/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
D | SyntheticPasswordTests.java | 73 final byte[] password = "user-password".getBytes(); in testPasswordBasedSyntheticPassword() 80 password, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, authToken, in testPasswordBasedSyntheticPassword() 84 mGateKeeperService, handle, password, USER_ID, null); in testPasswordBasedSyntheticPassword() 106 final byte[] password = "testPasswordMigration-password".getBytes(); in testPasswordMigration() 109 mService.setLockCredential(password, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, null, in testPasswordMigration() 116 password, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, 0, PRIMARY_USER_ID) in testPasswordMigration() 122 assertEquals(VerifyCredentialResponse.RESPONSE_OK, mService.verifyCredential(password, in testPasswordMigration() 129 protected void initializeCredentialUnderSP(byte[] password, int userId) throws RemoteException { in initializeCredentialUnderSP() argument 131 int quality = password != null ? PASSWORD_QUALITY_ALPHABETIC in initializeCredentialUnderSP() 133 int type = password != null ? LockPatternUtils.CREDENTIAL_TYPE_PASSWORD in initializeCredentialUnderSP() [all …]
|
D | CachedSyntheticPasswordTests.java | 62 final byte[] password = "testSyntheticPasswordClearCredential-password".getBytes(); in testSyntheticPasswordClearCredentialUntrusted() 65 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testSyntheticPasswordClearCredentialUntrusted() 82 final byte[] password = "testSyntheticPasswordClearCredential-password".getBytes(); in testSyntheticPasswordChangeCredentialUntrusted() 85 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testSyntheticPasswordChangeCredentialUntrusted() 99 final byte[] password = in testUntrustedCredentialChangeMaintainsAuthSecret() 104 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testUntrustedCredentialChangeMaintainsAuthSecret() 121 final byte[] password = in testUntrustedCredentialChangeBlockedIfSpNotCached() 129 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testUntrustedCredentialChangeBlockedIfSpNotCached() 144 assertEquals(VerifyCredentialResponse.RESPONSE_OK, mService.verifyCredential(password, in testUntrustedCredentialChangeBlockedIfSpNotCached()
|
D | FakeGateKeeperService.java | 33 public byte[] password; field in FakeGateKeeperService.VerifyHandle 36 public VerifyHandle(byte[] password, long sid) { in VerifyHandle() argument 37 this.password = password; in VerifyHandle() 47 password = new byte[buffer.remaining()]; in VerifyHandle() 48 buffer.get(password); in VerifyHandle() 52 ByteBuffer buffer = ByteBuffer.allocate(1 + Long.BYTES + password.length); in toBytes() 55 buffer.put(password); in toBytes() 97 if (Arrays.equals(currentPassword, handle.password)) { in enroll() 128 if (Arrays.equals(handle.password, providedPassword)) { in verifyChallenge()
|
D | MockSyntheticPasswordManager.java | 98 protected byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument 100 char[] passwordChars = new char[password.length]; in scrypt() 101 for (int i = 0; i < password.length; i++) { in scrypt() 102 passwordChars[i] = (char) password[i]; in scrypt()
|
D | LockSettingsServiceTests.java | 222 final byte[] password = "password".getBytes(); in testSetLockCredential_forPrimaryUser_sendsCredentials() 225 password, in testSetLockCredential_forPrimaryUser_sendsCredentials() 233 .lockScreenSecretChanged(CREDENTIAL_TYPE_PASSWORD, password, PRIMARY_USER_ID); in testSetLockCredential_forPrimaryUser_sendsCredentials() 383 final String password = "password"; in testVerifyCredential_forPrimaryUser_sendsCredentials() local 384 initializeStorageWithCredential(PRIMARY_USER_ID, password, CREDENTIAL_TYPE_PASSWORD, 1234); in testVerifyCredential_forPrimaryUser_sendsCredentials() 388 password.getBytes(), CREDENTIAL_TYPE_PASSWORD, 1, PRIMARY_USER_ID); in testVerifyCredential_forPrimaryUser_sendsCredentials() 392 CREDENTIAL_TYPE_PASSWORD, password.getBytes(), PRIMARY_USER_ID); in testVerifyCredential_forPrimaryUser_sendsCredentials()
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/ |
D | WifiAssociationTest.java | 64 String password = arguments.getString("password"); in testWifiAssociation() local 71 WifiConfiguration config = getConfig(ssid, securityType, password); in testWifiAssociation() 80 private WifiConfiguration getConfig(String ssid, SecurityType securityType, String password) { in getConfig() argument 89 assertNotNull("password is empty", password); in getConfig() 91 assertTrue(WifiConfigurationHelper.isHex(password, 10)); in getConfig() 92 config = WifiConfigurationHelper.createWepConfig(ssid, password); in getConfig() 96 assertNotNull("password is empty", password); in getConfig() 98 assertTrue(WifiConfigurationHelper.isHex(password, 26)); in getConfig() 99 config = WifiConfigurationHelper.createWepConfig(ssid, password); in getConfig() 103 assertNotNull("password is empty", password); in getConfig() [all …]
