/frameworks/base/obex/javax/obex/ |
D | ObexSession.java | 81 byte[] challenge = ObexHelper.getTagValue((byte)0x00, header.mAuthChall); in handleAuthChall() 169 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall() 170 System.arraycopy(challenge, 0, digest, 0, challenge.length); in handleAuthChall() 172 digest[challenge.length] = (byte)0x3A; in handleAuthChall() 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall() 184 System.arraycopy(challenge, 0, header.mAuthResp, 20, 16); in handleAuthChall()
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternChecker.java | 66 final long challenge, in verifyPattern() argument 83 return utils.verifyPattern(patternCopy, challenge, userId); in verifyPattern() 160 final long challenge, in verifyPassword() argument 164 return verifyPassword(utils, passwordBytes, challenge, userId, callback); in verifyPassword() 178 final long challenge, in verifyPassword() argument 187 return utils.verifyPassword(password, challenge, userId); in verifyPassword() 215 final long challenge, in verifyTiedProfileChallenge() argument 224 return utils.verifyTiedProfileChallenge(password, isPattern, challenge, userId); in verifyTiedProfileChallenge()
|
D | ILockSettings.aidl | 49 …VerifyCredentialResponse verifyCredential(in byte[] credential, int type, long challenge, int user… in verifyCredential() argument 50 …ialResponse verifyTiedProfileChallenge(in byte[] credential, int type, long challenge, int userId); in verifyTiedProfileChallenge() argument
|
D | LockPatternUtils.java | 368 private byte[] verifyCredential(byte[] credential, int type, long challenge, int userId) in verifyCredential() argument 372 type, challenge, userId); in verifyCredential() 413 public byte[] verifyPattern(List<LockPatternView.Cell> pattern, long challenge, int userId) in verifyPattern() argument 416 return verifyCredential(patternToByteArray(pattern), CREDENTIAL_TYPE_PATTERN, challenge, in verifyPattern() 454 public byte[] verifyPassword(byte[] password, long challenge, int userId) in verifyPassword() argument 457 return verifyCredential(password, CREDENTIAL_TYPE_PASSWORD, challenge, userId); in verifyPassword() 470 public byte[] verifyTiedProfileChallenge(byte[] password, boolean isPattern, long challenge, in verifyTiedProfileChallenge() argument 476 … isPattern ? CREDENTIAL_TYPE_PATTERN : CREDENTIAL_TYPE_PASSWORD, challenge, in verifyTiedProfileChallenge()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
D | FakeGateKeeperService.java | 61 public long challenge; field in FakeGateKeeperService.AuthToken 64 public AuthToken(long challenge, long sid) { in AuthToken() argument 65 this.challenge = challenge; in AuthToken() 74 challenge = buffer.getLong(); in AuthToken() 81 buffer.putLong(challenge); in toBytes() 124 public GateKeeperResponse verifyChallenge(int uid, long challenge, in verifyChallenge() argument 136 AuthToken token = new AuthToken(challenge, handle.sid); in verifyChallenge()
|
D | LockSettingsServiceTests.java | 491 final long challenge = 54321; in assertVerifyCredentials() local 493 type, challenge, userId); in assertVerifyCredentials() 513 credential.getBytes(), incorrectType, challenge, userId).getResponseCode()); in assertVerifyCredentials() 516 ("0" + credential).getBytes(), type, challenge, userId).getResponseCode()); in assertVerifyCredentials()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
D | KeySyncUtilsTest.java | 288 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 294 challenge, in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 301 /*header=*/ KeySyncUtils.concat(RECOVERY_CLAIM_HEADER, vaultParams, challenge), in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 335 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 341 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 350 RECOVERY_CLAIM_HEADER, vaultParams, challenge), in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 362 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() 367 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() 376 RECOVERY_CLAIM_HEADER, randomBytes(100), challenge), in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() 388 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader() [all …]
