/system/keymaster/include/keymaster/km_openssl/ |
D | hkdf.h | 35 bool Init(Buffer& secret, Buffer& salt) { in Init() argument 36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), in Init() 40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { in Init() argument 41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len); in Init()
|
D | iso18033kdf.h | 36 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument 37 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
|
D | kdf.h | 35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
|
/system/keymint/common/src/keyblob/ |
D | sdd_mem.rs | 30 let mut secret = [0; 32]; in get_or_create_factory_reset_secret() localVariable 31 rng.fill_bytes(&mut secret[..]); in get_or_create_factory_reset_secret() 32 self.factory_secret = Some(secret); in get_or_create_factory_reset_secret() 39 Some(secret) => Ok(SecureDeletionData { in get_factory_reset_secret() 40 factory_reset_secret: secret, in get_factory_reset_secret()
|
/system/keymaster/km_openssl/ |
D | kdf.cpp | 23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument 40 if (!secret || secret_len == 0) return false; in Init() 43 secret_key_.reset(dup_buffer(secret, secret_len)); in Init()
|
/system/vold/ |
D | KeyStorage.h | 32 KeyAuthentication(const std::string& s) : secret{s} {}; in KeyAuthentication() 34 bool usesKeystore() const { return secret.empty(); }; in usesKeystore() 36 const std::string secret; variable
|
D | FsCrypt.h | 28 bool fscrypt_set_user_key_protection(userid_t user_id, const std::string& secret); 32 bool fscrypt_unlock_user_key(userid_t user_id, int serial, const std::string& secret);
|
D | VoldNativeService.h | 118 binder::Status setUserKeyProtection(int32_t userId, const std::string& secret); 121 binder::Status unlockUserKey(int32_t userId, int32_t userSerial, const std::string& secret);
|
D | FsCrypt.cpp | 715 std::string secret; in authentication_from_hex() local 716 if (!parse_hex(secret_hex, &secret)) return std::optional<android::vold::KeyAuthentication>(); in authentication_from_hex() 717 if (secret.empty()) { in authentication_from_hex() 720 return android::vold::KeyAuthentication(secret); in authentication_from_hex() 773 if (auth->secret.empty()) { in fscrypt_set_user_key_protection()
|
D | VoldNativeService.cpp | 615 binder::Status VoldNativeService::setUserKeyProtection(int32_t userId, const std::string& secret) { in setUserKeyProtection() argument 619 return translateBool(fscrypt_set_user_key_protection(userId, secret)); in setUserKeyProtection() 631 const std::string& secret) { in unlockUserKey() argument 635 return translateBool(fscrypt_unlock_user_key(userId, userSerial, secret)); in unlockUserKey()
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | netd.te | 38 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 43 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | netd.te | 38 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 43 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/security/keystore2/tests/ |
D | keystore2_client_key_agreement_tests.rs | 67 let secret = op.finish(Some(local_pub_key), None).unwrap(); in check_agreement() localVariable 68 assert!(secret.is_some()); in check_agreement() 76 assert_eq!(secret.unwrap(), peer_secret); in check_agreement()
|
/system/sepolicy/private/ |
D | netd.te | 39 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 44 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | netd.te | 39 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 44 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/security/keystore2/src/ |
D | ec_crypto.rs | 67 let secret = ecdh_compute_key(other_public_key.get_point(), &self.0) in agree_key() localVariable 69 let prk = hkdf_extract(&secret, &hkdf).context(ks_err!("hkdf_extract on secret failed"))?; in agree_key()
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | netd.te | 40 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 45 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/netd/server/ |
D | InterfaceController.cpp | 218 std::string secret = oldSecret; in enableStablePrivacyAddresses() local 222 ASSIGN_OR_RETURN(secret, randomIPv6Address()); in enableStablePrivacyAddresses() 226 RETURN_IF_NOT_OK(sys.write(procFd.value(), makeSlice(secret))); in enableStablePrivacyAddresses() 233 return setProperty(kStableSecretProperty, secret); in enableStablePrivacyAddresses()
|
/system/vold/binder/android/os/ |
D | IVold.aidl | 91 void setUserKeyProtection(int userId, @utf8InCpp String secret); in setUserKeyProtection() argument 94 void unlockUserKey(int userId, int userSerial, @utf8InCpp String secret); in unlockUserKey() argument
|
/system/security/keystore2/src/crypto/ |
D | crypto.hpp | 47 const uint8_t *secret, size_t secret_len,
|
D | lib.rs | 232 pub fn hkdf_extract(secret: &[u8], salt: &[u8]) -> Result<ZVec, Error> { in hkdf_extract() 242 secret.as_ptr(), in hkdf_extract() 243 secret.len(), in hkdf_extract()
|
D | crypto.cpp | 208 bool HKDFExtract(uint8_t* out_key, size_t* out_len, const uint8_t* secret, size_t secret_len, in HKDFExtract() argument 211 auto result = HKDF_extract(out_key, out_len, digest, secret, secret_len, salt, salt_len); in HKDFExtract()
|
/system/keymint/ta/src/ |
D | device.rs | 188 let secret = self.derive_bytes_from_hbk(hkdf, RPC_HMAC_KEY_CONTEXT, RPC_HMAC_KEY_LEN)?; in compute_hmac_sha256() localVariable 189 crypto::hmac_sha256(hmac, &secret, input) in compute_hmac_sha256()
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | netd.te | 160 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 165 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | netd.te | 163 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 168 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|