HomeSort by relevance Sort by last modified time
    Searched defs:cryptohome (Results 1 - 25 of 35) sorted by null

1 2

  /external/cros/system_api/constants/
cryptohome.h 10 namespace cryptohome { namespace
15 } // namespace cryptohome
  /external/libbrillo/brillo/
cryptohome.h 14 namespace cryptohome { namespace in namespace:brillo
72 } // namespace cryptohome
  /external/autotest/client/site_tests/login_CryptohomeIncognito/
login_CryptohomeIncognito.py 10 from autotest_lib.client.cros import cryptohome namespace
18 if not cryptohome.is_guest_vault_mounted():
22 if cryptohome.is_guest_vault_mounted(allow_fail=True):
  /external/autotest/client/site_tests/platform_CryptohomeMount/
platform_CryptohomeMount.py 7 from autotest_lib.client.cros import cryptohome namespace
10 """Validates basic cryptohome creation and mounting."""
18 user_hash = cryptohome.get_user_hash(test_user)
19 proxy = cryptohome.CryptohomeProxy()
34 raise error.TestFail('Cryptohome mounted after unmount!')
39 raise error.TestFail('Cryptohome mounted with a bad password.')
42 raise error.TestFail('Cryptohome mounted even though mount() failed')
46 raise error.TestFail('Cryptohome could not clean up vault')
  /external/autotest/client/site_tests/login_Cryptohome/
login_Cryptohome.py 10 from autotest_lib.client.cros import cryptohome namespace
16 """Verify the cryptohome is mounted only after login."""
24 if not cryptohome.is_vault_mounted(user=username,
28 if cryptohome.is_vault_mounted(user=username,
35 cryptohome.remove_vault(username)
37 cryptohome.mount_vault(TEST_USER, TEST_PASS, create=True)
38 test_file = os.path.join(cryptohome.user_path(TEST_USER), 'hello')
40 cryptohome.unmount_vault(TEST_USER)
43 if not cryptohome.is_vault_mounted(user=username,
  /external/autotest/client/site_tests/platform_Attestation/
platform_Attestation.py 7 from autotest_lib.client.cros import cryptohome namespace
14 utils.system(cryptohome.CRYPTOHOME_CMD +
22 utils.system(cryptohome.CRYPTOHOME_CMD +
27 utils.system(cryptohome.CRYPTOHOME_CMD +
34 utils.system(cryptohome.CRYPTOHOME_CMD +
40 status = cryptohome.get_tpm_attestation_status()
44 status = cryptohome.get_tpm_attestation_status()
  /external/autotest/client/site_tests/platform_CryptohomeBadPerms/
platform_CryptohomeBadPerms.py 9 from autotest_lib.client.cros import cryptohome namespace
20 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
24 path = cryptohome.user_path(user)
34 path = cryptohome.system_path(user)
45 path = cryptohome.user_path(user)
56 path = cryptohome.user_path(user)
66 path = cryptohome.user_path(user)
  /external/autotest/client/site_tests/platform_CryptohomeKeyEviction/
platform_CryptohomeKeyEviction.py 7 from autotest_lib.client.cros import cryptohome, pkcs11 namespace
10 """Ensure that the cryptohome properly manages key eviction from the tpm.
12 and then remounting a user's cryptohome. Mount requires use of the
13 user's cryptohome key, and thus the mount only succeeds if the
14 cryptohome key was properly evicted and reloaded into the TPM.
21 self._cryptohome_proxy = cryptohome.CryptohomeProxy()
29 # First we inject 30 tokens into chaps. This forces the cryptohome
34 # Then we get a user to remount his cryptohome. This process uses
35 # the cryptohome key, and if the user was able to login, the
36 # cryptohome key was correctly reloaded
    [all...]
  /external/autotest/client/site_tests/platform_CryptohomeMigrateChapsTokenClient/
platform_CryptohomeMigrateChapsTokenClient.py 7 from autotest_lib.client.cros import cryptohome, pkcs11 namespace
20 self._cryptohome_proxy = cryptohome.CryptohomeProxy()
38 raise error.TestFail('Unable to remount users cryptohome')
  /external/autotest/client/site_tests/platform_CryptohomeMigrateKey/
platform_CryptohomeMigrateKey.py 7 from autotest_lib.client.cros import cryptohome namespace
51 self.proxy = cryptohome.CryptohomeProxy()
  /external/autotest/client/site_tests/platform_CryptohomeMultiple/
platform_CryptohomeMultiple.py 7 from autotest_lib.client.cros import cryptohome namespace
15 Tests mounting a single not-already-existing cryptohome. Ensures that
26 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
  /external/autotest/client/cros/
login.py 7 import constants, cros_logging, cros_ui, cryptohome namespace
109 """Wait until cryptohome is mounted.
