Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 124) sorted by relevance

12345

/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
DSyntheticPasswordTests.java74 final byte[] password = "user-password".getBytes(); in testPasswordBasedSyntheticPassword()
81 password, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, authToken, in testPasswordBasedSyntheticPassword()
85 mGateKeeperService, handle, password, USER_ID, null); in testPasswordBasedSyntheticPassword()
106 protected void initializeCredentialUnderSP(byte[] password, int userId) throws RemoteException { in initializeCredentialUnderSP() argument
108 int quality = password != null ? PASSWORD_QUALITY_ALPHABETIC in initializeCredentialUnderSP()
110 int type = password != null ? LockPatternUtils.CREDENTIAL_TYPE_PASSWORD in initializeCredentialUnderSP()
112 mService.setLockCredential(password, type, null, quality, userId, false); in initializeCredentialUnderSP()
117 final byte[] password = "testSyntheticPasswordChangeCredential-password".getBytes(); in testSyntheticPasswordChangeCredential()
120 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testSyntheticPasswordChangeCredential()
122 mService.setLockCredential(newPassword, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, password, in testSyntheticPasswordChangeCredential()
[all …]
DCachedSyntheticPasswordTests.java68 final byte[] password = "testSyntheticPasswordClearCredential-password".getBytes(); in testSyntheticPasswordClearCredentialUntrusted()
71 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testSyntheticPasswordClearCredentialUntrusted()
89 final byte[] password = "testSyntheticPasswordClearCredential-password".getBytes(); in testSyntheticPasswordChangeCredentialUntrusted()
92 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testSyntheticPasswordChangeCredentialUntrusted()
107 final byte[] password = in testUntrustedCredentialChangeMaintainsAuthSecret()
112 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testUntrustedCredentialChangeMaintainsAuthSecret()
130 final byte[] password = in testUntrustedCredentialChangeBlockedIfSpNotCached()
138 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testUntrustedCredentialChangeBlockedIfSpNotCached()
153 assertEquals(VerifyCredentialResponse.RESPONSE_OK, mService.verifyCredential(password, in testUntrustedCredentialChangeBlockedIfSpNotCached()
DFakeGateKeeperService.java33 public byte[] password; field in FakeGateKeeperService.VerifyHandle
36 public VerifyHandle(byte[] password, long sid) { in VerifyHandle() argument
37 this.password = password; in VerifyHandle()
47 password = new byte[buffer.remaining()]; in VerifyHandle()
48 buffer.get(password); in VerifyHandle()
52 ByteBuffer buffer = ByteBuffer.allocate(1 + Long.BYTES + password.length); in toBytes()
55 buffer.put(password); in toBytes()
97 if (Arrays.equals(currentPassword, handle.password)) { in enroll()
128 if (Arrays.equals(handle.password, providedPassword)) { in verifyChallenge()
DMockSyntheticPasswordManager.java98 protected byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument
100 char[] passwordChars = new char[password.length]; in scrypt()
101 for (int i = 0; i < password.length; i++) { in scrypt()
102 passwordChars[i] = (char) password[i]; in scrypt()
DLockSettingsServiceTests.java233 final byte[] password = "password".getBytes(); in testSetLockCredential_forPrimaryUser_sendsCredentials()
236 password, in testSetLockCredential_forPrimaryUser_sendsCredentials()
244 .lockScreenSecretChanged(CREDENTIAL_TYPE_PASSWORD, password, PRIMARY_USER_ID); in testSetLockCredential_forPrimaryUser_sendsCredentials()
402 final String password = "password"; in testVerifyCredential_forPrimaryUser_sendsCredentials() local
403 initializeStorageWithCredential(PRIMARY_USER_ID, password, CREDENTIAL_TYPE_PASSWORD, 1234); in testVerifyCredential_forPrimaryUser_sendsCredentials()
407 password.getBytes(), CREDENTIAL_TYPE_PASSWORD, 1, PRIMARY_USER_ID); in testVerifyCredential_forPrimaryUser_sendsCredentials()
411 CREDENTIAL_TYPE_PASSWORD, password.getBytes(), PRIMARY_USER_ID); in testVerifyCredential_forPrimaryUser_sendsCredentials()
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/
DWifiAssociationTest.java64 String password = arguments.getString("password"); in testWifiAssociation() local
71 WifiConfiguration config = getConfig(ssid, securityType, password); in testWifiAssociation()
80 private WifiConfiguration getConfig(String ssid, SecurityType securityType, String password) { in getConfig() argument
89 assertNotNull("password is empty", password); in getConfig()
91 assertTrue(WifiConfigurationHelper.isHex(password, 10)); in getConfig()
