Searched refs:password (Results 1 - 25 of 63) sorted by relevance

123

/system/connectivity/shill/shims/
H A Dc_ppp.h26 int PPPGetSecret(char* username, char* password);
H A Dc_ppp.cc41 int PPPGetSecret(char* username, char* password) { argument
49 if (password) {
50 strcpy(password, pass.c_str()); // NOLINT(runtime/printf)
H A Dtask_proxy.cc45 bool TaskProxy::GetSecret(string* username, string* password) { argument
48 if (!proxy_.getsec(username, password, &error)) {
H A Dtask_proxy.h41 bool GetSecret(std::string* username, std::string* password);
H A Dppp.h46 bool GetSecret(std::string* username, std::string* password);
/system/core/gatekeeperd/tests/
H A Dgatekeeper_test.cpp36 SizedBuffer password; local
38 password.buffer.reset(new uint8_t[16]);
39 password.length = 16;
40 memset(password.buffer.get(), 0, 16);
41 EnrollRequest request(0, NULL, &password, NULL);
55 SizedBuffer password; local
58 EnrollRequest request(0, NULL, &password, NULL);
100 // do_enroll enrolls an all 0 password
113 // verify first password
124 // enroll new password
128 SizedBuffer password; local
173 SizedBuffer password; local
[all...]
/system/connectivity/shill/
H A Drpc_task_unittest.cc39 virtual void GetLogin(string* user, string* password);
53 void RPCTaskTest::GetLogin(string* user, string* password) { argument
56 last_password_ = password;
79 string user, password; local
80 task_.GetLogin(&user, &password);
83 EXPECT_EQ(&password, last_password_);
H A Drpc_task.cc46 void RPCTask::GetLogin(string* user, string* password) const {
47 delegate_->GetLogin(user, password);
H A Drpc_task.h41 virtual void GetLogin(std::string* user, std::string* password) = 0;
55 virtual void GetLogin(std::string* user, std::string* password) const;
H A Deap_credentials.h118 virtual void set_password(const std::string& password) { argument
119 password_ = password;
167 bool SetEapPassword(const std::string& password, Error* error);
168 bool SetEapPrivateKeyPassword(const std::string& password, Error* error);
H A Dexternal_task.cc96 void ExternalTask::GetLogin(string* user, string* password) { argument
97 return task_delegate_->GetLogin(user, password);
/system/core/gatekeeperd/
H A DSoftGateKeeper.h82 const uint8_t *, uint32_t, const uint8_t *password,
85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt),
136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { argument
138 size_t digest_size = password.length + sizeof(salt);
141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length);
149 bool VerifyFast(const fast_hash_t &fast_hash, const SizedBuffer &password) { argument
150 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt);
154 bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument
157 if (it != fast_hash_map_.end() && VerifyFast(it->second, password)) {
81 ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, const uint8_t *, uint32_t, const uint8_t *password, uint32_t password_length, salt_t salt) const argument
[all...]
/system/connectivity/shill/mobile_operator_db/
H A Dserviceproviders.prototxt41 password : "mnet"
52 password : "etisalat.ae"
86 password : "1111"
130 password : "internet"
276 password : "clarogprs999"
287 password : "clarogprs999"
309 password : "wap"
318 password : "Internet"
340 password : "adgj"
351 password
[all...]
/system/connectivity/shill/dbus/
H A Dchromeos_rpc_task_dbus_adaptor.cc68 brillo::ErrorPtr* /*error*/, string* user, string* password) {
70 task_->GetLogin(user, password);
67 getsec( brillo::ErrorPtr* , string* user, string* password) argument
H A Dchromeos_rpc_task_dbus_adaptor.h56 std::string* password) override;
/system/tpm/trunks/
H A Dpassword_authorization_delegate.cc28 const std::string& password) {
29 password_ = Make_TPM2B_DIGEST(password);
27 PasswordAuthorizationDelegate( const std::string& password) argument
H A Dtrunks_factory_impl.cc74 const std::string& password) const {
76 new PasswordAuthorizationDelegate(password));
H A Dpassword_authorization_delegate.h31 // interface. This delegate is used for password based authorization. Upon
32 // initialization of this delegate, we feed in the plaintext password. This
33 // password is then used to authorize the commands issued with this delegate.
38 explicit PasswordAuthorizationDelegate(const std::string& password);
H A Dtrunks_factory.h56 // Returns an AuthorizationDelegate instance for basic password authorization.
59 const std::string& password) const = 0;
H A Dtrunks_factory_impl.h51 const std::string& password) const override;
/system/connectivity/shill/bin/
H A Dset_apn28 ${PROGRAM} [-n <network_id>] [-u <username] [-p <password] <apn>
97 local password="$5"
104 if [ -n "${password}" ]; then
105 args="${args},password,${password}"
162 DEFINE_string 'password' "" 'password to be used with the APN' 'p'
H A Dset_cellular_ppp19 # Set the PPP username and password to be used when making connections on
28 Set PPP username and/or password
29 ${PROGRAM} [-u <username>] [-p <password>]
31 Clear PPP username and password
95 local password="$2"
99 "string:${PASSWORD_PROPERTY}" "variant:string:${password}"
181 DEFINE_string 'password' "" 'PPP password for the Service' 'p'
183 'clear any username and password that has been previously set' 'c'
205 and password b
[all...]
/system/gatekeeper/include/gatekeeper/
H A Dgatekeeper.h55 * as a password change.
68 * The key used to sign and verify password data.
81 * Uses platform-specific routines to compute a signature on the provided password.
84 * available in case handling for password signatures is different from general
90 const uint8_t *key, uint32_t key_length, const uint8_t *password,
94 * Retrieves a unique, cryptographically randomly generated buffer for use in password
123 * If 'secure' is false, password is operating in a fallback mode. Implementations
136 * If 'secure' is false, password is operating in a fallback mode. Implementations
148 * If 'secure' is false, password is operating in a fallback mode. Implementations
168 * Verifies that handle matches password HMA
[all...]
/system/connectivity/shill/vpn/
H A Dopenvpn_management_server.cc238 LOG(INFO) << "Processing need-password message.";
250 NOTIMPLEMENTED() << ": Unsupported need-password message: " << message;
289 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); local
292 if (user.empty() || (token.empty() && (password.empty() || otp.empty()))) {
296 << (password.empty() ? " no-password" : "")
308 string b64_password(brillo::data_encoding::Base64Encode(password));
323 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); local
324 if (user.empty() || password.empty()) {
327 << (password
453 SendPassword(const string& tag, const string& password) argument
[all...]
/system/gatekeeper/
H A Dgatekeeper.cpp73 // incorrect old password
170 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password,
186 memcpy(to_sign + metadata_length, password, password_length);
201 bool GateKeeper::DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument
202 if (!password.buffer.get()) return false;
207 password.buffer.get(), password.length)) {
169 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument

Completed in 1044 milliseconds

123