/system/security/keystore2/src/ |
D | maintenance.rs | 72 fn on_user_password_changed(user_id: i32, password: Option<Password>) -> Result<()> { in on_user_password_changed() 79 if let Some(pw) = password.as_ref() { in on_user_password_changed() 94 DB.with(|db| match password { in on_user_password_changed() 127 password: Password, in init_user_super_keys() 139 &password, in init_user_super_keys() 299 fn onUserPasswordChanged(&self, user_id: i32, password: Option<&[u8]>) -> BinderResult<()> { in onUserPasswordChanged() 303 password.is_some() in onUserPasswordChanged() 306 Self::on_user_password_changed(user_id, password.map(|pw| pw.into())) in onUserPasswordChanged() 319 password: &[u8], in initUserSuperKeys() 324 self.init_user_super_keys(user_id, password.into(), allow_existing) in initUserSuperKeys()
|
D | authorization.rs | 127 fn on_device_unlocked(&self, user_id: i32, password: Option<Password>) -> Result<()> { in on_device_unlocked() 131 password.is_some(), in on_device_unlocked() 138 if let Some(password) = password { in on_device_unlocked() 140 skm.unlock_user(&mut db.borrow_mut(), &LEGACY_IMPORTER, user_id as u32, &password) in on_device_unlocked() 258 fn onDeviceUnlocked(&self, user_id: i32, password: Option<&[u8]>) -> BinderResult<()> { in onDeviceUnlocked() 260 self.on_device_unlocked(user_id, password.map(|pw| pw.into())).map_err(into_logged_binder) in onDeviceUnlocked()
|
D | super_key.rs | 748 password: &Password, in create_super_key() 768 Self::encrypt_with_password(&super_key, password).context(ks_err!())?; in create_super_key() 792 password: &Password, in get_or_create_super_key() 800 password, in get_or_create_super_key() 804 self.create_super_key(db, user_id, key_type, password, reencrypt_with) in get_or_create_super_key() 814 password: &Password, in unlock_unlocked_device_required_keys() 842 password, in unlock_unlocked_device_required_keys() 857 password, in unlock_unlocked_device_required_keys() 1146 password: &Password, in init_user() 1160 Self::encrypt_with_password(&super_key, password) in init_user() [all …]
|
/system/security/keystore2/aidl/android/security/maintenance/ |
D | IKeystoreMaintenance.aidl | 53 void initUserSuperKeys(in int userId, in byte[] password, in boolean allowExisting); in initUserSuperKeys() argument 92 void onUserPasswordChanged(in int userId, in @nullable byte[] password); in onUserPasswordChanged() argument
|
/system/nvram/hal/tests/ |
D | nvram_hal_test.cc | 338 std::string password = "hunter2"; in TEST() local 342 password); in TEST() 347 EXPECT_EQ(NV_RESULT_SUCCESS, device.WriteSpace(kTestIndex1, data, password)); in TEST() 427 std::string password = "hunter2"; in TEST() local 430 password); in TEST() 431 EXPECT_EQ(NV_RESULT_SUCCESS, device.WriteSpace(index, "test", password)); in TEST() 441 EXPECT_EQ(NV_RESULT_SUCCESS, device.ReadSpace(index, 4, password, &data)); in TEST() 446 std::string password = "hunter2"; in TEST() local 449 password); in TEST() 450 ASSERT_EQ(NV_RESULT_SUCCESS, device.WriteSpace(index, "test", password)); in TEST() [all …]
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper.h | 92 const uint8_t *key, uint32_t key_length, const uint8_t *password, 186 virtual bool DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password); 203 const SizedBuffer & password);
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 194 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const SizedBuffer & password) { in CreatePasswordHandle() argument 211 const size_t to_sign_size = password.size() + metadata_length; in CreatePasswordHandle() 217 memcpy(to_sign.get() + metadata_length, password.Data<uint8_t>(), password.size()); in CreatePasswordHandle() 239 bool GateKeeper::DoVerify(const password_handle_t *expected_handle, const SizedBuffer &password) { in DoVerify() argument 240 if (!password) return false; in DoVerify() 244 expected_handle->flags, expected_handle->version, password)) { in DoVerify()
|
/system/security/keystore2/aidl/android/security/authorization/ |
D | IKeystoreAuthorization.aidl | 78 void onDeviceUnlocked(in int userId, in @nullable byte[] password); in onDeviceUnlocked() argument
|
/system/extras/verity/ |
D | Utils.java | 148 char[] password = System.console().readPassword("Password for the private key file: "); in decryptPrivateKey() local 151 Key key = skFactory.generateSecret(new PBEKeySpec(password)); in decryptPrivateKey() 152 Arrays.fill(password, '\0'); in decryptPrivateKey()
|
/system/core/trusty/gatekeeper/fuzz/ |
D | Android.bp | 34 // password in the emulator.
|
/system/sepolicy/microdroid/reqd_mask/ |
D | access_vectors | 712 password
|
/system/sepolicy/private/ |
D | access_vectors | 712 password
|
D | system_server.te | 1064 # Allow lock_settings service to manage locksettings keys (e.g. the synthetic password key).
|
/system/sepolicy/microdroid/system/private/ |
D | access_vectors | 712 password
|
/system/sepolicy/reqd_mask/ |
D | access_vectors | 712 password
|
/system/extras/simpleperf/demo/SimpleperfExampleCpp/gradle/wrapper/ |
D | gradle-wrapper.jar | ... )
java.net.URI uri
String username
String password
private java.lang.String calculateUserAgent ()
String ... |
/system/extras/simpleperf/demo/JavaApi/gradle/wrapper/ |
D | gradle-wrapper.jar | ... )
java.net.URI uri
String username
String password
private java.lang.String calculateUserAgent ()
String ... |
/system/extras/simpleperf/demo/CppApi/gradle/wrapper/ |
D | gradle-wrapper.jar | ... )
java.net.URI uri
String username
String password
private java.lang.String calculateUserAgent ()
String ... |
/system/extras/simpleperf/demo/SimpleperfExampleKotlin/gradle/wrapper/ |
D | gradle-wrapper.jar | ... )
java.net.URI uri
String username
String password
private java.lang.String calculateUserAgent ()
String ... |
/system/extras/simpleperf/demo/SimpleperfExampleJava/gradle/wrapper/ |
D | gradle-wrapper.jar | ... )
java.net.URI uri
String username
String password
private java.lang.String calculateUserAgent ()
String ... |