Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 7329e021 authored by Jim Miller's avatar Jim Miller Committed by android-build-merger
Browse files

Fix vulnerability in LockSettings service am: 2d71384a am: 485fbda0 am:...

Fix vulnerability in LockSettings service am: 2d71384a am: 485fbda0 am: 229de708 am: cb83f618
am: e3457fc1

Change-Id: I9ec3cc802112160f463fcfb737c6fd5932d62332
parents ac2c1dde e3457fc1
Loading
Loading
Loading
Loading
+2 −2
Original line number Diff line number Diff line
@@ -354,7 +354,7 @@ public class LockPatternUtils {
                return false;
            }
        } catch (RemoteException re) {
            return true;
            return false;
        }
    }

@@ -435,7 +435,7 @@ public class LockPatternUtils {
                return false;
            }
        } catch (RemoteException re) {
            return true;
            return false;
        }
    }

+6 −0
Original line number Diff line number Diff line
@@ -1215,6 +1215,9 @@ public class LockSettingsService extends ILockSettings.Stub {
    private VerifyCredentialResponse doVerifyPattern(String pattern, boolean hasChallenge,
            long challenge, int userId) throws RemoteException {
       checkPasswordReadPermission(userId);
       if (TextUtils.isEmpty(pattern)) {
           throw new IllegalArgumentException("Pattern can't be null or empty");
       }
       CredentialHash storedHash = mStorage.readPatternHash(userId);
       return doVerifyPattern(pattern, storedHash, hasChallenge, challenge, userId);
    }
@@ -1306,6 +1309,9 @@ public class LockSettingsService extends ILockSettings.Stub {
    private VerifyCredentialResponse doVerifyPassword(String password, boolean hasChallenge,
            long challenge, int userId) throws RemoteException {
       checkPasswordReadPermission(userId);
       if (TextUtils.isEmpty(password)) {
           throw new IllegalArgumentException("Password can't be null or empty");
       }
       CredentialHash storedHash = mStorage.readPasswordHash(userId);
       return doVerifyPassword(password, storedHash, hasChallenge, challenge, userId);
    }