Loading core/java/com/android/internal/widget/LockPatternUtils.java +3 −3 Original line number Diff line number Diff line Loading @@ -24,7 +24,7 @@ import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_SOMETHING; import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED; import static android.security.Flags.shouldTrustManagerListenForPrimaryAuth; import static com.android.internal.widget.flags.Flags.useDefaultVisibilityForSensitiveInputs; import static com.android.internal.widget.flags.Flags.enableDefaultVisibilityForSensitiveInputs; import android.annotation.IntDef; import android.annotation.NonNull; Loading Loading @@ -1069,7 +1069,7 @@ public class LockPatternUtils { @UnsupportedAppUsage public boolean isVisiblePatternEnabled(int userId) { boolean defaultValue = true; if (useDefaultVisibilityForSensitiveInputs()) { if (enableDefaultVisibilityForSensitiveInputs()) { defaultValue = mContext.getResources() .getBoolean( Loading @@ -1094,7 +1094,7 @@ public class LockPatternUtils { */ public boolean isPinEnhancedPrivacyEnabled(int userId) { boolean defaultValue = false; if (useDefaultVisibilityForSensitiveInputs()) { if (enableDefaultVisibilityForSensitiveInputs()) { defaultValue = mContext.getResources() .getBoolean( Loading core/java/com/android/internal/widget/flags.aconfig +2 −2 Original line number Diff line number Diff line Loading @@ -16,8 +16,8 @@ flag { } flag { name: "use_default_visibility_for_sensitive_inputs" namespace: "input" name: "enable_default_visibility_for_sensitive_inputs" namespace: "systemui" description: "Allows setting default value for visibility of sensitive inputs (passowrd, pin and pattern)." bug: "339270220" metadata { Loading core/tests/coretests/src/com/android/internal/widget/LockPatternUtilsTest.java +6 −6 Original line number Diff line number Diff line Loading @@ -469,7 +469,7 @@ public class LockPatternUtilsTest { } @Test @EnableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @EnableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isVisiblePatternEnabled_WhenConfigValueTrue() throws RemoteException { configureSensitiveInputVisibilityTest(); when(mResources.getBoolean(com.android.internal.R.bool.config_lockPatternVisibleDefault)) Loading @@ -478,7 +478,7 @@ public class LockPatternUtilsTest { } @Test @EnableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @EnableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isVisiblePatternEnabled_WhenConfigValueFalse() throws RemoteException { configureSensitiveInputVisibilityTest(); when(mResources.getBoolean(com.android.internal.R.bool.config_lockPatternVisibleDefault)) Loading @@ -487,14 +487,14 @@ public class LockPatternUtilsTest { } @Test @DisableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @DisableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isVisiblePatternEnabled_OldDefault() throws RemoteException { configureSensitiveInputVisibilityTest(); assertTrue(mLockPatternUtils.isVisiblePatternEnabled(USER_ID)); } @Test @EnableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @EnableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isPinEnhancedPrivacyEnabled_WhenConfigValueTrue() throws RemoteException { configureSensitiveInputVisibilityTest(); when(mResources.getBoolean( Loading @@ -504,7 +504,7 @@ public class LockPatternUtilsTest { } @Test @EnableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @EnableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isPinEnhancedPrivacyEnabled_WhenConfigValueFalse() throws RemoteException { configureSensitiveInputVisibilityTest(); when(mResources.getBoolean( Loading @@ -514,7 +514,7 @@ public class LockPatternUtilsTest { } @Test @DisableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @DisableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isPinEnhancedPrivacyEnabled_OldDefault() throws RemoteException { configureSensitiveInputVisibilityTest(); assertFalse(mLockPatternUtils.isPinEnhancedPrivacyEnabled(USER_ID)); Loading packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java +1 −1 Original line number Diff line number Diff line Loading @@ -6764,7 +6764,7 @@ public class SettingsProvider extends ContentProvider { if (currentVersion == 230) { if (com.android.internal.widget.flags.Flags .useDefaultVisibilityForSensitiveInputs()) { .enableDefaultVisibilityForSensitiveInputs()) { if (systemSettings .getSettingLocked(Settings.System.TEXT_SHOW_PASSWORD) .isNull()) { Loading Loading
