/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
D | SyntheticPasswordTests.java | 74 final byte[] password = "user-password".getBytes(); in testPasswordBasedSyntheticPassword() 81 password, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, authToken, in testPasswordBasedSyntheticPassword() 85 mGateKeeperService, handle, password, USER_ID, null); in testPasswordBasedSyntheticPassword() 106 protected void initializeCredentialUnderSP(byte[] password, int userId) throws RemoteException { in initializeCredentialUnderSP() argument 108 int quality = password != null ? PASSWORD_QUALITY_ALPHABETIC in initializeCredentialUnderSP() 110 int type = password != null ? LockPatternUtils.CREDENTIAL_TYPE_PASSWORD in initializeCredentialUnderSP() 112 mService.setLockCredential(password, type, null, quality, userId, false); in initializeCredentialUnderSP() 117 final byte[] password = "testSyntheticPasswordChangeCredential-password".getBytes(); in testSyntheticPasswordChangeCredential() 120 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testSyntheticPasswordChangeCredential() 122 mService.setLockCredential(newPassword, LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, password, in testSyntheticPasswordChangeCredential() [all …]
|
D | CachedSyntheticPasswordTests.java | 68 final byte[] password = "testSyntheticPasswordClearCredential-password".getBytes(); in testSyntheticPasswordClearCredentialUntrusted() 71 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testSyntheticPasswordClearCredentialUntrusted() 89 final byte[] password = "testSyntheticPasswordClearCredential-password".getBytes(); in testSyntheticPasswordChangeCredentialUntrusted() 92 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testSyntheticPasswordChangeCredentialUntrusted() 107 final byte[] password = in testUntrustedCredentialChangeMaintainsAuthSecret() 112 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testUntrustedCredentialChangeMaintainsAuthSecret() 130 final byte[] password = in testUntrustedCredentialChangeBlockedIfSpNotCached() 138 initializeCredentialUnderSP(password, PRIMARY_USER_ID); in testUntrustedCredentialChangeBlockedIfSpNotCached() 153 assertEquals(VerifyCredentialResponse.RESPONSE_OK, mService.verifyCredential(password, in testUntrustedCredentialChangeBlockedIfSpNotCached()
|
D | FakeGateKeeperService.java | 33 public byte[] password; field in FakeGateKeeperService.VerifyHandle 36 public VerifyHandle(byte[] password, long sid) { in VerifyHandle() argument 37 this.password = password; in VerifyHandle() 47 password = new byte[buffer.remaining()]; in VerifyHandle() 48 buffer.get(password); in VerifyHandle() 52 ByteBuffer buffer = ByteBuffer.allocate(1 + Long.BYTES + password.length); in toBytes() 55 buffer.put(password); in toBytes() 97 if (Arrays.equals(currentPassword, handle.password)) { in enroll() 128 if (Arrays.equals(handle.password, providedPassword)) { in verifyChallenge()
|
D | MockSyntheticPasswordManager.java | 98 protected byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument 100 char[] passwordChars = new char[password.length]; in scrypt() 101 for (int i = 0; i < password.length; i++) { in scrypt() 102 passwordChars[i] = (char) password[i]; in scrypt()
|
D | LockSettingsServiceTests.java | 233 final byte[] password = "password".getBytes(); in testSetLockCredential_forPrimaryUser_sendsCredentials() 236 password, in testSetLockCredential_forPrimaryUser_sendsCredentials() 244 .lockScreenSecretChanged(CREDENTIAL_TYPE_PASSWORD, password, PRIMARY_USER_ID); in testSetLockCredential_forPrimaryUser_sendsCredentials() 402 final String password = "password"; in testVerifyCredential_forPrimaryUser_sendsCredentials() local 403 initializeStorageWithCredential(PRIMARY_USER_ID, password, CREDENTIAL_TYPE_PASSWORD, 1234); in testVerifyCredential_forPrimaryUser_sendsCredentials() 407 password.getBytes(), CREDENTIAL_TYPE_PASSWORD, 1, PRIMARY_USER_ID); in testVerifyCredential_forPrimaryUser_sendsCredentials() 411 CREDENTIAL_TYPE_PASSWORD, password.getBytes(), PRIMARY_USER_ID); in testVerifyCredential_forPrimaryUser_sendsCredentials()
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/ |
D | WifiAssociationTest.java | 64 String password = arguments.getString("password"); in testWifiAssociation() local 71 WifiConfiguration config = getConfig(ssid, securityType, password); in testWifiAssociation() 80 private WifiConfiguration getConfig(String ssid, SecurityType securityType, String password) { in getConfig() argument 89 assertNotNull("password is empty", password); in getConfig() 91 assertTrue(WifiConfigurationHelper.isHex(password, 10)); in getConfig() 92 config = WifiConfigurationHelper.createWepConfig(ssid, password); in getConfig() 96 assertNotNull("password is empty", password); in getConfig() 98 assertTrue(WifiConfigurationHelper.isHex(password, 26)); in getConfig() 99 config = WifiConfigurationHelper.createWepConfig(ssid, password); in getConfig() 103 assertNotNull("password is empty", password); in getConfig() [all …]
