Home
last modified time | relevance | path

Searched refs:password (Results 1 – 14 of 14) sorted by relevance

/system/core/gatekeeperd/tests/
Dgatekeeper_test.cpp37 SizedBuffer password; in do_enroll() local
39 password.buffer.reset(new uint8_t[16]); in do_enroll()
40 password.length = 16; in do_enroll()
41 memset(password.buffer.get(), 0, 16); in do_enroll()
42 EnrollRequest request(0, NULL, &password, NULL); in do_enroll()
56 SizedBuffer password; in TEST() local
59 EnrollRequest request(0, NULL, &password, NULL); in TEST()
129 SizedBuffer password; in TEST() local
130 password.buffer.reset(new uint8_t[16]); in TEST()
131 memset(password.buffer.get(), 1, 16); in TEST()
[all …]
/system/core/gatekeeperd/
DSoftGateKeeper.h80 const uint8_t *, uint32_t, const uint8_t *password, in ComputePasswordSignature() argument
83 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), in ComputePasswordSignature()
134 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { in ComputeFastHash() argument
136 size_t digest_size = password.length + sizeof(salt); in ComputeFastHash()
139 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length); in ComputeFastHash()
147 bool VerifyFast(const fast_hash_t &fast_hash, const SizedBuffer &password) { in VerifyFast() argument
148 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt); in VerifyFast()
152 bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { in DoVerify() argument
154 if (it != fast_hash_map_.end() && VerifyFast(it->second, password)) { in DoVerify()
157 if (GateKeeper::DoVerify(expected_handle, password)) { in DoVerify()
[all …]
/system/vold/
DCryptCommandListener.cpp188 const char* password; in runCommand() local
190 password = ""; in runCommand()
192 password = argv[3]; in runCommand()
203 rc = cryptfs_changepw(type, password); in runCommand()
274 const char* password = cryptfs_get_password(); in runCommand() local
275 if (password) { in runCommand()
277 int size = asprintf(&message, "{{sensitive}} %s", password); in runCommand()
DExt4Crypt.h10 const char* password);
12 int e4crypt_check_passwd(const char* path, const char* password);
DExt4Crypt.cpp34 std::string password; member
226 const char* password) in e4crypt_change_password() argument
246 if (cryptfs_set_password(&ftr, password, master_key)) { in e4crypt_change_password()
296 int e4crypt_check_passwd(const char* path, const char* password) in e4crypt_check_passwd() argument
309 if (cryptfs_get_master_key (&ftr, password, master_key)){ in e4crypt_check_passwd()
329 password, in e4crypt_check_passwd()
436 return i->second.password.c_str(); in e4crypt_get_password()
448 memset(&i->second.password[0], 0, i->second.password.size()); in e4crypt_clear_password()
449 i->second.password = std::string(); in e4crypt_clear_password()
Dcryptfs.h237 int cryptfs_get_master_key(struct crypt_mnt_ftr* ftr, const char* password,
239 int cryptfs_set_password(struct crypt_mnt_ftr* ftr, const char* password,
Dcryptfs.c419 static char* password = 0; variable
2047 password = strdup(passwd);
3682 return password;
3695 if (password) {
3696 size_t len = strlen(password);
3697 memset(password, 0, len);
3698 free(password);
3699 password = 0;
3726 int cryptfs_get_master_key(struct crypt_mnt_ftr* ftr, const char* password, argument
3734 if (password == 0 || *password == 0) {
[all …]
/system/gatekeeper/include/gatekeeper/
Dgatekeeper.h90 const uint8_t *key, uint32_t key_length, const uint8_t *password,
170 virtual bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password);
187 const uint8_t *password, uint32_t password_length);
/system/gatekeeper/
Dgatekeeper.cpp168 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, in CreatePasswordHandle() argument
184 memcpy(to_sign + metadata_length, password, password_length); in CreatePasswordHandle()
199 bool GateKeeper::DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { in DoVerify() argument
200 if (!password.buffer.get()) return false; in DoVerify()
205 password.buffer.get(), password.length)) { in DoVerify()
/system/extras/verity/
DUtils.java148 char[] password = System.console().readPassword("Password for the private key file: "); in decryptPrivateKey() local
151 Key key = skFactory.generateSecret(new PBEKeySpec(password)); in decryptPrivateKey()
152 Arrays.fill(password, '\0'); in decryptPrivateKey()
/system/extras/tests/net_test/
DREADME69 apt-get install. Log in as root with no password. By default, the filesystem is
/system/security/keystore/include/keystore/
DIKeystoreService.h160 virtual int32_t unlock(int32_t userId, const String16& password) = 0;
/system/security/keystore/
DIKeystoreService.cpp561 virtual int32_t onUserPasswordChanged(int32_t userId, const String16& password) in onUserPasswordChanged() argument
566 data.writeString16(password); in onUserPasswordChanged()
601 virtual int32_t unlock(int32_t userId, const String16& password) in unlock() argument
606 data.writeString16(password); in unlock()
Dkeystore.cpp1808 int32_t onUserPasswordChanged(int32_t userId, const String16& password) { in onUserPasswordChanged() argument
1813 const String8 password8(password); in onUserPasswordChanged()
1818 if (password.size() == 0) { in onUserPasswordChanged()