/system/security/keystore2/src/fuzzers/ |
D | keystore2_unsafe_fuzzer.rs | 27 hmac_sha256, parse_subject_from_certificate, Password, ZVec, 70 Password { enumerator 151 FuzzCommand::Password { pw, salt, key_length } => { 152 let _res = Password::from(pw).derive_key(salt, key_length % MAX_SIZE_MODIFIER);
|
/system/security/keystore2/src/ |
D | super_key.rs | 45 aes_gcm_decrypt, aes_gcm_encrypt, generate_aes256_key, generate_salt, Password, ZVec, 411 pw: &Password, in unlock_user_key() argument 537 pw: &Password, in check_and_unlock_super_key() argument 566 pw: Option<&Password>, in check_and_initialize_super_key() argument 612 pw: &Password, in populate_cache_from_super_key_blob() argument 624 pw: &Password, in extract_super_key_from_key_entry() argument 634 (Some(&EncryptedBy::Password), Some(salt), Some(iv), Some(tag)) => { in extract_super_key_from_key_entry() 670 pw: &Password, in encrypt_with_password() argument 677 metadata.add(BlobMetaEntry::EncryptedBy(EncryptedBy::Password)); in encrypt_with_password() 820 password: &Password, in get_or_create_super_key() argument [all …]
|
D | authorization.rs | 37 use keystore2_crypto::Password; 140 password: Option<Password>, in on_lock_screen_event() argument
|
D | maintenance.rs | 42 use keystore2_crypto::Password; 72 fn on_user_password_changed(user_id: i32, password: Option<Password>) -> Result<()> { in on_user_password_changed()
|
D | legacy_importer.rs | 37 use keystore2_crypto::{Password, ZVec}; 347 pw: &Password, in with_try_import_super_key() argument 710 fn check_and_import_super_key(&mut self, user_id: u32, pw: &Password) -> Result<()> { in check_and_import_super_key()
|
D | legacy_blob.rs | 28 use keystore2_crypto::{aes_gcm_decrypt, Password, ZVec}; 1307 pub fn load_super_key(&self, user_id: u32, pw: &Password) -> Result<Option<ZVec>> { in load_super_key() 1955 let pw: Password = PASSWORD.into(); in test_with_encrypted_characteristics() 2042 let pw: Password = PASSWORD.into(); in test_with_encrypted_certificates() 2130 let pw: Password = PASSWORD.into(); in test_in_place_key_migration()
|
D | database.rs | 331 Password, enumerator 341 Self::Password => Ok(ToSqlOutput::Owned(Value::Null)), in to_sql() 350 ValueRef::Null => Ok(Self::Password), in column_result() 5322 blob_metadata.add(BlobMetaEntry::EncryptedBy(EncryptedBy::Password)); in make_test_key_entry() 5351 blob_metadata.add(BlobMetaEntry::EncryptedBy(EncryptedBy::Password)); in make_test_key_entry_test_vector() 5538 let pw: keystore2_crypto::Password = (&b"xyzabc"[..]).into(); in test_unbind_keys_for_user_removes_superkeys() 5611 let pw: keystore2_crypto::Password = (&b"xyzabc"[..]).into(); in test_store_super_key() 5756 blob_metadata.add(BlobMetaEntry::EncryptedBy(EncryptedBy::Password)); in test_verify_key_table_size_reporting()
|
/system/security/keystore2/src/crypto/ |
D | lib.rs | 176 pub enum Password<'a> { enum 183 impl<'a> From<&'a [u8]> for Password<'a> { implementation 189 impl<'a> Password<'a> { implementation 226 pub fn try_clone(&self) -> Result<Password<'static>, Error> { in try_clone() 227 Ok(Password::Owned(ZVec::try_from(self.get_key())?)) in try_clone()
|
/system/security/keystore2/tests/legacy_blobs/ |
D | keystore2_legacy_blob_tests.rs | 41 use keystore2_crypto::{Password, ZVec}; 178 let pw: Password = PASSWORD.into(); in keystore2_encrypted_characteristics() 435 let pw: Password = PASSWORD.into(); in keystore2_encrypted_certificates()
|
/system/keymint/ta/src/ |
D | keys.rs | 608 if (secure_id & (HardwareAuthenticatorType::Password as u64) in import_wrapped_key() 609 == (HardwareAuthenticatorType::Password as u64)) in import_wrapped_key() 616 } else if secure_id & (HardwareAuthenticatorType::Password as u64) in import_wrapped_key() 617 == (HardwareAuthenticatorType::Password as u64) in import_wrapped_key()
|
D | operation.rs | 732 & (HardwareAuthenticatorType::Password as u32) in maybe_unlock()
|
/system/keymint/wire/src/ |
D | keymint.rs | 273 Password = 1, enumerator
|