/frameworks/base/obex/javax/obex/ |
D | ObexSession.java | 81 byte[] challenge = ObexHelper.getTagValue((byte)0x00, header.mAuthChall); in handleAuthChall() 169 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall() 170 System.arraycopy(challenge, 0, digest, 0, challenge.length); in handleAuthChall() 172 digest[challenge.length] = (byte)0x3A; in handleAuthChall() 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall() 184 System.arraycopy(challenge, 0, header.mAuthResp, 20, 16); in handleAuthChall()
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternChecker.java | 60 final long challenge, in verifyPattern() argument 77 return utils.verifyPattern(patternCopy, challenge, userId); in verifyPattern() 146 final long challenge, in verifyPassword() argument 155 return utils.verifyPassword(password, challenge, userId); in verifyPassword() 183 final long challenge, in verifyTiedProfileChallenge() argument 192 return utils.verifyTiedProfileChallenge(password, isPattern, challenge, userId); in verifyTiedProfileChallenge()
|
D | ILockSettings.aidl | 35 VerifyCredentialResponse verifyPattern(in String pattern, long challenge, int userId); in verifyPattern() argument 39 VerifyCredentialResponse verifyPassword(in String password, long challenge, int userId); in verifyPassword() argument 40 …esponse verifyTiedProfileChallenge(String password, boolean isPattern, long challenge, int userId); in verifyTiedProfileChallenge() argument
|
D | LockPatternUtils.java | 316 public byte[] verifyPattern(List<LockPatternView.Cell> pattern, long challenge, int userId) in verifyPattern() argument 321 getLockSettings().verifyPattern(patternToString(pattern), challenge, userId); in verifyPattern() 386 public byte[] verifyPassword(String password, long challenge, int userId) in verifyPassword() argument 391 getLockSettings().verifyPassword(password, challenge, userId); in verifyPassword() 415 public byte[] verifyTiedProfileChallenge(String password, boolean isPattern, long challenge, in verifyTiedProfileChallenge() argument 420 getLockSettings().verifyTiedProfileChallenge(password, isPattern, challenge, in verifyTiedProfileChallenge()
|
/frameworks/base/services/core/java/com/android/server/ |
D | LockSettingsService.java | 1245 public VerifyCredentialResponse verifyPattern(String pattern, long challenge, int userId) in verifyPattern() argument 1247 return doVerifyPattern(pattern, true, challenge, userId, null /* progressCallback */); in verifyPattern() 1251 long challenge, int userId, ICheckCredentialProgressCallback progressCallback) in doVerifyPattern() argument 1258 return doVerifyPattern(pattern, storedHash, hasChallenge, challenge, userId, in doVerifyPattern() 1263 boolean hasChallenge, long challenge, int userId, in doVerifyPattern() argument 1279 hasChallenge, challenge, in doVerifyPattern() 1316 public VerifyCredentialResponse verifyPassword(String password, long challenge, int userId) in verifyPassword() argument 1318 return doVerifyPassword(password, true, challenge, userId, null /* progressCallback */); in verifyPassword() 1323 long challenge, int userId) throws RemoteException { in verifyTiedProfileChallenge() argument 1331 ? doVerifyPattern(password, true, challenge, parentProfileId, in verifyTiedProfileChallenge() [all …]
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
D | DefaultHttpClientTest.java | 126 String challenge = "Digest realm=\"protected area\", " in authenticateDigestAlgorithm() local 130 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge)); in authenticateDigestAlgorithm()
|
/frameworks/base/core/java/android/service/gatekeeper/ |
D | IGateKeeperService.aidl | 65 GateKeeperResponse verifyChallenge(int uid, long challenge, in byte[] enrolledPasswordHandle, in verifyChallenge() argument
|
/frameworks/base/keystore/java/android/security/keystore/ |
D | AndroidKeyStoreKeyPairGeneratorSpi.java | 485 byte[] challenge = mSpec.getAttestationChallenge(); in createCertificateChain() 486 if (challenge != null) { in createCertificateChain() 488 args.addBytes(KeymasterDefs.KM_TAG_ATTESTATION_CHALLENGE, challenge); in createCertificateChain()
|
/frameworks/base/docs/html/about/versions/nougat/ |
D | android-7.0.jd | 696 <h3 id="work_profile_security_challenge">Work profile security challenge </h3> 700 can specify a separate security challenge for apps running in 701 the work profile. The work challenge is shown when a user attempts to open 702 any work apps. Successful completion of the security challenge unlocks the 705 challenge, and <code>ACTION_SET_NEW_PARENT_PROFILE_PASSWORD</code> prompts 710 Profile owners can set distinct passcode policies for the work challenge 717 work challenge using the new <code>setOrganizationColor()</code> and
|
D | android-7.0-changes.jd | 745 separate work challenge. Rather than affecting the entire device, these
|
/frameworks/base/docs/html/distribute/engage/ |
D | game-services.jd | 101 <strong>Multiplayer games:</strong> Add the challenge of playing against
|
/frameworks/base/docs/html/training/articles/ |
D | security-key-attestation.jd | 277 The challenge string associated with a key pair that is verified using key 701 The challenge string associated with the key pair that is defined in the
|
D | security-tips.jd | 256 <p>Each of these poses a significant nontechnical challenge for you as the developer
|
/frameworks/base/docs/html/topic/performance/ |
D | network-xfer.jd | 305 hand-tuning for each asset is impractical. You might address this challenge by
|
D | launch-time.jd | 72 greatest challenge in terms of minimizing startup time, because the system
|
D | threads.jd | 360 Consider a common challenge with getting preview frames from your
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
D | WifiStateMachine.java | 8021 for (String challenge : requestData) { in getGsmSimAuthResponse() 8022 if (challenge == null || challenge.isEmpty()) { in getGsmSimAuthResponse() 8025 logd("RAND = " + challenge); in getGsmSimAuthResponse() 8029 rand = parseHex(challenge); in getGsmSimAuthResponse()
|
/frameworks/base/docs/html/guide/topics/media/ |
D | mediaplayer.jd | 466 multi-tasking environment. This poses a particular challenge to applications
|
/frameworks/base/docs/html/google/play/licensing/ |
D | adding-licensing.jd | 337 <p>At the same time, this {@code Policy} presents a challenge for normal users, since it
|