/external/autotest/client/site_tests/login_CryptohomeOwnerQuery/ |
login_CryptohomeOwnerQuery.py | 6 # similar ownership clearing/checking tasks. 14 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace 24 ownership.restart_ui_to_clear_ownership_files() 45 self._listener.wait_for_signals(desc='Device ownership complete.')
|
/external/autotest/client/common_lib/cros/ |
policy.py | 10 from autotest_lib.client.cros import ownership namespace 54 ownership.assert_has_policy_data(response_proto) 58 ownership.assert_has_device_settings(data_proto) 59 if owner: ownership.assert_username(data_proto, owner) 63 if guests: ownership.assert_guest_setting(settings, guests) 64 if new_users: ownership.assert_show_users(settings, new_users) 65 if roaming: ownership.assert_roaming(settings, roaming) 67 ownership.assert_new_users(settings, False) 68 ownership.assert_users_on_whitelist(settings, whitelist) 69 if proxies: ownership.assert_proxy_settings(settings, proxies [all...] |
/external/autotest/client/site_tests/login_GuestAndActualSession/ |
login_GuestAndActualSession.py | 12 from autotest_lib.client.cros import constants, cros_ui, cryptohome, ownership namespace 16 """Ensure that the session_manager correctly handles ownership when a guest 29 ownership.restart_ui_to_clear_ownership_files() 52 self._listener.wait_for_signals(desc='Device ownership complete.')
|
/external/autotest/client/site_tests/login_MultiUserPolicy/ |
login_MultiUserPolicy.py | 11 from autotest_lib.client.cros import cryptohome, ownership namespace 36 ownership.restart_ui_to_clear_ownership_files() 56 public_key = ownership.known_pubkey() 57 private_key = ownership.known_privkey()
|
/external/autotest/client/site_tests/login_MultipleSessions/ |
login_MultipleSessions.py | 11 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace 28 ownership.restart_ui_to_clear_ownership_files() 61 self._listener.wait_for_signals(desc='Re-taking of ownership complete.')
|
/external/autotest/client/site_tests/login_OwnershipNotRetaken/ |
login_OwnershipNotRetaken.py | 11 from autotest_lib.client.cros import constants, cryptohome, ownership namespace 25 # Start clean, wrt ownership and the desired user. 26 ownership.restart_ui_to_clear_ownership_files()
|
/external/autotest/client/site_tests/login_RemoteOwnership/ |
login_RemoteOwnership.py | 11 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace 15 """Tests to ensure that the Ownership API can be used, as an 27 # Start with a clean slate wrt ownership 28 ownership.restart_ui_to_clear_ownership_files() 39 priv = ownership.known_privkey() 40 pub = ownership.known_pubkey() 45 (priv, pub) = ownership.pairgen_as_data() 56 (new_priv, new_pub) = ownership.pairgen_as_data()
|
/external/autotest/client/site_tests/platform_SessionManagerBlockDevmodeSetting/ |
platform_SessionManagerBlockDevmodeSetting.py | 11 from autotest_lib.client.cros import constants, cros_ui, ownership namespace 35 ownership.restart_ui_to_clear_ownership_files() 54 # Test whether the flag gets reset when taking ownership. 58 listener.wait_for_signals(desc='Ownership files written to disk.') 61 "Flag not clear after ownership got established.")
|
/external/autotest/client/site_tests/login_OwnershipApi/ |
login_OwnershipApi.py | 11 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace 15 """Tests to ensure that the Ownership API works for a local device owner. 31 # Clear existing ownership and inject known keys. 33 ownership.clear_ownership_files_no_restart() 35 # Make device already owned by ownership.TESTUSER. 36 self._cryptohome_proxy.mount(ownership.TESTUSER, 37 ownership.TESTPASS, 39 ownership.use_known_ownerkeys(ownership.TESTUSER) 54 pkey = ownership.known_privkey( [all...] |
/external/autotest/client/site_tests/login_OwnershipRetaken/ |
login_OwnershipRetaken.py | 11 from autotest_lib.client.cros import constants, cros_ui, cryptohome, ownership namespace 15 """"Ensure that ownership is re-taken upon loss of owner's cryptohome.""" 29 # Start clean, wrt ownership and the desired user. 30 ownership.restart_ui_to_clear_ownership_files() 34 self._cryptohome_proxy.remove(ownership.TESTUSER) 40 pkey = ownership.known_privkey() 41 pubkey = ownership.known_pubkey() 45 owner=ownership.TESTUSER, 49 whitelist=(ownership.TESTUSER, 62 # Start a new session, which will trigger the re-taking of ownership [all...] |
/external/autotest/client/site_tests/login_OwnershipTaken/ |
login_OwnershipTaken.py | 11 from autotest_lib.client.cros import constants, ownership namespace 15 """Sign in and ensure that ownership of the device is taken.""" 26 ownership.restart_ui_to_clear_ownership_files() 29 raise error.TestError('Ownership already taken!') 42 ownership.assert_has_policy_data(response_proto) 46 ownership.assert_has_device_settings(poldata) 47 ownership.assert_username(poldata, username) 51 ownership.assert_new_users(polval, True) 52 ownership.assert_users_on_whitelist(polval, (username,))
|
/external/autotest/client/site_tests/login_UserPolicyKeys/ |
login_UserPolicyKeys.py | 11 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace 77 ownership.restart_ui_to_clear_ownership_files() 78 self._cryptohome_proxy.remove(ownership.TESTUSER) 83 self._cryptohome_proxy.mount(ownership.TESTUSER, 84 ownership.TESTPASS, 87 if not sm.StartSession(ownership.TESTUSER, ''): 91 retrieved_policy = sm.RetrievePolicyForUser(ownership.TESTUSER, 97 key_file = ownership.get_user_policy_key_filename(ownership.TESTUSER) 105 public_key = ownership.known_pubkey( [all...] |
/external/vboot_reference/firmware/include/ |
tss_constants.h | 66 TSS_BOOL ownership; member in struct:tdTPM_PERMANENT_FLAGS
|
/toolchain/binutils/binutils-2.25/gold/ |
fileread.cc | 490 View::Data_ownership ownership; local 498 ownership = View::DATA_ALLOCATED_ARRAY; 506 ownership = View::DATA_MMAPPED; 515 ownership = View::DATA_ALLOCATED_ARRAY; 521 cache, ownership);
|
/external/clang/lib/CodeGen/ |
CGExpr.cpp | 201 // If we are binding a reference to a temporary that has ownership, we 355 auto ownership = M->getType().getObjCLifetime(); local 356 if (ownership != Qualifiers::OCL_None && 357 ownership != Qualifiers::OCL_ExplicitNone) { [all...] |
/external/clang/lib/Sema/ |
SemaType.cpp | 395 // But don't move an ARC ownership attribute to the return type 4422 Qualifiers::ObjCLifetime ownership = Context.getInnerObjCOwnership(FromTy); local [all...] |