92 config = WifiConfigurationHelper.createWepConfig(ssid, password); in getConfig()
96 assertNotNull("password is empty", password); in getConfig()
98 assertTrue(WifiConfigurationHelper.isHex(password, 26)); in getConfig()
99 config = WifiConfigurationHelper.createWepConfig(ssid, password); in getConfig()
103 assertNotNull("password is empty", password); in getConfig()
[all …]
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
DWifiConfigurationHelper.java72 public static WifiConfiguration createWepConfig(String ssid, String password) { in createWepConfig() argument
75 if (isHex(password, 10) || isHex(password, 26) || isHex(password, 58)) { in createWepConfig()
76 config.wepKeys[0] = password; in createWepConfig()
78 config.wepKeys[0] = quotedString(password); in createWepConfig()
94 public static WifiConfiguration createPskConfig(String ssid, String password) { in createPskConfig() argument
97 if (isHex(password, 64)) { in createPskConfig()
98 config.preSharedKey = password; in createPskConfig()
100 config.preSharedKey = quotedString(password); in createPskConfig()
119 public static WifiConfiguration createEapConfig(String ssid, String password, int eapMethod, in createEapConfig() argument
135 config.enterpriseConfig.setPassword(password); in createEapConfig()
[all …]
DConnectivityManagerTestRunner.java62 String password = (String) icicle.get("password"); in onCreate() local
63 if (password != null) { in onCreate()
64 mPassword = password; in onCreate()
/frameworks/base/services/tests/servicestests/src/com/android/server/backup/
DBackupPasswordManagerTest.java96 String password = "password1234"; in backupPasswordMatches_isTrueForSamePassword() local
97 mPasswordManager.setBackupPassword(null, password); in backupPasswordMatches_isTrueForSamePassword()
98 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue(); in backupPasswordMatches_isTrueForSamePassword()
109 String password = "corgi\uFFFF"; in backupPasswordMatches_worksForV1HashIfVersionIsV1() local
111 writeV1HashToFile(password, saltFixture()); in backupPasswordMatches_worksForV1HashIfVersionIsV1()
116 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue(); in backupPasswordMatches_worksForV1HashIfVersionIsV1()
124 String password = "corgi\uFFFF"; in backupPasswordMatches_failsForV1HashIfVersionIsV2() local
126 writeV1HashToFile(password, saltFixture()); in backupPasswordMatches_failsForV1HashIfVersionIsV2()
131 assertThat(mPasswordManager.backupPasswordMatches(password)).isFalse(); in backupPasswordMatches_failsForV1HashIfVersionIsV2()
146 String password = "shiba"; in setBackupPassword_persistsPasswordToFile() local
[all …]
/frameworks/base/core/java/com/android/internal/widget/
DLockPatternChecker.java159 final String password, in verifyPassword() argument
163 byte[] passwordBytes = password != null ? password.getBytes() : null; in verifyPassword()
177 final byte[] password, in verifyPassword() argument
187 return utils.verifyPassword(password, challenge, userId); in verifyPassword()
213 final byte[] password, in verifyTiedProfileChallenge() argument
224 return utils.verifyTiedProfileChallenge(password, isPattern, challenge, userId); in verifyTiedProfileChallenge()
252 final String password, in checkPassword() argument
255 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword()
DLockPatternUtils.java454 public byte[] verifyPassword(byte[] password, long challenge, int userId) in verifyPassword() argument
457 return verifyCredential(password, CREDENTIAL_TYPE_PASSWORD, challenge, userId); in verifyPassword()
470 public byte[] verifyTiedProfileChallenge(byte[] password, boolean isPattern, long challenge, in verifyTiedProfileChallenge() argument
475 getLockSettings().verifyTiedProfileChallenge(password, in verifyTiedProfileChallenge()
499 public boolean checkPassword(String password, int userId) throws RequestThrottledException { in checkPassword() argument
500 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword()
512 public boolean checkPassword(byte[] password, int userId) throws RequestThrottledException { in checkPassword() argument
513 return checkPassword(password, userId, null /* progressCallback */); in checkPassword()
523 public boolean checkPassword(String password, int userId, in checkPassword() argument
526 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword()
[all …]
/frameworks/base/obex/javax/obex/
DPasswordAuthentication.java53 public PasswordAuthentication(final byte[] userName, final byte[] password) { in PasswordAuthentication() argument
59 mPassword = new byte[password.length]; in PasswordAuthentication()
60 System.arraycopy(password, 0, mPassword, 0, password.length); in PasswordAuthentication()
