Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 74) sorted by relevance

123

/system/core/gatekeeperd/tests/
Dgatekeeper_test.cpp36 SizedBuffer password; in do_enroll() local
38 password.buffer.reset(new uint8_t[16]); in do_enroll()
39 password.length = 16; in do_enroll()
40 memset(password.buffer.get(), 0, 16); in do_enroll()
41 EnrollRequest request(0, NULL, &password, NULL); in do_enroll()
55 SizedBuffer password; in TEST() local
58 EnrollRequest request(0, NULL, &password, NULL); in TEST()
128 SizedBuffer password; in TEST() local
129 password.buffer.reset(new uint8_t[16]); in TEST()
130 memset(password.buffer.get(), 1, 16); in TEST()
[all …]
/system/core/gatekeeperd/
DSoftGateKeeper.h82 const uint8_t *, uint32_t, const uint8_t *password, in ComputePasswordSignature() argument
85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), in ComputePasswordSignature()
136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { in ComputeFastHash() argument
138 size_t digest_size = password.length + sizeof(salt); in ComputeFastHash()
141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length); in ComputeFastHash()
149 bool VerifyFast(const fast_hash_t &fast_hash, const SizedBuffer &password) { in VerifyFast() argument
150 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt); in VerifyFast()
154 bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { in DoVerify() argument
157 if (it != fast_hash_map_.end() && VerifyFast(it->second, password)) { in DoVerify()
160 if (GateKeeper::DoVerify(expected_handle, password)) { in DoVerify()
[all …]
/system/connectivity/shill/
Drpc_task_unittest.cc39 virtual void GetLogin(string* user, string* password);
53 void RPCTaskTest::GetLogin(string* user, string* password) { in GetLogin() argument
56 last_password_ = password; in GetLogin()
79 string user, password; in TEST_F() local
80 task_.GetLogin(&user, &password); in TEST_F()
83 EXPECT_EQ(&password, last_password_); in TEST_F()
Deap_credentials.h118 virtual void set_password(const std::string& password) { in set_password() argument
119 password_ = password; in set_password()
167 bool SetEapPassword(const std::string& password, Error* error);
168 bool SetEapPrivateKeyPassword(const std::string& password, Error* error);
Drpc_task.cc46 void RPCTask::GetLogin(string* user, string* password) const { in GetLogin()
47 delegate_->GetLogin(user, password); in GetLogin()
Drpc_task.h41 virtual void GetLogin(std::string* user, std::string* password) = 0;
55 virtual void GetLogin(std::string* user, std::string* password) const;
Dexternal_task_unittest.cc101 MOCK_METHOD2(GetLogin, void(string* user, string* password));
242 string password; in TEST_F() local
243 EXPECT_CALL(*this, GetLogin(&username, &password)); in TEST_F()
245 external_task_->GetLogin(&username, &password); in TEST_F()
Dexternal_task.cc96 void ExternalTask::GetLogin(string* user, string* password) { in GetLogin() argument
97 return task_delegate_->GetLogin(user, password); in GetLogin()
Deap_credentials.cc463 bool EapCredentials::SetEapPassword(const string& password, Error* /*error*/) { in SetEapPassword() argument
464 if (password_ == password) { in SetEapPassword()
467 password_ = password; in SetEapPassword()
471 bool EapCredentials::SetEapPrivateKeyPassword(const string& password, in SetEapPrivateKeyPassword() argument
473 if (private_key_password_ == password) { in SetEapPrivateKeyPassword()
476 private_key_password_ = password; in SetEapPrivateKeyPassword()
/system/connectivity/shill/mobile_operator_db/
Dserviceproviders.prototxt41 password : "mnet"
52 password : "etisalat.ae"
86 password : "1111"
130 password : "internet"
276 password : "clarogprs999"
287 password : "clarogprs999"
309 password : "wap"
318 password : "Internet"
340 password : "adgj"
351 password : "datos"
[all …]
/system/connectivity/shill/shims/
Dc_ppp.cc41 int PPPGetSecret(char* username, char* password) { in PPPGetSecret() argument
49 if (password) { in PPPGetSecret()
50 strcpy(password, pass.c_str()); // NOLINT(runtime/printf) in PPPGetSecret()
