/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
D | FakeStorageManager.java | 34 public void addUserKeyAuth(int userId, int serialNumber, byte[] secret) { in addUserKeyAuth() argument 35 getUserAuth(userId).add(secret); in addUserKeyAuth() 38 public void clearUserKeyAuth(int userId, int serialNumber, byte[] secret) { in clearUserKeyAuth() argument 40 if (secret == null) { in clearUserKeyAuth() 43 auths.remove(secret); in clearUserKeyAuth() 71 public void unlockUser(int userId, byte[] secret, IProgressListener listener) in unlockUser() argument 80 if (!Arrays.equals(secret, auth)) { in unlockUser()
|
D | RebootEscrowProviderServerBasedImplTests.java | 82 byte[] secret = invocation.getArgument(0); in setUp() 83 for (int i = 0; i < secret.length; i++) { in setUp() 84 secret[i] = (byte) (secret[i] ^ 0xf); in setUp() 86 return secret; in setUp() 111 byte[] secret = invocation.getArgument(0); in getAndClearRebootEscrowKey_WrongDecryptionMethod_failure() 112 for (int i = 0; i < secret.length; i++) { in getAndClearRebootEscrowKey_WrongDecryptionMethod_failure() 113 secret[i] = (byte) (secret[i] ^ 0xe); in getAndClearRebootEscrowKey_WrongDecryptionMethod_failure() 115 return secret; in getAndClearRebootEscrowKey_WrongDecryptionMethod_failure()
|
D | SyntheticPasswordTests.java | 175 ArgumentCaptor<ArrayList<Byte>> secret = ArgumentCaptor.forClass(ArrayList.class); in testSyntheticPasswordChangeCredentialKeepsAuthSecret() local 176 verify(mAuthSecretService, atLeastOnce()).primaryUserCredential(secret.capture()); in testSyntheticPasswordChangeCredentialKeepsAuthSecret() 177 assertEquals(1, secret.getAllValues().stream().distinct().count()); in testSyntheticPasswordChangeCredentialKeepsAuthSecret()
|
/frameworks/base/core/java/android/os/storage/ |
D | IStorageManager.aidl | 123 void unlockUserKey(int userId, int serialNumber, in byte[] secret) = 63; in unlockUserKey() argument 128 void addUserKeyAuth(int userId, int serialNumber, in byte[] secret) = 70; in addUserKeyAuth() argument 144 void clearUserKeyAuth(int userId, int serialNumber, in byte[] secret) = 88; in clearUserKeyAuth() argument
|
D | StorageManager.java | 1613 public void unlockUserKey(int userId, int serialNumber, byte[] secret) { in unlockUserKey() argument 1615 mStorageManager.unlockUserKey(userId, serialNumber, secret); in unlockUserKey()
|
/frameworks/base/core/java/android/security/keystore/recovery/ |
D | KeyChainProtectionParams.java | 204 public @NonNull Builder setSecret(@NonNull byte[] secret) { in setSecret() argument 205 mInstance.mSecret = secret; in setSecret()
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
D | SyntheticPasswordManager.java | 1030 final byte[] secret; in createSyntheticPasswordBlob() 1033 secret = authToken.getEscrowSecret(); in createSyntheticPasswordBlob() 1035 secret = authToken.getSyntheticPassword(); in createSyntheticPasswordBlob() 1037 byte[] content = createSPBlob(getKeyName(handle), secret, applicationId, sid); in createSyntheticPasswordBlob() 1243 final byte[] secret; in unwrapSyntheticPasswordBlob() 1245 secret = SyntheticPasswordCrypto.decryptBlobV1(getKeyName(handle), blob.mContent, in unwrapSyntheticPasswordBlob() 1248 secret = decryptSPBlob(getKeyName(handle), blob.mContent, applicationId); in unwrapSyntheticPasswordBlob() 1250 if (secret == null) { in unwrapSyntheticPasswordBlob() 1261 result.recreateFromEscrow(secret); in unwrapSyntheticPasswordBlob() 1263 result.recreateDirectly(secret); in unwrapSyntheticPasswordBlob() [all …]
|
