Searched refs:secret (Results 1 – 25 of 33) sorted by relevance
12
35 secret: VmSecret, field49 self.secret in getVmInstanceSecret()59 if let Some(bcc) = self.secret.dice_artifacts().bcc() { in getDiceAttestationChain()68 Ok(self.secret.dice_artifacts().cdi_attest().to_vec()) in getDiceAttestationCdi()77 generate_attestation_key_and_csr(challenge, self.secret.dice_artifacts()) in requestAttestation()109 secret: VmSecret, in new()111 Self { allow_restricted_apis, virtual_machine_service: vm_service, secret } in new()129 secret: VmSecret, in register_vm_payload_service()133 VmPayloadService::new(allow_restricted_apis, vm_service, secret), in register_vm_payload_service()
113 if let Some(secret) = get_secret(&mut session, id, Some(policy.clone()))? { in new()114 *skp_secret = secret; in new()237 secret: Zeroizing<[u8; SECRET_SIZE]>,240 let store_request = StoreSecretRequest { id: Id(id), secret: Secret(*secret), sealing_policy };269 Ok(Some(get_response.secret.0))
28 secret: &[u8], in hkdf()40 secret.as_ptr(),41 secret.len(),
92 fn aead_ctx_from_secret(secret: &[u8]) -> Result<AeadContext> { in aead_ctx_from_secret()93 let key = hkdf::<32>(secret, /* salt= */ &[], b"vm-instance", Digester::sha512())?; in aead_ctx_from_secret()102 secret: &[u8], in get_recorded_entry()111 let aead_ctx = aead_ctx_from_secret(secret)?; in get_recorded_entry()135 secret: &[u8], in record_instance_entry()142 let aead_ctx = aead_ctx_from_secret(secret)?; in record_instance_entry()
23 Updatable VMs are achieved by changing Microdroid's secret management. It now supports26 1. Secretkeeper protected secret: This is random 64 bytes generated by VM on first boot & stored in31 Secretkeeper protected secret is protected against rollback of boot images i.e. VM instance rebooted34 instance, Microdroid Manager (on behalf of the VM payload) generates a secret, stores it in35 Secretkeeper and on further reboots, this is retrieved from it. Along with this secret, a46 constructed by Microdroid Manager on behalf of the payload and is stored along with the secret.65 The sealing policy is updated each time the secret is retrieved. This ensures the secrets are only78 the secret ( for ex. VM) while storing it, includes a corresponding sealing policy such that only
134 byte[] secret = export(ohttpJniWrapper, requestContext); in decryptObliviousHttpResponse()145 byte[] prk = extract(ohttpJniWrapper, messageDigest, secret, salt); in decryptObliviousHttpResponse()244 byte[] secret, in extract() argument247 ohttpJniWrapper.hkdfExtract(messageDigest, secret, salt); in extract()
237 HpkeExportResponse secret = in encrypt() local250 byte[] prk = extract(jniWrapper, messageDigest, secret.getBytes(), salt); in encrypt()279 byte[] secret, in extract() argument282 ohttpJniWrapper.hkdfExtract(messageDigest, secret, salt); in extract()
228 HkdfMessageDigestNativeRef hkdfMessageDigestNativeRef, byte[] secret, byte[] salt) { in hkdfExtract() argument230 byte[] extractResponse = hkdfExtract(hkdfMessageDigestNativeRef.getAddress(), secret, salt); in hkdfExtract()346 private native byte[] hkdfExtract(long hkdfMessageDigestNativeRef, byte[] secret, byte[] salt); in hkdfExtract() argument
119 HkdfMessageDigestNativeRef hkdfMessageDigestNativeRef, byte[] secret, byte[] salt); in hkdfExtract() argument
170 Every VM has a 32-byte secret unique to it, which is not available to the171 host. We refer to this as the VM identity. The secret, and thus the identity,175 In Android 14 the secret is derived, using the [Open Profile for185 Any change to any of these will mean a different secret is generated. So while187 not have access to the same secret. An attempt to start an existing VM instance188 which doesn't derive the same secret will fail.193 instance with a new secret.195 The payload code is not given direct access to the VM secret, but an API is208 secret, even if it is otherwise identical.339 directory. The data is encrypted using a key derived from the VM secret, which[all …]
453 jbyte *secret = env->GetByteArrayElements(secretArray, 0); in Java_com_android_adservices_ohttp_OhttpJniWrapper_hkdfExtract() local463 &prk_len, evp_md, reinterpret_cast<const uint8_t *>(secret), in Java_com_android_adservices_ohttp_OhttpJniWrapper_hkdfExtract()466 env->ReleaseByteArrayElements(secretArray, secret, JNI_ABORT); in Java_com_android_adservices_ohttp_OhttpJniWrapper_hkdfExtract()472 env->ReleaseByteArrayElements(secretArray, secret, JNI_ABORT); in Java_com_android_adservices_ohttp_OhttpJniWrapper_hkdfExtract()
111 void* _Nonnull secret, size_t size);
182 secret: *mut u8, in AVmPayload_getVmInstanceSecret()194 ptr::copy_nonoverlapping(vm_secret.as_ptr(), secret, size); in AVmPayload_getVmInstanceSecret()
153 JNIEnv *env, jclass, jlong hkdfMd, jbyteArray secret, jbyteArray salt);
41 // If api_key contains the right secret string, this allows Cobalt to identify
33 // secret payload.
13 derived from the VM secret and AES256 cipher with HCTR2 mode. The Block level encryption ensures
42 for an example. The config file contains secret information; do NOT commit
247 next-stage secret, and a certificate chain, intended for pVM attestation. Note404 - the `/chosen/avf,new-instance` flag, set when pvmfw generated a new secret
META-INF/ META-INF/MANIFEST.MF META-INF/maven/ META- ...
36 …ng.unicorn.game.girls.color.quest.pet.building.minecraft.cube.pixel.rainbow.secret.free 10250,102382529 secret.hide.calculator 101846421 com.tsua.my.secret.diary.lock.photo 10166
com/google/crypto/tink/subtle/prf/StreamingPrf.class StreamingPrf.java package ...
10560 Rights" means any and all rights under patent law, copyright law, trade secret law, trademark law,10731 copyright, trademark, trade secret, trade dress, patent or other intellectual property right of any
1dictionary=main:pt_br,locale=pt_BR,description=Português (Brasil),date ...