/external/cros/system_api/constants/ |
cryptohome.h | 10 namespace cryptohome { namespace 15 } // namespace cryptohome
|
/external/autotest/client/site_tests/platform_CryptohomeTestAuth/ |
platform_CryptohomeTestAuth.py | 12 from autotest_lib.client.cros import constants, cryptohome 22 user_hash = cryptohome.get_user_hash(test_user) 26 cryptohome.unmount_vault(test_user) 27 cryptohome.remove_vault(test_user) 33 cryptohome.mount_vault(test_user, test_password, create=True) 36 if not cryptohome.test_auth(test_user, test_password): 41 if cryptohome.test_auth(test_user, 'badpass'): 46 cryptohome.unmount_vault(test_user) 48 if cryptohome.is_vault_mounted(user=test_user, allow_fail=True): 49 raise error.TestFail('Cryptohome did not unmount the user.' [all...] |
/external/autotest/client/site_tests/platform_Attestation/ |
platform_Attestation.py | 7 from autotest_lib.client.cros import cryptohome 14 utils.system(cryptohome.CRYPTOHOME_CMD + 22 utils.system(cryptohome.CRYPTOHOME_CMD + 27 utils.system(cryptohome.CRYPTOHOME_CMD + 34 utils.system(cryptohome.CRYPTOHOME_CMD + 40 status = cryptohome.get_tpm_attestation_status() 44 status = cryptohome.get_tpm_attestation_status()
|
/external/autotest/client/site_tests/login_Cryptohome/ |
login_Cryptohome.py | 10 from autotest_lib.client.cros import cryptohome 16 """Verify the cryptohome is mounted only after login.""" 24 if not cryptohome.is_permanent_vault_mounted(username): 27 if cryptohome.is_vault_mounted(user=username, 34 cryptohome.remove_vault(username) 36 cryptohome.mount_vault(TEST_USER, TEST_PASS, create=True) 37 test_file = os.path.join(cryptohome.user_path(TEST_USER), 'hello') 39 cryptohome.unmount_vault(TEST_USER) 42 if not cryptohome.is_permanent_vault_mounted(username): 47 cryptohome.remove_vault(TEST_USER [all...] |
/external/autotest/client/site_tests/platform_CryptohomeKeyEviction/ |
platform_CryptohomeKeyEviction.py | 7 from autotest_lib.client.cros import cryptohome, pkcs11 10 """Ensure that the cryptohome properly manages key eviction from the tpm. 12 and then remounting a user's cryptohome. Mount requires use of the 13 user's cryptohome key, and thus the mount only succeeds if the 14 cryptohome key was properly evicted and reloaded into the TPM. 21 self._cryptohome_proxy = cryptohome.CryptohomeProxy() 26 status = cryptohome.get_tpm_status() 28 cryptohome.take_tpm_ownership() 34 # First we inject 30 tokens into chaps. This forces the cryptohome 39 # Then we get a user to remount his cryptohome. This process use [all...] |
/external/autotest/client/site_tests/platform_BootLockbox/ |
platform_BootLockbox.py | 9 from autotest_lib.client.cros import cryptohome 36 status = cryptohome.get_tpm_status() 40 cryptohome.take_tpm_ownership() 41 status = cryptohome.get_tpm_status() 46 return utils.system(cryptohome.CRYPTOHOME_CMD + 51 return utils.system(cryptohome.CRYPTOHOME_CMD + 56 utils.system(cryptohome.CRYPTOHOME_CMD + ' --action=finalize_lockbox') 59 return utils.system(cryptohome.CRYPTOHOME_CMD + 64 utils.system(cryptohome.CRYPTOHOME_CMD + 68 return utils.system(cryptohome.CRYPTOHOME_CMD [all...] |
/external/autotest/client/site_tests/firmware_SetFWMP/ |
firmware_SetFWMP.py | 10 from autotest_lib.client.cros import cryptohome 19 cryptohome.take_tpm_ownership() 21 status = cryptohome.get_tpm_status() 29 cryptohome.get_fwmp(fwmp_cleared) 30 status = cryptohome.get_tpm_status() 42 cryptohome.set_fwmp(flags, dev_key_hash) 45 fwmp = cryptohome.get_fwmp()
|
/external/autotest/client/site_tests/login_CryptohomeIncognito/ |
login_CryptohomeIncognito.py | 10 from autotest_lib.client.cros import cryptohome 18 if not cryptohome.is_guest_vault_mounted(): 22 if cryptohome.is_guest_vault_mounted(allow_fail=True):
|
/external/autotest/client/site_tests/platform_CryptohomeMount/ |
platform_CryptohomeMount.py | 7 from autotest_lib.client.cros import cryptohome 10 """Validates basic cryptohome creation and mounting.""" 18 user_hash = cryptohome.get_user_hash(test_user) 19 proxy = cryptohome.CryptohomeProxy() 34 raise error.TestFail('Cryptohome mounted after unmount!') 39 raise error.TestFail('Cryptohome mounted with a bad password.') 42 raise error.TestFail('Cryptohome mounted even though mount() failed') 46 raise error.TestFail('Cryptohome could not clean up vault')
|
/external/autotest/client/site_tests/platform_CryptohomeNonDirs/ |
platform_CryptohomeNonDirs.py | 9 from autotest_lib.client.cros import cryptohome 31 self.cryptohome_proxy = cryptohome.CryptohomeProxy() 35 path = cryptohome.user_path(user) 44 path = cryptohome.system_path(user) 53 path = cryptohome.user_path(user) 66 path = cryptohome.system_path(user)
|
/external/autotest/client/site_tests/login_CryptohomeOwnerQuery/ |
