/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 36 SizedBuffer password; local 38 password.buffer.reset(new uint8_t[16]); 39 password.length = 16; 40 memset(password.buffer.get(), 0, 16); 41 EnrollRequest request(0, NULL, &password, NULL); 55 SizedBuffer password; local 58 EnrollRequest request(0, NULL, &password, NULL); 100 // do_enroll enrolls an all 0 password 113 // verify first password 124 // enroll new password 128 SizedBuffer password; local 173 SizedBuffer password; local [all...] |
/system/connectivity/shill/shims/ |
H A D | c_ppp.cc | 41 int PPPGetSecret(char* username, char* password) { argument 49 if (password) { 50 strcpy(password, pass.c_str()); // NOLINT(runtime/printf)
|
H A D | task_proxy.cc | 45 bool TaskProxy::GetSecret(string* username, string* password) { argument 48 if (!proxy_.getsec(username, password, &error)) {
|
H A D | ppp.cc | 82 bool PPP::GetSecret(string* username, string* password) { argument 87 bool success = proxy_->GetSecret(username, password);
|
/system/connectivity/shill/cellular/ |
H A D | mobile_operator_info.h | 125 // The username and password fields that are required by the modemmanager. 128 // for username/password, this usually means that the carrier requires 131 std::string password; member in struct:shill::MobileOperatorInfo::MobileAPN
|
H A D | cellular.cc | 1067 void Cellular::GetLogin(string* user, string* password) { argument 1074 CHECK(password); 1076 *password = service()->ppp_password(); 1495 if (!mobile_apn->password.empty()) { 1496 props[kApnPasswordProperty] = mobile_apn->password;
|
H A D | cellular_unittest.cc | 1435 virtual void GetLogin(std::string* user, std::string* password) {} argument 1503 // Provides expected username and password in normal case. 1505 const char kFakePassword[] = "fake-password";
|
/system/connectivity/shill/dbus/ |
H A D | chromeos_rpc_task_dbus_adaptor.cc | 68 brillo::ErrorPtr* /*error*/, string* user, string* password) { 70 task_->GetLogin(user, password); 67 getsec( brillo::ErrorPtr* , string* user, string* password) argument
|
/system/connectivity/shill/ |
H A D | rpc_task_unittest.cc | 39 virtual void GetLogin(string* user, string* password); 53 void RPCTaskTest::GetLogin(string* user, string* password) { argument 56 last_password_ = password; 79 string user, password; local 80 task_.GetLogin(&user, &password); 83 EXPECT_EQ(&password, last_password_);
|
H A D | external_task.cc | 96 void ExternalTask::GetLogin(string* user, string* password) { argument 97 return task_delegate_->GetLogin(user, password);
|
H A D | external_task_unittest.cc | 101 MOCK_METHOD2(GetLogin, void(string* user, string* password)); 242 string password; local 243 EXPECT_CALL(*this, GetLogin(&username, &password)); 245 external_task_->GetLogin(&username, &password);
|
H A D | eap_credentials.cc | 269 // For EAP types other than TLS (e.g. EAP-TTLS or EAP-PEAP, password is the 270 // minimum requirement), at least an identity + password is required. 273 SLOG(this, 2) << "Connectable. !EAP-TLS and has a password."; 463 bool EapCredentials::SetEapPassword(const string& password, Error* /*error*/) { argument 464 if (password_ == password) { 467 password_ = password; 471 bool EapCredentials::SetEapPrivateKeyPassword(const string& password, argument 473 if (private_key_password_ == password) { 476 private_key_password_ = password;
|
H A D | eap_credentials.h | 118 virtual void set_password(const std::string& password) { argument 119 password_ = password; 167 bool SetEapPassword(const std::string& password, Error* error); 168 bool SetEapPrivateKeyPassword(const std::string& password, Error* error);
|
H A D | eap_credentials_unittest.cc | 94 void SetPassword(const string& password) { argument 95 eap_.password_ = password; 134 bool SetEapPassword(const string& password, Error* error) { argument 135 return eap_.SetEapPassword(password, error); 137 bool SetEapPrivateKeyPassword(const string& password, Error* error) { argument 138 return eap_.SetEapPrivateKeyPassword(password, error); 163 // Set a password. 177 // Clearing the password won't help. 214 // No password.