Dtask_proxy.cc45 bool TaskProxy::GetSecret(string* username, string* password) { in GetSecret() argument
48 if (!proxy_.getsec(username, password, &error)) { in GetSecret()
Dc_ppp.h26 int PPPGetSecret(char* username, char* password);
/system/connectivity/shill/vpn/
Dopenvpn_management_server.cc289 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); in PerformStaticChallenge() local
292 if (user.empty() || (token.empty() && (password.empty() || otp.empty()))) { in PerformStaticChallenge()
296 << (password.empty() ? " no-password" : "") in PerformStaticChallenge()
308 string b64_password(brillo::data_encoding::Base64Encode(password)); in PerformStaticChallenge()
323 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); in PerformAuthentication() local
324 if (user.empty() || password.empty()) { in PerformAuthentication()
327 << (password.empty() ? " no-password" : ""); in PerformAuthentication()
332 SendPassword(tag, password); in PerformAuthentication()
454 const string& password) { in SendPassword() argument
458 EscapeToQuote(password).c_str())); in SendPassword()
Dl2tp_ipsec_driver.cc342 string password = args()->LookupString(kL2tpIpsecXauthPasswordProperty, ""); in InitXauthOptions() local
343 if (user.empty() && password.empty()) { in InitXauthOptions()
347 if (user.empty() || password.empty()) { in InitXauthOptions()
353 string xauth_credentials = user + "\n" + password + "\n"; in InitXauthOptions()
423 void L2TPIPSecDriver::GetLogin(string* user, string* password) { in GetLogin() argument
438 *password = password_property; in GetLogin()
/system/gatekeeper/include/gatekeeper/
Dgatekeeper.h90 const uint8_t *key, uint32_t key_length, const uint8_t *password,
170 virtual bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password);
187 const uint8_t *password, uint32_t password_length);
/system/connectivity/shill/bin/
Dset_apn97 local password="$5"
104 if [ -n "${password}" ]; then
105 args="${args},password,${password}"
Dset_cellular_ppp95 local password="$2"
99 "string:${PASSWORD_PROPERTY}" "variant:string:${password}"
205 and password by running the following command:
208 If you clear the PPP username and password, you will need to re-run
/system/vold/
DCryptCommandListener.cpp266 const char* password; in runCommand() local
268 password = ""; in runCommand()
270 password = argv[3]; in runCommand()
281 rc = cryptfs_changepw(type, password); in runCommand()
349 const char* password = cryptfs_get_password(); in runCommand() local
350 if (password) { in runCommand()
352 int size = asprintf(&message, "{{sensitive}} %s", password); in runCommand()
Dcryptfs.h251 int cryptfs_get_master_key(struct crypt_mnt_ftr* ftr, const char* password,
253 int cryptfs_set_password(struct crypt_mnt_ftr* ftr, const char* password,
/system/gatekeeper/
Dgatekeeper.cpp170 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, in CreatePasswordHandle() argument
186 memcpy(to_sign + metadata_length, password, password_length); in CreatePasswordHandle()
201 bool GateKeeper::DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { in DoVerify() argument
202 if (!password.buffer.get()) return false; in DoVerify()
207 password.buffer.get(), password.length)) { in DoVerify()
/system/connectivity/shill/dbus/
Dchromeos_rpc_task_dbus_adaptor.cc68 brillo::ErrorPtr* /*error*/, string* user, string* password) { in getsec() argument
70 task_->GetLogin(user, password); in getsec()
/system/tpm/trunks/
Dpassword_authorization_delegate.cc28 const std::string& password) { in PasswordAuthorizationDelegate() argument
29 password_ = Make_TPM2B_DIGEST(password); in PasswordAuthorizationDelegate()
Dtrunks_factory_impl.cc74 const std::string& password) const { in GetPasswordAuthorization()
76 new PasswordAuthorizationDelegate(password)); in GetPasswordAuthorization()
/system/tpm/tpm_manager/common/
Dlocal_data.proto23 // the owner password (like Attestation, InstallAttributes and BootLockbox).
24 // when all the clients have the owner password injected, this protobuf is

123