Searched refs:challenge (Results 1 - 17 of 17) sorted by relevance

/frameworks/base/telephony/java/com/android/internal/telephony/euicc/
H A DIGetEuiccChallengeCallback.aidl20 void onComplete(int resultCode, in byte[] challenge);
/frameworks/base/obex/javax/obex/
H A DObexSession.java60 * Called when the server received an authentication challenge header. This
61 * will cause the authenticator to handle the authentication challenge.
62 * @param header the header with the authentication challenge
73 * An authentication challenge is made up of one required and two
75 * the authentication challenge and it represents the challenge digest
81 byte[] challenge = ObexHelper.getTagValue((byte)0x00, header.mAuthChall);
156 * will be sent. The second optional tag is 0x02 and is the challenge
169 byte[] digest = new byte[challenge.length + password.length + 1];
170 System.arraycopy(challenge,
[all...]
/frameworks/base/core/java/android/service/gatekeeper/
H A DIGateKeeperService.aidl57 * @param challenge a challenge to authenticate agaisnt the device credential. If successful
65 GateKeeperResponse verifyChallenge(int uid, long challenge, in byte[] enrolledPasswordHandle,
/frameworks/base/core/java/com/android/internal/widget/
H A DLockPatternChecker.java47 * @param attestation The attestation that the challenge was verified, or null.
59 * @param challenge The challenge to verify against the pattern.
65 final long challenge,
82 return utils.verifyPattern(patternCopy, challenge, userId);
150 * @param challenge The challenge to verify against the pattern.
156 final long challenge,
165 return utils.verifyPassword(password, challenge, userId);
186 * @param challenge Th
63 verifyPattern(final LockPatternUtils utils, final List<LockPatternView.Cell> pattern, final long challenge, final int userId, final OnVerifyCallback callback) argument
154 verifyPassword(final LockPatternUtils utils, final String password, final long challenge, final int userId, final OnVerifyCallback callback) argument
190 verifyTiedProfileChallenge(final LockPatternUtils utils, final String password, final boolean isPattern, final long challenge, final int userId, final OnVerifyCallback callback) argument
[all...]
H A DILockSettings.aidl43 VerifyCredentialResponse verifyCredential(in String credential, int type, long challenge, int userId);
44 VerifyCredentialResponse verifyTiedProfileChallenge(String credential, int type, long challenge, int userId);
H A DLockPatternUtils.java353 private byte[] verifyCredential(String credential, int type, long challenge, int userId) argument
357 type, challenge, userId);
391 * If pattern matches, return an opaque attestation that the challenge
395 * @param challenge The challenge to verify against the pattern
396 * @return the attestation that the challenge was verified, or null.
398 public byte[] verifyPattern(List<LockPatternView.Cell> pattern, long challenge, int userId) argument
401 return verifyCredential(patternToString(pattern), CREDENTIAL_TYPE_PATTERN, challenge,
432 * If password matches, return an opaque attestation that the challenge
436 * @param challenge Th
439 verifyPassword(String password, long challenge, int userId) argument
455 verifyTiedProfileChallenge(String password, boolean isPattern, long challenge, int userId) argument
[all...]
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
H A DFakeGateKeeperService.java61 public long challenge; field in class:FakeGateKeeperService.AuthToken
64 public AuthToken(long challenge, long sid) { argument
65 this.challenge = challenge;
74 challenge = buffer.getLong();
81 buffer.putLong(challenge);
124 public GateKeeperResponse verifyChallenge(int uid, long challenge, argument
136 AuthToken token = new AuthToken(challenge, handle.sid);
H A DLockSettingsServiceTests.java114 // clear auth token and wait for verify challenge from primary user to re-generate it.
141 // Clear unified challenge
169 // clear auth token and make sure verify challenge from primary user does not regenerate it.
211 final long challenge = 54321;
212 VerifyCredentialResponse response = mService.verifyCredential(credential, type, challenge,
233 incorrectType, challenge, userId).getResponseCode());
236 type, challenge, userId).getResponseCode());
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
H A DKeySyncUtilsTest.java226 byte[] challenge = randomBytes(32);
232 challenge,
239 /*header=*/ KeySyncUtils.concat(RECOVERY_CLAIM_HEADER, vaultParams, challenge),
253 /*challenge=*/ randomBytes(32),
264 fail("Should throw if challenge is incorrect.");
273 byte[] challenge = randomBytes(32);
279 challenge,
288 RECOVERY_CLAIM_HEADER, vaultParams, challenge),
300 byte[] challenge = randomBytes(32);
305 challenge,
[all...]
