Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 28) sorted by relevance

12

/system/keymaster/include/keymaster/km_openssl/
Dhkdf.h35 bool Init(Buffer& secret, Buffer& salt) { in Init() argument
36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), in Init()
40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { in Init() argument
41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len); in Init()
Diso18033kdf.h36 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument
37 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
Dkdf.h35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
/system/keymint/common/src/keyblob/
Dsdd_mem.rs30 let mut secret = [0; 32]; in get_or_create_factory_reset_secret() localVariable
31 rng.fill_bytes(&mut secret[..]); in get_or_create_factory_reset_secret()
32 self.factory_secret = Some(secret); in get_or_create_factory_reset_secret()
39 Some(secret) => Ok(SecureDeletionData { in get_factory_reset_secret()
40 factory_reset_secret: secret, in get_factory_reset_secret()
/system/keymaster/km_openssl/
Dkdf.cpp23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument
40 if (!secret || secret_len == 0) return false; in Init()
43 secret_key_.reset(dup_buffer(secret, secret_len)); in Init()
/system/vold/
DKeyStorage.h32 KeyAuthentication(const std::string& s) : secret{s} {}; in KeyAuthentication()
34 bool usesKeystore() const { return secret.empty(); }; in usesKeystore()
36 const std::string secret; variable
DFsCrypt.h28 bool fscrypt_set_user_key_protection(userid_t user_id, const std::string& secret);
32 bool fscrypt_unlock_user_key(userid_t user_id, int serial, const std::string& secret);
DVoldNativeService.h118 binder::Status setUserKeyProtection(int32_t userId, const std::string& secret);
121 binder::Status unlockUserKey(int32_t userId, int32_t userSerial, const std::string& secret);
DFsCrypt.cpp715 std::string secret; in authentication_from_hex() local
716 if (!parse_hex(secret_hex, &secret)) return std::optional<android::vold::KeyAuthentication>(); in authentication_from_hex()
717 if (secret.empty()) { in authentication_from_hex()
720 return android::vold::KeyAuthentication(secret); in authentication_from_hex()
773 if (auth->secret.empty()) { in fscrypt_set_user_key_protection()
DVoldNativeService.cpp615 binder::Status VoldNativeService::setUserKeyProtection(int32_t userId, const std::string& secret) { in setUserKeyProtection() argument
619 return translateBool(fscrypt_set_user_key_protection(userId, secret)); in setUserKeyProtection()
631 const std::string& secret) { in unlockUserKey() argument
635 return translateBool(fscrypt_unlock_user_key(userId, userSerial, secret)); in unlockUserKey()
/system/sepolicy/prebuilts/api/32.0/private/
Dnetd.te38 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
43 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/prebuilts/api/31.0/private/
Dnetd.te38 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
43 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/security/keystore2/tests/
Dkeystore2_client_key_agreement_tests.rs67 let secret = op.finish(Some(local_pub_key), None).unwrap(); in check_agreement() localVariable
68 assert!(secret.is_some()); in check_agreement()
76 assert_eq!(secret.unwrap(), peer_secret); in check_agreement()
/system/sepolicy/private/
Dnetd.te39 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
44 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/prebuilts/api/34.0/private/
Dnetd.te39 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
44 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/security/keystore2/src/
Dec_crypto.rs67 let secret = ecdh_compute_key(other_public_key.get_point(), &self.0) in agree_key() localVariable
69 let prk = hkdf_extract(&secret, &hkdf).context(ks_err!("hkdf_extract on secret failed"))?; in agree_key()
/system/sepolicy/prebuilts/api/33.0/private/
Dnetd.te40 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
45 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/netd/server/
DInterfaceController.cpp218 std::string secret = oldSecret; in enableStablePrivacyAddresses() local
222 ASSIGN_OR_RETURN(secret, randomIPv6Address()); in enableStablePrivacyAddresses()
226 RETURN_IF_NOT_OK(sys.write(procFd.value(), makeSlice(secret))); in enableStablePrivacyAddresses()
233 return setProperty(kStableSecretProperty, secret); in enableStablePrivacyAddresses()
/system/vold/binder/android/os/
DIVold.aidl91 void setUserKeyProtection(int userId, @utf8InCpp String secret); in setUserKeyProtection() argument
94 void unlockUserKey(int userId, int userSerial, @utf8InCpp String secret); in unlockUserKey() argument
/system/security/keystore2/src/crypto/
Dcrypto.hpp47 const uint8_t *secret, size_t secret_len,
Dlib.rs232 pub fn hkdf_extract(secret: &[u8], salt: &[u8]) -> Result<ZVec, Error> { in hkdf_extract()
242 secret.as_ptr(), in hkdf_extract()
243 secret.len(), in hkdf_extract()
Dcrypto.cpp208 bool HKDFExtract(uint8_t* out_key, size_t* out_len, const uint8_t* secret, size_t secret_len, in HKDFExtract() argument
211 auto result = HKDF_extract(out_key, out_len, digest, secret, secret_len, salt, salt_len); in HKDFExtract()
/system/keymint/ta/src/
Ddevice.rs188 let secret = self.derive_bytes_from_hbk(hkdf, RPC_HMAC_KEY_CONTEXT, RPC_HMAC_KEY_LEN)?; in compute_hmac_sha256() localVariable
189 crypto::hmac_sha256(hmac, &secret, input) in compute_hmac_sha256()
/system/sepolicy/prebuilts/api/30.0/public/
Dnetd.te160 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
165 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/prebuilts/api/29.0/public/
Dnetd.te163 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
168 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.

12