HomeSort by relevance Sort by last modified time
    Searched refs:cryptohome (Results 1 - 25 of 44) sorted by null

1 2

  /external/cros/system_api/constants/
cryptohome.h 10 namespace cryptohome { namespace
15 } // namespace cryptohome
  /external/autotest/client/site_tests/platform_CryptohomeTestAuth/
platform_CryptohomeTestAuth.py 12 from autotest_lib.client.cros import constants, cryptohome
22 user_hash = cryptohome.get_user_hash(test_user)
26 cryptohome.unmount_vault(test_user)
27 cryptohome.remove_vault(test_user)
33 cryptohome.mount_vault(test_user, test_password, create=True)
36 if not cryptohome.test_auth(test_user, test_password):
41 if cryptohome.test_auth(test_user, 'badpass'):
46 cryptohome.unmount_vault(test_user)
48 if cryptohome.is_vault_mounted(user=test_user, allow_fail=True):
49 raise error.TestFail('Cryptohome did not unmount the user.'
    [all...]
  /external/autotest/client/site_tests/platform_Attestation/
platform_Attestation.py 7 from autotest_lib.client.cros import cryptohome
14 utils.system(cryptohome.CRYPTOHOME_CMD +
22 utils.system(cryptohome.CRYPTOHOME_CMD +
27 utils.system(cryptohome.CRYPTOHOME_CMD +
34 utils.system(cryptohome.CRYPTOHOME_CMD +
40 status = cryptohome.get_tpm_attestation_status()
44 status = cryptohome.get_tpm_attestation_status()
  /external/autotest/client/site_tests/login_Cryptohome/
login_Cryptohome.py 10 from autotest_lib.client.cros import cryptohome
16 """Verify the cryptohome is mounted only after login."""
24 if not cryptohome.is_permanent_vault_mounted(username):
27 if cryptohome.is_vault_mounted(user=username,
34 cryptohome.remove_vault(username)
36 cryptohome.mount_vault(TEST_USER, TEST_PASS, create=True)
37 test_file = os.path.join(cryptohome.user_path(TEST_USER), 'hello')
39 cryptohome.unmount_vault(TEST_USER)
42 if not cryptohome.is_permanent_vault_mounted(username):
47 cryptohome.remove_vault(TEST_USER
    [all...]
  /external/autotest/client/site_tests/platform_CryptohomeKeyEviction/
platform_CryptohomeKeyEviction.py 7 from autotest_lib.client.cros import cryptohome, pkcs11
10 """Ensure that the cryptohome properly manages key eviction from the tpm.
12 and then remounting a user's cryptohome. Mount requires use of the
13 user's cryptohome key, and thus the mount only succeeds if the
14 cryptohome key was properly evicted and reloaded into the TPM.
21 self._cryptohome_proxy = cryptohome.CryptohomeProxy()
26 status = cryptohome.get_tpm_status()
28 cryptohome.take_tpm_ownership()
34 # First we inject 30 tokens into chaps. This forces the cryptohome
39 # Then we get a user to remount his cryptohome. This process use
    [all...]
  /external/autotest/client/site_tests/platform_BootLockbox/
platform_BootLockbox.py 9 from autotest_lib.client.cros import cryptohome
36 status = cryptohome.get_tpm_status()
40 cryptohome.take_tpm_ownership()
41 status = cryptohome.get_tpm_status()
46 return utils.system(cryptohome.CRYPTOHOME_CMD +
51 return utils.system(cryptohome.CRYPTOHOME_CMD +
56 utils.system(cryptohome.CRYPTOHOME_CMD + ' --action=finalize_lockbox')
59 return utils.system(cryptohome.CRYPTOHOME_CMD +
64 utils.system(cryptohome.CRYPTOHOME_CMD +
68 return utils.system(cryptohome.CRYPTOHOME_CMD
    [all...]
  /external/autotest/client/site_tests/firmware_SetFWMP/
firmware_SetFWMP.py 10 from autotest_lib.client.cros import cryptohome
19 cryptohome.take_tpm_ownership()
21 status = cryptohome.get_tpm_status()
29 cryptohome.get_fwmp(fwmp_cleared)
30 status = cryptohome.get_tpm_status()
42 cryptohome.set_fwmp(flags, dev_key_hash)
45 fwmp = cryptohome.get_fwmp()
  /external/autotest/client/site_tests/login_CryptohomeIncognito/
login_CryptohomeIncognito.py 10 from autotest_lib.client.cros import cryptohome
18 if not cryptohome.is_guest_vault_mounted():
22 if cryptohome.is_guest_vault_mounted(allow_fail=True):
  /external/autotest/client/site_tests/platform_CryptohomeMount/
platform_CryptohomeMount.py 7 from autotest_lib.client.cros import cryptohome
10 """Validates basic cryptohome creation and mounting."""
18 user_hash = cryptohome.get_user_hash(test_user)
19 proxy = cryptohome.CryptohomeProxy()
34 raise error.TestFail('Cryptohome mounted after unmount!')
39 raise error.TestFail('Cryptohome mounted with a bad password.')
42 raise error.TestFail('Cryptohome mounted even though mount() failed')
46 raise error.TestFail('Cryptohome could not clean up vault')
  /external/autotest/client/site_tests/platform_CryptohomeNonDirs/
platform_CryptohomeNonDirs.py 9 from autotest_lib.client.cros import cryptohome
31 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
35 path = cryptohome.user_path(user)
44 path = cryptohome.system_path(user)
53 path = cryptohome.user_path(user)
66 path = cryptohome.system_path(user)
  /external/autotest/client/site_tests/login_CryptohomeOwnerQuery/
