/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 35 SizedBuffer password; local 37 password.buffer.reset(new uint8_t[16]); 38 password.length = 16; 39 memset(password.buffer.get(), 0, 16); 40 EnrollRequest request(0, NULL, &password, NULL); 54 SizedBuffer password; local 57 EnrollRequest request(0, NULL, &password, NULL); 99 // do_enroll enrolls an all 0 password 112 // verify first password 123 // enroll new password 127 SizedBuffer password; local 172 SizedBuffer password; local [all...] |
/system/tpm/tpm_manager/server/ |
H A D | tpm2_initializer_test.cc | 108 std::string password = "hunter2"; local 112 DoAll(SetArgPointee<2>(password), Return(trunks::TPM_RC_SUCCESS))); 117 EXPECT_EQ(password, fake_local_data_.owner_password()); 118 EXPECT_EQ(password, fake_local_data_.endorsement_password()); 119 EXPECT_EQ(password, fake_local_data_.lockout_password());
|
/system/tpm/trunks/ |
H A D | password_authorization_delegate.cc | 28 const std::string& password) { 29 password_ = Make_TPM2B_DIGEST(password); 27 PasswordAuthorizationDelegate( const std::string& password) argument
|
H A D | tpm_utility_test.cc | 581 std::string password("password"); 607 std::string password; local 645 std::string password; local 656 std::string password; local 684 std::string password; local 708 std::string password("password"); 734 std::string password; local 754 std::string password; local 770 std::string password; local 780 std::string password; local 796 std::string password; local 812 std::string password; local 828 std::string password; local 838 std::string password; local 864 std::string password; local 1186 std::string password; local 1198 std::string password; local 1211 std::string password; local 1223 std::string password; local [all...] |
H A D | tpm_utility_impl.cc | 44 const char kWellKnownPassword[] = "cros-password"; 161 // Most likely the platform password has already been set. 252 // password. 256 LOG(ERROR) << __func__ << ": Error injecting known password: " 310 << ": Error changing owner password. This probably because " 752 const std::string& password, 798 in_sensitive.auth_value = Make_TPM2B_DIGEST(password); 831 const std::string& password, 891 sensitive.user_auth = Make_TPM2B_DIGEST(password); 1486 LOG(INFO) << __func__ << ": Owner password i 748 ImportRSAKey(AsymmetricKeyUsage key_type, const std::string& modulus, uint32_t public_exponent, const std::string& prime_factor, const std::string& password, AuthorizationDelegate* delegate, std::string* key_blob) argument 828 CreateRSAKeyPair(AsymmetricKeyUsage key_type, int modulus_bits, uint32_t public_exponent, const std::string& password, const std::string& policy_digest, bool use_only_policy_authorization, int creation_pcr_index, AuthorizationDelegate* delegate, std::string* key_blob, std::string* creation_blob) argument 1714 SetHierarchyAuthorization( TPMI_RH_HIERARCHY_AUTH hierarchy, const std::string& password, AuthorizationDelegate* authorization) argument [all...] |
/system/core/gatekeeperd/ |
H A D | SoftGateKeeper.h | 82 const uint8_t *, uint32_t, const uint8_t *password, 85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), 136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { argument 138 size_t digest_size = password.length + sizeof(salt); 141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length); 149 bool VerifyFast(const fast_hash_t &fast_hash, const SizedBuffer &password) { argument 150 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt); 154 bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument 157 if (it != fast_hash_map_.end() && VerifyFast(it->second, password)) { 81 ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, const uint8_t *, uint32_t, const uint8_t *password, uint32_t password_length, salt_t salt) const argument [all...] |
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 73 // incorrect old password 170 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, 192 memcpy(to_sign.get() + metadata_length, password, password_length); 207 bool GateKeeper::DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { argument 208 if (!password.buffer.get()) return false; 213 password.buffer.get(), password.length)) { 169 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument
|
/system/tpm/tpm_manager/client/ |
H A D | main.cc | 65 constexpr char kPasswordSwitch[] = "password"; 78 Takes ownership of the Tpm with a random password. 82 [--password=<password>] [--bind_to_pcr0] 95 This command requires that owner authorization is available. If a password 97 READ_AUTHORIZATION is not listed, then the password will not be required 103 write_space --index=<index> --file=<input_file> [--password=<password>] 107 read_space --index=<index> --file=<output_file> [--password=<password>] 376 HandleDefineSpace(uint32_t index, size_t size, const std::string& attributes, const std::string& password, bool bind_to_pcr0) argument 419 HandleWriteSpace(uint32_t index, const std::string& input_file, const std::string& password, bool use_owner_authorization) argument 448 HandleReadSpace(uint32_t index, const std::string& output_file, const std::string& password, bool use_owner_authorization) argument 461 HandleLockSpace(uint32_t index, bool lock_read, bool lock_write, const std::string& password, bool use_owner_authorization) argument [all...] |
/system/vold/ |
H A D | VoldNativeService.cpp | 518 binder::Status VoldNativeService::fdeCheckPassword(const std::string& password) { argument 522 return translate(cryptfs_check_passwd(password.c_str())); 543 static int fdeEnableInternal(int32_t passwordType, const std::string& password, argument 552 rc = cryptfs_enable(passwordType, password.c_str(), noUi); 566 const std::string& password, int32_t encryptionFlags) { 579 std::thread(&fdeEnableInternal, passwordType, password, encryptionFlags).detach(); 584 const std::string& password) { 588 return translate(cryptfs_changepw(passwordType, password.c_str())); 591 binder::Status VoldNativeService::fdeVerifyPassword(const std::string& password) { argument 595 return translate(cryptfs_verify_passwd(password 565 fdeEnable(int32_t passwordType, const std::string& password, int32_t encryptionFlags) argument 583 fdeChangePassword(int32_t passwordType, const std::string& password) argument [all...] |
H A D | cryptfs.cpp | 210 /* Store password when userdata is successfully decrypted and mounted. 214 * password and pass it to KeyGuard, which uses it to unlock KeyStore. 216 * we have to use a daemon or similar to store the password. Since vold 220 * password should be cleared once it has been used. 222 * password is aged out after password_max_age_seconds seconds. 224 static char* password = 0; variable 637 * It will get updated later to KDF_SCRYPT after the password has been verified. 1185 /* Turn the password into a key and IV that can decrypt the master key */ 1202 /* Turn the password into a key and IV that can decrypt the master key */ 1261 /* Turn the password int [all...] |
/system/security/keystore/ |
H A D | key_store_service.cpp | 282 Status KeyStoreService::onUserPasswordChanged(int32_t userId, const String16& password, argument 289 const String8 password8(password); 294 if (password.size() == 0) { 302 // generate master key, encrypt with password, write to file, 308 // rewrite master key with new password. 313 ALOGE("Changing user %d's password while locked, clearing old encryption", userId); 337 // This profile must share the same master key password as the parent profile. Because the 338 // password of the parent profile is not known here, the best we can do is copy the parent's 404 // read master key, decrypt with password, initialize mMasterKey*.
|