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/ |
D | TelephonyUtil.java | 485 for (String challenge : requestData) { in getGsmAuthResponseWithLength() 486 if (challenge == null || challenge.isEmpty()) { in getGsmAuthResponseWithLength() 489 Log.d(TAG, "RAND = " + challenge); in getGsmAuthResponseWithLength() 493 rand = parseHex(challenge); in getGsmAuthResponseWithLength() 558 for (String challenge : requestData) { in getGsmSimpleSimNoLengthAuthResponse() 559 if (challenge == null || challenge.isEmpty()) { in getGsmSimpleSimNoLengthAuthResponse() 562 Log.d(TAG, "RAND = " + challenge); in getGsmSimpleSimNoLengthAuthResponse() 566 rand = parseHexWithoutLength(challenge); in getGsmSimpleSimNoLengthAuthResponse()
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
D | DefaultHttpClientTest.java | 132 String challenge = "Digest realm=\"protected area\", " in authenticateDigestAlgorithm() local 136 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge)); in authenticateDigestAlgorithm()
|
/frameworks/base/telephony/java/com/android/internal/telephony/euicc/ |
D | IGetEuiccChallengeCallback.aidl | 20 void onComplete(int resultCode, in byte[] challenge); in onComplete() argument
|
/frameworks/base/identity/java/android/security/identity/ |
D | WritableIdentityCredential.java | 66 @NonNull byte[] challenge); in getCredentialKeyCertificateChain()
|
D | CredstoreWritableIdentityCredential.java | 51 public Collection<X509Certificate> getCredentialKeyCertificateChain(@NonNull byte[] challenge) { in getCredentialKeyCertificateChain() argument 53 byte[] certsBlob = mBinder.getCredentialKeyCertificateChain(challenge); in getCredentialKeyCertificateChain()
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
D | LockSettingsService.java | 1188 @ChallengeType int challengeType, long challenge, in unlockChildProfile() argument 1194 challengeType, challenge, profileHandle, null /* progressCallback */, in unlockChildProfile() local 1223 @ChallengeType int challengeType, long challenge, in unlockUser() argument 1269 challengeType, challenge, resetLockouts); in unlockUser() 1810 public VerifyCredentialResponse verifyCredential(byte[] credential, int type, long challenge, in verifyCredential() argument 1813 return doVerifyCredential(credential, type, CHALLENGE_FROM_CALLER, challenge, userId, in verifyCredential() 1818 @ChallengeType int challengeType, long challenge, int userId, in doVerifyCredential() argument 1820 return doVerifyCredential(credential, credentialType, challengeType, challenge, userId, in doVerifyCredential() 1829 @ChallengeType int challengeType, long challenge, int userId, in doVerifyCredential() argument 1841 response = spBasedDoVerifyCredential(credential, credentialType, challengeType, challenge, in doVerifyCredential() [all …]
|
D | SyntheticPasswordManager.java | 1031 @NonNull AuthenticationToken auth, long challenge, int userId) throws RemoteException { in verifyChallenge() argument 1039 GateKeeperResponse response = gatekeeper.verifyChallenge(userId, challenge, in verifyChallenge() 1051 return verifyChallenge(gatekeeper, auth, challenge, userId); in verifyChallenge()
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
D | KeySyncUtils.java | 215 byte[] challenge, in encryptRecoveryClaim() argument 221 /*header=*/ concat(RECOVERY_CLAIM_HEADER, vaultParams, challenge), in encryptRecoveryClaim()
|
/frameworks/base/keystore/java/android/security/ |
D | IKeyChainService.aidl | 38 int attestKey(in String alias, in byte[] challenge, in int[] idAttestationFlags, in attestKey() argument
|
/frameworks/base/keystore/java/android/security/keystore/ |
D | AndroidKeyStoreKeyPairGeneratorSpi.java | 492 byte[] challenge = mSpec.getAttestationChallenge(); in createCertificateChain() 493 if (challenge != null) { in createCertificateChain() 495 args.addBytes(KeymasterDefs.KM_TAG_ATTESTATION_CHALLENGE, challenge); in createCertificateChain()
|
/frameworks/base/telephony/java/android/telephony/euicc/ |
D | EuiccCardManager.java | 489 public void onComplete(int resultCode, byte[] challenge) { in requestEuiccChallenge() argument 492 executor.execute(() -> callback.onComplete(resultCode, challenge)); in requestEuiccChallenge()
|