History log of /frameworks/base/services/core/java/com/android/server/locksettings/LockSettingsStorage.java
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
fe2d5ed8d79e52e989da1754f809bd6ff72de1bd 02-Sep-2017 Fyodor Kupolov <fkupolov@google.com> Close idle connections to release RAM

Close idle connections after 30s of inactivity to release RAM.
Savings: ~0.4mb on marlin

Bug: 63398887
Test: reboot and dumpsys meminfo system
Change-Id: I39aa1fef9ae9850564a13891cb89c27cb805d683
/frameworks/base/services/core/java/com/android/server/locksettings/LockSettingsStorage.java
971f2948fbee3766ec01907f5a6e23f4c9bb4872 12-Jul-2017 Andrew Scull <ascull@google.com> Credential FRP: remove GateKeeper

From O-DR, all new credentials will be synthetic password based. A
GateKeeper credential could be enrolled but that would require
`adb shell cmd lock_settings sp 0`.

Credential FRP won't be released before O-DR so there is no need to
handle GateKeeper credentials. The protocol constants have been updated
because they are not yet in use.

Bug: 36814845
Test: runtest frameworks-services -p com.android.server.locksettings
Change-Id: Id0def06bb56fef47f3151f4f5cd0db738b35979f
/frameworks/base/services/core/java/com/android/server/locksettings/LockSettingsStorage.java
7374d3a4bca6bfbf7da1ef5dbf0db9f35f0c8315 31-Mar-2017 Adrian Roos <roosa@google.com> Credential FRP: Add implementation

- Adds a facility to store a credential handle that survives factory reset
- Adds a method to KeyguardManager for verifying the stored credential for SetupWizard
- Dark launches persisting the primary user's credential as the FRP credential (behind a default-off flag)

Future work:
- Use a separate GK handle / synthetic password for the FRP credential
- Enroll the FRP credential in verifyCredential for the upgrade case

Bug: 36814845
Test: runtest -x core/tests/coretests/src/com/android/internal/widget/LockPatternUtilsTest.java && runtest -x services/tests/servicestests/src/com/android/server/LockSettingsStorageTests.java && runtest -x services/tests/servicestests/src/com/android/server/SyntheticPasswordTests.java
Change-Id: Ia739408c5ecb169e5f09670cd9ceaa7febc2b1cc
/frameworks/base/services/core/java/com/android/server/locksettings/LockSettingsStorage.java
4c870a095a94d42b796d59be1c89ed7abd645fe5 19-May-2017 Andrew Scull <ascull@google.com> Merge "Resolve error-prone warnings."
8fc2ec832f765a51c8fcd04cc89428a3ced4b605 19-May-2017 Andrew Scull <ascull@google.com> Resolve error-prone warnings.

Objects used for synchronisation should be final and inner classes
should be static, if possible.

Change-Id: I2be5bae504835660fad752048b2ab9c7076fafc0
Fix: 38442000
Test: Build
/frameworks/base/services/core/java/com/android/server/locksettings/LockSettingsStorage.java
aa32d1530594db74e730e99d5ebbf8809bacd9d1 27-Apr-2017 Rubin Xu <rubinxu@google.com> Invoke BLKSECDISCARD to securely delete sensitive data

Bug: 34600579
Test: manual - change device lock under synthetic password, verify
old data on disk is erased.

Change-Id: I247bd1f095dd27335e671981f9e2d77e149af84f
/frameworks/base/services/core/java/com/android/server/locksettings/LockSettingsStorage.java
507d11c9353666a75fee014565f900825a907691 03-May-2017 Andrew Scull <ascull@google.com> Move LockSettingsService into locksettings package.

This service now has a large number of support classes so move them into
their own package to keep things tidy and easier to refactor.

Bug: 37090873
Test: runtest frameworks-services -c com.android.server.locksettings.LockSettingsServiceTests
Test: runtest frameworks-services -c com.android.server.locksettings.LockSettingsShellCommandTest
Test: runtest frameworks-services -c com.android.server.locksettings.SyntheticPasswordTests
Change-Id: Ic3cd00e6565749defd74498a3491c3d9b914ad90
/frameworks/base/services/core/java/com/android/server/locksettings/LockSettingsStorage.java