DObexSession.java144 byte[] password = result.getPassword(); in handleAuthChall()
145 if (password == null) { in handleAuthChall()
169 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall()
173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall()
/frameworks/base/core/jni/
Dandroid_security_Scrypt.cpp34 static jbyteArray android_security_Scrypt_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, j… in android_security_Scrypt_nativeScrypt() argument
35 if (!password || !salt) { in android_security_Scrypt_nativeScrypt()
39 int passwordLen = env->GetArrayLength(password); in android_security_Scrypt_nativeScrypt()
43 jbyte* passwordPtr = (jbyte*)env->GetByteArrayElements(password, NULL); in android_security_Scrypt_nativeScrypt()
50 env->ReleaseByteArrayElements(password, passwordPtr, JNI_ABORT); in android_security_Scrypt_nativeScrypt()
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
DMockScrypt.java31 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument
35 password.length + salt.length + Integer.BYTES * 6); in scrypt()
37 byteBuffer.putInt(password.length); in scrypt()
38 byteBuffer.put(password); in scrypt()
/frameworks/base/core/java/android/security/
DScrypt.java26 native byte[] nativeScrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen); in nativeScrypt() argument
29 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument
30 return nativeScrypt(password, salt, n, r, p, outLen); in scrypt()
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
DWifiConfigurationUtil.java412 private static boolean validatePassword(String password, boolean isAdd, boolean isSae) { in validatePassword() argument
414 if (password == null) { in validatePassword()
419 if (password == null) { in validatePassword()
422 } else if (password.equals(PASSWORD_MASK)) { in validatePassword()
428 if (password.isEmpty()) { in validatePassword()
432 if (password.startsWith("\"")) { in validatePassword()
434 byte[] passwordBytes = password.getBytes(StandardCharsets.US_ASCII); in validatePassword()
454 if (password.length() != PSK_SAE_HEX_LEN) { in validatePassword()
456 + password.length()); in validatePassword()
461 NativeUtil.hexOrQuotedStringToBytes(password); in validatePassword()
[all …]
/frameworks/opt/car/setupwizard/library/utils/src/com/android/car/setupwizardlib/
DIInitialLockSetupService.aidl39 int checkValidLock(in int lockType, in byte[] password) = 2; in checkValidLock() argument
46 int setLock(in int lockType, in byte[] password) = 3; in setLock() argument
/frameworks/base/core/java/com/android/internal/net/
DVpnProfile.java91 public String password = ""; // 4 field in VpnProfile
162 password = in.readString(); in VpnProfile()
213 out.writeString(password); in writeToParcel()
271 profile.password = values[4]; in decode()
306 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); in decode()
324 builder.append(VALUE_DELIMITER).append(saveLogin ? password : ""); in encode()
443 key, type, server, username, password, dnsServers, searchDomains, routes, mppe, in hashCode()
462 && Objects.equals(password, other.password) in equals()
/frameworks/base/core/java/android/os/storage/
DIStorageManager.aidl81 int decryptStorage(in String password) = 26; field
85 int encryptStorage(int type, in String password) = 27; in encryptStorage() argument
89 int changeEncryptionPassword(int type, in String password) = 28; in changeEncryptionPassword() argument
108 int verifyEncryptionPassword(in String password) = 32; field
/frameworks/base/tests/net/java/com/android/internal/net/
DVpnProfileTest.java58 assertEquals("", p.password); in testDefaults()
85 p.password = "qux"; in getSampleIkev2Profile()
215 decoded.password = profile.password; in testEncodeDecodeLoginsNotSaved()
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/
DKeyStoreProxyImpl.java49 public Key getKey(String alias, char[] password) in getKey() argument
51 return mKeyStore.getKey(alias, password); in getKey()
/frameworks/base/telephony/java/android/telephony/ims/stub/
DImsUtImplBase.java214 int serviceClass, String password) throws RemoteException {
216 cbType, action, barrList, serviceClass, password);
344 int serviceClass, @NonNull String password) { in updateCallBarringWithPassword() argument
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
DIccCard.java192 String password, Message onComplete) { in setIccLockEnabled() argument
208 String password, Message onComplete) { in setIccFdnEnabled() argument
/frameworks/base/tests/LegacyRestoreTest/
DREADME4 to the PBKDF2 implementation. The archive's encryption password, entered on-screen,
9 reporting an invalid password in logcat. This is the situation reported in bug

12345