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
D | WifiConfigurationHelper.java | 71 public static WifiConfiguration createWepConfig(String ssid, String password) { in createWepConfig() argument 74 if (isHex(password, 10) || isHex(password, 26) || isHex(password, 58)) { in createWepConfig() 75 config.wepKeys[0] = password; in createWepConfig() 77 config.wepKeys[0] = quotedString(password); in createWepConfig() 93 public static WifiConfiguration createPskConfig(String ssid, String password) { in createPskConfig() argument 96 if (isHex(password, 64)) { in createPskConfig() 97 config.preSharedKey = password; in createPskConfig() 99 config.preSharedKey = quotedString(password); in createPskConfig() 118 public static WifiConfiguration createEapConfig(String ssid, String password, int eapMethod, in createEapConfig() argument 134 config.enterpriseConfig.setPassword(password); in createEapConfig() [all …]
|
D | ConnectivityManagerTestRunner.java | 62 String password = (String) icicle.get("password"); in onCreate() local 63 if (password != null) { in onCreate() 64 mPassword = password; in onCreate()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/backup/ |
D | BackupPasswordManagerTest.java | 96 String password = "password1234"; in backupPasswordMatches_isTrueForSamePassword() local 97 mPasswordManager.setBackupPassword(null, password); in backupPasswordMatches_isTrueForSamePassword() 98 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue(); in backupPasswordMatches_isTrueForSamePassword() 109 String password = "corgi\uFFFF"; in backupPasswordMatches_worksForV1HashIfVersionIsV1() local 111 writeV1HashToFile(password, saltFixture()); in backupPasswordMatches_worksForV1HashIfVersionIsV1() 116 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue(); in backupPasswordMatches_worksForV1HashIfVersionIsV1() 124 String password = "corgi\uFFFF"; in backupPasswordMatches_failsForV1HashIfVersionIsV2() local 126 writeV1HashToFile(password, saltFixture()); in backupPasswordMatches_failsForV1HashIfVersionIsV2() 131 assertThat(mPasswordManager.backupPasswordMatches(password)).isFalse(); in backupPasswordMatches_failsForV1HashIfVersionIsV2() 146 String password = "shiba"; in setBackupPassword_persistsPasswordToFile() local [all …]
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternChecker.java | 159 final String password, in verifyPassword() argument 163 byte[] passwordBytes = password != null ? password.getBytes() : null; in verifyPassword() 177 final byte[] password, in verifyPassword() argument 187 return utils.verifyPassword(password, challenge, userId); in verifyPassword() 213 final byte[] password, in verifyTiedProfileChallenge() argument 224 return utils.verifyTiedProfileChallenge(password, isPattern, challenge, userId); in verifyTiedProfileChallenge() 252 final String password, in checkPassword() argument 255 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword()
|
D | LockPatternUtils.java | 454 public byte[] verifyPassword(byte[] password, long challenge, int userId) in verifyPassword() argument 457 return verifyCredential(password, CREDENTIAL_TYPE_PASSWORD, challenge, userId); in verifyPassword() 470 public byte[] verifyTiedProfileChallenge(byte[] password, boolean isPattern, long challenge, in verifyTiedProfileChallenge() argument 475 getLockSettings().verifyTiedProfileChallenge(password, in verifyTiedProfileChallenge() 499 public boolean checkPassword(String password, int userId) throws RequestThrottledException { in checkPassword() argument 500 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword() 512 public boolean checkPassword(byte[] password, int userId) throws RequestThrottledException { in checkPassword() argument 513 return checkPassword(password, userId, null /* progressCallback */); in checkPassword() 523 public boolean checkPassword(String password, int userId, in checkPassword() argument 526 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword() [all …]
|
/frameworks/base/obex/javax/obex/ |
D | PasswordAuthentication.java | 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { in PasswordAuthentication() argument 59 mPassword = new byte[password.length]; in PasswordAuthentication() 60 System.arraycopy(password, 0, mPassword, 0, password.length); in PasswordAuthentication()
