Home
last modified time | relevance | path

Searched refs:Password (Results 1 – 12 of 12) sorted by relevance

/system/security/keystore2/src/fuzzers/
Dkeystore2_unsafe_fuzzer.rs27 hmac_sha256, parse_subject_from_certificate, Password, ZVec,
70 Password { enumerator
151 FuzzCommand::Password { pw, salt, key_length } => {
152 let _res = Password::from(pw).derive_key(salt, key_length % MAX_SIZE_MODIFIER);
/system/security/keystore2/src/
Dsuper_key.rs45 aes_gcm_decrypt, aes_gcm_encrypt, generate_aes256_key, generate_salt, Password, ZVec,
411 pw: &Password, in unlock_user_key() argument
537 pw: &Password, in check_and_unlock_super_key() argument
566 pw: Option<&Password>, in check_and_initialize_super_key() argument
612 pw: &Password, in populate_cache_from_super_key_blob() argument
624 pw: &Password, in extract_super_key_from_key_entry() argument
634 (Some(&EncryptedBy::Password), Some(salt), Some(iv), Some(tag)) => { in extract_super_key_from_key_entry()
670 pw: &Password, in encrypt_with_password() argument
677 metadata.add(BlobMetaEntry::EncryptedBy(EncryptedBy::Password)); in encrypt_with_password()
820 password: &Password, in get_or_create_super_key() argument
[all …]
Dauthorization.rs37 use keystore2_crypto::Password;
140 password: Option<Password>, in on_lock_screen_event() argument
Dmaintenance.rs42 use keystore2_crypto::Password;
72 fn on_user_password_changed(user_id: i32, password: Option<Password>) -> Result<()> { in on_user_password_changed()
Dlegacy_importer.rs37 use keystore2_crypto::{Password, ZVec};
347 pw: &Password, in with_try_import_super_key() argument
710 fn check_and_import_super_key(&mut self, user_id: u32, pw: &Password) -> Result<()> { in check_and_import_super_key()
Dlegacy_blob.rs28 use keystore2_crypto::{aes_gcm_decrypt, Password, ZVec};
1307 pub fn load_super_key(&self, user_id: u32, pw: &Password) -> Result<Option<ZVec>> { in load_super_key()
1955 let pw: Password = PASSWORD.into(); in test_with_encrypted_characteristics()
2042 let pw: Password = PASSWORD.into(); in test_with_encrypted_certificates()
2130 let pw: Password = PASSWORD.into(); in test_in_place_key_migration()
Ddatabase.rs331 Password, enumerator
341 Self::Password => Ok(ToSqlOutput::Owned(Value::Null)), in to_sql()
350 ValueRef::Null => Ok(Self::Password), in column_result()
5322 blob_metadata.add(BlobMetaEntry::EncryptedBy(EncryptedBy::Password)); in make_test_key_entry()
5351 blob_metadata.add(BlobMetaEntry::EncryptedBy(EncryptedBy::Password)); in make_test_key_entry_test_vector()
5538 let pw: keystore2_crypto::Password = (&b"xyzabc"[..]).into(); in test_unbind_keys_for_user_removes_superkeys()
5611 let pw: keystore2_crypto::Password = (&b"xyzabc"[..]).into(); in test_store_super_key()
5756 blob_metadata.add(BlobMetaEntry::EncryptedBy(EncryptedBy::Password)); in test_verify_key_table_size_reporting()
/system/security/keystore2/src/crypto/
Dlib.rs176 pub enum Password<'a> { enum
183 impl<'a> From<&'a [u8]> for Password<'a> { implementation
189 impl<'a> Password<'a> { implementation
226 pub fn try_clone(&self) -> Result<Password<'static>, Error> { in try_clone()
227 Ok(Password::Owned(ZVec::try_from(self.get_key())?)) in try_clone()
/system/security/keystore2/tests/legacy_blobs/
Dkeystore2_legacy_blob_tests.rs41 use keystore2_crypto::{Password, ZVec};
178 let pw: Password = PASSWORD.into(); in keystore2_encrypted_characteristics()
435 let pw: Password = PASSWORD.into(); in keystore2_encrypted_certificates()
/system/keymint/ta/src/
Dkeys.rs608 if (secure_id & (HardwareAuthenticatorType::Password as u64) in import_wrapped_key()
609 == (HardwareAuthenticatorType::Password as u64)) in import_wrapped_key()
616 } else if secure_id & (HardwareAuthenticatorType::Password as u64) in import_wrapped_key()
617 == (HardwareAuthenticatorType::Password as u64) in import_wrapped_key()
Doperation.rs732 & (HardwareAuthenticatorType::Password as u32) in maybe_unlock()
/system/keymint/wire/src/
Dkeymint.rs273 Password = 1, enumerator