login_CryptohomeOwnerQuery.py 14 from autotest_lib.client.cros import cros_ui, cryptohome, ownership
17 """Verify that the cryptohome owner user query works properly."""
32 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
38 if cryptohome.get_login_status()['owner_user_exists']:
46 if not cryptohome.get_login_status()['owner_user_exists']:
  /external/autotest/client/site_tests/platform_CryptohomeMigrateChapsTokenClient/
platform_CryptohomeMigrateChapsTokenClient.py 7 from autotest_lib.client.cros import cryptohome, pkcs11
20 self._cryptohome_proxy = cryptohome.CryptohomeProxy()
28 status = cryptohome.get_tpm_status()
30 cryptohome.take_tpm_ownership()
43 raise error.TestFail('Unable to remount users cryptohome')
  /external/autotest/client/site_tests/platform_CryptohomeBadPerms/
platform_CryptohomeBadPerms.py 9 from autotest_lib.client.cros import cryptohome
12 """Tests Cryptohome's ability to detect directories with bad permissions or
27 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
31 path = cryptohome.user_path(user)
41 path = cryptohome.system_path(user)
52 path = cryptohome.user_path(user)
63 path = cryptohome.user_path(user)
73 path = cryptohome.user_path(user)
  /external/autotest/client/site_tests/platform_CryptohomeMultiple/
platform_CryptohomeMultiple.py 7 from autotest_lib.client.cros import cryptohome
15 Tests mounting a single not-already-existing cryptohome. Ensures that
26 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
  /external/autotest/client/site_tests/platform_CryptohomeSyncStress/
platform_CryptohomeSyncStress.py 20 # make sure cryptohome is mounted
22 proxy = bus.get_object('org.chromium.Cryptohome',
23 '/org/chromium/Cryptohome')
24 cryptohome = dbus.Interface(proxy, 'org.chromium.CryptohomeInterface')
26 ismounted = cryptohome.IsMounted()
28 raise error.TestFail('Cryptohome failed to mount.')
  /external/autotest/client/site_tests/platform_CryptohomeFio/
platform_CryptohomeFio.py 8 from autotest_lib.client.cros import cryptohome
52 # Mount a test cryptohome vault.
54 cryptohome.mount_vault(TEST_USER, TEST_PASSWORD,
56 tmpdir = cryptohome.user_path(TEST_USER)
79 cryptohome.unmount_vault(TEST_USER)
80 cryptohome.remove_vault(TEST_USER)
  /external/autotest/client/site_tests/security_ProfilePermissions/
security_ProfilePermissions.py 13 from autotest_lib.client.cros import cryptohome
52 else cryptohome.GUEST_USER_NAME)
54 """Check permissions within cryptohome for anything too permissive.
61 user_mountpt = cryptohome.user_path(username)
115 if cryptohome.is_permanent_vault_mounted(username):
118 mountpath = cryptohome.get_mounted_vault_path(username)
136 'Bad permissions found on cryptohome files')
  /external/autotest/client/site_tests/desktopui_ChromeSanity/
desktopui_ChromeSanity.py 13 from autotest_lib.client.cros import cryptohome
59 if not cryptohome.is_vault_mounted(user=cr.username,
62 'Didn\'t find mounted cryptohome for "%s"' %
  /external/autotest/client/site_tests/login_GuestAndActualSession/
login_GuestAndActualSession.py 12 from autotest_lib.client.cros import constants, cros_ui, cryptohome, ownership
37 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
44 cryptohome.mount_guest()
  /external/autotest/client/bin/
vm_sanity.py 9 This script logs in, ensures that the cryptohome is mounted,
25 from autotest_lib.client.cros import cryptohome
40 # Check that the cryptohome is mounted.
42 logging.info('Checking mounted cryptohome.')
43 cryptohome.is_vault_mounted(user=cr.username, allow_fail=False)
  /external/autotest/client/site_tests/login_GaiaLogin/
login_GaiaLogin.py 7 from autotest_lib.client.cros import cryptohome
32 if not cryptohome.is_vault_mounted(user=chrome.NormalizeEmail(username)):
  /external/autotest/client/site_tests/login_RetrieveActiveSessions/
login_RetrieveActiveSessions.py 10 from autotest_lib.client.cros import cros_ui, cryptohome
28 cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
  /external/autotest/client/site_tests/login_SameSessionTwice/
login_SameSessionTwice.py 11 from autotest_lib.client.cros import cros_ui, cryptohome
30 cryptohome.CryptohomeProxy(bus_loop).ensure_clean_cryptohome_for(user)
  /external/autotest/client/cros/
login.py 7 import constants, cros_logging, cros_ui, cryptohome
109 """Wait until cryptohome is mounted.
111 @param user: the user whose cryptohome the caller wants to wait for.
114 @raise: TimeoutError: cryptohome wasn't mounted before timeout
117 condition=lambda: cryptohome.is_vault_mounted(user),
118 timeout_msg='Timed out waiting for cryptohome to be mounted',
  /external/autotest/client/site_tests/login_OwnershipNotRetaken/
login_OwnershipNotRetaken.py 11 from autotest_lib.client.cros import constants, cryptohome, ownership
29 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)

Completed in 612 milliseconds

1 2