/system/keymaster/include/keymaster/km_openssl/ |
D | hkdf.h | 35 bool Init(Buffer& secret, Buffer& salt) { in Init() argument 36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), in Init() 40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { in Init() argument 41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len); in Init()
|
D | iso18033kdf.h | 36 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument 37 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
|
D | kdf.h | 35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
|
/system/vold/ |
D | FsCrypt.h | 27 bool fscrypt_add_user_key_auth(userid_t user_id, int serial, const std::string& secret); 28 bool fscrypt_clear_user_key_auth(userid_t user_id, int serial, const std::string& secret); 32 bool fscrypt_unlock_user_key(userid_t user_id, int serial, const std::string& secret);
|
D | KeyStorage.h | 32 KeyAuthentication(const std::string& s) : secret{s} {}; in KeyAuthentication() 34 bool usesKeymaster() const { return secret.empty(); }; in usesKeymaster() 36 const std::string secret; variable
|
D | VoldNativeService.h | 125 const std::string& secret); 127 const std::string& secret); 132 const std::string& secret);
|
D | VoldNativeService.cpp | 735 const std::string& secret) { in addUserKeyAuth() argument 744 return translateBool(fscrypt_add_user_key_auth(userId, userSerial, secret)); in addUserKeyAuth() 749 const std::string& secret) { in clearUserKeyAuth() argument 759 return translateBool(fscrypt_clear_user_key_auth(userId, userSerial, secret)); in clearUserKeyAuth() 779 const std::string& secret) { in unlockUserKey() argument 788 return translateBool(fscrypt_unlock_user_key(userId, userSerial, secret)); in unlockUserKey()
|
D | KeyStorage.cpp | 430 static bool stretchSecret(const std::string& stretching, const std::string& secret, in stretchSecret() argument 433 if (!secret.empty()) { in stretchSecret() 439 *stretched = secret; in stretchSecret() 450 if (!stretchSecret(stretching, auth.secret, &stretched)) return false; in generateAppId()
|
D | FsCrypt.cpp | 629 std::string secret; in authentication_from_hex() local 630 if (!parse_hex(secret_hex, &secret)) return std::optional<android::vold::KeyAuthentication>(); in authentication_from_hex() 631 if (secret.empty()) { in authentication_from_hex() 634 return android::vold::KeyAuthentication(secret); in authentication_from_hex()
|
/system/keymaster/km_openssl/ |
D | kdf.cpp | 23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument 40 if (!secret || secret_len == 0) return false; in Init() 43 secret_key_.reset(dup_buffer(secret, secret_len)); in Init()
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | netd.te | 38 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 43 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/private/ |
D | netd.te | 38 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 43 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/security/keystore2/src/ |
D | ec_crypto.rs | 72 let secret = ecdh_compute_key(other_public_key.get_point(), &self.0) in agree_key() localVariable 74 let prk = hkdf_extract(&secret, &hkdf) in agree_key()
|
/system/vold/binder/android/os/ |
D | IVold.aidl | 100 @utf8InCpp String secret); in addUserKeyAuth() argument 102 @utf8InCpp String secret); in clearUserKeyAuth() argument 107 @utf8InCpp String secret); in unlockUserKey() argument
|
/system/security/keystore2/src/crypto/ |
D | crypto.hpp | 44 const uint8_t *secret, size_t secret_len,
|
D | lib.rs | 223 pub fn hkdf_extract(secret: &[u8], salt: &[u8]) -> Result<ZVec, Error> { in hkdf_extract() 233 secret.as_ptr(), in hkdf_extract() 234 secret.len(), in hkdf_extract()
|
D | crypto.cpp | 208 bool HKDFExtract(uint8_t* out_key, size_t* out_len, const uint8_t* secret, size_t secret_len, in HKDFExtract() argument 211 auto result = HKDF_extract(out_key, out_len, digest, secret, secret_len, salt, salt_len); in HKDFExtract()
|
/system/netd/server/ |
D | InterfaceController.cpp | 220 std::string secret = oldSecret; in enableStablePrivacyAddresses() local 224 ASSIGN_OR_RETURN(secret, randomIPv6Address()); in enableStablePrivacyAddresses() 228 RETURN_IF_NOT_OK(sys.write(procFd.value(), makeSlice(secret))); in enableStablePrivacyAddresses() 235 return setProperty(kStableSecretProperty, secret); in enableStablePrivacyAddresses()
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | netd.te | 123 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 128 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | netd.te | 142 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 147 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | netd.te | 160 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 165 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | netd.te | 163 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 168 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/security/keystore2/src/km_compat/ |
D | km_compat.cpp | 1411 auto secret = SharedSecret::createSharedSecret(in_securityLevel); in getSharedSecret() local 1412 if (!secret) { in getSharedSecret() 1415 i = mSharedSecretCache.insert(i, {in_securityLevel, std::move(secret)}); in getSharedSecret()
|