/external/cros/system_api/constants/ |
cryptohome.h | 10 namespace cryptohome { namespace 15 } // namespace cryptohome
|
/external/autotest/client/site_tests/platform_CryptohomeTestAuth/ |
platform_CryptohomeTestAuth.py | 12 from autotest_lib.client.cros import constants, cryptohome namespace 22 user_hash = cryptohome.get_user_hash(test_user) 26 cryptohome.unmount_vault(test_user) 27 cryptohome.remove_vault(test_user) 33 cryptohome.mount_vault(test_user, test_password, create=True) 36 if not cryptohome.test_auth(test_user, test_password): 41 if cryptohome.test_auth(test_user, 'badpass'): 46 cryptohome.unmount_vault(test_user) 48 if cryptohome.is_vault_mounted(user=test_user, allow_fail=True): 49 raise error.TestFail('Cryptohome did not unmount the user.' [all...] |
/external/autotest/client/site_tests/platform_Attestation/ |
platform_Attestation.py | 7 from autotest_lib.client.cros import cryptohome namespace 14 utils.system(cryptohome.CRYPTOHOME_CMD + 22 utils.system(cryptohome.CRYPTOHOME_CMD + 27 utils.system(cryptohome.CRYPTOHOME_CMD + 34 utils.system(cryptohome.CRYPTOHOME_CMD + 40 status = cryptohome.get_tpm_attestation_status() 44 status = cryptohome.get_tpm_attestation_status()
|
/external/autotest/client/site_tests/login_Cryptohome/ |
login_Cryptohome.py | 10 from autotest_lib.client.cros import cryptohome namespace 16 """Verify the cryptohome is mounted only after login.""" 24 if not cryptohome.is_vault_mounted(user=username, 28 if cryptohome.is_vault_mounted(user=username, 35 cryptohome.remove_vault(username) 37 cryptohome.mount_vault(TEST_USER, TEST_PASS, create=True) 38 test_file = os.path.join(cryptohome.user_path(TEST_USER), 'hello') 40 cryptohome.unmount_vault(TEST_USER) 43 if not cryptohome.is_vault_mounted(user=username,
|
/external/autotest/client/site_tests/platform_BootLockbox/ |
platform_BootLockbox.py | 9 from autotest_lib.client.cros import cryptohome namespace 36 status = cryptohome.get_tpm_status() 40 cryptohome.take_tpm_ownership() 41 status = cryptohome.get_tpm_status() 46 return utils.system(cryptohome.CRYPTOHOME_CMD + 51 return utils.system(cryptohome.CRYPTOHOME_CMD + 56 utils.system(cryptohome.CRYPTOHOME_CMD + ' --action=finalize_lockbox') 59 return utils.system(cryptohome.CRYPTOHOME_CMD + 64 utils.system(cryptohome.CRYPTOHOME_CMD + 68 return utils.system(cryptohome.CRYPTOHOME_CMD [all...] |
/external/autotest/client/site_tests/login_CryptohomeIncognito/ |
login_CryptohomeIncognito.py | 10 from autotest_lib.client.cros import cryptohome namespace 18 if not cryptohome.is_guest_vault_mounted(): 22 if cryptohome.is_guest_vault_mounted(allow_fail=True):
|
/external/autotest/client/site_tests/platform_CryptohomeBadPerms/ |
platform_CryptohomeBadPerms.py | 9 from autotest_lib.client.cros import cryptohome namespace 20 self.cryptohome_proxy = cryptohome.CryptohomeProxy() 24 path = cryptohome.user_path(user) 34 path = cryptohome.system_path(user) 45 path = cryptohome.user_path(user) 56 path = cryptohome.user_path(user) 66 path = cryptohome.user_path(user)
|
/external/autotest/client/site_tests/platform_CryptohomeKeyEviction/ |
platform_CryptohomeKeyEviction.py | 7 from autotest_lib.client.cros import cryptohome, pkcs11 namespace 10 """Ensure that the cryptohome properly manages key eviction from the tpm. 12 and then remounting a user's cryptohome. Mount requires use of the 13 user's cryptohome key, and thus the mount only succeeds if the 14 cryptohome key was properly evicted and reloaded into the TPM. 21 self._cryptohome_proxy = cryptohome.CryptohomeProxy() 29 # First we inject 30 tokens into chaps. This forces the cryptohome 34 # Then we get a user to remount his cryptohome. This process uses 35 # the cryptohome key, and if the user was able to login, the 36 # cryptohome key was correctly reloaded [all...] |
/external/autotest/client/site_tests/platform_CryptohomeMount/ |
platform_CryptohomeMount.py | 7 from autotest_lib.client.cros import cryptohome namespace 10 """Validates basic cryptohome creation and mounting.""" 18 user_hash = cryptohome.get_user_hash(test_user) 19 proxy = cryptohome.CryptohomeProxy() 34 raise error.TestFail('Cryptohome mounted after unmount!') 39 raise error.TestFail('Cryptohome mounted with a bad password.') 42 raise error.TestFail('Cryptohome mounted even though mount() failed') 46 raise error.TestFail('Cryptohome could not clean up vault')
|
/external/autotest/client/site_tests/platform_CryptohomeNonDirs/ |
platform_CryptohomeNonDirs.py | 9 from autotest_lib.client.cros import cryptohome namespace 31 self.cryptohome_proxy = cryptohome.CryptohomeProxy() 35 path = cryptohome.user_path(user) 44 path = cryptohome.system_path(user) 53 path = cryptohome.user_path(user) 66 path = cryptohome.system_path(user)
|
/external/autotest/client/site_tests/platform_CryptohomeSyncStress/ |
platform_CryptohomeSyncStress.py | 18 # make sure cryptohome is mounted 20 proxy = bus.get_object('org.chromium.Cryptohome', 21 '/org/chromium/Cryptohome') 22 cryptohome = dbus.Interface(proxy, 'org.chromium.CryptohomeInterface') 24 ismounted = cryptohome.IsMounted() 26 raise error.TestFail('Cryptohome failed to mount.')
