HomeSort by relevance Sort by last modified time
    Searched refs:cryptohome (Results 1 - 25 of 41) sorted by null

1 2

  /external/cros/system_api/constants/
cryptohome.h 10 namespace cryptohome { namespace
15 } // namespace cryptohome
  /external/autotest/client/site_tests/platform_CryptohomeTestAuth/
platform_CryptohomeTestAuth.py 12 from autotest_lib.client.cros import constants, cryptohome namespace
22 user_hash = cryptohome.get_user_hash(test_user)
26 cryptohome.unmount_vault(test_user)
27 cryptohome.remove_vault(test_user)
33 cryptohome.mount_vault(test_user, test_password, create=True)
36 if not cryptohome.test_auth(test_user, test_password):
41 if cryptohome.test_auth(test_user, 'badpass'):
46 cryptohome.unmount_vault(test_user)
48 if cryptohome.is_vault_mounted(user=test_user, allow_fail=True):
49 raise error.TestFail('Cryptohome did not unmount the user.'
    [all...]
  /external/autotest/client/site_tests/platform_Attestation/
platform_Attestation.py 7 from autotest_lib.client.cros import cryptohome namespace
14 utils.system(cryptohome.CRYPTOHOME_CMD +
22 utils.system(cryptohome.CRYPTOHOME_CMD +
27 utils.system(cryptohome.CRYPTOHOME_CMD +
34 utils.system(cryptohome.CRYPTOHOME_CMD +
40 status = cryptohome.get_tpm_attestation_status()
44 status = cryptohome.get_tpm_attestation_status()
  /external/autotest/client/site_tests/login_Cryptohome/
login_Cryptohome.py 10 from autotest_lib.client.cros import cryptohome namespace
16 """Verify the cryptohome is mounted only after login."""
24 if not cryptohome.is_vault_mounted(user=username,
28 if cryptohome.is_vault_mounted(user=username,
35 cryptohome.remove_vault(username)
37 cryptohome.mount_vault(TEST_USER, TEST_PASS, create=True)
38 test_file = os.path.join(cryptohome.user_path(TEST_USER), 'hello')
40 cryptohome.unmount_vault(TEST_USER)
43 if not cryptohome.is_vault_mounted(user=username,
  /external/autotest/client/site_tests/platform_BootLockbox/
platform_BootLockbox.py 9 from autotest_lib.client.cros import cryptohome namespace
36 status = cryptohome.get_tpm_status()
40 cryptohome.take_tpm_ownership()
41 status = cryptohome.get_tpm_status()
46 return utils.system(cryptohome.CRYPTOHOME_CMD +
51 return utils.system(cryptohome.CRYPTOHOME_CMD +
56 utils.system(cryptohome.CRYPTOHOME_CMD + ' --action=finalize_lockbox')
59 return utils.system(cryptohome.CRYPTOHOME_CMD +
64 utils.system(cryptohome.CRYPTOHOME_CMD +
68 return utils.system(cryptohome.CRYPTOHOME_CMD
    [all...]
  /external/autotest/client/site_tests/login_CryptohomeIncognito/
login_CryptohomeIncognito.py 10 from autotest_lib.client.cros import cryptohome namespace
18 if not cryptohome.is_guest_vault_mounted():
22 if cryptohome.is_guest_vault_mounted(allow_fail=True):
  /external/autotest/client/site_tests/platform_CryptohomeBadPerms/
platform_CryptohomeBadPerms.py 9 from autotest_lib.client.cros import cryptohome namespace
20 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
24 path = cryptohome.user_path(user)
34 path = cryptohome.system_path(user)
45 path = cryptohome.user_path(user)
56 path = cryptohome.user_path(user)
66 path = cryptohome.user_path(user)
  /external/autotest/client/site_tests/platform_CryptohomeKeyEviction/
platform_CryptohomeKeyEviction.py 7 from autotest_lib.client.cros import cryptohome, pkcs11 namespace
10 """Ensure that the cryptohome properly manages key eviction from the tpm.
12 and then remounting a user's cryptohome. Mount requires use of the
13 user's cryptohome key, and thus the mount only succeeds if the
14 cryptohome key was properly evicted and reloaded into the TPM.
21 self._cryptohome_proxy = cryptohome.CryptohomeProxy()
29 # First we inject 30 tokens into chaps. This forces the cryptohome
34 # Then we get a user to remount his cryptohome. This process uses
35 # the cryptohome key, and if the user was able to login, the
36 # cryptohome key was correctly reloaded
    [all...]
  /external/autotest/client/site_tests/platform_CryptohomeMount/
platform_CryptohomeMount.py 7 from autotest_lib.client.cros import cryptohome namespace
10 """Validates basic cryptohome creation and mounting."""
18 user_hash = cryptohome.get_user_hash(test_user)
19 proxy = cryptohome.CryptohomeProxy()
34 raise error.TestFail('Cryptohome mounted after unmount!')
39 raise error.TestFail('Cryptohome mounted with a bad password.')
42 raise error.TestFail('Cryptohome mounted even though mount() failed')
46 raise error.TestFail('Cryptohome could not clean up vault')
  /external/autotest/client/site_tests/platform_CryptohomeNonDirs/
platform_CryptohomeNonDirs.py 9 from autotest_lib.client.cros import cryptohome namespace
31 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
35 path = cryptohome.user_path(user)
44 path = cryptohome.system_path(user)
53 path = cryptohome.user_path(user)
66 path = cryptohome.system_path(user)
  /external/autotest/client/site_tests/platform_CryptohomeSyncStress/
