Home
last modified time | relevance | path

Searched refs:entropy (Results 1 – 16 of 16) sorted by relevance

/system/security/keystore/
Duser_state.cpp79 ResponseCode UserState::initialize(const android::String8& pw, Entropy* entropy) { in initialize() argument
80 if (!generateMasterKey(entropy)) { in initialize()
83 ResponseCode response = writeMasterKey(pw, entropy); in initialize()
133 ResponseCode UserState::writeMasterKey(const android::String8& pw, Entropy* entropy) { in writeMasterKey() argument
137 return masterKeyBlob.writeBlob(mMasterKeyFile, passwordKey, STATE_NO_ERROR, entropy); in writeMasterKey()
140 ResponseCode UserState::readMasterKey(const android::String8& pw, Entropy* entropy) { in readMasterKey() argument
170 if (!generateSalt(entropy)) { in readMasterKey()
173 response = writeMasterKey(pw, entropy); in readMasterKey()
240 bool UserState::generateSalt(Entropy* entropy) { in generateSalt() argument
241 return entropy->generate_random_data(mSalt, sizeof(mSalt)); in generateSalt()
[all …]
Duser_state.h50 ResponseCode initialize(const android::String8& pw, Entropy* entropy);
54 ResponseCode writeMasterKey(const android::String8& pw, Entropy* entropy);
55 ResponseCode readMasterKey(const android::String8& pw, Entropy* entropy);
70 bool generateSalt(Entropy* entropy);
71 bool generateMasterKey(Entropy* entropy);
Dkeystore_main.cpp139 Entropy entropy; in main() local
140 CHECK(entropy.open()) << "Failed to open entropy source."; in main()
158 keystore::KeyStore keyStore(&entropy, kmDevices, minimalAllowedSecurityLevelForNewKeys); in main()
Dkey_store_service.h108 const ::std::vector<uint8_t>& entropy, int32_t uid, int32_t flags,
132 const ::std::vector<uint8_t>& entropy, int32_t uid,
142 const ::std::vector<uint8_t>& signature, const ::std::vector<uint8_t>& entropy,
Dblob.h126 Entropy* entropy);
Dblob.cpp209 Entropy* entropy) { in writeBlob() argument
222 if (!entropy->generate_random_data(mBlob.initialization_vector, kGcmIvSizeBytes)) { in writeBlob()
DKeyStore.h43 KeyStore(Entropy* entropy, const KeymasterDevices& kmDevices,
Dkey_store_service.cpp756 Status KeyStoreService::addRngEntropy(const ::std::vector<uint8_t>& entropy, int32_t flags, in addRngEntropy() argument
764 KeyStoreServiceReturnCode(KS_HANDLE_HIDL_ERROR(device->addRngEntropy(entropy)))); in addRngEntropy()
771 const ::std::vector<uint8_t>& entropy, int uid, int flags, in generateKey()
815 rc = KS_HANDLE_HIDL_ERROR(dev->addRngEntropy(entropy)); in generateKey()
1224 const ::std::vector<uint8_t>& entropy, int32_t uid, in begin()
1309 if (entropy.size()) { in begin()
1310 result->resultCode = KS_HANDLE_HIDL_ERROR(dev->addRngEntropy(entropy)); in begin()
1505 const ::std::vector<uint8_t>& entropy, OperationResult* result) { in finish()
1522 if (entropy.size()) { in finish()
1523 result->resultCode = KS_HANDLE_HIDL_ERROR(op.device->addRngEntropy(entropy)); in finish()
DAndroid.bp28 "entropy.cpp",
Dkeystore_client_impl.cpp182 KeystoreClientImpl::addRandomNumberGeneratorEntropy(const std::string& entropy, int32_t flags) { in addRandomNumberGeneratorEntropy() argument
184 auto binder_result = keystore_->addRngEntropy(blob2hidlVec(entropy), flags, &result); in addRandomNumberGeneratorEntropy()
DKeyStore.cpp66 KeyStore::KeyStore(Entropy* entropy, const KeymasterDevices& kmDevices, in KeyStore() argument
68 : mEntropy(entropy), mKmDevices(kmDevices), in KeyStore()
/system/security/keystore/binder/android/security/
DIKeystoreService.aidl59 int generateKey(String alias, in KeymasterArguments arguments, in byte[] entropy, int uid, in generateKey() argument
68 in KeymasterArguments params, in byte[] entropy, int uid); in begin() argument
71 in byte[] entropy); in finish() argument
/system/security/keystore/include/keystore/
Dkeystore_client.h88 virtual KeyStoreNativeReturnCode addRandomNumberGeneratorEntropy(const std::string& entropy,
Dkeystore_client_mock.h43 MOCK_METHOD1(addRandomNumberGeneratorEntropy, int32_t(const std::string& entropy));
Dkeystore_client_impl.h46 KeyStoreNativeReturnCode addRandomNumberGeneratorEntropy(const std::string& entropy,
/system/core/rootdir/
Dinit.rc44 # Mix device-specific information into the entropy pool
400 # Avoid predictable entropy pool. Carry over entropy from previous boot.
401 copy /data/system/entropy.dat /dev/urandom