/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
D | RebootEscrowProviderServerBasedImplTests.java | 82 byte[] secret = invocation.getArgument(0); in setUp() 83 for (int i = 0; i < secret.length; i++) { in setUp() 84 secret[i] = (byte) (secret[i] ^ 0xf); in setUp() 86 return secret; in setUp() 111 byte[] secret = invocation.getArgument(0); in getAndClearRebootEscrowKey_WrongDecryptionMethod_failure() 112 for (int i = 0; i < secret.length; i++) { in getAndClearRebootEscrowKey_WrongDecryptionMethod_failure() 113 secret[i] = (byte) (secret[i] ^ 0xe); in getAndClearRebootEscrowKey_WrongDecryptionMethod_failure() 115 return secret; in getAndClearRebootEscrowKey_WrongDecryptionMethod_failure()
|
D | FakeStorageManager.java | 35 public void addUserKeyAuth(int userId, int serialNumber, byte[] token, byte[] secret) { in addUserKeyAuth() argument 36 getUserAuth(userId).add(new Pair<>(token, secret)); in addUserKeyAuth() 39 public void clearUserKeyAuth(int userId, int serialNumber, byte[] token, byte[] secret) { in clearUserKeyAuth() argument 41 if (token == null && secret == null) { in clearUserKeyAuth() 44 auths.remove(new Pair<>(token, secret)); in clearUserKeyAuth() 72 public void unlockUser(int userId, byte[] secret, IProgressListener listener) in unlockUser() argument 81 if (!Arrays.equals(secret, auth.second)) { in unlockUser()
|
D | SyntheticPasswordTests.java | 168 ArgumentCaptor<ArrayList<Byte>> secret = ArgumentCaptor.forClass(ArrayList.class); in testSyntheticPasswordChangeCredentialKeepsAuthSecret() local 169 verify(mAuthSecretService, atLeastOnce()).primaryUserCredential(secret.capture()); in testSyntheticPasswordChangeCredentialKeepsAuthSecret() 170 assertEquals(1, secret.getAllValues().stream().distinct().count()); in testSyntheticPasswordChangeCredentialKeepsAuthSecret()
|
/frameworks/base/core/java/android/os/storage/ |
D | IStorageManager.aidl | 176 void unlockUserKey(int userId, int serialNumber, in byte[] token, in byte[] secret) = 63; in unlockUserKey() argument 182 void addUserKeyAuth(int userId, int serialNumber, in byte[] token, in byte[] secret) = 70; in addUserKeyAuth() argument 198 void clearUserKeyAuth(int userId, int serialNumber, in byte[] token, in byte[] secret) = 88; in clearUserKeyAuth() argument
|
D | StorageManager.java | 1531 public void unlockUserKey(int userId, int serialNumber, byte[] token, byte[] secret) { in unlockUserKey() argument 1533 mStorageManager.unlockUserKey(userId, serialNumber, token, secret); in unlockUserKey()
|
/frameworks/base/core/java/android/security/keystore/recovery/ |
D | KeyChainProtectionParams.java | 204 public @NonNull Builder setSecret(@NonNull byte[] secret) { in setSecret() argument 205 mInstance.mSecret = secret; in setSecret()
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
D | SyntheticPasswordManager.java | 955 final byte[] secret; in createSyntheticPasswordBlob() 957 secret = authToken.getEscrowSecret(); in createSyntheticPasswordBlob() 959 secret = authToken.getSyntheticPassword(); in createSyntheticPasswordBlob() 961 byte[] content = createSPBlob(getKeyName(handle), secret, applicationId, sid); in createSyntheticPasswordBlob() 1142 final byte[] secret; in unwrapSyntheticPasswordBlob() 1144 secret = SyntheticPasswordCrypto.decryptBlobV1(getKeyName(handle), in unwrapSyntheticPasswordBlob() 1147 secret = decryptSPBlob(getKeyName(handle), in unwrapSyntheticPasswordBlob() 1150 if (secret == null) { in unwrapSyntheticPasswordBlob() 1160 result.recreateFromEscrow(secret); in unwrapSyntheticPasswordBlob() 1162 result.recreateDirectly(secret); in unwrapSyntheticPasswordBlob() [all …]
|
