/system/core/gatekeeperd/tests/ |
D | gatekeeper_test.cpp | 36 SizedBuffer password; in do_enroll() local 38 password.buffer.reset(new uint8_t[16]); in do_enroll() 39 password.length = 16; in do_enroll() 40 memset(password.buffer.get(), 0, 16); in do_enroll() 41 EnrollRequest request(0, NULL, &password, NULL); in do_enroll() 55 SizedBuffer password; in TEST() local 58 EnrollRequest request(0, NULL, &password, NULL); in TEST() 128 SizedBuffer password; in TEST() local 129 password.buffer.reset(new uint8_t[16]); in TEST() 130 memset(password.buffer.get(), 1, 16); in TEST() [all …]
|
/system/core/gatekeeperd/ |
D | SoftGateKeeper.h | 82 const uint8_t *, uint32_t, const uint8_t *password, in ComputePasswordSignature() argument 85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), in ComputePasswordSignature() 136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { in ComputeFastHash() argument 138 size_t digest_size = password.length + sizeof(salt); in ComputeFastHash() 141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length); in ComputeFastHash() 149 bool VerifyFast(const fast_hash_t &fast_hash, const SizedBuffer &password) { in VerifyFast() argument 150 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt); in VerifyFast() 154 bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { in DoVerify() argument 157 if (it != fast_hash_map_.end() && VerifyFast(it->second, password)) { in DoVerify() 160 if (GateKeeper::DoVerify(expected_handle, password)) { in DoVerify() [all …]
|
/system/connectivity/shill/ |
D | rpc_task_unittest.cc | 39 virtual void GetLogin(string* user, string* password); 53 void RPCTaskTest::GetLogin(string* user, string* password) { in GetLogin() argument 56 last_password_ = password; in GetLogin() 79 string user, password; in TEST_F() local 80 task_.GetLogin(&user, &password); in TEST_F() 83 EXPECT_EQ(&password, last_password_); in TEST_F()
|
D | eap_credentials.h | 118 virtual void set_password(const std::string& password) { in set_password() argument 119 password_ = password; in set_password() 167 bool SetEapPassword(const std::string& password, Error* error); 168 bool SetEapPrivateKeyPassword(const std::string& password, Error* error);
|
D | rpc_task.cc | 46 void RPCTask::GetLogin(string* user, string* password) const { in GetLogin() 47 delegate_->GetLogin(user, password); in GetLogin()
|
D | rpc_task.h | 41 virtual void GetLogin(std::string* user, std::string* password) = 0; 55 virtual void GetLogin(std::string* user, std::string* password) const;
|
D | external_task_unittest.cc | 101 MOCK_METHOD2(GetLogin, void(string* user, string* password)); 242 string password; in TEST_F() local 243 EXPECT_CALL(*this, GetLogin(&username, &password)); in TEST_F() 245 external_task_->GetLogin(&username, &password); in TEST_F()
|
D | external_task.cc | 96 void ExternalTask::GetLogin(string* user, string* password) { in GetLogin() argument 97 return task_delegate_->GetLogin(user, password); in GetLogin()
|
D | eap_credentials.cc | 463 bool EapCredentials::SetEapPassword(const string& password, Error* /*error*/) { in SetEapPassword() argument 464 if (password_ == password) { in SetEapPassword() 467 password_ = password; in SetEapPassword() 471 bool EapCredentials::SetEapPrivateKeyPassword(const string& password, in SetEapPrivateKeyPassword() argument 473 if (private_key_password_ == password) { in SetEapPrivateKeyPassword() 476 private_key_password_ = password; in SetEapPrivateKeyPassword()
|
/system/connectivity/shill/mobile_operator_db/ |
D | serviceproviders.prototxt | 41 password : "mnet" 52 password : "etisalat.ae" 86 password : "1111" 130 password : "internet" 276 password : "clarogprs999" 287 password : "clarogprs999" 309 password : "wap" 318 password : "Internet" 340 password : "adgj" 351 password : "datos" [all …]
|
/system/connectivity/shill/shims/ |
D | c_ppp.cc | 41 int PPPGetSecret(char* username, char* password) { in PPPGetSecret() argument 49 if (password) { in PPPGetSecret() 50 strcpy(password, pass.c_str()); // NOLINT(runtime/printf) in PPPGetSecret()
|