login_CryptohomeOwnerQuery.py | 14 from autotest_lib.client.cros import cros_ui, cryptohome, ownership 17 """Verify that the cryptohome owner user query works properly.""" 32 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop) 38 if cryptohome.get_login_status()['owner_user_exists']: 46 if not cryptohome.get_login_status()['owner_user_exists']:
|
/external/autotest/client/site_tests/platform_CryptohomeMigrateChapsTokenClient/ |
platform_CryptohomeMigrateChapsTokenClient.py | 7 from autotest_lib.client.cros import cryptohome, pkcs11 20 self._cryptohome_proxy = cryptohome.CryptohomeProxy() 28 status = cryptohome.get_tpm_status() 30 cryptohome.take_tpm_ownership() 43 raise error.TestFail('Unable to remount users cryptohome')
|
/external/autotest/client/site_tests/platform_CryptohomeBadPerms/ |
platform_CryptohomeBadPerms.py | 9 from autotest_lib.client.cros import cryptohome 12 """Tests Cryptohome's ability to detect directories with bad permissions or 27 self.cryptohome_proxy = cryptohome.CryptohomeProxy() 31 path = cryptohome.user_path(user) 41 path = cryptohome.system_path(user) 52 path = cryptohome.user_path(user) 63 path = cryptohome.user_path(user) 73 path = cryptohome.user_path(user)
|
/external/autotest/client/site_tests/platform_CryptohomeMultiple/ |
platform_CryptohomeMultiple.py | 7 from autotest_lib.client.cros import cryptohome 15 Tests mounting a single not-already-existing cryptohome. Ensures that 26 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
|
/external/autotest/client/site_tests/platform_CryptohomeSyncStress/ |
platform_CryptohomeSyncStress.py | 20 # make sure cryptohome is mounted 22 proxy = bus.get_object('org.chromium.Cryptohome', 23 '/org/chromium/Cryptohome') 24 cryptohome = dbus.Interface(proxy, 'org.chromium.CryptohomeInterface') 26 ismounted = cryptohome.IsMounted() 28 raise error.TestFail('Cryptohome failed to mount.')
|
/external/autotest/client/site_tests/platform_CryptohomeFio/ |
platform_CryptohomeFio.py | 8 from autotest_lib.client.cros import cryptohome 52 # Mount a test cryptohome vault. 54 cryptohome.mount_vault(TEST_USER, TEST_PASSWORD, 56 tmpdir = cryptohome.user_path(TEST_USER) 79 cryptohome.unmount_vault(TEST_USER) 80 cryptohome.remove_vault(TEST_USER)
|
/external/autotest/client/site_tests/security_ProfilePermissions/ |
security_ProfilePermissions.py | 13 from autotest_lib.client.cros import cryptohome 52 else cryptohome.GUEST_USER_NAME) 54 """Check permissions within cryptohome for anything too permissive. 61 user_mountpt = cryptohome.user_path(username) 115 if cryptohome.is_permanent_vault_mounted(username): 118 mountpath = cryptohome.get_mounted_vault_path(username) 136 'Bad permissions found on cryptohome files')
|
/external/autotest/client/site_tests/desktopui_ChromeSanity/ |
desktopui_ChromeSanity.py | 13 from autotest_lib.client.cros import cryptohome 59 if not cryptohome.is_vault_mounted(user=cr.username, 62 'Didn\'t find mounted cryptohome for "%s"' %
|
/external/autotest/client/site_tests/login_GuestAndActualSession/ |
login_GuestAndActualSession.py | 12 from autotest_lib.client.cros import constants, cros_ui, cryptohome, ownership 37 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop) 44 cryptohome.mount_guest()
|
/external/autotest/client/bin/ |
vm_sanity.py | 9 This script logs in, ensures that the cryptohome is mounted, 25 from autotest_lib.client.cros import cryptohome 40 # Check that the cryptohome is mounted. 42 logging.info('Checking mounted cryptohome.') 43 cryptohome.is_vault_mounted(user=cr.username, allow_fail=False)
|
/external/autotest/client/site_tests/login_GaiaLogin/ |
login_GaiaLogin.py | 7 from autotest_lib.client.cros import cryptohome 32 if not cryptohome.is_vault_mounted(user=chrome.NormalizeEmail(username)):
|
/external/autotest/client/site_tests/login_RetrieveActiveSessions/ |
login_RetrieveActiveSessions.py | 10 from autotest_lib.client.cros import cros_ui, cryptohome 28 cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
|
/external/autotest/client/site_tests/login_SameSessionTwice/ |
login_SameSessionTwice.py | 11 from autotest_lib.client.cros import cros_ui, cryptohome 30 cryptohome.CryptohomeProxy(bus_loop).ensure_clean_cryptohome_for(user)
|
/external/autotest/client/cros/ |
login.py | 7 import constants, cros_logging, cros_ui, cryptohome 109 """Wait until cryptohome is mounted. 111 @param user: the user whose cryptohome the caller wants to wait for. 114 @raise: TimeoutError: cryptohome wasn't mounted before timeout 117 condition=lambda: cryptohome.is_vault_mounted(user), 118 timeout_msg='Timed out waiting for cryptohome to be mounted',
|
/external/autotest/client/site_tests/login_OwnershipNotRetaken/ |
login_OwnershipNotRetaken.py | 11 from autotest_lib.client.cros import constants, cryptohome, ownership 29 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
|