|
/external/autotest/client/site_tests/login_CryptohomeOwnerQuery/ |
login_CryptohomeOwnerQuery.py | 14 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace 17 """Verify that the cryptohome owner user query works properly.""" 32 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop) 38 if cryptohome.get_login_status()['owner_user_exists']: 47 if not cryptohome.get_login_status()['owner_user_exists']:
|
/external/autotest/client/site_tests/platform_CryptohomeMigrateChapsTokenClient/ |
platform_CryptohomeMigrateChapsTokenClient.py | 7 from autotest_lib.client.cros import cryptohome, pkcs11 namespace 20 self._cryptohome_proxy = cryptohome.CryptohomeProxy() 38 raise error.TestFail('Unable to remount users cryptohome')
|
/external/autotest/client/site_tests/platform_CryptohomeMultiple/ |
platform_CryptohomeMultiple.py | 7 from autotest_lib.client.cros import cryptohome namespace 15 Tests mounting a single not-already-existing cryptohome. Ensures that 26 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
|
/external/autotest/client/site_tests/platform_CryptohomeFio/ |
platform_CryptohomeFio.py | 8 from autotest_lib.client.cros import cryptohome namespace 47 # Mount a test cryptohome vault. 49 cryptohome.mount_vault(TEST_USER, TEST_PASSWORD, 51 tmpdir = cryptohome.user_path(TEST_USER) 75 cryptohome.unmount_vault(TEST_USER) 76 cryptohome.remove_vault(TEST_USER)
|
/external/autotest/client/site_tests/security_ProfilePermissions/ |
security_ProfilePermissions.py | 13 from autotest_lib.client.cros import constants, cryptohome namespace 52 else cryptohome.GUEST_USER_NAME) 54 """Check permissions within cryptohome for anything too permissive. 61 user_mountpt = cryptohome.user_path(username) 115 if cryptohome.is_vault_mounted( 120 vaultpath = cryptohome.get_mounted_vault_devices(username)[0] 132 'Bad permissions found on cryptohome files')
|
/external/autotest/client/site_tests/login_GuestAndActualSession/ |
login_GuestAndActualSession.py | 12 from autotest_lib.client.cros import constants, cros_ui, cryptohome, ownership namespace 37 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop) 44 cryptohome.mount_guest()
|
/external/autotest/client/site_tests/login_GaiaLogin/ |
login_GaiaLogin.py | 7 from autotest_lib.client.cros import cryptohome namespace 31 if not cryptohome.is_vault_mounted(user=self._USERNAME):
|
/external/autotest/client/site_tests/login_RetrieveActiveSessions/ |
login_RetrieveActiveSessions.py | 10 from autotest_lib.client.cros import cros_ui, cryptohome namespace 28 cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
|
/external/autotest/client/site_tests/login_SameSessionTwice/ |
login_SameSessionTwice.py | 11 from autotest_lib.client.cros import cros_ui, cryptohome namespace 30 cryptohome.CryptohomeProxy(bus_loop).ensure_clean_cryptohome_for(user)
|
/external/autotest/client/cros/ |
login.py | 7 import constants, cros_logging, cros_ui, cryptohome namespace 109 """Wait until cryptohome is mounted. 111 @param user: the user whose cryptohome the caller wants to wait for. 114 @raise: TimeoutError: cryptohome wasn't mounted before timeout 117 condition=lambda: cryptohome.is_vault_mounted(user), 118 timeout_msg='Timed out waiting for cryptohome to be mounted',
|
cryptohome.py | 13 CRYPTOHOME_CMD = '/usr/sbin/cryptohome' 27 return utils.system_output(['cryptohome', '--action=obfuscate_user', 33 return utils.system_output(['cryptohome-path', 'user', user]) 38 return utils.system_output(['cryptohome-path', 'system', user]) 42 """Ensure a fresh cryptohome exists for user. 44 @param user: user who needs a shiny new cryptohome. 185 raise ChromiumOSError('Cryptohome could not remove the user\'s vault.') 210 raise ChromiumOSError('Cryptohome vault not found after mount.') 216 raise ChromiumOSError('Cryptohome created a vault but did not mount.') 225 raise ChromiumOSError('Cryptohome did not mount tmpfs.' [all...] |
/external/autotest/client/site_tests/enterprise_PowerManagement/ |
enterprise_PowerManagement.py | 9 from autotest_lib.client.cros import cryptohome namespace 95 lambda: not cryptohome.is_vault_mounted(user=self.USERNAME,
|
/external/autotest/client/site_tests/login_OwnershipNotRetaken/ |
login_OwnershipNotRetaken.py | 11 from autotest_lib.client.cros import constants, cryptohome, ownership namespace 29 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
|
/external/autotest/client/site_tests/platform_CryptohomeMigrateKey/ |
platform_CryptohomeMigrateKey.py | 7 from autotest_lib.client.cros import cryptohome namespace 51 self.proxy = cryptohome.CryptohomeProxy()
|