D | task_proxy.cc | 45 bool TaskProxy::GetSecret(string* username, string* password) { in GetSecret() argument 48 if (!proxy_.getsec(username, password, &error)) { in GetSecret()
|
D | c_ppp.h | 26 int PPPGetSecret(char* username, char* password);
|
/system/connectivity/shill/vpn/ |
D | openvpn_management_server.cc | 289 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); in PerformStaticChallenge() local 292 if (user.empty() || (token.empty() && (password.empty() || otp.empty()))) { in PerformStaticChallenge() 296 << (password.empty() ? " no-password" : "") in PerformStaticChallenge() 308 string b64_password(brillo::data_encoding::Base64Encode(password)); in PerformStaticChallenge() 323 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); in PerformAuthentication() local 324 if (user.empty() || password.empty()) { in PerformAuthentication() 327 << (password.empty() ? " no-password" : ""); in PerformAuthentication() 332 SendPassword(tag, password); in PerformAuthentication() 454 const string& password) { in SendPassword() argument 458 EscapeToQuote(password).c_str())); in SendPassword()
|
D | l2tp_ipsec_driver.cc | 342 string password = args()->LookupString(kL2tpIpsecXauthPasswordProperty, ""); in InitXauthOptions() local 343 if (user.empty() && password.empty()) { in InitXauthOptions() 347 if (user.empty() || password.empty()) { in InitXauthOptions() 353 string xauth_credentials = user + "\n" + password + "\n"; in InitXauthOptions() 423 void L2TPIPSecDriver::GetLogin(string* user, string* password) { in GetLogin() argument 438 *password = password_property; in GetLogin()
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper.h | 90 const uint8_t *key, uint32_t key_length, const uint8_t *password, 170 virtual bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password); 187 const uint8_t *password, uint32_t password_length);
|
/system/connectivity/shill/bin/ |
D | set_apn | 97 local password="$5" 104 if [ -n "${password}" ]; then 105 args="${args},password,${password}"
|
D | set_cellular_ppp | 95 local password="$2" 99 "string:${PASSWORD_PROPERTY}" "variant:string:${password}" 205 and password by running the following command: 208 If you clear the PPP username and password, you will need to re-run
|
/system/vold/ |
D | CryptCommandListener.cpp | 266 const char* password; in runCommand() local 268 password = ""; in runCommand() 270 password = argv[3]; in runCommand() 281 rc = cryptfs_changepw(type, password); in runCommand() 349 const char* password = cryptfs_get_password(); in runCommand() local 350 if (password) { in runCommand() 352 int size = asprintf(&message, "{{sensitive}} %s", password); in runCommand()
|
D | cryptfs.h | 251 int cryptfs_get_master_key(struct crypt_mnt_ftr* ftr, const char* password, 253 int cryptfs_set_password(struct crypt_mnt_ftr* ftr, const char* password,
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 170 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, in CreatePasswordHandle() argument 186 memcpy(to_sign + metadata_length, password, password_length); in CreatePasswordHandle() 201 bool GateKeeper::DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { in DoVerify() argument 202 if (!password.buffer.get()) return false; in DoVerify() 207 password.buffer.get(), password.length)) { in DoVerify()
|
/system/connectivity/shill/dbus/ |
D | chromeos_rpc_task_dbus_adaptor.cc | 68 brillo::ErrorPtr* /*error*/, string* user, string* password) { in getsec() argument 70 task_->GetLogin(user, password); in getsec()
|
/system/tpm/trunks/ |
D | trunks_factory_impl.cc | 74 const std::string& password) const { in GetPasswordAuthorization() 76 new PasswordAuthorizationDelegate(password)); in GetPasswordAuthorization()
|
D | password_authorization_delegate.cc | 28 const std::string& password) { in PasswordAuthorizationDelegate() argument 29 password_ = Make_TPM2B_DIGEST(password); in PasswordAuthorizationDelegate()
|
/system/tpm/tpm_manager/common/ |
D | local_data.proto | 23 // the owner password (like Attestation, InstallAttributes and BootLockbox). 24 // when all the clients have the owner password injected, this protobuf is
|