Searched defs:password (Results 1 - 25 of 27) sorted by relevance

12

/system/core/gatekeeperd/tests/
H A Dgatekeeper_test.cpp36 SizedBuffer password; local
38 password.buffer.reset(new uint8_t[16]);
39 password.length = 16;
40 memset(password.buffer.get(), 0, 16);
41 EnrollRequest request(0, NULL, &password, NULL);
55 SizedBuffer password; local
58 EnrollRequest request(0, NULL, &password, NULL);
100 // do_enroll enrolls an all 0 password
113 // verify first password
124 // enroll new password
128 SizedBuffer password; local
173 SizedBuffer password; local
[all...]
/system/connectivity/shill/shims/
H A Dc_ppp.cc41 int PPPGetSecret(char* username, char* password) { argument
49 if (password) {
50 strcpy(password, pass.c_str()); // NOLINT(runtime/printf)
H A Dtask_proxy.cc45 bool TaskProxy::GetSecret(string* username, string* password) { argument
48 if (!proxy_.getsec(username, password, &error)) {
H A Dppp.cc82 bool PPP::GetSecret(string* username, string* password) { argument
87 bool success = proxy_->GetSecret(username, password);
/system/connectivity/shill/cellular/
H A Dmobile_operator_info.h125 // The username and password fields that are required by the modemmanager.
128 // for username/password, this usually means that the carrier requires
131 std::string password; member in struct:shill::MobileOperatorInfo::MobileAPN
H A Dcellular.cc1067 void Cellular::GetLogin(string* user, string* password) { argument
1074 CHECK(password);
1076 *password = service()->ppp_password();
1495 if (!mobile_apn->password.empty()) {
1496 props[kApnPasswordProperty] = mobile_apn->password;
H A Dcellular_unittest.cc1435 virtual void GetLogin(std::string* user, std::string* password) {} argument
1503 // Provides expected username and password in normal case.
1505 const char kFakePassword[] = "fake-password";
/system/connectivity/shill/dbus/
H A Dchromeos_rpc_task_dbus_adaptor.cc68 brillo::ErrorPtr* /*error*/, string* user, string* password) {
70 task_->GetLogin(user, password);
67 getsec( brillo::ErrorPtr* , string* user, string* password) argument
/system/connectivity/shill/
H A Drpc_task_unittest.cc39 virtual void GetLogin(string* user, string* password);
53 void RPCTaskTest::GetLogin(string* user, string* password) { argument
56 last_password_ = password;
79 string user, password; local
80 task_.GetLogin(&user, &password);
83 EXPECT_EQ(&password, last_password_);
H A Dexternal_task.cc96 void ExternalTask::GetLogin(string* user, string* password) { argument
97 return task_delegate_->GetLogin(user, password);
H A Dexternal_task_unittest.cc101 MOCK_METHOD2(GetLogin, void(string* user, string* password));
242 string password; local
243 EXPECT_CALL(*this, GetLogin(&username, &password));
245 external_task_->GetLogin(&username, &password);
H A Deap_credentials.cc269 // For EAP types other than TLS (e.g. EAP-TTLS or EAP-PEAP, password is the
270 // minimum requirement), at least an identity + password is required.
273 SLOG(this, 2) << "Connectable. !EAP-TLS and has a password.";
463 bool EapCredentials::SetEapPassword(const string& password, Error* /*error*/) { argument
464 if (password_ == password) {
467 password_ = password;
471 bool EapCredentials::SetEapPrivateKeyPassword(const string& password, argument
473 if (private_key_password_ == password) {
476 private_key_password_ = password;
H A Deap_credentials.h118 virtual void set_password(const std::string& password) { argument
119 password_ = password;
167 bool SetEapPassword(const std::string& password, Error* error);
168 bool SetEapPrivateKeyPassword(const std::string& password, Error* error);
H A Deap_credentials_unittest.cc94 void SetPassword(const string& password) { argument
95 eap_.password_ = password;
134 bool SetEapPassword(const string& password, Error* error) { argument
135 return eap_.SetEapPassword(password, error);
137 bool SetEapPrivateKeyPassword(const string& password, Error* error) { argument
138 return eap_.SetEapPrivateKeyPassword(password, error);
163 // Set a password.
177 // Clearing the password won't help.
214 // No password.
/system/tpm/trunks/
H A Dpassword_authorization_delegate.cc28 const std::string& password) {
29 password_ = Make_TPM2B_DIGEST(password);
27 PasswordAuthorizationDelegate( const std::string& password) argument
H A Dtpm_utility_test.cc619 std::string password("password");
649 std::string password; local
693 std::string password; local
704 std::string password; local
736 std::string password; local
764 std::string password("password");
794 std::string password; local
817 std::string password; local
836 std::string password; local
849 std::string password; local
868 std::string password; local
887 std::string password; local
906 std::string password; local