111 @param user: the user whose cryptohome the caller wants to wait for.
114 @raise: TimeoutError: cryptohome wasn't mounted before timeout
117 condition=lambda: cryptohome.is_vault_mounted(user),
118 timeout_msg='Timed out waiting for cryptohome to be mounted',
  /external/autotest/client/site_tests/enterprise_PowerManagement/
enterprise_PowerManagement.py 9 from autotest_lib.client.cros import cryptohome namespace
95 lambda: not cryptohome.is_vault_mounted(user=self.USERNAME,
  /external/autotest/client/site_tests/login_CryptohomeOwnerQuery/
login_CryptohomeOwnerQuery.py 14 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace
17 """Verify that the cryptohome owner user query works properly."""
32 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
38 if cryptohome.get_login_status()['owner_user_exists']:
47 if not cryptohome.get_login_status()['owner_user_exists']:
  /external/autotest/client/site_tests/login_GaiaLogin/
login_GaiaLogin.py 7 from autotest_lib.client.cros import cryptohome namespace
31 if not cryptohome.is_vault_mounted(user=self._USERNAME):
  /external/autotest/client/site_tests/login_RetrieveActiveSessions/
login_RetrieveActiveSessions.py 10 from autotest_lib.client.cros import cros_ui, cryptohome namespace
28 cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
  /external/autotest/client/site_tests/login_SameSessionTwice/
login_SameSessionTwice.py 11 from autotest_lib.client.cros import cros_ui, cryptohome namespace
30 cryptohome.CryptohomeProxy(bus_loop).ensure_clean_cryptohome_for(user)
  /external/autotest/client/site_tests/platform_CryptohomeNonDirs/
platform_CryptohomeNonDirs.py 9 from autotest_lib.client.cros import cryptohome namespace
31 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
35 path = cryptohome.user_path(user)
44 path = cryptohome.system_path(user)
53 path = cryptohome.user_path(user)
66 path = cryptohome.system_path(user)
  /external/autotest/client/site_tests/platform_CryptohomeTestAuth/
platform_CryptohomeTestAuth.py 12 from autotest_lib.client.cros import constants, cryptohome namespace
22 user_hash = cryptohome.get_user_hash(test_user)
26 cryptohome.unmount_vault(test_user)
27 cryptohome.remove_vault(test_user)
33 cryptohome.mount_vault(test_user, test_password, create=True)
36 if not cryptohome.test_auth(test_user, test_password):
41 if cryptohome.test_auth(test_user, 'badpass'):
46 cryptohome.unmount_vault(test_user)
48 if cryptohome.is_vault_mounted(user=test_user, allow_fail=True):
49 raise error.TestFail('Cryptohome did not unmount the user.'
    [all...]
  /external/autotest/client/site_tests/security_ProfilePermissions/
security_ProfilePermissions.py 13 from autotest_lib.client.cros import constants, cryptohome namespace
52 else cryptohome.GUEST_USER_NAME)
54 """Check permissions within cryptohome for anything too permissive.
61 user_mountpt = cryptohome.user_path(username)
115 if cryptohome.is_vault_mounted(
120 vaultpath = cryptohome.get_mounted_vault_devices(username)[0]
132 'Bad permissions found on cryptohome files')
  /external/autotest/client/site_tests/login_GuestAndActualSession/
login_GuestAndActualSession.py 12 from autotest_lib.client.cros import constants, cros_ui, cryptohome, ownership namespace
37 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
44 cryptohome.mount_guest()
  /external/autotest/client/site_tests/login_MultiUserPolicy/
login_MultiUserPolicy.py 11 from autotest_lib.client.cros import cryptohome, ownership namespace
37 cryptohome_proxy = cryptohome.CryptohomeProxy(self._bus_loop)
  /external/autotest/client/site_tests/login_MultipleSessions/
login_MultipleSessions.py 11 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace
36 self._cryptohome_proxy = cryptohome.CryptohomeProxy(self._bus_loop)
56 # Destroy the owner's cryptohome and start sessions again in a
73 Make a fresh cryptohome for user, and then start a session for him
  /external/autotest/client/site_tests/login_OwnershipNotRetaken/
login_OwnershipNotRetaken.py 11 from autotest_lib.client.cros import constants, cryptohome, ownership namespace
29 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
  /external/autotest/client/site_tests/login_RemoteOwnership/
login_RemoteOwnership.py 11 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace
32 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)

Completed in 761 milliseconds

1 2