summaryrefslogtreecommitdiff
path: root/graphics/java/android/renderscript/ProgramFragmentFixedFunction.java
diff options
context:
space:
mode:
authorEric Sandness <sandness@google.com>2017-05-03 18:28:56 +0100
committerEric Sandness <sandness@google.com>2017-05-12 15:33:42 +0100
commitfabfcb05281be6841799d2e31cf9c89cc39ef79b (patch)
tree475ae06e9a5cdb8997c8018ce1bacfe7d7e70847 /graphics/java/android/renderscript/ProgramFragmentFixedFunction.java
parentbcee3cc3fa57263cf253dd652e4d90c030c49b5a (diff)
Stop saving password metrics to disk
Previously, DevicePolicyManager saved password stats (number of letters, number of symbols, etc) to disk for FDE devices. This made it possible for the isActivePasswordSufficient() API to return a result before the password was entered for the first time after a reboot. Access to these stats would significantly narrow the space of possible passwords an attacker would need to explore. Going forward, every time either the password or the password requirements change, a flag will be persisted indicating whether the current password meets the requirements. Before the password is entered for the first time after a reboot, isActivePasswordSufficient() simply returns the value of this flag. (After the password is entered for the first time, isActivePasswordSufficient() uses password stats saved in memory, as is the case today.) This creates a window where isActivePasswordSufficient() may return an incorrect value before the password is entered for the first time, if the requirements are changed after startup so that the current password no longer meets the requirements. This has been deemed an acceptable compromise in order to avoid storing potentially sensitive data. Test: runtest -c com.android.server.devicepolicy.DevicePolicyManagerTest frameworks-services Bug: 34218769 Change-Id: I5d3cd008a9ee2787bcb10ed5455bb61c6014ae00
Diffstat (limited to 'graphics/java/android/renderscript/ProgramFragmentFixedFunction.java')
0 files changed, 0 insertions, 0 deletions