/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | SyntheticPasswordTests.java | 175 initSpAndSetCredential(PRIMARY_USER_ID, password); in testChangeCredential() 188 initSpAndSetCredential(PRIMARY_USER_ID, password); in testVerifyCredential() 202 initSpAndSetCredential(PRIMARY_USER_ID, password); in testClearCredential() 220 initSpAndSetCredential(PRIMARY_USER_ID, password); in testChangeCredentialKeepsAuthSecret() 237 initSpAndSetCredential(PRIMARY_USER_ID, password); in testVerifyPassesPrimaryUserAuthSecret() 266 initSpAndSetCredential(PRIMARY_USER_ID, password); in testUnlockUserKeyIfUnsecuredPassesPrimaryUserAuthSecretIfPasswordIsCleared() 329 initSpAndSetCredential(PRIMARY_USER_ID, password); in testTokenBasedResetPassword() 377 PRIMARY_USER_ID); in testTokenBasedClearPassword() 784 mService.onCleanupUser(PRIMARY_USER_ID); in testUnlockUserWithToken() 797 assertNoOrphanedFilesLeft(PRIMARY_USER_ID); in testPasswordChange_NoOrphanedFilesLeft() [all …]
|
H A D | WeakEscrowTokenTests.java | 55 mService.initializeSyntheticPassword(PRIMARY_USER_ID); in setUp() 66 assertTrue(mService.isWeakEscrowTokenActive(handle, PRIMARY_USER_ID)); in testWeakTokenActivatedImmediatelyIfNoUserPassword() 79 mService.setLockCredential(password, nonePassword(), PRIMARY_USER_ID); in testWeakTokenActivatedLaterWithUserPassword() 86 password, PRIMARY_USER_ID, 0 /* flags */).getResponseCode()); in testWeakTokenActivatedLaterWithUserPassword() 114 pattern, handle, token, PRIMARY_USER_ID)); in testWeakTokensRemovedIfCredentialChanged() 129 mService.removeWeakEscrowToken(handle, PRIMARY_USER_ID); in testWeakTokenRemovedListenerRegistered() 146 mService.removeWeakEscrowToken(handle0, PRIMARY_USER_ID); in testWeakTokenRemovedListenerUnregistered() 150 mService.removeWeakEscrowToken(handle1, PRIMARY_USER_ID); in testWeakTokenRemovedListenerUnregistered() 172 mService.onCleanupUser(PRIMARY_USER_ID); in testUnlockUserWithToken_weakEscrowToken() 173 assertNull(mLocalService.getUserPasswordMetrics(PRIMARY_USER_ID)); in testUnlockUserWithToken_weakEscrowToken() [all …]
|
H A D | LockSettingsStrongAuthTest.java | 66 private static final int PRIMARY_USER_ID = 0; field in LockSettingsStrongAuthTest 97 mStrongAuth.scheduleNonStrongBiometricIdleTimeout(PRIMARY_USER_ID); in testScheduleNonStrongBiometricIdleTimeout() 138 PRIMARY_USER_ID); in testRequireStrongAuth_nonStrongBiometric_fallbackTimeout() 143 verifyStrongAuthFlags(expectedFlag, PRIMARY_USER_ID); in testRequireStrongAuth_nonStrongBiometric_fallbackTimeout() 149 mStrongAuth.scheduleNonStrongBiometricIdleTimeout(PRIMARY_USER_ID); in testReportSuccessfulBiometricUnlock_nonStrongBiometric_cancelIdleTimeout() 161 setupAlarms(PRIMARY_USER_ID); in testReportSuccessfulBiometricUnlock_strongBio_cancelAlarmsAndAllowNonStrongBio() 177 mStrongAuth.reportSuccessfulStrongAuthUnlock(PRIMARY_USER_ID); in testReportSuccessfulStrongAuthUnlock_schedulePrimaryAuthTimeout() 195 mStrongAuth.reportSuccessfulStrongAuthUnlock(PRIMARY_USER_ID); in testReportSuccessfulStrongAuthUnlock_testRefreshStrongAuthTimeout() 205 mStrongAuth.refreshStrongAuthTimeout(PRIMARY_USER_ID); in testReportSuccessfulStrongAuthUnlock_testRefreshStrongAuthTimeout() 213 setupAlarms(PRIMARY_USER_ID); in testReportSuccessfulStrongAuthUnlock_cancelAlarmsAndAllowNonStrongBio() [all …]
