Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 18 of 18) sorted by relevance

/frameworks/base/obex/javax/obex/
DObexSession.java81 byte[] challenge = ObexHelper.getTagValue((byte)0x00, header.mAuthChall); in handleAuthChall()
169 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall()
170 System.arraycopy(challenge, 0, digest, 0, challenge.length); in handleAuthChall()
172 digest[challenge.length] = (byte)0x3A; in handleAuthChall()
173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall()
184 System.arraycopy(challenge, 0, header.mAuthResp, 20, 16); in handleAuthChall()
/frameworks/base/core/java/com/android/internal/widget/
DLockPatternChecker.java66 final long challenge, in verifyPattern() argument
83 return utils.verifyPattern(patternCopy, challenge, userId); in verifyPattern()
160 final long challenge, in verifyPassword() argument
164 return verifyPassword(utils, passwordBytes, challenge, userId, callback); in verifyPassword()
178 final long challenge, in verifyPassword() argument
187 return utils.verifyPassword(password, challenge, userId); in verifyPassword()
215 final long challenge, in verifyTiedProfileChallenge() argument
224 return utils.verifyTiedProfileChallenge(password, isPattern, challenge, userId); in verifyTiedProfileChallenge()
DILockSettings.aidl49 …VerifyCredentialResponse verifyCredential(in byte[] credential, int type, long challenge, int user… in verifyCredential() argument
50 …ialResponse verifyTiedProfileChallenge(in byte[] credential, int type, long challenge, int userId); in verifyTiedProfileChallenge() argument
DLockPatternUtils.java368 private byte[] verifyCredential(byte[] credential, int type, long challenge, int userId) in verifyCredential() argument
372 type, challenge, userId); in verifyCredential()
413 public byte[] verifyPattern(List<LockPatternView.Cell> pattern, long challenge, int userId) in verifyPattern() argument
416 return verifyCredential(patternToByteArray(pattern), CREDENTIAL_TYPE_PATTERN, challenge, in verifyPattern()
454 public byte[] verifyPassword(byte[] password, long challenge, int userId) in verifyPassword() argument
457 return verifyCredential(password, CREDENTIAL_TYPE_PASSWORD, challenge, userId); in verifyPassword()
470 public byte[] verifyTiedProfileChallenge(byte[] password, boolean isPattern, long challenge, in verifyTiedProfileChallenge() argument
476 … isPattern ? CREDENTIAL_TYPE_PATTERN : CREDENTIAL_TYPE_PASSWORD, challenge, in verifyTiedProfileChallenge()
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
DFakeGateKeeperService.java61 public long challenge; field in FakeGateKeeperService.AuthToken
64 public AuthToken(long challenge, long sid) { in AuthToken() argument
65 this.challenge = challenge; in AuthToken()
74 challenge = buffer.getLong(); in AuthToken()
81 buffer.putLong(challenge); in toBytes()
124 public GateKeeperResponse verifyChallenge(int uid, long challenge, in verifyChallenge() argument
136 AuthToken token = new AuthToken(challenge, handle.sid); in verifyChallenge()
DLockSettingsServiceTests.java491 final long challenge = 54321; in assertVerifyCredentials() local
493 type, challenge, userId); in assertVerifyCredentials()
513 credential.getBytes(), incorrectType, challenge, userId).getResponseCode()); in assertVerifyCredentials()
516 ("0" + credential).getBytes(), type, challenge, userId).getResponseCode()); in assertVerifyCredentials()
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
DKeySyncUtilsTest.java288 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant()
294 challenge, in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant()
301 /*header=*/ KeySyncUtils.concat(RECOVERY_CLAIM_HEADER, vaultParams, challenge), in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant()
335 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey()
341 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey()
350 RECOVERY_CLAIM_HEADER, vaultParams, challenge), in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey()
362 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams()
367 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams()
376 RECOVERY_CLAIM_HEADER, randomBytes(100), challenge), in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams()
