/system/keymaster/include/keymaster/km_openssl/ |
D | hkdf.h | 35 bool Init(Buffer& secret, Buffer& salt) { in Init() argument 36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), in Init() 40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { in Init() argument 41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len); in Init()
|
D | iso18033kdf.h | 37 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument 38 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
|
D | kdf.h | 35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
|
/system/keymaster/km_openssl/ |
D | kdf.cpp | 23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument 40 if (!secret || secret_len == 0) in Init() 44 secret_key_.reset(dup_buffer(secret, secret_len)); in Init()
|
/system/vold/ |
D | FsCrypt.h | 27 const std::string& secret); 29 const std::string& secret); 33 const std::string& secret);
|
D | KeyStorage.h | 34 KeyAuthentication(const std::string& t, const std::string& s) : token{t}, secret{s} {}; in KeyAuthentication() 36 bool usesKeymaster() const { return !token.empty() || secret.empty(); }; in usesKeymaster() 39 const std::string secret; variable
|
D | KeyStorage.cpp | 317 } else if (auth.secret.empty()) { in getStretching() 331 static bool stretchSecret(const std::string& stretching, const std::string& secret, in stretchSecret() argument 334 if (!secret.empty()) { in stretchSecret() 340 *stretched = secret; in stretchSecret() 350 if (crypto_scrypt(reinterpret_cast<const uint8_t*>(secret.data()), secret.size(), in stretchSecret() 368 if (!stretchSecret(stretching, auth.secret, salt, &stretched)) return false; in generateAppId()
|
D | VoldNativeService.h | 113 const std::string& secret); 115 const std::string& secret); 119 const std::string& secret);
|
D | VoldNativeService.cpp | 672 const std::string& secret) { in addUserKeyAuth() argument 676 return translateBool(fscrypt_add_user_key_auth(userId, userSerial, token, secret)); in addUserKeyAuth() 681 const std::string& secret) { in clearUserKeyAuth() argument 685 return translateBool(fscrypt_clear_user_key_auth(userId, userSerial, token, secret)); in clearUserKeyAuth() 697 const std::string& secret) { in unlockUserKey() argument 701 return translateBool(fscrypt_unlock_user_key(userId, userSerial, token, secret)); in unlockUserKey()
|
D | FsCrypt.cpp | 623 std::string token, secret; in authentication_from_hex() local 625 if (!parse_hex(secret_hex, &secret)) return std::optional<android::vold::KeyAuthentication>(); in authentication_from_hex() 626 if (secret.empty()) { in authentication_from_hex() 629 return android::vold::KeyAuthentication(token, secret); in authentication_from_hex()
|
/system/vold/binder/android/os/ |
D | IVold.aidl | 91 @utf8InCpp String secret); in addUserKeyAuth() argument 93 @utf8InCpp String secret); in clearUserKeyAuth() argument 97 @utf8InCpp String secret); in unlockUserKey() argument
|
/system/sepolicy/private/ |
D | netd.te | 37 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 42 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/netd/server/ |
D | InterfaceController.cpp | 220 std::string secret = oldSecret; in enableStablePrivacyAddresses() local 224 ASSIGN_OR_RETURN(secret, randomIPv6Address()); in enableStablePrivacyAddresses() 228 RETURN_IF_NOT_OK(sys.write(procFd.value(), makeSlice(secret))); in enableStablePrivacyAddresses() 235 return setProperty(kStableSecretProperty, secret); in enableStablePrivacyAddresses()
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | netd.te | 123 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 128 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | netd.te | 142 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 147 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | netd.te | 163 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 168 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | netd.te | 160 # persist.netd.stable_secret contains RFC 7217 secret key which should never be 165 # the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
|