Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 108) sorted by relevance

12345

/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
DSyntheticPasswordTests.java73 final byte[] password = "user-password".getBytes(); in testPasswordBasedSyntheticPassword()
80 password, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, authToken, in testPasswordBasedSyntheticPassword()
84 mGateKeeperService, handle, password, USER_ID, null); in testPasswordBasedSyntheticPassword()
106 final byte[] password = "testPasswordMigration-password".getBytes(); in testPasswordMigration()
109 mService.setLockCredential(password, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, null, in testPasswordMigration()
116 password, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, 0, PRIMARY_USER_ID) in testPasswordMigration()
122 assertEquals(VerifyCredentialResponse.RESPONSE_OK, mService.verifyCredential(password, in testPasswordMigration()
129 protected void initializeCredentialUnderSP(byte[] password, int userId) throws RemoteException { in initializeCredentialUnderSP() argument
131 int quality = password != null ? PASSWORD_QUALITY_ALPHABETIC in initializeCredentialUnderSP()
133 int type = password != null ? LockPatternUtils.CREDENTIAL_TYPE_PASSWORD in initializeCredentialUnderSP()
[all …]
DCachedSyntheticPasswordTests.java62 final byte[] password = "testSyntheticPasswordClearCredential-password".getBytes(); in testSyntheticPasswordClearCredentialUntrusted()
65 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testSyntheticPasswordClearCredentialUntrusted()
82 final byte[] password = "testSyntheticPasswordClearCredential-password".getBytes(); in testSyntheticPasswordChangeCredentialUntrusted()
85 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testSyntheticPasswordChangeCredentialUntrusted()
99 final byte[] password = in testUntrustedCredentialChangeMaintainsAuthSecret()
104 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testUntrustedCredentialChangeMaintainsAuthSecret()
121 final byte[] password = in testUntrustedCredentialChangeBlockedIfSpNotCached()
129 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testUntrustedCredentialChangeBlockedIfSpNotCached()
144 assertEquals(VerifyCredentialResponse.RESPONSE_OK, mService.verifyCredential(password, in testUntrustedCredentialChangeBlockedIfSpNotCached()
DFakeGateKeeperService.java33 public byte[] password; field in FakeGateKeeperService.VerifyHandle
36 public VerifyHandle(byte[] password, long sid) { in VerifyHandle() argument
37 this.password = password; in VerifyHandle()
47 password = new byte[buffer.remaining()]; in VerifyHandle()
48 buffer.get(password); in VerifyHandle()
52 ByteBuffer buffer = ByteBuffer.allocate(1 + Long.BYTES + password.length); in toBytes()
55 buffer.put(password); in toBytes()
97 if (Arrays.equals(currentPassword, handle.password)) { in enroll()
128 if (Arrays.equals(handle.password, providedPassword)) { in verifyChallenge()
DMockSyntheticPasswordManager.java98 protected byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument
100 char[] passwordChars = new char[password.length]; in scrypt()
101 for (int i = 0; i < password.length; i++) { in scrypt()
102 passwordChars[i] = (char) password[i]; in scrypt()
DLockSettingsServiceTests.java222 final byte[] password = "password".getBytes(); in testSetLockCredential_forPrimaryUser_sendsCredentials()
225 password, in testSetLockCredential_forPrimaryUser_sendsCredentials()
233 .lockScreenSecretChanged(CREDENTIAL_TYPE_PASSWORD, password, PRIMARY_USER_ID); in testSetLockCredential_forPrimaryUser_sendsCredentials()
383 final String password = "password"; in testVerifyCredential_forPrimaryUser_sendsCredentials() local
384 initializeStorageWithCredential(PRIMARY_USER_ID, password, CREDENTIAL_TYPE_PASSWORD, 1234); in testVerifyCredential_forPrimaryUser_sendsCredentials()
388 password.getBytes(), CREDENTIAL_TYPE_PASSWORD, 1, PRIMARY_USER_ID); in testVerifyCredential_forPrimaryUser_sendsCredentials()
392 CREDENTIAL_TYPE_PASSWORD, password.getBytes(), PRIMARY_USER_ID); in testVerifyCredential_forPrimaryUser_sendsCredentials()
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/
DWifiAssociationTest.java64 String password = arguments.getString("password"); in testWifiAssociation() local
71 WifiConfiguration config = getConfig(ssid, securityType, password); in testWifiAssociation()
80 private WifiConfiguration getConfig(String ssid, SecurityType securityType, String password) { in getConfig() argument
89 assertNotNull("password is empty", password); in getConfig()
