Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 17 of 17) sorted by relevance

/system/keymaster/include/keymaster/km_openssl/
Dhkdf.h35 bool Init(Buffer& secret, Buffer& salt) { in Init() argument
36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), in Init()
40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { in Init() argument
41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len); in Init()
Diso18033kdf.h37 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument
38 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
Dkdf.h35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
/system/keymaster/km_openssl/
Dkdf.cpp23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument
40 if (!secret || secret_len == 0) in Init()
44 secret_key_.reset(dup_buffer(secret, secret_len)); in Init()
/system/vold/
DFsCrypt.h27 const std::string& secret);
29 const std::string& secret);
33 const std::string& secret);
DKeyStorage.h34 KeyAuthentication(const std::string& t, const std::string& s) : token{t}, secret{s} {}; in KeyAuthentication()
36 bool usesKeymaster() const { return !token.empty() || secret.empty(); }; in usesKeymaster()
39 const std::string secret; variable
DKeyStorage.cpp317 } else if (auth.secret.empty()) { in getStretching()
331 static bool stretchSecret(const std::string& stretching, const std::string& secret, in stretchSecret() argument
334 if (!secret.empty()) { in stretchSecret()
340 *stretched = secret; in stretchSecret()
350 if (crypto_scrypt(reinterpret_cast<const uint8_t*>(secret.data()), secret.size(), in stretchSecret()
368 if (!stretchSecret(stretching, auth.secret, salt, &stretched)) return false; in generateAppId()
DVoldNativeService.h113 const std::string& secret);
115 const std::string& secret);
119 const std::string& secret);
DVoldNativeService.cpp672 const std::string& secret) { in addUserKeyAuth() argument
676 return translateBool(fscrypt_add_user_key_auth(userId, userSerial, token, secret)); in addUserKeyAuth()
681 const std::string& secret) { in clearUserKeyAuth() argument
685 return translateBool(fscrypt_clear_user_key_auth(userId, userSerial, token, secret)); in clearUserKeyAuth()
697 const std::string& secret) { in unlockUserKey() argument
701 return translateBool(fscrypt_unlock_user_key(userId, userSerial, token, secret)); in unlockUserKey()
DFsCrypt.cpp623 std::string token, secret; in authentication_from_hex() local
625 if (!parse_hex(secret_hex, &secret)) return std::optional<android::vold::KeyAuthentication>(); in authentication_from_hex()
626 if (secret.empty()) { in authentication_from_hex()
629 return android::vold::KeyAuthentication(token, secret); in authentication_from_hex()
/system/vold/binder/android/os/
DIVold.aidl91 @utf8InCpp String secret); in addUserKeyAuth() argument
93 @utf8InCpp String secret); in clearUserKeyAuth() argument
97 @utf8InCpp String secret); in unlockUserKey() argument
/system/sepolicy/private/
Dnetd.te37 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
42 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/netd/server/
DInterfaceController.cpp220 std::string secret = oldSecret; in enableStablePrivacyAddresses() local
224 ASSIGN_OR_RETURN(secret, randomIPv6Address()); in enableStablePrivacyAddresses()
228 RETURN_IF_NOT_OK(sys.write(procFd.value(), makeSlice(secret))); in enableStablePrivacyAddresses()
235 return setProperty(kStableSecretProperty, secret); in enableStablePrivacyAddresses()
/system/sepolicy/prebuilts/api/27.0/public/
Dnetd.te123 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
128 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/prebuilts/api/28.0/public/
Dnetd.te142 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
147 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/prebuilts/api/29.0/public/
Dnetd.te163 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
168 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
/system/sepolicy/prebuilts/api/30.0/public/
Dnetd.te160 # persist.netd.stable_secret contains RFC 7217 secret key which should never be
165 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.