D | LockSettingsService.java | 1373 private void unlockUser(int userId, byte[] token, byte[] secret) { in unlockUser() argument 1375 + (secret != null ? secret.length : 0)); in unlockUser() 1398 mActivityManager.unlockUser(userId, token, secret, listener); in unlockUser() 1560 final byte[] secret = credential.isNone() ? null : credential.getCredential(); in sendCredentialsOnUnlockIfRequired() 1564 credential.getType(), secret, profileId); in sendCredentialsOnUnlockIfRequired() local 1582 final byte[] secret = credential.isNone() ? null : credential.getCredential(); in sendCredentialsOnChangeIfRequired() 1586 credential.getType(), secret, profileId); in sendCredentialsOnChangeIfRequired() local 2019 private void clearUserKeyProtection(int userId, byte[] secret) { in clearUserKeyProtection() argument 2024 mStorageManager.clearUserKeyAuth(userId, userInfo.serialNumber, null, secret); in clearUserKeyProtection() 2057 private void unlockUserKey(int userId, byte[] token, byte[] secret) { in unlockUserKey() argument [all …]
|
/frameworks/libs/service_entitlement/java/com/android/libraries/entitlement/eapaka/ |
D | EapAkaResponse.java | 281 SecretKeySpec secret = new SecretKeySpec(key, ALGORITHM_HMAC_SHA1); in calculateMac() local 282 mac.init(secret); in calculateMac()
|
/frameworks/base/core/java/android/net/ |
D | Ikev2VpnProfile.java | 599 public static String encodeForIpsecSecret(@NonNull byte[] secret) { in encodeForIpsecSecret() argument 600 checkNotNull(secret, MISSING_PARAM_MSG_TMPL, "secret"); in encodeForIpsecSecret() 602 return Base64.getEncoder().encodeToString(secret); in encodeForIpsecSecret()
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
D | SecureBox.java | 301 private static SecretKey hkdfDeriveKey(byte[] secret, byte[] salt, byte[] info) in hkdfDeriveKey() argument 310 byte[] pseudorandomKey = mac.doFinal(secret); in hkdfDeriveKey()
|
/frameworks/base/services/core/java/com/android/server/ |
D | StorageManagerService.java | 3237 public void addUserKeyAuth(int userId, int serialNumber, byte[] token, byte[] secret) { in addUserKeyAuth() argument 3241 mVold.addUserKeyAuth(userId, serialNumber, encodeBytes(token), encodeBytes(secret)); in addUserKeyAuth() 3255 public void clearUserKeyAuth(int userId, int serialNumber, byte[] token, byte[] secret) { in clearUserKeyAuth() argument 3259 mVold.clearUserKeyAuth(userId, serialNumber, encodeBytes(token), encodeBytes(secret)); in clearUserKeyAuth() 3280 public void unlockUserKey(int userId, int serialNumber, byte[] token, byte[] secret) { in unlockUserKey() argument 3285 + " hasSecret: " + (secret != null)); in unlockUserKey() 3298 if (mLockPatternUtils.isSecure(userId) && ArrayUtils.isEmpty(secret)) { in unlockUserKey() 3305 encodeBytes(secret)); in unlockUserKey()
|
/frameworks/base/services/core/java/com/android/server/am/ |
D | UserController.java | 1628 boolean unlockUser(final @UserIdInt int userId, byte[] token, byte[] secret, 1634 return unlockUserCleared(userId, token, secret, listener); 1659 private boolean unlockUserCleared(final @UserIdInt int userId, byte[] token, byte[] secret, 1667 storageManager.unlockUserKey(userId, userInfo.serialNumber, token, secret);
|
D | ActivityManagerShellCommand.java | 1925 byte[] secret = argToBytes(getNextArgRequired()); 1926 boolean success = mInterface.unlockUser(userId, token, secret, null);
|
D | ActivityManagerService.java | 15058 public boolean unlockUser(int userId, byte[] token, byte[] secret, IProgressListener listener) { in unlockUser() argument 15059 return mUserController.unlockUser(userId, token, secret, listener); in unlockUser()
|
/frameworks/base/core/java/android/app/ |
D | IActivityManager.aidl | 512 boolean unlockUser(int userid, in byte[] token, in byte[] secret, in unlockUser() argument
|