Searched defs:password (Results 1 - 11 of 11) sorted by relevance

/system/core/gatekeeperd/tests/
H A Dgatekeeper_test.cpp35 SizedBuffer password; local
37 password.buffer.reset(new uint8_t[16]);
38 password.length = 16;
39 memset(password.buffer.get(), 0, 16);
40 EnrollRequest request(0, NULL, &password, NULL);
54 SizedBuffer password; local
57 EnrollRequest request(0, NULL, &password, NULL);
99 // do_enroll enrolls an all 0 password
112 // verify first password
123 // enroll new password
127 SizedBuffer password; local
172 SizedBuffer password; local
[all...]
/system/tpm/tpm_manager/server/
H A Dtpm2_initializer_test.cc108 std::string password = "hunter2"; local
112 DoAll(SetArgPointee<2>(password), Return(trunks::TPM_RC_SUCCESS)));
117 EXPECT_EQ(password, fake_local_data_.owner_password());
118 EXPECT_EQ(password, fake_local_data_.endorsement_password());
119 EXPECT_EQ(password, fake_local_data_.lockout_password());
/system/tpm/trunks/
H A Dpassword_authorization_delegate.cc28 const std::string& password) {
29 password_ = Make_TPM2B_DIGEST(password);
27 PasswordAuthorizationDelegate( const std::string& password) argument
H A Dtpm_utility_test.cc581 std::string password("password");
607 std::string password; local
645 std::string password; local
656 std::string password; local
684 std::string password; local
708 std::string password("password");
734 std::string password; local
754 std::string password; local
770 std::string password; local
780 std::string password; local
796 std::string password; local
812 std::string password; local
828 std::string password; local
838 std::string password; local
864 std::string password; local
1186 std::string password; local
1198 std::string password; local
1211 std::string password; local
1223 std::string password; local
[all...]
H A Dtpm_utility_impl.cc44 const char kWellKnownPassword[] = "cros-password";
161 // Most likely the platform password has already been set.
252 // password.
256 LOG(ERROR) << __func__ << ": Error injecting known password: "
310 << ": Error changing owner password. This probably because "
752 const std::string& password,
798 in_sensitive.auth_value = Make_TPM2B_DIGEST(password);
831 const std::string& password,
891 sensitive.user_auth = Make_TPM2B_DIGEST(password);
1486 LOG(INFO) << __func__ << ": Owner password i
748 ImportRSAKey(AsymmetricKeyUsage key_type, const std::string& modulus, uint32_t public_exponent, const std::string& prime_factor, const std::string& password, AuthorizationDelegate* delegate, std::string* key_blob) argument
828 CreateRSAKeyPair(AsymmetricKeyUsage key_type, int modulus_bits, uint32_t public_exponent, const std::string& password, const std::string& policy_digest, bool use_only_policy_authorization, int creation_pcr_index, AuthorizationDelegate* delegate, std::string* key_blob, std::string* creation_blob) argument
1714 SetHierarchyAuthorization( TPMI_RH_HIERARCHY_AUTH hierarchy, const std::string& password, AuthorizationDelegate* authorization) argument
[all...]
/system/core/gatekeeperd/
H A DSoftGateKeeper.h82 const uint8_t *, uint32_t, const uint8_t *password,
85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt),
136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { argument
138 size_t digest_size = password.length + sizeof(salt);
141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length);
149 bool VerifyFast(const fast_hash_t &fast_hash, const SizedBuffer &password) { argument
150 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt);
154 bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument
157 if (it != fast_hash_map_.end() && VerifyFast(it->second, password)) {
81 ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, const uint8_t *, uint32_t, const uint8_t *password, uint32_t password_length, salt_t salt) const argument
[all...]
/system/gatekeeper/
H A Dgatekeeper.cpp73 // incorrect old password
170 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password,
192 memcpy(to_sign.get() + metadata_length, password, password_length);
207 bool GateKeeper::DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument
208 if (!password.buffer.get()) return false;
213 password.buffer.get(), password.length)) {
169 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument
/system/tpm/tpm_manager/client/
H A Dmain.cc65 constexpr char kPasswordSwitch[] = "password";
78 Takes ownership of the Tpm with a random password.
82 [--password=<password>] [--bind_to_pcr0]
95 This command requires that owner authorization is available. If a password
97 READ_AUTHORIZATION is not listed, then the password will not be required
103 write_space --index=<index> --file=<input_file> [--password=<password>]
107 read_space --index=<index> --file=<output_file> [--password=<password>]
376 HandleDefineSpace(uint32_t index, size_t size, const std::string& attributes, const std::string& password, bool bind_to_pcr0) argument
419 HandleWriteSpace(uint32_t index, const std::string& input_file, const std::string& password, bool use_owner_authorization) argument
448 HandleReadSpace(uint32_t index, const std::string& output_file, const std::string& password, bool use_owner_authorization) argument
461 HandleLockSpace(uint32_t index, bool lock_read, bool lock_write, const std::string& password, bool use_owner_authorization) argument
[all...]
/system/vold/
H A DVoldNativeService.cpp518 binder::Status VoldNativeService::fdeCheckPassword(const std::string& password) { argument
522 return translate(cryptfs_check_passwd(password.c_str()));
543 static int fdeEnableInternal(int32_t passwordType, const std::string& password, argument
552 rc = cryptfs_enable(passwordType, password.c_str(), noUi);
566 const std::string& password, int32_t encryptionFlags) {
579 std::thread(&fdeEnableInternal, passwordType, password, encryptionFlags).detach();
584 const std::string& password) {
588 return translate(cryptfs_changepw(passwordType, password.c_str()));
591 binder::Status VoldNativeService::fdeVerifyPassword(const std::string& password) { argument
595 return translate(cryptfs_verify_passwd(password
565 fdeEnable(int32_t passwordType, const std::string& password, int32_t encryptionFlags) argument
583 fdeChangePassword(int32_t passwordType, const std::string& password) argument
[all...]
H A Dcryptfs.cpp210 /* Store password when userdata is successfully decrypted and mounted.
214 * password and pass it to KeyGuard, which uses it to unlock KeyStore.
216 * we have to use a daemon or similar to store the password. Since vold
220 * password should be cleared once it has been used.
222 * password is aged out after password_max_age_seconds seconds.
224 static char* password = 0; variable
637 * It will get updated later to KDF_SCRYPT after the password has been verified.
1185 /* Turn the password into a key and IV that can decrypt the master key */
1202 /* Turn the password into a key and IV that can decrypt the master key */
1261 /* Turn the password int
[all...]
/system/security/keystore/
H A Dkey_store_service.cpp282 Status KeyStoreService::onUserPasswordChanged(int32_t userId, const String16& password, argument
289 const String8 password8(password);
294 if (password.size() == 0) {
302 // generate master key, encrypt with password, write to file,
308 // rewrite master key with new password.
313 ALOGE("Changing user %d's password while locked, clearing old encryption", userId);
337 // This profile must share the same master key password as the parent profile. Because the
338 // password of the parent profile is not known here, the best we can do is copy the parent's
404 // read master key, decrypt with password, initialize mMasterKey*.

Completed in 2760 milliseconds