Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 16 of 16) sorted by relevance

/system/keymaster/include/keymaster/km_openssl/
Dhkdf.h35 bool Init(Buffer& secret, Buffer& salt) { in Init() argument
36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), in Init()
40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { in Init() argument
41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len); in Init()
Diso18033kdf.h37 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument
38 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
Dkdf.h35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
/system/keymaster/km_openssl/
Dkdf.cpp23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument
40 if (!secret || secret_len == 0) in Init()
44 secret_key_.reset(dup_buffer(secret, secret_len)); in Init()
/system/vold/
DKeyStorage.h34 KeyAuthentication(const std::string& t, const std::string& s) : token{t}, secret{s} {}; in KeyAuthentication()
36 bool usesKeymaster() const { return !token.empty() || secret.empty(); }; in usesKeymaster()
39 const std::string secret; variable
DFsCrypt.h27 const std::string& secret);
31 const std::string& secret);
DKeyStorage.cpp286 } else if (auth.secret.empty()) { in getStretching()
300 static bool stretchSecret(const std::string& stretching, const std::string& secret, in stretchSecret() argument
303 if (!secret.empty()) { in stretchSecret()
309 *stretched = secret; in stretchSecret()
319 if (crypto_scrypt(reinterpret_cast<const uint8_t*>(secret.data()), secret.size(), in stretchSecret()
337 if (!stretchSecret(stretching, auth.secret, salt, &stretched)) return false; in generateAppId()
DFsCrypt.cpp557 std::string token, secret; in fscrypt_add_user_key_auth() local
559 if (!parse_hex(secret_hex, &secret)) return false; in fscrypt_add_user_key_auth()
561 secret.empty() ? kEmptyAuthentication : android::vold::KeyAuthentication(token, secret); in fscrypt_add_user_key_auth()
601 std::string token, secret; in fscrypt_unlock_user_key() local
603 if (!parse_hex(secret_hex, &secret)) return false; in fscrypt_unlock_user_key()
604 android::vold::KeyAuthentication auth(token, secret); in fscrypt_unlock_user_key()
DVoldNativeService.h114 const std::string& secret);
118 const std::string& secret);
DVoldNativeService.cpp756 const std::string& secret) { in addUserKeyAuth() argument
760 return translateBool(fscrypt_add_user_key_auth(userId, userSerial, token, secret)); in addUserKeyAuth()
772 const std::string& secret) { in unlockUserKey() argument
776 return translateBool(fscrypt_unlock_user_key(userId, userSerial, token, secret)); in unlockUserKey()
/system/vold/binder/android/os/
DIVold.aidl91 @utf8InCpp String secret); in addUserKeyAuth() argument
95 @utf8InCpp String secret); in unlockUserKey() argument
/system/netd/server/
DInterfaceController.cpp228 std::string secret = oldSecret; in enableStablePrivacyAddresses() local
232 ASSIGN_OR_RETURN(secret, randomIPv6Address()); in enableStablePrivacyAddresses()
236 RETURN_IF_NOT_OK(sys.write(procFd.value(), makeSlice(secret))); in enableStablePrivacyAddresses()
243 return setProperty(kStableSecretProperty, secret); in enableStablePrivacyAddresses()
/system/sepolicy/prebuilts/api/27.0/public/
Dnetd.te123 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
128 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/prebuilts/api/28.0/public/
Dnetd.te142 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
147 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/prebuilts/api/29.0/public/
Dnetd.te163 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
168 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/public/
Dnetd.te163 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
168 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.