Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 23 of 23) sorted by relevance

/system/keymaster/include/keymaster/km_openssl/
Dhkdf.h35 bool Init(Buffer& secret, Buffer& salt) { in Init() argument
36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), in Init()
40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { in Init() argument
41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len); in Init()
Diso18033kdf.h36 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument
37 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
Dkdf.h35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
/system/vold/
DFsCrypt.h27 bool fscrypt_add_user_key_auth(userid_t user_id, int serial, const std::string& secret);
28 bool fscrypt_clear_user_key_auth(userid_t user_id, int serial, const std::string& secret);
32 bool fscrypt_unlock_user_key(userid_t user_id, int serial, const std::string& secret);
DKeyStorage.h32 KeyAuthentication(const std::string& s) : secret{s} {}; in KeyAuthentication()
34 bool usesKeymaster() const { return secret.empty(); }; in usesKeymaster()
36 const std::string secret; variable
DVoldNativeService.h125 const std::string& secret);
127 const std::string& secret);
132 const std::string& secret);
DVoldNativeService.cpp735 const std::string& secret) { in addUserKeyAuth() argument
744 return translateBool(fscrypt_add_user_key_auth(userId, userSerial, secret)); in addUserKeyAuth()
749 const std::string& secret) { in clearUserKeyAuth() argument
759 return translateBool(fscrypt_clear_user_key_auth(userId, userSerial, secret)); in clearUserKeyAuth()
779 const std::string& secret) { in unlockUserKey() argument
788 return translateBool(fscrypt_unlock_user_key(userId, userSerial, secret)); in unlockUserKey()
DKeyStorage.cpp430 static bool stretchSecret(const std::string& stretching, const std::string& secret, in stretchSecret() argument
433 if (!secret.empty()) { in stretchSecret()
439 *stretched = secret; in stretchSecret()
450 if (!stretchSecret(stretching, auth.secret, &stretched)) return false; in generateAppId()
DFsCrypt.cpp629 std::string secret; in authentication_from_hex() local
630 if (!parse_hex(secret_hex, &secret)) return std::optional<android::vold::KeyAuthentication>(); in authentication_from_hex()
631 if (secret.empty()) { in authentication_from_hex()
634 return android::vold::KeyAuthentication(secret); in authentication_from_hex()
/system/keymaster/km_openssl/
Dkdf.cpp23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument
40 if (!secret || secret_len == 0) return false; in Init()
43 secret_key_.reset(dup_buffer(secret, secret_len)); in Init()
/system/sepolicy/prebuilts/api/31.0/private/
Dnetd.te38 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
43 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/private/
Dnetd.te38 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
43 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/security/keystore2/src/
Dec_crypto.rs72 let secret = ecdh_compute_key(other_public_key.get_point(), &self.0) in agree_key() localVariable
74 let prk = hkdf_extract(&secret, &hkdf) in agree_key()
/system/vold/binder/android/os/
DIVold.aidl100 @utf8InCpp String secret); in addUserKeyAuth() argument
102 @utf8InCpp String secret); in clearUserKeyAuth() argument
107 @utf8InCpp String secret); in unlockUserKey() argument
/system/security/keystore2/src/crypto/
Dcrypto.hpp44 const uint8_t *secret, size_t secret_len,
Dlib.rs223 pub fn hkdf_extract(secret: &[u8], salt: &[u8]) -> Result<ZVec, Error> { in hkdf_extract()
233 secret.as_ptr(), in hkdf_extract()
234 secret.len(), in hkdf_extract()
Dcrypto.cpp208 bool HKDFExtract(uint8_t* out_key, size_t* out_len, const uint8_t* secret, size_t secret_len, in HKDFExtract() argument
211 auto result = HKDF_extract(out_key, out_len, digest, secret, secret_len, salt, salt_len); in HKDFExtract()
/system/netd/server/
DInterfaceController.cpp220 std::string secret = oldSecret; in enableStablePrivacyAddresses() local
224 ASSIGN_OR_RETURN(secret, randomIPv6Address()); in enableStablePrivacyAddresses()
228 RETURN_IF_NOT_OK(sys.write(procFd.value(), makeSlice(secret))); in enableStablePrivacyAddresses()
235 return setProperty(kStableSecretProperty, secret); in enableStablePrivacyAddresses()
/system/sepolicy/prebuilts/api/27.0/public/
Dnetd.te123 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
128 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/prebuilts/api/28.0/public/
Dnetd.te142 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
147 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/prebuilts/api/30.0/public/
Dnetd.te160 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
165 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/prebuilts/api/29.0/public/
Dnetd.te163 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
168 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/security/keystore2/src/km_compat/
Dkm_compat.cpp1411 auto secret = SharedSecret::createSharedSecret(in_securityLevel); in getSharedSecret() local
1412 if (!secret) { in getSharedSecret()
1415 i = mSharedSecretCache.insert(i, {in_securityLevel, std::move(secret)}); in getSharedSecret()