|
/system/tpm/trunks/ |
H A D | password_authorization_delegate.cc | 28 const std::string& password) { 29 password_ = Make_TPM2B_DIGEST(password); 27 PasswordAuthorizationDelegate( const std::string& password) argument
|
H A D | tpm_utility_test.cc | 619 std::string password("password"); 649 std::string password; local 693 std::string password; local 704 std::string password; local 736 std::string password; local 764 std::string password("password"); 794 std::string password; local 817 std::string password; local 836 std::string password; local 849 std::string password; local 868 std::string password; local 887 std::string password; local 906 std::string password; local 920 std::string password; local 950 std::string password; local 1305 std::string password; local 1320 std::string password; local 1336 std::string password; local 1352 std::string password; local [all...] |
/system/vold/ |
H A D | CryptCommandListener.cpp | 109 } else if (!strcmp(type, "password")) { 204 "default|password|pin|pattern [passwd] [noui]"; 265 "default|password|pin|pattern [newpasswd]"; 266 const char* password; local 268 password = ""; 270 password = argv[3]; 281 rc = cryptfs_changepw(type, password); 329 cli->sendMsg(ResponseCode::PasswordTypeResult, "password", false); 349 const char* password = cryptfs_get_password(); local 350 if (password) { [all...] |
/system/connectivity/shill/pppoe/ |
H A D | pppoe_service.cc | 192 void PPPoEService::GetLogin(string* user, string* password) { argument 193 CHECK(user && password); 195 *password = password_;
|
/system/core/gatekeeperd/ |
H A D | SoftGateKeeper.h | 82 const uint8_t *, uint32_t, const uint8_t *password, 85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), 136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { argument 138 size_t digest_size = password.length + sizeof(salt); 141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length); 149 bool VerifyFast(const fast_hash_t &fast_hash, const SizedBuffer &password) { argument 150 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt); 154 bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument 157 if (it != fast_hash_map_.end() && VerifyFast(it->second, password)) { 81 ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, const uint8_t *, uint32_t, const uint8_t *password, uint32_t password_length, salt_t salt) const argument [all...] |
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 73 // incorrect old password 170 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, 186 memcpy(to_sign + metadata_length, password, password_length); 201 bool GateKeeper::DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument 202 if (!password.buffer.get()) return false; 207 password.buffer.get(), password.length)) { 169 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument
|
/system/connectivity/shill/vpn/ |
H A D | openvpn_management_server.cc | 238 LOG(INFO) << "Processing need-password message."; 250 NOTIMPLEMENTED() << ": Unsupported need-password message: " << message; 289 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); local 292 if (user.empty() || (token.empty() && (password.empty() || otp.empty()))) { 296 << (password.empty() ? " no-password" : "") 308 string b64_password(brillo::data_encoding::Base64Encode(password)); 323 string password = driver_->args()->LookupString(kOpenVPNPasswordProperty, ""); local 324 if (user.empty() || password.empty()) { 327 << (password 453 SendPassword(const string& tag, const string& password) argument [all...] |
H A D | l2tp_ipsec_driver.cc | 34 // using the provided "user" and "password" properties. 342 string password = args()->LookupString(kL2tpIpsecXauthPasswordProperty, ""); local 343 if (user.empty() && password.empty()) { 347 if (user.empty() || password.empty()) { 353 string xauth_credentials = user + "\n" + password + "\n"; 423 void L2TPIPSecDriver::GetLogin(string* user, string* password) { argument 438 *password = password_property;
|
H A D | l2tp_ipsec_driver_unittest.cc | 193 virtual void GetLogin(string* user, string* password); 213 void L2TPIPSecDriverTest::GetLogin(string* /*user*/, string* /*password*/) {} 502 static const char kPassword[] = "random-password"; 503 string user, password; local 505 driver_->GetLogin(&user, &password); 507 EXPECT_TRUE(password.empty()); 510 driver_->GetLogin(&user, &password); 512 EXPECT_TRUE(password.empty()); 514 driver_->GetLogin(&user, &password); 516 EXPECT_EQ(kPassword, password); [all...] |
/system/security/keystore/ |
H A D | IKeystoreService.cpp | 624 virtual int32_t onUserPasswordChanged(int32_t userId, const String16& password) argument 629 data.writeString16(password); 664 virtual int32_t unlock(int32_t userId, const String16& password) argument 669 data.writeString16(password);
|
H A D | key_store_service.cpp | 157 int32_t KeyStoreService::onUserPasswordChanged(int32_t userId, const String16& password) { argument 162 const String8 password8(password); 167 if (password.size() == 0) { 174 // generate master key, encrypt with password, write to file, 179 // rewrite master key with new password. 183 ALOGE("Changing user %d's password while locked, clearing old encryption", userId); 204 // This profile must share the same master key password as the parent profile. Because the 205 // password of the parent profile is not known here, the best we can do is copy the parent's 260 // read master key, decrypt with password, initialize mMasterKey*.
|