/frameworks/base/telephony/java/com/android/internal/telephony/euicc/ |
H A D | IGetEuiccChallengeCallback.aidl | 20 void onComplete(int resultCode, in byte[] challenge);
|
/frameworks/base/obex/javax/obex/ |
H A D | ObexSession.java | 60 * Called when the server received an authentication challenge header. This 61 * will cause the authenticator to handle the authentication challenge. 62 * @param header the header with the authentication challenge 73 * An authentication challenge is made up of one required and two 75 * the authentication challenge and it represents the challenge digest 81 byte[] challenge = ObexHelper.getTagValue((byte)0x00, header.mAuthChall); 156 * will be sent. The second optional tag is 0x02 and is the challenge 169 byte[] digest = new byte[challenge.length + password.length + 1]; 170 System.arraycopy(challenge, [all...] |
/frameworks/base/core/java/android/service/gatekeeper/ |
H A D | IGateKeeperService.aidl | 57 * @param challenge a challenge to authenticate agaisnt the device credential. If successful 65 GateKeeperResponse verifyChallenge(int uid, long challenge, in byte[] enrolledPasswordHandle,
|
/frameworks/base/core/java/com/android/internal/widget/ |
H A D | LockPatternChecker.java | 47 * @param attestation The attestation that the challenge was verified, or null. 59 * @param challenge The challenge to verify against the pattern. 65 final long challenge, 82 return utils.verifyPattern(patternCopy, challenge, userId); 150 * @param challenge The challenge to verify against the pattern. 156 final long challenge, 165 return utils.verifyPassword(password, challenge, userId); 186 * @param challenge Th 63 verifyPattern(final LockPatternUtils utils, final List<LockPatternView.Cell> pattern, final long challenge, final int userId, final OnVerifyCallback callback) argument 154 verifyPassword(final LockPatternUtils utils, final String password, final long challenge, final int userId, final OnVerifyCallback callback) argument 190 verifyTiedProfileChallenge(final LockPatternUtils utils, final String password, final boolean isPattern, final long challenge, final int userId, final OnVerifyCallback callback) argument [all...] |
H A D | ILockSettings.aidl | 43 VerifyCredentialResponse verifyCredential(in String credential, int type, long challenge, int userId); 44 VerifyCredentialResponse verifyTiedProfileChallenge(String credential, int type, long challenge, int userId);
|
H A D | LockPatternUtils.java | 353 private byte[] verifyCredential(String credential, int type, long challenge, int userId) argument 357 type, challenge, userId); 391 * If pattern matches, return an opaque attestation that the challenge 395 * @param challenge The challenge to verify against the pattern 396 * @return the attestation that the challenge was verified, or null. 398 public byte[] verifyPattern(List<LockPatternView.Cell> pattern, long challenge, int userId) argument 401 return verifyCredential(patternToString(pattern), CREDENTIAL_TYPE_PATTERN, challenge, 432 * If password matches, return an opaque attestation that the challenge 436 * @param challenge Th 439 verifyPassword(String password, long challenge, int userId) argument 455 verifyTiedProfileChallenge(String password, boolean isPattern, long challenge, int userId) argument [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | FakeGateKeeperService.java | 61 public long challenge; field in class:FakeGateKeeperService.AuthToken 64 public AuthToken(long challenge, long sid) { argument 65 this.challenge = challenge; 74 challenge = buffer.getLong(); 81 buffer.putLong(challenge); 124 public GateKeeperResponse verifyChallenge(int uid, long challenge, argument 136 AuthToken token = new AuthToken(challenge, handle.sid);
|
H A D | LockSettingsServiceTests.java | 114 // clear auth token and wait for verify challenge from primary user to re-generate it. 141 // Clear unified challenge 169 // clear auth token and make sure verify challenge from primary user does not regenerate it. 211 final long challenge = 54321; 212 VerifyCredentialResponse response = mService.verifyCredential(credential, type, challenge, 233 incorrectType, challenge, userId).getResponseCode()); 236 type, challenge, userId).getResponseCode());