91 assertTrue(WifiConfigurationHelper.isHex(password, 10)); in getConfig()
92 config = WifiConfigurationHelper.createWepConfig(ssid, password); in getConfig()
96 assertNotNull("password is empty", password); in getConfig()
98 assertTrue(WifiConfigurationHelper.isHex(password, 26)); in getConfig()
99 config = WifiConfigurationHelper.createWepConfig(ssid, password); in getConfig()
103 assertNotNull("password is empty", password); in getConfig()
[all …]
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
DWifiConfigurationHelper.java71 public static WifiConfiguration createWepConfig(String ssid, String password) { in createWepConfig() argument
74 if (isHex(password, 10) || isHex(password, 26) || isHex(password, 58)) { in createWepConfig()
75 config.wepKeys[0] = password; in createWepConfig()
77 config.wepKeys[0] = quotedString(password); in createWepConfig()
93 public static WifiConfiguration createPskConfig(String ssid, String password) { in createPskConfig() argument
96 if (isHex(password, 64)) { in createPskConfig()
97 config.preSharedKey = password; in createPskConfig()
99 config.preSharedKey = quotedString(password); in createPskConfig()
118 public static WifiConfiguration createEapConfig(String ssid, String password, int eapMethod, in createEapConfig() argument
134 config.enterpriseConfig.setPassword(password); in createEapConfig()
[all …]
DConnectivityManagerTestRunner.java62 String password = (String) icicle.get("password"); in onCreate() local
63 if (password != null) { in onCreate()
64 mPassword = password; in onCreate()
/frameworks/base/services/tests/servicestests/src/com/android/server/backup/
DBackupPasswordManagerTest.java96 String password = "password1234"; in backupPasswordMatches_isTrueForSamePassword() local
97 mPasswordManager.setBackupPassword(null, password); in backupPasswordMatches_isTrueForSamePassword()
98 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue(); in backupPasswordMatches_isTrueForSamePassword()
109 String password = "corgi\uFFFF"; in backupPasswordMatches_worksForV1HashIfVersionIsV1() local
111 writeV1HashToFile(password, saltFixture()); in backupPasswordMatches_worksForV1HashIfVersionIsV1()
116 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue(); in backupPasswordMatches_worksForV1HashIfVersionIsV1()
124 String password = "corgi\uFFFF"; in backupPasswordMatches_failsForV1HashIfVersionIsV2() local
126 writeV1HashToFile(password, saltFixture()); in backupPasswordMatches_failsForV1HashIfVersionIsV2()
131 assertThat(mPasswordManager.backupPasswordMatches(password)).isFalse(); in backupPasswordMatches_failsForV1HashIfVersionIsV2()
146 String password = "shiba"; in setBackupPassword_persistsPasswordToFile() local
[all …]
/frameworks/base/core/java/com/android/internal/widget/
DLockPatternChecker.java159 final String password, in verifyPassword() argument
163 byte[] passwordBytes = password != null ? password.getBytes() : null; in verifyPassword()
177 final byte[] password, in verifyPassword() argument
187 return utils.verifyPassword(password, challenge, userId); in verifyPassword()
213 final byte[] password, in verifyTiedProfileChallenge() argument
224 return utils.verifyTiedProfileChallenge(password, isPattern, challenge, userId); in verifyTiedProfileChallenge()
252 final String password, in checkPassword() argument
255 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword()
DLockPatternUtils.java454 public byte[] verifyPassword(byte[] password, long challenge, int userId) in verifyPassword() argument
457 return verifyCredential(password, CREDENTIAL_TYPE_PASSWORD, challenge, userId); in verifyPassword()
470 public byte[] verifyTiedProfileChallenge(byte[] password, boolean isPattern, long challenge, in verifyTiedProfileChallenge() argument
475 getLockSettings().verifyTiedProfileChallenge(password, in verifyTiedProfileChallenge()
499 public boolean checkPassword(String password, int userId) throws RequestThrottledException { in checkPassword() argument
500 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword()
512 public boolean checkPassword(byte[] password, int userId) throws RequestThrottledException { in checkPassword() argument
513 return checkPassword(password, userId, null /* progressCallback */); in checkPassword()
523 public boolean checkPassword(String password, int userId, in checkPassword() argument
526 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword()
[all …]
/frameworks/base/obex/javax/obex/
DPasswordAuthentication.java53 public PasswordAuthentication(final byte[] userName, final byte[] password) { in PasswordAuthentication() argument