|
H A D | LockSettingsServiceTests.java | 104 PRIMARY_USER_ID)); in testChangePasswordFailPrimaryUser() 164 setCredential(PRIMARY_USER_ID, primaryPassword); in testManagedProfileSeparateChallenge() 219 PRIMARY_USER_ID); in testSetLockCredential_forPrimaryUser_sendsCredentials() 258 setCredential(PRIMARY_USER_ID, oldCredential); in testSetLockCredential_forPrimaryUserWithUnifiedChallengeProfile_updatesBothCredentials() 264 PRIMARY_USER_ID); in testSetLockCredential_forPrimaryUserWithUnifiedChallengeProfile_updatesBothCredentials() 303 setCredential(PRIMARY_USER_ID, parentPassword); in testSetLockCredential_forUnifiedToSeparateChallengeProfile_sendsNewCredentials() 319 setCredential(PRIMARY_USER_ID, parentPassword); in testSetLockCredential_forSeparateToUnifiedChallengeProfile_doesNotSendRandomCredential() 334 setCredential(PRIMARY_USER_ID, password); in testVerifyCredential_forPrimaryUser_sendsCredentials() 362 setCredential(PRIMARY_USER_ID, pattern); in verifyCredential_forPrimaryUserWithUnifiedChallengeProfile_sendsCredentialsForBoth() 400 final int userId = PRIMARY_USER_ID; in testPasswordHistoryDisabledByDefault() [all …]
|
H A D | LockscreenRepairModeTest.java | 48 mService.initializeSyntheticPassword(PRIMARY_USER_ID); in setUp() 53 mService.setLockCredential(newPin("1234"), nonePassword(), PRIMARY_USER_ID); in verifyPin_writeRepairModePW() 58 newPin("1234"), PRIMARY_USER_ID, VERIFY_FLAG_WRITE_REPAIR_MODE_PW) in verifyPin_writeRepairModePW() 66 mService.setLockCredential(newPattern("4321"), nonePassword(), PRIMARY_USER_ID); in verifyPattern_writeRepairModePW() 79 mService.setLockCredential(newPassword("4321"), nonePassword(), PRIMARY_USER_ID); in verifyPassword_writeRepairModePW() 92 mService.setLockCredential(newPin("1234"), nonePassword(), PRIMARY_USER_ID); in verifyCredential_writeRepairModePW_repairModeActive() 105 mService.setLockCredential(newPin("1234"), nonePassword(), PRIMARY_USER_ID); in deleteRepairModePersistentData() 120 mService.setLockCredential(newPin("1234"), nonePassword(), PRIMARY_USER_ID); in verifyPin_userRepairMode() 137 mService.setLockCredential(newPattern("4321"), nonePassword(), PRIMARY_USER_ID); in verifyPattern_userRepairMode() 171 mService.setLockCredential(newPin("1234"), nonePassword(), PRIMARY_USER_ID); in verifyCredential_userRepairMode_repairModeIsNotActive() [all …]
|