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncUtilsTest.java | 226 byte[] challenge = randomBytes(32); 232 challenge, 239 /*header=*/ KeySyncUtils.concat(RECOVERY_CLAIM_HEADER, vaultParams, challenge), 253 /*challenge=*/ randomBytes(32), 264 fail("Should throw if challenge is incorrect."); 273 byte[] challenge = randomBytes(32); 279 challenge, 288 RECOVERY_CLAIM_HEADER, vaultParams, challenge), 300 byte[] challenge = randomBytes(32); 305 challenge, [all...] |
/frameworks/base/keystore/java/android/security/ |
H A D | IKeyChainService.aidl | 37 int attestKey(in String alias, in byte[] challenge, in int[] idAttestationFlags,
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | DefaultHttpClientTest.java | 132 String challenge = "Digest realm=\"protected area\", " 136 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge));
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/ |
H A D | TelephonyUtil.java | 354 for (String challenge : requestData) { 355 if (challenge == null || challenge.isEmpty()) { 358 Log.d(TAG, "RAND = " + challenge); 362 rand = parseHex(challenge); 364 Log.e(TAG, "malformed challenge"); 427 // EAP-AKA/AKA': data[] contains rand & authn couple for the single challenge 456 Log.e(TAG, "malformed challenge"); 459 Log.e(TAG, "malformed challenge");
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncUtils.java | 187 * @param challenge The challenge issued by the server. 199 byte[] challenge, 205 /*header=*/ concat(RECOVERY_CLAIM_HEADER, vaultParams, challenge), 196 encryptRecoveryClaim( PublicKey publicKey, byte[] vaultParams, byte[] challenge, byte[] thmKfHash, byte[] keyClaimant) argument
|
/frameworks/base/telephony/java/android/telephony/euicc/ |
H A D | EuiccCardManager.java | 418 * Requests the eUICC challenge for new profile downloading. 422 * @param callback the callback to get the result code and the challenge. 430 public void onComplete(int resultCode, byte[] challenge) { 431 executor.execute(() -> callback.onComplete(resultCode, challenge));
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreKeyPairGeneratorSpi.java | 493 byte[] challenge = mSpec.getAttestationChallenge(); 494 if (challenge != null) { 496 args.addBytes(KeymasterDefs.KM_TAG_ATTESTATION_CHALLENGE, challenge);
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | LockSettingsService.java | 281 // Do not tie managed profile when work challenge is enabled 1138 false, 0 /* no challenge */, profileHandle, null /* progressCallback */); 1237 * Synchronize all profile's work challenge of the given user if it's unified: tie or clear them 1612 public VerifyCredentialResponse verifyCredential(String credential, int type, long challenge, argument 1615 return doVerifyCredential(credential, type, true, challenge, userId, 1624 boolean hasChallenge, long challenge, int userId, 1635 response = spBasedDoVerifyCredential(credential, credentialType, hasChallenge, challenge, 1669 hasChallenge, challenge, progressCallback); 1684 long challenge, int userId) throws RemoteException { 1690 // Unlock parent by using parent's challenge 1623 doVerifyCredential(String credential, int credentialType, boolean hasChallenge, long challenge, int userId, ICheckCredentialProgressCallback progressCallback) argument 1683 verifyTiedProfileChallenge(String credential, int type, long challenge, int userId) argument 1724 verifyCredential(int userId, CredentialHash storedHash, String credential, boolean hasChallenge, long challenge, ICheckCredentialProgressCallback progressCallback) argument 2341 spBasedDoVerifyCredential(String userCredential, int credentialType, boolean hasChallenge, long challenge, int userId, ICheckCredentialProgressCallback progressCallback) argument [all...] |
H A D | SyntheticPasswordManager.java | 667 0 /* challenge */, pwd.passwordHandle, passwordTokenToGkInput(pwdToken)); 987 @NonNull AuthenticationToken auth, long challenge, int userId) throws RemoteException { 995 GateKeeperResponse response = gatekeeper.verifyChallenge(userId, challenge, 1007 return verifyChallenge(gatekeeper, auth, challenge, userId); 986 verifyChallenge(IGateKeeperService gatekeeper, @NonNull AuthenticationToken auth, long challenge, int userId) argument
|