public void savePassword(String host, String username, String password) { in savePassword() argument 86 String username, String password) { in setHttpAuthUsernamePassword() argument
|
/frameworks/base/vpn/java/android/net/vpn/ |
D | IVpnService.aidl | 32 boolean connect(in VpnProfile profile, String username, String password); in connect() argument
|
/frameworks/base/cmds/keystore/ |
D | keystore.c | 341 static void generate_key(uint8_t *key, uint8_t *password, int length) in generate_key() argument 343 PKCS5_PBKDF2_HMAC_SHA1((char *)password, length, (uint8_t *)"keystore", in generate_key() 347 static int8_t password() in password() function 403 return password(); in unlock() 435 {password, 'p', 0, PASSWORD, {PASSWORD_SIZE, PASSWORD_SIZE}},
|
/frameworks/policies/base/phone/com/android/internal/policy/impl/ |
D | AccountUnlockScreen.java | 103 mPassword = (EditText) findViewById(R.id.password); in AccountUnlockScreen() 258 final String password = mPassword.getText().toString(); in asyncCheckPassword() local 266 options.putString(AccountManager.KEY_PASSWORD, password); in asyncCheckPassword()
|
/frameworks/base/docs/html/guide/publishing/ |
D | app-signing.jd | 90 a keystore and key with a known alias and password. At each compilation, the tools then use 91 the debug key to sign the application .apk file. Because the password is known, the tools 92 don't need to prompt you for the keystore/key password each time you compile.</li> 207 <li>Keystore password: "android"</li> 209 <li>Key password: "android"</li> 344 <td><code>-storepass <password></code></td><td><p>A password for the 347 If not supplied, Keytool prompts you to enter the password. In this 348 way, your password is not stored in your shell history.</p></td> 369 <td><code>-keypass <password></code></td><td><p>The password for the key.</p> 372 If not supplied, Keytool prompts you to enter the password. In this [all …]
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
D | CommandsInterface.java | 936 void setupDefaultPDP(String apn, String user, String password, Message response); in setupDefaultPDP() argument 1065 void queryFacilityLock (String facility, String password, int serviceClass, in queryFacilityLock() argument 1075 void setFacilityLock (String facility, boolean lockState, String password, in setFacilityLock() argument 1325 String user, String password, String authType, Message result); in setupDataCall() argument
|
D | IccCard.java | 282 String password, Message onComplete) { in setIccLockEnabled() argument 291 enabled, password, serviceClassX, in setIccLockEnabled() 307 String password, Message onComplete) { in setIccFdnEnabled() argument 317 enabled, password, serviceClassX, in setIccFdnEnabled()
|