H A D | LockscreenFrpTest.java | 58 mService.initializeSyntheticPassword(PRIMARY_USER_ID); in setUp() 63 mService.setLockCredential(newPin("1234"), nonePassword(), PRIMARY_USER_ID); in testFrpCredential_setPin() 73 mService.setLockCredential(newPattern("4321"), nonePassword(), PRIMARY_USER_ID); in testFrpCredential_setPattern() 83 mService.setLockCredential(newPassword("4321"), nonePassword(), PRIMARY_USER_ID); in testFrpCredential_setPassword() 93 mService.setLockCredential(newPassword("1234"), nonePassword(), PRIMARY_USER_ID); in testFrpCredential_changeCredential() 104 mService.setLockCredential(newPassword("1234"), nonePassword(), PRIMARY_USER_ID); in testFrpCredential_removeCredential() 108 mService.setLockCredential(nonePassword(), newPassword("1234"), PRIMARY_USER_ID); in testFrpCredential_removeCredential() 114 mService.setLockCredential(newPin("1234"), nonePassword(), PRIMARY_USER_ID); in testFrpCredential_cannotVerifyAfterProvsioning() 124 mService.setLockCredential(newPin("1234"), nonePassword(), PRIMARY_USER_ID); in testFrpCredential_legacyPinTypePersistentData() 160 mService.setLockCredential(newPin("1234"), nonePassword(), PRIMARY_USER_ID); in testFrpBlock_isForwardsCompatible() [all …]
|
H A D | RebootEscrowManagerTests.java | 88 protected static final int PRIMARY_USER_ID = 0; field in RebootEscrowManagerTests 362 callToRebootEscrowIfNeededAndWait(PRIMARY_USER_ID); in prepareRebootEscrow_Success() 374 callToRebootEscrowIfNeededAndWait(PRIMARY_USER_ID); in prepareRebootEscrowServerBased_Success() 384 callToRebootEscrowIfNeededAndWait(PRIMARY_USER_ID); in prepareRebootEscrow_ClearCredentials_Success() 408 callToRebootEscrowIfNeededAndWait(PRIMARY_USER_ID); in armService_Success() 432 callToRebootEscrowIfNeededAndWait(PRIMARY_USER_ID); in armServiceServerBased_Success() 453 callToRebootEscrowIfNeededAndWait(PRIMARY_USER_ID); in armService_HalFailure_NonFatal() 471 callToRebootEscrowIfNeededAndWait(PRIMARY_USER_ID); in armService_MultipleUsers_Success() 505 callToRebootEscrowIfNeededAndWait(PRIMARY_USER_ID); in armService_RebootEscrowServiceException_Failure() 528 callToRebootEscrowIfNeededAndWait(PRIMARY_USER_ID); in loadRebootEscrowDataIfAvailable_Success() [all …]
|
H A D | BaseLockSettingsServiceTests.java | 79 protected static final int PRIMARY_USER_ID = 0; field in BaseLockSettingsServiceTests 181 PRIMARY_USER_ID, in setUp_baseServices() 202 when(mUserManager.getUserInfo(eq(PRIMARY_USER_ID))).thenReturn(mPrimaryUserInfo); in setUp_baseServices() 203 when(mUserManagerInternal.getUserInfo(eq(PRIMARY_USER_ID))).thenReturn(mPrimaryUserInfo); in setUp_baseServices() 237 mockBiometricsHardwareFingerprintsAndTemplates(PRIMARY_USER_ID); in setUp_baseServices() 280 userInfo.profileGroupId = PRIMARY_USER_ID; in installChildProfile()
|
/aosp14/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/keyguard/data/repository/ |
H A D | BiometricSettingsRepositoryTest.kt | 197 onNonStrongAuthChanged(true, PRIMARY_USER_ID) 204 onNonStrongAuthChanged(false, PRIMARY_USER_ID) 238 onNonStrongAuthChanged(true, PRIMARY_USER_ID) 262 onNonStrongAuthChanged(true, PRIMARY_USER_ID) 286 fingerprintIsEnrolled(PRIMARY_USER_ID) 343 enrollmentChange(FACE, PRIMARY_USER_ID, true) 601 onNonStrongAuthChanged(true, PRIMARY_USER_ID) 641 fingerprintIsEnrolled(PRIMARY_USER_ID) 682 fingerprintIsEnrolled(PRIMARY_USER_ID) 723 private const val PRIMARY_USER_ID = 0 [all …]