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
D | WifiConfigurationHelper.java | 72 public static WifiConfiguration createWepConfig(String ssid, String password) { in createWepConfig() argument 75 if (isHex(password, 10) || isHex(password, 26) || isHex(password, 58)) { in createWepConfig() 76 config.wepKeys[0] = password; in createWepConfig() 78 config.wepKeys[0] = quotedString(password); in createWepConfig() 94 public static WifiConfiguration createPskConfig(String ssid, String password) { in createPskConfig() argument 97 if (isHex(password, 64)) { in createPskConfig() 98 config.preSharedKey = password; in createPskConfig() 100 config.preSharedKey = quotedString(password); in createPskConfig() 119 public static WifiConfiguration createEapConfig(String ssid, String password, int eapMethod, in createEapConfig() argument 135 config.enterpriseConfig.setPassword(password); in createEapConfig() [all …]
|
D | ConnectivityManagerTestRunner.java | 62 String password = (String) icicle.get("password"); in onCreate() local 63 if (password != null) { in onCreate() 64 mPassword = password; in onCreate()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/backup/ |
D | BackupPasswordManagerTest.java | 96 String password = "password1234"; in backupPasswordMatches_isTrueForSamePassword() local 97 mPasswordManager.setBackupPassword(null, password); in backupPasswordMatches_isTrueForSamePassword() 98 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue(); in backupPasswordMatches_isTrueForSamePassword() 109 String password = "corgi\uFFFF"; in backupPasswordMatches_worksForV1HashIfVersionIsV1() local 111 writeV1HashToFile(password, saltFixture()); in backupPasswordMatches_worksForV1HashIfVersionIsV1() 116 assertThat(mPasswordManager.backupPasswordMatches(password)).isTrue(); in backupPasswordMatches_worksForV1HashIfVersionIsV1() 124 String password = "corgi\uFFFF"; in backupPasswordMatches_failsForV1HashIfVersionIsV2() local 126 writeV1HashToFile(password, saltFixture()); in backupPasswordMatches_failsForV1HashIfVersionIsV2() 131 assertThat(mPasswordManager.backupPasswordMatches(password)).isFalse(); in backupPasswordMatches_failsForV1HashIfVersionIsV2() 146 String password = "shiba"; in setBackupPassword_persistsPasswordToFile() local [all …]
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternChecker.java | 159 final String password, in verifyPassword() argument 163 byte[] passwordBytes = password != null ? password.getBytes() : null; in verifyPassword() 177 final byte[] password, in verifyPassword() argument 187 return utils.verifyPassword(password, challenge, userId); in verifyPassword() 213 final byte[] password, in verifyTiedProfileChallenge() argument 224 return utils.verifyTiedProfileChallenge(password, isPattern, challenge, userId); in verifyTiedProfileChallenge() 252 final String password, in checkPassword() argument 255 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword()
|
D | LockPatternUtils.java | 454 public byte[] verifyPassword(byte[] password, long challenge, int userId) in verifyPassword() argument 457 return verifyCredential(password, CREDENTIAL_TYPE_PASSWORD, challenge, userId); in verifyPassword() 470 public byte[] verifyTiedProfileChallenge(byte[] password, boolean isPattern, long challenge, in verifyTiedProfileChallenge() argument 475 getLockSettings().verifyTiedProfileChallenge(password, in verifyTiedProfileChallenge() 499 public boolean checkPassword(String password, int userId) throws RequestThrottledException { in checkPassword() argument 500 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword() 512 public boolean checkPassword(byte[] password, int userId) throws RequestThrottledException { in checkPassword() argument 513 return checkPassword(password, userId, null /* progressCallback */); in checkPassword() 523 public boolean checkPassword(String password, int userId, in checkPassword() argument 526 byte[] passwordBytes = password != null ? password.getBytes() : null; in checkPassword() [all …]
|
/frameworks/base/obex/javax/obex/ |
D | PasswordAuthentication.java | 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { in PasswordAuthentication() argument 59 mPassword = new byte[password.length]; in PasswordAuthentication() 60 System.arraycopy(password, 0, mPassword, 0, password.length); in PasswordAuthentication()
|