920 std::string password; local
950 std::string password; local
1305 std::string password; local
1320 std::string password; local
1336 std::string password; local
1352 std::string password; local
[all...]
/system/vold/
H A DCryptCommandListener.cpp109 } else if (!strcmp(type, "password")) {
204 "default|password|pin|pattern [passwd] [noui]";
265 "default|password|pin|pattern [newpasswd]";
266 const char* password; local
268 password = "";
270 password = argv[3];
281 rc = cryptfs_changepw(type, password);
329 cli->sendMsg(ResponseCode::PasswordTypeResult, "password", false);
349 const char* password = cryptfs_get_password(); local
350 if (password) {
[all...]
/system/connectivity/shill/pppoe/
H A Dpppoe_service.cc192 void PPPoEService::GetLogin(string* user, string* password) { argument
193 CHECK(user && password);
195 *password = password_;
/system/core/gatekeeperd/
H A DSoftGateKeeper.h82 const uint8_t *, uint32_t, const uint8_t *password,
85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt),
136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { argument
138 size_t digest_size = password.length + sizeof(salt);
141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length);
149 bool VerifyFast(const fast_hash_t &fast_hash, const SizedBuffer &password) { argument
150 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt);
154 bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument
157 if (it != fast_hash_map_.end() && VerifyFast(it->second, password)) {
81 ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, const uint8_t *, uint32_t, const uint8_t *password, uint32_t password_length, salt_t salt) const argument
[all...]
/system/gatekeeper/
H A Dgatekeeper.cpp73 // incorrect old password
170 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password,
186 memcpy(to_sign + metadata_length, password, password_length);
201 bool GateKeeper::DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument
202 if (!password.buffer.get()) return false;
207 password.buffer.get(), password.length)) {
169 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument
/system/connectivity/shill/vpn/
H A Dopenvpn_management_server.cc238 LOG(INFO) << "Processing need-password message.";
250 NOTIMPLEMENTED() << ": Unsupported need-password message: " << message;
289 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); local
292 if (user.empty() || (token.empty() && (password.empty() || otp.empty()))) {
296 << (password.empty() ? " no-password" : "")
308 string b64_password(brillo::data_encoding::Base64Encode(password));
323 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); local
324 if (user.empty() || password.empty()) {
327 << (password
453 SendPassword(const string& tag, const string& password) argument
[all...]
H A Dl2tp_ipsec_driver.cc34 // using the provided "user" and "password" properties.
342 string password = args()->LookupString(kL2tpIpsecXauthPasswordProperty, ""); local
343 if (user.empty() && password.empty()) {
347 if (user.empty() || password.empty()) {
353 string xauth_credentials = user + "\n" + password + "\n";
423 void L2TPIPSecDriver::GetLogin(string* user, string* password) { argument
438 *password = password_property;
H A Dl2tp_ipsec_driver_unittest.cc193 virtual void GetLogin(string* user, string* password);
213 void L2TPIPSecDriverTest::GetLogin(string* /*user*/, string* /*password*/) {}
502 static const char kPassword[] = "random-password";
503 string user, password; local
505 driver_->GetLogin(&user, &password);
507 EXPECT_TRUE(password.empty());
510 driver_->GetLogin(&user, &password);
512 EXPECT_TRUE(password.empty());
514 driver_->GetLogin(&user, &password);
516 EXPECT_EQ(kPassword, password);
[all...]
/system/security/keystore/
H A DIKeystoreService.cpp624 virtual int32_t onUserPasswordChanged(int32_t userId, const String16& password) argument
629 data.writeString16(password);
664 virtual int32_t unlock(int32_t userId, const String16& password) argument
669 data.writeString16(password);
H A Dkey_store_service.cpp157 int32_t KeyStoreService::onUserPasswordChanged(int32_t userId, const String16& password) { argument
162 const String8 password8(password);
167 if (password.size() == 0) {
174 // generate master key, encrypt with password, write to file,
179 // rewrite master key with new password.
183 ALOGE("Changing user %d's password while locked, clearing old encryption", userId);
204 // This profile must share the same master key password as the parent profile. Because the
205 // password of the parent profile is not known here, the best we can do is copy the parent's
260 // read master key, decrypt with password, initialize mMasterKey*.

Completed in 503 milliseconds

12