Lines Matching defs:credential

137      * The UIDs that are used for system credential storage in keystore.
149 void setCredential(String credential, String savedCredential, int userId)
151 byte[] toHash(String credential, int userId);
152 String adjustForKeystore(String credential);
157 // the user unlocks the account and credential-encrypted storage is available.
260 // We store a private credential for the managed user that's unlocked by the primary
261 // account holder's credential. As such, the user will never be prompted to enter this
307 * If the account is credential-encrypted, show notification requesting the user to unlock
851 CredentialHash credential;
857 credential = mStorage.readPatternHash(userId);
858 currentHandle = credential != null
859 ? credential.hash
863 credential = mStorage.readPasswordHash(userId);
864 currentHandle = credential != null
865 ? credential.hash
950 // get credential from keystore when managed profile has unified lock
966 Slog.w(TAG, "Saved credential provided, but none stored");
1014 // get credential from keystore when managed profile has unified lock
1028 Slog.w(TAG, "Saved credential provided, but none stored");
1135 private void setUserKeyProtection(int userId, String credential, VerifyCredentialResponse vcr)
1138 throw new RemoteException("Null response verifying a credential we just set");
1141 throw new RemoteException("Non-OK response verifying a credential we just set: "
1146 throw new RemoteException("Empty payload verifying a credential we just set");
1148 addUserKeyAuth(userId, token, secretFromCredential(credential));
1155 private static byte[] secretFromCredential(String credential) throws RemoteException {
1159 byte[] personalization = "Android FBE credential hash"
1164 digest.update(credential.getBytes(StandardCharsets.UTF_8));
1393 String credential, boolean hasChallenge, long challenge, CredentialUtil credentialUtil,
1396 if ((storedHash == null || storedHash.hash.length == 0) && TextUtils.isEmpty(credential)) {
1401 if (TextUtils.isEmpty(credential)) {
1406 byte[] hash = credentialUtil.toHash(credential, userId);
1408 unlockKeystore(credentialUtil.adjustForKeystore(credential), userId);
1410 // Users with legacy credentials don't have credential-backed
1416 // migrate credential to GateKeeper
1417 credentialUtil.setCredential(credential, null, userId);
1419 notifyActivePasswordMetricsAvailable(credential, userId);
1423 // as a user that had a legacy credential would have to unlock their device
1433 .verifyChallenge(userId, challenge, storedHash.hash, credential.getBytes());
1454 // credential has matched
1459 notifyActivePasswordMetricsAvailable(credential, userId);
1460 unlockKeystore(credential, userId);
1464 unlockUser(userId, response.getPayload(), secretFromCredential(credential));
1472 credentialUtil.setCredential(credential, credential, userId);