core/java/com/android/internal/widget/LockPatternUtils.java +3 −3 Original line number Diff line number Diff line Loading @@ -24,7 +24,7 @@ import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_SOMETHING; import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED; import static android.security.Flags.shouldTrustManagerListenForPrimaryAuth; import static com.android.internal.widget.flags.Flags.useDefaultVisibilityForSensitiveInputs; import static com.android.internal.widget.flags.Flags.enableDefaultVisibilityForSensitiveInputs; import android.annotation.IntDef; import android.annotation.NonNull; Loading Loading @@ -1069,7 +1069,7 @@ public class LockPatternUtils { @UnsupportedAppUsage public boolean isVisiblePatternEnabled(int userId) { boolean defaultValue = true; if (useDefaultVisibilityForSensitiveInputs()) { if (enableDefaultVisibilityForSensitiveInputs()) { defaultValue = mContext.getResources() .getBoolean( Loading @@ -1094,7 +1094,7 @@ public class LockPatternUtils { */ public boolean isPinEnhancedPrivacyEnabled(int userId) { boolean defaultValue = false; if (useDefaultVisibilityForSensitiveInputs()) { if (enableDefaultVisibilityForSensitiveInputs()) { defaultValue = mContext.getResources() .getBoolean( Loading
core/java/com/android/internal/widget/flags.aconfig +2 −2 Original line number Diff line number Diff line Loading @@ -16,8 +16,8 @@ flag { } flag { name: "use_default_visibility_for_sensitive_inputs" namespace: "input" name: "enable_default_visibility_for_sensitive_inputs" namespace: "systemui" description: "Allows setting default value for visibility of sensitive inputs (passowrd, pin and pattern)." bug: "339270220" metadata { Loading
core/tests/coretests/src/com/android/internal/widget/LockPatternUtilsTest.java +6 −6 Original line number Diff line number Diff line Loading @@ -469,7 +469,7 @@ public class LockPatternUtilsTest { } @Test @EnableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @EnableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isVisiblePatternEnabled_WhenConfigValueTrue() throws RemoteException { configureSensitiveInputVisibilityTest(); when(mResources.getBoolean(com.android.internal.R.bool.config_lockPatternVisibleDefault)) Loading @@ -478,7 +478,7 @@ public class LockPatternUtilsTest { } @Test @EnableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @EnableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isVisiblePatternEnabled_WhenConfigValueFalse() throws RemoteException { configureSensitiveInputVisibilityTest(); when(mResources.getBoolean(com.android.internal.R.bool.config_lockPatternVisibleDefault)) Loading @@ -487,14 +487,14 @@ public class LockPatternUtilsTest { } @Test @DisableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @DisableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isVisiblePatternEnabled_OldDefault() throws RemoteException { configureSensitiveInputVisibilityTest(); assertTrue(mLockPatternUtils.isVisiblePatternEnabled(USER_ID)); } @Test @EnableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @EnableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isPinEnhancedPrivacyEnabled_WhenConfigValueTrue() throws RemoteException { configureSensitiveInputVisibilityTest(); when(mResources.getBoolean( Loading @@ -504,7 +504,7 @@ public class LockPatternUtilsTest { } @Test @EnableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @EnableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isPinEnhancedPrivacyEnabled_WhenConfigValueFalse() throws RemoteException { configureSensitiveInputVisibilityTest(); when(mResources.getBoolean( Loading @@ -514,7 +514,7 @@ public class LockPatternUtilsTest { } @Test @DisableFlags(Flags.FLAG_USE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) @DisableFlags(Flags.FLAG_ENABLE_DEFAULT_VISIBILITY_FOR_SENSITIVE_INPUTS) public void isPinEnhancedPrivacyEnabled_OldDefault() throws RemoteException { configureSensitiveInputVisibilityTest(); assertFalse(mLockPatternUtils.isPinEnhancedPrivacyEnabled(USER_ID)); Loading
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java +1 −1 Original line number Diff line number Diff line Loading @@ -6764,7 +6764,7 @@ public class SettingsProvider extends ContentProvider { if (currentVersion == 230) { if (com.android.internal.widget.flags.Flags .useDefaultVisibilityForSensitiveInputs()) { .enableDefaultVisibilityForSensitiveInputs()) { if (systemSettings .getSettingLocked(Settings.System.TEXT_SHOW_PASSWORD) .isNull()) { Loading