/system/keymaster/include/keymaster/km_openssl/ |
D | hkdf.h | 35 bool Init(Buffer& secret, Buffer& salt) { in Init() argument 36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), in Init() 40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { in Init() argument 41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len); in Init()
|
D | iso18033kdf.h | 37 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument 38 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
|
D | kdf.h | 35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
|
/system/keymaster/km_openssl/ |
D | kdf.cpp | 23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument 40 if (!secret || secret_len == 0) in Init() 44 secret_key_.reset(dup_buffer(secret, secret_len)); in Init()
|
/system/vold/ |
D | KeyStorage.h | 34 KeyAuthentication(const std::string& t, const std::string& s) : token{t}, secret{s} {}; in KeyAuthentication() 36 bool usesKeymaster() const { return !token.empty() || secret.empty(); }; in usesKeymaster() 39 const std::string secret; variable
|
D | FsCrypt.h | 27 const std::string& secret); 31 const std::string& secret);
|
D | KeyStorage.cpp | 286 } else if (auth.secret.empty()) { in getStretching() 300 static bool stretchSecret(const std::string& stretching, const std::string& secret, in stretchSecret() argument 303 if (!secret.empty()) { in stretchSecret() 309 *stretched = secret; in stretchSecret() 319 if (crypto_scrypt(reinterpret_cast<const uint8_t*>(secret.data()), secret.size(), in stretchSecret() 337 if (!stretchSecret(stretching, auth.secret, salt, &stretched)) return false; in generateAppId()
|
D | FsCrypt.cpp | 557 std::string token, secret; in fscrypt_add_user_key_auth() local 559 if (!parse_hex(secret_hex, &secret)) return false; in fscrypt_add_user_key_auth() 561 secret.empty() ? kEmptyAuthentication : android::vold::KeyAuthentication(token, secret); in fscrypt_add_user_key_auth() 601 std::string token, secret; in fscrypt_unlock_user_key() local 603 if (!parse_hex(secret_hex, &secret)) return false; in fscrypt_unlock_user_key() 604 android::vold::KeyAuthentication auth(token, secret); in fscrypt_unlock_user_key()
|
D | VoldNativeService.h | 114 const std::string& secret); 118 const std::string& secret);
|
D | VoldNativeService.cpp | 756 const std::string& secret) { in addUserKeyAuth() argument 760 return translateBool(fscrypt_add_user_key_auth(userId, userSerial, token, secret)); in addUserKeyAuth() 772 const std::string& secret) { in unlockUserKey() argument 776 return translateBool(fscrypt_unlock_user_key(userId, userSerial, token, secret)); in unlockUserKey()
|
/system/vold/binder/android/os/ |
D | IVold.aidl | 91 @utf8InCpp String secret); in addUserKeyAuth() argument 95 @utf8InCpp String secret); in unlockUserKey() argument
|
/system/netd/server/ |
D | InterfaceController.cpp | 228 std::string secret = oldSecret; in enableStablePrivacyAddresses() local 232 ASSIGN_OR_RETURN(secret, randomIPv6Address()); in enableStablePrivacyAddresses() 236 RETURN_IF_NOT_OK(sys.write(procFd.value(), makeSlice(secret))); in enableStablePrivacyAddresses() 243 return setProperty(kStableSecretProperty, secret); in enableStablePrivacyAddresses()
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | netd.te | 123 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 128 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | netd.te | 142 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 147 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | netd.te | 163 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 168 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/public/ |
D | netd.te | 163 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 168 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|