|
D | ObexSession.java | 144 byte[] password = result.getPassword(); in handleAuthChall() 145 if (password == null) { in handleAuthChall() 169 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall() 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall()
|
/frameworks/base/core/jni/ |
D | android_security_Scrypt.cpp | 34 static jbyteArray android_security_Scrypt_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, j… in android_security_Scrypt_nativeScrypt() argument 35 if (!password || !salt) { in android_security_Scrypt_nativeScrypt() 39 int passwordLen = env->GetArrayLength(password); in android_security_Scrypt_nativeScrypt() 43 jbyte* passwordPtr = (jbyte*)env->GetByteArrayElements(password, NULL); in android_security_Scrypt_nativeScrypt() 50 env->ReleaseByteArrayElements(password, passwordPtr, JNI_ABORT); in android_security_Scrypt_nativeScrypt()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
D | MockScrypt.java | 31 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument 35 password.length + salt.length + Integer.BYTES * 6); in scrypt() 37 byteBuffer.putInt(password.length); in scrypt() 38 byteBuffer.put(password); in scrypt()
|
/frameworks/base/core/java/android/security/ |
D | Scrypt.java | 26 native byte[] nativeScrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen); in nativeScrypt() argument 29 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument 30 return nativeScrypt(password, salt, n, r, p, outLen); in scrypt()
|
/frameworks/opt/car/setupwizard/library/utils/src/com/android/car/setupwizardlib/ |
D | IInitialLockSetupService.aidl | 39 int checkValidLock(in int lockType, in byte[] password) = 2; in checkValidLock() argument 46 int setLock(in int lockType, in byte[] password) = 3; in setLock() argument
|
/frameworks/base/core/java/com/android/internal/net/ |
D | VpnProfile.java | 66 public String password = ""; // 4 field in VpnProfile 94 password = in.readString(); in VpnProfile() 116 out.writeString(password); in writeToParcel() 152 profile.password = values[4]; in decode() 175 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); in decode() 188 builder.append('\0').append(saveLogin ? password : ""); in encode()
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
D | WifiConfigurationUtil.java | 412 private static boolean validatePassword(String password, boolean isAdd, boolean isSae) { in validatePassword() argument 414 if (password == null) { in validatePassword() 419 if (password == null) { in validatePassword() 422 } else if (password.equals(PASSWORD_MASK)) { in validatePassword() 428 if (password.isEmpty()) { in validatePassword() 432 if (password.startsWith("\"")) { in validatePassword() 434 byte[] passwordBytes = password.getBytes(StandardCharsets.US_ASCII); in validatePassword() 454 if (password.length() != PSK_SAE_HEX_LEN) { in validatePassword() 456 + password.length()); in validatePassword() 461 NativeUtil.hexOrQuotedStringToBytes(password); in validatePassword() [all …]
|
/frameworks/base/core/java/android/os/storage/ |
D | IStorageManager.aidl | 81 int decryptStorage(in String password) = 26; field 85 int encryptStorage(int type, in String password) = 27; in encryptStorage() argument 89 int changeEncryptionPassword(int type, in String password) = 28; in changeEncryptionPassword() argument 108 int verifyEncryptionPassword(in String password) = 32; field
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
D | KeyStoreProxyImpl.java | 49 public Key getKey(String alias, char[] password) in getKey() argument 51 return mKeyStore.getKey(alias, password); in getKey()
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
D | IccCard.java | 183 String password, Message onComplete) { in setIccLockEnabled() argument 199 String password, Message onComplete) { in setIccFdnEnabled() argument
|
/frameworks/layoutlib/bridge/src/android/webkit/ |
D | WebView.java | 82 public void savePassword(String host, String username, String password) { in savePassword() argument 86 String username, String password) { in setHttpAuthUsernamePassword() argument
|
/frameworks/base/tests/LegacyRestoreTest/ |
D | README | 4 to the PBKDF2 implementation. The archive's encryption password, entered on-screen, 9 reporting an invalid password in logcat. This is the situation reported in bug
|
/frameworks/base/libs/storage/include/storage/ |
D | IMountService.h | 73 virtual int32_t decryptStorage(const String16& password) = 0; 74 virtual int32_t encryptStorage(const String16& password) = 0;
|