summaryrefslogtreecommitdiff
path: root/tools/aapt2/java/JavaClassGenerator.cpp
diff options
context:
space:
mode:
authorRubin Xu <rubinxu@google.com>2019-11-06 13:54:27 +0000
committerRubin Xu <rubinxu@google.com>2019-12-08 22:01:01 +0000
commitd952240979aea7d10b5f81dfa9199323c79b4363 (patch)
tree3f7967d266008faea19d25003ab842c99176af01 /tools/aapt2/java/JavaClassGenerator.cpp
parent43429e772df27f0e58bd3c7b91901192e7020a45 (diff)
Kill off untrusted password reset
Time has come that we can finally ditch untrusted password reset i.e. changing lockscreen password without providing the existing password or an activiated password reset token. In this change, we are: 1. Preventing any DPC / legacy device admin from invoking DPM.resetPassword(), the primary route to invoke untrusted password reset. Depending on their target SDK level, resetPassword() will either throw SecurityException, or fail silently. 2. Still allowing privilleged app holding RESET_PASSWORD permission to call this API, but it's limited to setting a new passowrd on an unsecured device. 3. Removing synthetic password caching mechanism in LockSettingsService, whose sole purpose was to support untrusted password reset. Bug: 137939224 Test: atest com.android.server.locksettings Test: atest com.android.server.devicepolicy.DevicePolicyManagerTest Change-Id: Ie3e5e277984b6fc2f1d378880363028752bad775
Diffstat (limited to 'tools/aapt2/java/JavaClassGenerator.cpp')
0 files changed, 0 insertions, 0 deletions