388 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader()
[all …]
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/
DTelephonyUtil.java485 for (String challenge : requestData) { in getGsmAuthResponseWithLength()
486 if (challenge == null || challenge.isEmpty()) { in getGsmAuthResponseWithLength()
489 Log.d(TAG, "RAND = " + challenge); in getGsmAuthResponseWithLength()
493 rand = parseHex(challenge); in getGsmAuthResponseWithLength()
558 for (String challenge : requestData) { in getGsmSimpleSimNoLengthAuthResponse()
559 if (challenge == null || challenge.isEmpty()) { in getGsmSimpleSimNoLengthAuthResponse()
562 Log.d(TAG, "RAND = " + challenge); in getGsmSimpleSimNoLengthAuthResponse()
566 rand = parseHexWithoutLength(challenge); in getGsmSimpleSimNoLengthAuthResponse()
/frameworks/base/core/tests/coretests/src/android/net/http/
DDefaultHttpClientTest.java132 String challenge = "Digest realm=\"protected area\", " in authenticateDigestAlgorithm() local
136 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge)); in authenticateDigestAlgorithm()
/frameworks/base/telephony/java/com/android/internal/telephony/euicc/
DIGetEuiccChallengeCallback.aidl20 void onComplete(int resultCode, in byte[] challenge); in onComplete() argument
/frameworks/base/identity/java/android/security/identity/
DWritableIdentityCredential.java66 @NonNull byte[] challenge); in getCredentialKeyCertificateChain()
DCredstoreWritableIdentityCredential.java51 public Collection<X509Certificate> getCredentialKeyCertificateChain(@NonNull byte[] challenge) { in getCredentialKeyCertificateChain() argument
53 byte[] certsBlob = mBinder.getCredentialKeyCertificateChain(challenge); in getCredentialKeyCertificateChain()
/frameworks/base/services/core/java/com/android/server/locksettings/
DLockSettingsService.java1188 @ChallengeType int challengeType, long challenge, in unlockChildProfile() argument
1194 challengeType, challenge, profileHandle, null /* progressCallback */, in unlockChildProfile() local
1223 @ChallengeType int challengeType, long challenge, in unlockUser() argument
1269 challengeType, challenge, resetLockouts); in unlockUser()
1810 public VerifyCredentialResponse verifyCredential(byte[] credential, int type, long challenge, in verifyCredential() argument
1813 return doVerifyCredential(credential, type, CHALLENGE_FROM_CALLER, challenge, userId, in verifyCredential()
1818 @ChallengeType int challengeType, long challenge, int userId, in doVerifyCredential() argument
1820 return doVerifyCredential(credential, credentialType, challengeType, challenge, userId, in doVerifyCredential()
1829 @ChallengeType int challengeType, long challenge, int userId, in doVerifyCredential() argument
1841 response = spBasedDoVerifyCredential(credential, credentialType, challengeType, challenge, in doVerifyCredential()
[all …]
DSyntheticPasswordManager.java1031 @NonNull AuthenticationToken auth, long challenge, int userId) throws RemoteException { in verifyChallenge() argument
1039 GateKeeperResponse response = gatekeeper.verifyChallenge(userId, challenge, in verifyChallenge()
1051 return verifyChallenge(gatekeeper, auth, challenge, userId); in verifyChallenge()
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/
DKeySyncUtils.java215 byte[] challenge, in encryptRecoveryClaim() argument
221 /*header=*/ concat(RECOVERY_CLAIM_HEADER, vaultParams, challenge), in encryptRecoveryClaim()
/frameworks/base/keystore/java/android/security/
DIKeyChainService.aidl38 int attestKey(in String alias, in byte[] challenge, in int[] idAttestationFlags, in attestKey() argument
/frameworks/base/keystore/java/android/security/keystore/
DAndroidKeyStoreKeyPairGeneratorSpi.java492 byte[] challenge = mSpec.getAttestationChallenge(); in createCertificateChain()
493 if (challenge != null) { in createCertificateChain()
495 args.addBytes(KeymasterDefs.KM_TAG_ATTESTATION_CHALLENGE, challenge); in createCertificateChain()
/frameworks/base/telephony/java/android/telephony/euicc/
DEuiccCardManager.java489 public void onComplete(int resultCode, byte[] challenge) { in requestEuiccChallenge() argument
492 executor.execute(() -> callback.onComplete(resultCode, challenge)); in requestEuiccChallenge()