platform_CryptohomeSyncStress.py 18 # make sure cryptohome is mounted
20 proxy = bus.get_object('org.chromium.Cryptohome',
21 '/org/chromium/Cryptohome')
22 cryptohome = dbus.Interface(proxy, 'org.chromium.CryptohomeInterface')
24 ismounted = cryptohome.IsMounted()
26 raise error.TestFail('Cryptohome failed to mount.')
  /external/autotest/client/site_tests/login_CryptohomeOwnerQuery/
login_CryptohomeOwnerQuery.py 14 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace
17 """Verify that the cryptohome owner user query works properly."""
32 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
38 if cryptohome.get_login_status()['owner_user_exists']:
47 if not cryptohome.get_login_status()['owner_user_exists']:
  /external/autotest/client/site_tests/platform_CryptohomeMigrateChapsTokenClient/
platform_CryptohomeMigrateChapsTokenClient.py 7 from autotest_lib.client.cros import cryptohome, pkcs11 namespace
20 self._cryptohome_proxy = cryptohome.CryptohomeProxy()
38 raise error.TestFail('Unable to remount users cryptohome')
  /external/autotest/client/site_tests/platform_CryptohomeMultiple/
platform_CryptohomeMultiple.py 7 from autotest_lib.client.cros import cryptohome namespace
15 Tests mounting a single not-already-existing cryptohome. Ensures that
26 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
  /external/autotest/client/site_tests/platform_CryptohomeFio/
platform_CryptohomeFio.py 8 from autotest_lib.client.cros import cryptohome namespace
47 # Mount a test cryptohome vault.
49 cryptohome.mount_vault(TEST_USER, TEST_PASSWORD,
51 tmpdir = cryptohome.user_path(TEST_USER)
75 cryptohome.unmount_vault(TEST_USER)
76 cryptohome.remove_vault(TEST_USER)
  /external/autotest/client/site_tests/security_ProfilePermissions/
security_ProfilePermissions.py 13 from autotest_lib.client.cros import constants, cryptohome namespace
52 else cryptohome.GUEST_USER_NAME)
54 """Check permissions within cryptohome for anything too permissive.
61 user_mountpt = cryptohome.user_path(username)
115 if cryptohome.is_vault_mounted(
120 vaultpath = cryptohome.get_mounted_vault_devices(username)[0]
132 'Bad permissions found on cryptohome files')
  /external/autotest/client/site_tests/login_GuestAndActualSession/
login_GuestAndActualSession.py 12 from autotest_lib.client.cros import constants, cros_ui, cryptohome, ownership namespace
37 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
44 cryptohome.mount_guest()
  /external/autotest/client/site_tests/login_GaiaLogin/
login_GaiaLogin.py 7 from autotest_lib.client.cros import cryptohome namespace
31 if not cryptohome.is_vault_mounted(user=self._USERNAME):
  /external/autotest/client/site_tests/login_RetrieveActiveSessions/
login_RetrieveActiveSessions.py 10 from autotest_lib.client.cros import cros_ui, cryptohome namespace
28 cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
  /external/autotest/client/site_tests/login_SameSessionTwice/
login_SameSessionTwice.py 11 from autotest_lib.client.cros import cros_ui, cryptohome namespace
30 cryptohome.CryptohomeProxy(bus_loop).ensure_clean_cryptohome_for(user)
  /external/autotest/client/cros/
login.py 7 import constants, cros_logging, cros_ui, cryptohome namespace
109 """Wait until cryptohome is mounted.
111 @param user: the user whose cryptohome the caller wants to wait for.
114 @raise: TimeoutError: cryptohome wasn't mounted before timeout
117 condition=lambda: cryptohome.is_vault_mounted(user),
118 timeout_msg='Timed out waiting for cryptohome to be mounted',
cryptohome.py 13 CRYPTOHOME_CMD = '/usr/sbin/cryptohome'
27 return utils.system_output(['cryptohome', '--action=obfuscate_user',
33 return utils.system_output(['cryptohome-path', 'user', user])
38 return utils.system_output(['cryptohome-path', 'system', user])
42 """Ensure a fresh cryptohome exists for user.
44 @param user: user who needs a shiny new cryptohome.
185 raise ChromiumOSError('Cryptohome could not remove the user\'s vault.')
210 raise ChromiumOSError('Cryptohome vault not found after mount.')
216 raise ChromiumOSError('Cryptohome created a vault but did not mount.')
225 raise ChromiumOSError('Cryptohome did not mount tmpfs.'
    [all...]
  /external/autotest/client/site_tests/enterprise_PowerManagement/
enterprise_PowerManagement.py 9 from autotest_lib.client.cros import cryptohome namespace
95 lambda: not cryptohome.is_vault_mounted(user=self.USERNAME,
  /external/autotest/client/site_tests/login_OwnershipNotRetaken/
login_OwnershipNotRetaken.py 11 from autotest_lib.client.cros import constants, cryptohome, ownership namespace
29 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
  /external/autotest/client/site_tests/platform_CryptohomeMigrateKey/
platform_CryptohomeMigrateKey.py 7 from autotest_lib.client.cros import cryptohome namespace
51 self.proxy = cryptohome.CryptohomeProxy()

Completed in 680 milliseconds

1 2