/system/connectivity/shill/shims/ |
H A D | c_ppp.h | 26 int PPPGetSecret(char* username, char* password);
|
H A D | c_ppp.cc | 41 int PPPGetSecret(char* username, char* password) { argument 49 if (password) { 50 strcpy(password, pass.c_str()); // NOLINT(runtime/printf)
|
H A D | task_proxy.cc | 45 bool TaskProxy::GetSecret(string* username, string* password) { argument 48 if (!proxy_.getsec(username, password, &error)) {
|
H A D | task_proxy.h | 41 bool GetSecret(std::string* username, std::string* password);
|
H A D | ppp.h | 46 bool GetSecret(std::string* username, std::string* password);
|
/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 36 SizedBuffer password; local 38 password.buffer.reset(new uint8_t[16]); 39 password.length = 16; 40 memset(password.buffer.get(), 0, 16); 41 EnrollRequest request(0, NULL, &password, NULL); 55 SizedBuffer password; local 58 EnrollRequest request(0, NULL, &password, NULL); 100 // do_enroll enrolls an all 0 password 113 // verify first password 124 // enroll new password 128 SizedBuffer password; local 173 SizedBuffer password; local [all...] |
/system/connectivity/shill/ |
H A D | rpc_task_unittest.cc | 39 virtual void GetLogin(string* user, string* password); 53 void RPCTaskTest::GetLogin(string* user, string* password) { argument 56 last_password_ = password; 79 string user, password; local 80 task_.GetLogin(&user, &password); 83 EXPECT_EQ(&password, last_password_);
|
H A D | rpc_task.cc | 46 void RPCTask::GetLogin(string* user, string* password) const { 47 delegate_->GetLogin(user, password);
|
H A D | rpc_task.h | 41 virtual void GetLogin(std::string* user, std::string* password) = 0; 55 virtual void GetLogin(std::string* user, std::string* password) const;
|
H A D | eap_credentials.h | 118 virtual void set_password(const std::string& password) { argument 119 password_ = password; 167 bool SetEapPassword(const std::string& password, Error* error); 168 bool SetEapPrivateKeyPassword(const std::string& password, Error* error);
|
H A D | external_task.cc | 96 void ExternalTask::GetLogin(string* user, string* password) { argument 97 return task_delegate_->GetLogin(user, password);
|
/system/core/gatekeeperd/ |
H A D | SoftGateKeeper.h | 82 const uint8_t *, uint32_t, const uint8_t *password, 85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), 136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { argument 138 size_t digest_size = password.length + sizeof(salt); 141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length); 149 bool VerifyFast(const fast_hash_t &fast_hash, const SizedBuffer &password) { argument 150 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt); 154 bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument 157 if (it != fast_hash_map_.end() && VerifyFast(it->second, password)) { 81 ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, const uint8_t *, uint32_t, const uint8_t *password, uint32_t password_length, salt_t salt) const argument [all...] |
/system/connectivity/shill/mobile_operator_db/ |
H A D | serviceproviders.prototxt | 41 password : "mnet" 52 password : "etisalat.ae" 86 password : "1111" 130 password : "internet" 276 password : "clarogprs999" 287 password : "clarogprs999" 309 password : "wap" 318 password : "Internet" 340 password : "adgj" 351 password [all...] |
/system/connectivity/shill/dbus/ |
H A D | chromeos_rpc_task_dbus_adaptor.cc | 68 brillo::ErrorPtr* /*error*/, string* user, string* password) { 70 task_->GetLogin(user, password); 67 getsec( brillo::ErrorPtr* , string* user, string* password) argument
|
H A D | chromeos_rpc_task_dbus_adaptor.h | 56 std::string* password) override;
|
/system/tpm/trunks/ |
H A D | password_authorization_delegate.cc | 28 const std::string& password) { 29 password_ = Make_TPM2B_DIGEST(password); 27 PasswordAuthorizationDelegate( const std::string& password) argument
|
H A D | trunks_factory_impl.cc | 74 const std::string& password) const { 76 new PasswordAuthorizationDelegate(password));
|
H A D | password_authorization_delegate.h | 31 // interface. This delegate is used for password based authorization. Upon 32 // initialization of this delegate, we feed in the plaintext password. This 33 // password is then used to authorize the commands issued with this delegate. 38 explicit PasswordAuthorizationDelegate(const std::string& password);
|
H A D | trunks_factory.h | 56 // Returns an AuthorizationDelegate instance for basic password authorization. 59 const std::string& password) const = 0;
|
H A D | trunks_factory_impl.h | 51 const std::string& password) const override;
|
/system/connectivity/shill/bin/ |
H A D | set_apn | 28 ${PROGRAM} [-n <network_id>] [-u <username] [-p <password] <apn> 97 local password="$5" 104 if [ -n "${password}" ]; then 105 args="${args},password,${password}" 162 DEFINE_string 'password' "" 'password to be used with the APN' 'p'
|
H A D | set_cellular_ppp | 19 # Set the PPP username and password to be used when making connections on 28 Set PPP username and/or password 29 ${PROGRAM} [-u <username>] [-p <password>] 31 Clear PPP username and password 95 local password="$2" 99 "string:${PASSWORD_PROPERTY}" "variant:string:${password}" 181 DEFINE_string 'password' "" 'PPP password for the Service' 'p' 183 'clear any username and password that has been previously set' 'c' 205 and password b [all...] |
/system/gatekeeper/include/gatekeeper/ |
H A D | gatekeeper.h | 55 * as a password change. 68 * The key used to sign and verify password data. 81 * Uses platform-specific routines to compute a signature on the provided password. 84 * available in case handling for password signatures is different from general 90 const uint8_t *key, uint32_t key_length, const uint8_t *password, 94 * Retrieves a unique, cryptographically randomly generated buffer for use in password 123 * If 'secure' is false, password is operating in a fallback mode. Implementations 136 * If 'secure' is false, password is operating in a fallback mode. Implementations 148 * If 'secure' is false, password is operating in a fallback mode. Implementations 168 * Verifies that handle matches password HMA [all...] |
/system/connectivity/shill/vpn/ |
H A D | openvpn_management_server.cc | 238 LOG(INFO) << "Processing need-password message."; 250 NOTIMPLEMENTED() << ": Unsupported need-password message: " << message; 289 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); local 292 if (user.empty() || (token.empty() && (password.empty() || otp.empty()))) { 296 << (password.empty() ? " no-password" : "") 308 string b64_password(brillo::data_encoding::Base64Encode(password)); 323 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); local 324 if (user.empty() || password.empty()) { 327 << (password 453 SendPassword(const string& tag, const string& password) argument [all...] |
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 73 // incorrect old password 170 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, 186 memcpy(to_sign + metadata_length, password, password_length); 201 bool GateKeeper::DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument 202 if (!password.buffer.get()) return false; 207 password.buffer.get(), password.length)) { 169 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument
|