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/webkit/ |
H A D | TestSystemImpl.java | 42 public static final int PRIMARY_USER_ID = 0; field in TestSystemImpl 49 mUsers.add(PRIMARY_USER_ID); in TestSystemImpl() 103 PackageInfo ret = userPackages.get(PRIMARY_USER_ID); in getPackageInfoForProvider() 129 setPackageInfoForUser(PRIMARY_USER_ID, pi); in setPackageInfo() 146 mPackages.get(packageName).remove(PRIMARY_USER_ID); in removePackageInfo() 155 pi = userPackages.get(PRIMARY_USER_ID); in getFactoryPackageVersion()
|
H A D | WebViewUpdateServiceTest.java | 101 setEnabledAndValidPackageInfosForUser(TestSystemImpl.PRIMARY_USER_ID, providers); in setEnabledAndValidPackageInfos() 349 WebViewUpdateService.PACKAGE_ADDED, TestSystemImpl.PRIMARY_USER_ID); in testFailListingEmptyWebviewPackages() 358 WebViewUpdateService.PACKAGE_ADDED, TestSystemImpl.PRIMARY_USER_ID); in testFailListingEmptyWebviewPackages() 388 WebViewUpdateService.PACKAGE_ADDED_REPLACED, TestSystemImpl.PRIMARY_USER_ID); in testFailListingInvalidWebviewPackage() 566 WebViewUpdateService.PACKAGE_ADDED_REPLACED, TestSystemImpl.PRIMARY_USER_ID); in testInstallingPrimaryPackage() 614 setEnabledAndValidPackageInfosForUser(TestSystemImpl.PRIMARY_USER_ID, packages); in checkRemovingPrimarySelectsSecondary() 659 setEnabledAndValidPackageInfosForUser(TestSystemImpl.PRIMARY_USER_ID, packages); in testAddingNewUserWithUninstalledPackage() 719 WebViewUpdateService.PACKAGE_ADDED_REPLACED, TestSystemImpl.PRIMARY_USER_ID); in testNotifyRelroDoesntCrashIfNoPackages() 748 WebViewUpdateService.PACKAGE_ADDED, TestSystemImpl.PRIMARY_USER_ID); in testTempRemovePackageDoesntSwitchProviderPermanently() 755 WebViewUpdateService.PACKAGE_ADDED, TestSystemImpl.PRIMARY_USER_ID); in testTempRemovePackageDoesntSwitchProviderPermanently() [all …]
|
/aosp14/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/bouncer/data/repo/ |
H A D | BouncerMessageRepositoryTest.kt | 105 whenever(securityModel.getSecurityMode(PRIMARY_USER_ID)).thenReturn(PIN) 353 AuthenticationFlags(PRIMARY_USER_ID, flag) 372 private const val PRIMARY_USER_ID = 0 375 /* id= */ PRIMARY_USER_ID,
|
/aosp14/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/bouncer/domain/interactor/ |
H A D | BouncerMessageInteractorTest.kt | 77 whenever(securityModel.getSecurityMode(PRIMARY_USER_ID)).thenReturn(PIN) 287 private const val PRIMARY_USER_ID = 0 290 /* id= */ PRIMARY_USER_ID,
|
/aosp14/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/statusbar/policy/ |
H A D | SecurityControllerTest.java | 164 final int PRIMARY_USER_ID = 0; in testWorkAccount() local 166 List<UserInfo> profiles = Arrays.asList(new UserInfo(PRIMARY_USER_ID, "Primary", in testWorkAccount()
|
/aosp14/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/qs/tiles/ |
H A D | QuickAccessWalletTileTest.java | 96 private static final int PRIMARY_USER_ID = 0; field in QuickAccessWalletTileTest
|