Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit a76b0713 authored by Jim Miller's avatar Jim Miller Committed by android-build-merger
Browse files

Fix vulnerability in LockSettings service am: 2d71384a am: 485fbda0 am:...

Fix vulnerability in LockSettings service am: 2d71384a am: 485fbda0 am: 229de708 am: cb83f618 am: e3457fc1 am: 7329e021
am: cf7d8468

Change-Id: Ie7476d7f2b91e155481c322e7bdc3e60123d89de
parents 1f60d637 cf7d8468
Loading
Loading
Loading
Loading
+6 −0
Original line number Diff line number Diff line
@@ -1223,6 +1223,9 @@ public class LockSettingsService extends ILockSettings.Stub {
            long challenge, int userId, ICheckCredentialProgressCallback progressCallback)
            throws RemoteException {
       checkPasswordReadPermission(userId);
       if (TextUtils.isEmpty(pattern)) {
           throw new IllegalArgumentException("Pattern can't be null or empty");
       }
       CredentialHash storedHash = mStorage.readPatternHash(userId);
       return doVerifyPattern(pattern, storedHash, hasChallenge, challenge, userId,
               progressCallback);
@@ -1324,6 +1327,9 @@ public class LockSettingsService extends ILockSettings.Stub {
            long challenge, int userId, ICheckCredentialProgressCallback progressCallback)
            throws RemoteException {
       checkPasswordReadPermission(userId);
       if (TextUtils.isEmpty(password)) {
           throw new IllegalArgumentException("Password can't be null or empty");
       }
       CredentialHash storedHash = mStorage.readPasswordHash(userId);
       return doVerifyPassword(password, storedHash, hasChallenge, challenge, userId,
               progressCallback);