D | LockSettingsService.java | 1438 private void unlockUser(int userId, byte[] secret) { in unlockUser() argument 1440 + (secret != null ? secret.length : 0)); in unlockUser() 1463 mActivityManager.unlockUser(userId, null, secret, listener); in unlockUser() 1626 final byte[] secret = credential.isNone() ? null : credential.getCredential(); in sendCredentialsOnUnlockIfRequired() 1630 credential.getType(), secret, profileId); in sendCredentialsOnUnlockIfRequired() local 1648 final byte[] secret = credential.isNone() ? null : credential.getCredential(); in sendCredentialsOnChangeIfRequired() 1652 credential.getType(), secret, profileId); in sendCredentialsOnChangeIfRequired() local 2081 private void clearUserKeyProtection(int userId, byte[] secret) { in clearUserKeyProtection() argument 2086 mStorageManager.clearUserKeyAuth(userId, userInfo.serialNumber, secret); in clearUserKeyProtection() 2119 private void unlockUserKey(int userId, byte[] secret) { in unlockUserKey() argument [all …]
|
/frameworks/libs/service_entitlement/java/com/android/libraries/entitlement/eapaka/ |
D | EapAkaResponse.java | 281 SecretKeySpec secret = new SecretKeySpec(key, ALGORITHM_HMAC_SHA1); in calculateMac() local 282 mac.init(secret); in calculateMac()
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
D | SecureBox.java | 301 private static SecretKey hkdfDeriveKey(byte[] secret, byte[] salt, byte[] info) in hkdfDeriveKey() argument 310 byte[] pseudorandomKey = mac.doFinal(secret); in hkdfDeriveKey()
|
/frameworks/base/core/java/android/net/ |
D | Ikev2VpnProfile.java | 684 public static String encodeForIpsecSecret(@NonNull byte[] secret) { in encodeForIpsecSecret() argument 685 checkNotNull(secret, MISSING_PARAM_MSG_TMPL, "secret"); in encodeForIpsecSecret() 687 return Base64.getEncoder().encodeToString(secret); in encodeForIpsecSecret()
|
/frameworks/base/services/core/java/com/android/server/ |
D | StorageManagerService.java | 3244 public void addUserKeyAuth(int userId, int serialNumber, byte[] secret) { in addUserKeyAuth() argument 3248 mVold.addUserKeyAuth(userId, serialNumber, encodeBytes(secret)); in addUserKeyAuth() 3262 public void clearUserKeyAuth(int userId, int serialNumber, byte[] secret) { in clearUserKeyAuth() argument 3266 mVold.clearUserKeyAuth(userId, serialNumber, encodeBytes(secret)); in clearUserKeyAuth() 3288 public void unlockUserKey(int userId, int serialNumber, byte[] secret) { in unlockUserKey() argument 3292 + " hasSecret: " + (secret != null)); in unlockUserKey() 3305 if (mLockPatternUtils.isSecure(userId) && ArrayUtils.isEmpty(secret)) { in unlockUserKey() 3311 mVold.unlockUserKey(userId, serialNumber, encodeBytes(secret)); in unlockUserKey()
|
/frameworks/base/services/core/java/com/android/server/am/ |
D | UserController.java | 1725 boolean unlockUser(final @UserIdInt int userId, byte[] secret, IProgressListener listener) { 1730 return unlockUserCleared(userId, secret, listener); 1754 private boolean unlockUserCleared(final @UserIdInt int userId, byte[] secret, 1778 storageManager.unlockUserKey(userId, userInfo.serialNumber, secret);
|
D | ActivityManagerShellCommand.java | 2053 String secret = getNextArg(); 2054 if (!TextUtils.isEmpty(secret) && !"!".equals(secret)) {
|
D | ActivityManagerService.java | 16233 public boolean unlockUser(int userId, @Nullable byte[] token, @Nullable byte[] secret, in unlockUser() argument 16235 return mUserController.unlockUser(userId, secret, listener); in unlockUser()
|
/frameworks/base/core/java/android/app/ |
D | IActivityManager.aidl | 531 boolean unlockUser(int userid, in byte[] token, in byte[] secret, in unlockUser() argument
|