/frameworks/base/keystore/java/android/security/
H A DIKeyChainService.aidl37 int attestKey(in String alias, in byte[] challenge, in int[] idAttestationFlags,
/frameworks/base/core/tests/coretests/src/android/net/http/
H A DDefaultHttpClientTest.java132 String challenge = "Digest realm=\"protected area\", "
136 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge));
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/
H A DTelephonyUtil.java354 for (String challenge : requestData) {
355 if (challenge == null || challenge.isEmpty()) {
358 Log.d(TAG, "RAND = " + challenge);
362 rand = parseHex(challenge);
364 Log.e(TAG, "malformed challenge");
427 // EAP-AKA/AKA': data[] contains rand & authn couple for the single challenge
456 Log.e(TAG, "malformed challenge");
459 Log.e(TAG, "malformed challenge");
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/
H A DKeySyncUtils.java187 * @param challenge The challenge issued by the server.
199 byte[] challenge,
205 /*header=*/ concat(RECOVERY_CLAIM_HEADER, vaultParams, challenge),
196 encryptRecoveryClaim( PublicKey publicKey, byte[] vaultParams, byte[] challenge, byte[] thmKfHash, byte[] keyClaimant) argument
/frameworks/base/telephony/java/android/telephony/euicc/
H A DEuiccCardManager.java418 * Requests the eUICC challenge for new profile downloading.
422 * @param callback the callback to get the result code and the challenge.
430 public void onComplete(int resultCode, byte[] challenge) {
431 executor.execute(() -> callback.onComplete(resultCode, challenge));
/frameworks/base/keystore/java/android/security/keystore/
H A DAndroidKeyStoreKeyPairGeneratorSpi.java493 byte[] challenge = mSpec.getAttestationChallenge();
494 if (challenge != null) {
496 args.addBytes(KeymasterDefs.KM_TAG_ATTESTATION_CHALLENGE, challenge);
/frameworks/base/services/core/java/com/android/server/locksettings/
H A DLockSettingsService.java281 // Do not tie managed profile when work challenge is enabled
1138 false, 0 /* no challenge */, profileHandle, null /* progressCallback */);
1237 * Synchronize all profile's work challenge of the given user if it's unified: tie or clear them
1612 public VerifyCredentialResponse verifyCredential(String credential, int type, long challenge, argument
1615 return doVerifyCredential(credential, type, true, challenge, userId,
1624 boolean hasChallenge, long challenge, int userId,
1635 response = spBasedDoVerifyCredential(credential, credentialType, hasChallenge, challenge,
1669 hasChallenge, challenge, progressCallback);
1684 long challenge, int userId) throws RemoteException {
1690 // Unlock parent by using parent's challenge
1623 doVerifyCredential(String credential, int credentialType, boolean hasChallenge, long challenge, int userId, ICheckCredentialProgressCallback progressCallback) argument
1683 verifyTiedProfileChallenge(String credential, int type, long challenge, int userId) argument
1724 verifyCredential(int userId, CredentialHash storedHash, String credential, boolean hasChallenge, long challenge, ICheckCredentialProgressCallback progressCallback) argument
2341 spBasedDoVerifyCredential(String userCredential, int credentialType, boolean hasChallenge, long challenge, int userId, ICheckCredentialProgressCallback progressCallback) argument
[all...]
H A DSyntheticPasswordManager.java667 0 /* challenge */, pwd.passwordHandle, passwordTokenToGkInput(pwdToken));
987 @NonNull AuthenticationToken auth, long challenge, int userId) throws RemoteException {
995 GateKeeperResponse response = gatekeeper.verifyChallenge(userId, challenge,
1007 return verifyChallenge(gatekeeper, auth, challenge, userId);
986 verifyChallenge(IGateKeeperService gatekeeper, @NonNull AuthenticationToken auth, long challenge, int userId) argument

Completed in 356 milliseconds