59 mPassword = new byte[password.length]; in PasswordAuthentication()
60 System.arraycopy(password, 0, mPassword, 0, password.length); in PasswordAuthentication()
DObexSession.java144 byte[] password = result.getPassword(); in handleAuthChall()
145 if (password == null) { in handleAuthChall()
169 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall()
173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall()
/frameworks/base/core/jni/
Dandroid_security_Scrypt.cpp34 static jbyteArray android_security_Scrypt_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, j… in android_security_Scrypt_nativeScrypt() argument
35 if (!password || !salt) { in android_security_Scrypt_nativeScrypt()
39 int passwordLen = env->GetArrayLength(password); in android_security_Scrypt_nativeScrypt()
43 jbyte* passwordPtr = (jbyte*)env->GetByteArrayElements(password, NULL); in android_security_Scrypt_nativeScrypt()
50 env->ReleaseByteArrayElements(password, passwordPtr, JNI_ABORT); in android_security_Scrypt_nativeScrypt()
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
DMockScrypt.java31 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument
35 password.length + salt.length + Integer.BYTES * 6); in scrypt()
37 byteBuffer.putInt(password.length); in scrypt()
38 byteBuffer.put(password); in scrypt()
/frameworks/base/core/java/android/security/
DScrypt.java26 native byte[] nativeScrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen); in nativeScrypt() argument
29 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument
30 return nativeScrypt(password, salt, n, r, p, outLen); in scrypt()
/frameworks/opt/car/setupwizard/library/utils/src/com/android/car/setupwizardlib/
DIInitialLockSetupService.aidl39 int checkValidLock(in int lockType, in byte[] password) = 2; in checkValidLock() argument
46 int setLock(in int lockType, in byte[] password) = 3; in setLock() argument
/frameworks/base/core/java/com/android/internal/net/
DVpnProfile.java66 public String password = ""; // 4 field in VpnProfile
94 password = in.readString(); in VpnProfile()
116 out.writeString(password); in writeToParcel()
152 profile.password = values[4]; in decode()
175 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); in decode()
188 builder.append('\0').append(saveLogin ? password : ""); in encode()
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
DWifiConfigurationUtil.java412 private static boolean validatePassword(String password, boolean isAdd, boolean isSae) { in validatePassword() argument
414 if (password == null) { in validatePassword()
419 if (password == null) { in validatePassword()
422 } else if (password.equals(PASSWORD_MASK)) { in validatePassword()
428 if (password.isEmpty()) { in validatePassword()
432 if (password.startsWith("\"")) { in validatePassword()
434 byte[] passwordBytes = password.getBytes(StandardCharsets.US_ASCII); in validatePassword()
454 if (password.length() != PSK_SAE_HEX_LEN) { in validatePassword()
456 + password.length()); in validatePassword()
461 NativeUtil.hexOrQuotedStringToBytes(password); in validatePassword()
[all …]
/frameworks/base/core/java/android/os/storage/
DIStorageManager.aidl81 int decryptStorage(in String password) = 26; field
85 int encryptStorage(int type, in String password) = 27; in encryptStorage() argument
89 int changeEncryptionPassword(int type, in String password) = 28; in changeEncryptionPassword() argument
108 int verifyEncryptionPassword(in String password) = 32; field
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/
DKeyStoreProxyImpl.java49 public Key getKey(String alias, char[] password) in getKey() argument
51 return mKeyStore.getKey(alias, password); in getKey()
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
DIccCard.java183 String password, Message onComplete) { in setIccLockEnabled() argument
199 String password, Message onComplete) { in setIccFdnEnabled() argument
/frameworks/layoutlib/bridge/src/android/webkit/
DWebView.java82 public void savePassword(String host, String username, String password) { in savePassword() argument
86 String username, String password) { in setHttpAuthUsernamePassword() argument
/frameworks/base/tests/LegacyRestoreTest/
DREADME4 to the PBKDF2 implementation. The archive's encryption password, entered on-screen,
9 reporting an invalid password in logcat. This is the situation reported in bug
/frameworks/base/libs/storage/include/storage/
DIMountService.h73 virtual int32_t decryptStorage(const String16& password) = 0;
74 virtual int32_t encryptStorage(const String16& password) = 0;

12345