D | ObexSession.java | 144 byte[] password = result.getPassword(); in handleAuthChall() 145 if (password == null) { in handleAuthChall() 169 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall() 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall()
|
/frameworks/base/core/jni/ |
D | android_security_Scrypt.cpp | 34 static jbyteArray android_security_Scrypt_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, j… in android_security_Scrypt_nativeScrypt() argument 35 if (!password || !salt) { in android_security_Scrypt_nativeScrypt() 39 int passwordLen = env->GetArrayLength(password); in android_security_Scrypt_nativeScrypt() 43 jbyte* passwordPtr = (jbyte*)env->GetByteArrayElements(password, NULL); in android_security_Scrypt_nativeScrypt() 50 env->ReleaseByteArrayElements(password, passwordPtr, JNI_ABORT); in android_security_Scrypt_nativeScrypt()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
D | MockScrypt.java | 31 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument 35 password.length + salt.length + Integer.BYTES * 6); in scrypt() 37 byteBuffer.putInt(password.length); in scrypt() 38 byteBuffer.put(password); in scrypt()
|
/frameworks/base/core/java/android/security/ |
D | Scrypt.java | 26 native byte[] nativeScrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen); in nativeScrypt() argument 29 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() argument 30 return nativeScrypt(password, salt, n, r, p, outLen); in scrypt()
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
D | WifiConfigurationUtil.java | 412 private static boolean validatePassword(String password, boolean isAdd, boolean isSae) { in validatePassword() argument 414 if (password == null) { in validatePassword() 419 if (password == null) { in validatePassword() 422 } else if (password.equals(PASSWORD_MASK)) { in validatePassword() 428 if (password.isEmpty()) { in validatePassword() 432 if (password.startsWith("\"")) { in validatePassword() 434 byte[] passwordBytes = password.getBytes(StandardCharsets.US_ASCII); in validatePassword() 454 if (password.length() != PSK_SAE_HEX_LEN) { in validatePassword() 456 + password.length()); in validatePassword() 461 NativeUtil.hexOrQuotedStringToBytes(password); in validatePassword() [all …]
|
/frameworks/opt/car/setupwizard/library/utils/src/com/android/car/setupwizardlib/ |
D | IInitialLockSetupService.aidl | 39 int checkValidLock(in int lockType, in byte[] password) = 2; in checkValidLock() argument 46 int setLock(in int lockType, in byte[] password) = 3; in setLock() argument
|
/frameworks/base/core/java/com/android/internal/net/ |
D | VpnProfile.java | 91 public String password = ""; // 4 field in VpnProfile 162 password = in.readString(); in VpnProfile() 213 out.writeString(password); in writeToParcel() 271 profile.password = values[4]; in decode() 306 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); in decode() 324 builder.append(VALUE_DELIMITER).append(saveLogin ? password : ""); in encode() 443 key, type, server, username, password, dnsServers, searchDomains, routes, mppe, in hashCode() 462 && Objects.equals(password, other.password) in equals()
|
/frameworks/base/core/java/android/os/storage/ |
D | IStorageManager.aidl | 81 int decryptStorage(in String password) = 26; field 85 int encryptStorage(int type, in String password) = 27; in encryptStorage() argument 89 int changeEncryptionPassword(int type, in String password) = 28; in changeEncryptionPassword() argument 108 int verifyEncryptionPassword(in String password) = 32; field
|
/frameworks/base/tests/net/java/com/android/internal/net/ |
D | VpnProfileTest.java | 58 assertEquals("", p.password); in testDefaults() 85 p.password = "qux"; in getSampleIkev2Profile() 215 decoded.password = profile.password; in testEncodeDecodeLoginsNotSaved()
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
D | KeyStoreProxyImpl.java | 49 public Key getKey(String alias, char[] password) in getKey() argument 51 return mKeyStore.getKey(alias, password); in getKey()
|
/frameworks/base/telephony/java/android/telephony/ims/stub/ |
D | ImsUtImplBase.java | 214 int serviceClass, String password) throws RemoteException { 216 cbType, action, barrList, serviceClass, password); 344 int serviceClass, @NonNull String password) { in updateCallBarringWithPassword() argument
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
D | IccCard.java | 192 String password, Message onComplete) { in setIccLockEnabled() argument 208 String password, Message onComplete) { in setIccFdnEnabled() argument
|
/frameworks/base/tests/LegacyRestoreTest/ |
D | README | 4 to the PBKDF2 implementation. The archive's encryption password, entered on-screen, 9 reporting an invalid password in logcat. This is the situation reported in bug
|