/frameworks/base/core/tests/coretests/src/android/security/keystore/recovery/ |
D | KeyDerivationParamsTest.java | 46 assertArrayEquals(SALT, keyDerivationParams.getSalt()); in createSha256Params_setsSalt() 62 assertArrayEquals(SALT, keyDerivationParams.getSalt()); in writeToParcel_writesSalt()
|
D | KeyChainProtectionParamsTest.java | 59 assertArrayEquals(SALT, keyDerivationParams.getSalt()); in build_setsKeyDerivationParams() 89 assertArrayEquals(SALT, keyDerivationParams.getSalt()); in writeToParcel_writesKeyDerivationParams()
|
D | KeyChainSnapshotTest.java | 84 assertArrayEquals(SALT, keyDerivationParams.getSalt()); in build_setsKeyChainProtectionParams() 143 assertArrayEquals(SALT, keyDerivationParams.getSalt()); in writeToParcel_writesKeyChainProtectionParams()
|
/frameworks/base/libs/androidfw/tests/ |
D | ObbFile_test.cpp | 87 const unsigned char* newSalt = mObbFile->getSalt(&saltLen); in TEST_F()
|
/frameworks/base/libs/androidfw/include/androidfw/ |
D | ObbFile.h | 74 const unsigned char* getSalt(size_t* length) const { in getSalt() function
|
/frameworks/base/core/jni/ |
D | android_content_res_ObbScanner.cpp | 68 const unsigned char* salt = obb->getSalt(&saltLen); in android_content_res_ObbScanner_getObbInfo()
|
/frameworks/base/core/java/android/security/keystore/recovery/ |
D | KeyDerivationParams.java | 126 public @NonNull byte[] getSalt() { in getSalt() method in KeyDerivationParams
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/storage/ |
D | RecoverySnapshotStorageTest.java | 194 assertArrayEquals(b.getSalt(), a.getSalt()); in assertKeyDerivationParamsAreEqual()
|
/frameworks/base/tools/obbtool/ |
D | Main.cpp | 145 const unsigned char* salt = obb->getSalt(&saltLen); in doInfo()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/serialization/ |
D | KeyChainSnapshotSerializerTest.java | 112 assertThat(roundTripParams().getKeyDerivationParams().getSalt()).isEqualTo(SALT); in roundTripParams_persistsSalt()
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/serialization/ |
D | KeyChainSnapshotSerializer.java | 147 writePropertyTag(xmlSerializer, TAG_SALT, keyDerivationParams.getSalt()); in writeKeyDerivationParamsProperties()
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternUtils.java | 1125 private String getSalt(int userId) { in getSalt() method in LockPatternUtils 1155 byte[] saltedPassword = (password + getSalt(userId)).getBytes(); in legacyPasswordToHash() 1180 sha256.update((passwordToHash + getSalt(userId)).getBytes()); in passwordToHistoryHash()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
D | KeySyncTaskTest.java | 524 keyDerivationParams.getSalt(), in run_sendsEncryptedKeysIfAvailableToSync_withRawPublicKey()
|
/frameworks/base/api/ |
D | system-current.txt | 4350 method public byte[] getSalt();
|
D | current.txt | 71138 method public abstract byte[] getSalt(); 71221 method public final byte[] getSalt(); 71229 method public byte[] getSalt();
|
/frameworks/base/config/ |
D | hiddenapi-public-dex.txt | 39395 Landroid/security/keystore/recovery/KeyDerivationParams;->getSalt()[B 71520 Ljavax/crypto/interfaces/PBEKey;->getSalt()[B 71683 Ljavax/crypto/spec/PBEKeySpec;->getSalt()[B 71689 Ljavax/crypto/spec/PBEParameterSpec;->getSalt()[B
|
D | boot-image-profile.txt | 4940 HPLandroid/security/keystore/recovery/KeyDerivationParams;->getSalt()[B 50946 HSPLjavax/crypto/interfaces/PBEKey;->getSalt()[B 50959 HSPLjavax/crypto/spec/PBEKeySpec;->getSalt()[B 50963 HSPLjavax/crypto/spec/PBEParameterSpec;->getSalt()[B
|
/frameworks/opt/setupwizard/tools/docs/ |
D | android-22.txt | 51541 method public abstract byte[] getSalt(); 51624 method public final byte[] getSalt(); 51630 method public byte[] getSalt();
|