/system/core/gatekeeperd/tests/ |
D | gatekeeper_test.cpp | 37 SizedBuffer password; in do_enroll() local 39 password.buffer.reset(new uint8_t[16]); in do_enroll() 40 password.length = 16; in do_enroll() 41 memset(password.buffer.get(), 0, 16); in do_enroll() 42 EnrollRequest request(0, NULL, &password, NULL); in do_enroll() 56 SizedBuffer password; in TEST() local 59 EnrollRequest request(0, NULL, &password, NULL); in TEST() 129 SizedBuffer password; in TEST() local 130 password.buffer.reset(new uint8_t[16]); in TEST() 131 memset(password.buffer.get(), 1, 16); in TEST() [all …]
|
/system/core/gatekeeperd/ |
D | SoftGateKeeper.h | 80 const uint8_t *, uint32_t, const uint8_t *password, in ComputePasswordSignature() argument 83 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), in ComputePasswordSignature() 134 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { in ComputeFastHash() argument 136 size_t digest_size = password.length + sizeof(salt); in ComputeFastHash() 139 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length); in ComputeFastHash() 147 bool VerifyFast(const fast_hash_t &fast_hash, const SizedBuffer &password) { in VerifyFast() argument 148 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt); in VerifyFast() 152 bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { in DoVerify() argument 154 if (it != fast_hash_map_.end() && VerifyFast(it->second, password)) { in DoVerify() 157 if (GateKeeper::DoVerify(expected_handle, password)) { in DoVerify() [all …]
|
/system/vold/ |
D | CryptCommandListener.cpp | 188 const char* password; in runCommand() local 190 password = ""; in runCommand() 192 password = argv[3]; in runCommand() 203 rc = cryptfs_changepw(type, password); in runCommand() 274 const char* password = cryptfs_get_password(); in runCommand() local 275 if (password) { in runCommand() 277 int size = asprintf(&message, "{{sensitive}} %s", password); in runCommand()
|
D | Ext4Crypt.h | 10 const char* password); 12 int e4crypt_check_passwd(const char* path, const char* password);
|
D | Ext4Crypt.cpp | 34 std::string password; member 226 const char* password) in e4crypt_change_password() argument 246 if (cryptfs_set_password(&ftr, password, master_key)) { in e4crypt_change_password() 296 int e4crypt_check_passwd(const char* path, const char* password) in e4crypt_check_passwd() argument 309 if (cryptfs_get_master_key (&ftr, password, master_key)){ in e4crypt_check_passwd() 329 password, in e4crypt_check_passwd() 436 return i->second.password.c_str(); in e4crypt_get_password() 448 memset(&i->second.password[0], 0, i->second.password.size()); in e4crypt_clear_password() 449 i->second.password = std::string(); in e4crypt_clear_password()
|
D | cryptfs.h | 237 int cryptfs_get_master_key(struct crypt_mnt_ftr* ftr, const char* password, 239 int cryptfs_set_password(struct crypt_mnt_ftr* ftr, const char* password,
|
D | cryptfs.c | 419 static char* password = 0; variable 2047 password = strdup(passwd); 3682 return password; 3695 if (password) { 3696 size_t len = strlen(password); 3697 memset(password, 0, len); 3698 free(password); 3699 password = 0; 3726 int cryptfs_get_master_key(struct crypt_mnt_ftr* ftr, const char* password, argument 3734 if (password == 0 || *password == 0) { [all …]
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper.h | 90 const uint8_t *key, uint32_t key_length, const uint8_t *password, 170 virtual bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password); 187 const uint8_t *password, uint32_t password_length);
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 168 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, in CreatePasswordHandle() argument 184 memcpy(to_sign + metadata_length, password, password_length); in CreatePasswordHandle() 199 bool GateKeeper::DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { in DoVerify() argument 200 if (!password.buffer.get()) return false; in DoVerify() 205 password.buffer.get(), password.length)) { in DoVerify()
|
/system/extras/verity/ |
D | Utils.java | 148 char[] password = System.console().readPassword("Password for the private key file: "); in decryptPrivateKey() local 151 Key key = skFactory.generateSecret(new PBEKeySpec(password)); in decryptPrivateKey() 152 Arrays.fill(password, '\0'); in decryptPrivateKey()
|
/system/extras/tests/net_test/ |
D | README | 69 apt-get install. Log in as root with no password. By default, the filesystem is
|
/system/security/keystore/include/keystore/ |
D | IKeystoreService.h | 160 virtual int32_t unlock(int32_t userId, const String16& password) = 0;
|
/system/security/keystore/ |
D | IKeystoreService.cpp | 561 virtual int32_t onUserPasswordChanged(int32_t userId, const String16& password) in onUserPasswordChanged() argument 566 data.writeString16(password); in onUserPasswordChanged() 601 virtual int32_t unlock(int32_t userId, const String16& password) in unlock() argument 606 data.writeString16(password); in unlock()
|
D | keystore.cpp | 1808 int32_t onUserPasswordChanged(int32_t userId, const String16& password) { in onUserPasswordChanged() argument 1813 const String8 password8(password); in onUserPasswordChanged() 1818 if (password.size() == 0) { in onUserPasswordChanged()
|