/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncUtilsTest.java | 251 byte[] vaultParams = randomBytes(100); in decryptRecoveryClaimResponse_decryptsAValidResponse() 252 byte[] recoveryKey = randomBytes(32); in decryptRecoveryClaimResponse_decryptsAValidResponse() 267 byte[] vaultParams = randomBytes(100); in decryptRecoveryClaimResponse_throwsIfCannotDecrypt() 268 byte[] recoveryKey = randomBytes(32); in decryptRecoveryClaimResponse_throwsIfCannotDecrypt() 288 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 289 byte[] vaultParams = randomBytes(100); in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 310 byte[] vaultParams = randomBytes(100); in encryptRecoveryClaim_cannotBeDecryptedWithoutChallenge() 335 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 336 byte[] vaultParams = randomBytes(100); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 362 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() [all …]
|
H A D | RecoverableKeyGeneratorTest.java | 141 randomBytes(KEY_SIZE_BYTES), in importKey_storesNullMetadata() 150 randomBytes(KEY_SIZE_BYTES), in importKey_storesNonNullMetadata() 158 byte[] rawMaterial = randomBytes(KEY_SIZE_BYTES); in importKey_storesTheWrappedVersionOfTheRawMaterial() 183 private static byte[] randomBytes(int n) { in randomBytes() method in RecoverableKeyGeneratorTest
|
H A D | RecoverableKeyStoreManagerTest.java | 212 byte[] keyMaterial = randomBytes(APPLICATION_KEY_SIZE_BYTES); in importKey_storesTheKey() 245 byte[] keyMaterial = randomBytes(APPLICATION_KEY_SIZE_BYTES); in importKeyWithMetadata_nullMetadata_storesTheKey() 258 byte[] keyMaterial = randomBytes(APPLICATION_KEY_SIZE_BYTES); in importKeyWithMetadata_nonNullMetadata_storesTheKey() 921 .setEncryptedKeyMaterial(randomBytes(32)) in recoverKeyChainSnapshot_throwsIfNoSessionIsPresent() 925 /*recoveryKeyBlob=*/ randomBytes(32), in recoverKeyChainSnapshot_throwsIfNoSessionIsPresent() 945 /*encryptedRecoveryKey=*/ randomBytes(60), in recoverKeyChainSnapshot_throwsIfRecoveryClaimCannotBeDecrypted() 1017 byte[] applicationKeyBytes = randomBytes(32); in recoverKeyChainSnapshot_returnsDecryptedKeys() 1048 byte[] applicationKeyBytes1 = randomBytes(32); in recoverKeyChainSnapshot_worksOnOtherApplicationKeysIfOneDecryptionFails() 1049 byte[] applicationKeyBytes2 = randomBytes(32); in recoverKeyChainSnapshot_worksOnOtherApplicationKeysIfOneDecryptionFails() 1292 return new SecretKeySpec(randomBytes(32), "AES"); in randomRecoveryKey() [all …]
|
H A D | KeySyncTaskTest.java | 166 byte[] salt = randomBytes(16); in hashCredentialsBySaltedSha256_returnsSameHashForSameCredentialsAndSalt() 175 byte[] salt = randomBytes(16); in hashCredentialsBySaltedSha256_returnsDifferentHashForDifferentCredentials() 189 KeySyncTask.hashCredentialsBySaltedSha256(randomBytes(64), in hashCredentialsBySaltedSha256_returnsDifferentHashForDifferentSalt() 191 KeySyncTask.hashCredentialsBySaltedSha256(randomBytes(64), in hashCredentialsBySaltedSha256_returnsDifferentHashForDifferentSalt() 866 private static byte[] randomBytes(int n) { in randomBytes() method in KeySyncTaskTest
|
/aosp12/packages/services/Telephony/testapps/TestRcsApp/aosp_test_rcsclient/src/com/android/libraries/rcs/simpleclient/protocol/msrp/ |
H A D | MsrpUtils.java | 52 byte[] randomBytes = new byte[8]; in generateRandomId() 53 random.nextBytes(randomBytes); in generateRandomId() 55 for (byte b : randomBytes) { in generateRandomId()
|
/aosp12/frameworks/base/media/java/android/mtp/ |
H A D | MtpServer.java | 104 byte[] randomBytes = new byte[sID_LEN_BYTES]; in getRandId() 106 randomVal.nextBytes(randomBytes); in getRandId() 107 return HexEncoding.encodeToString(randomBytes); in getRandId()
|
/aosp12/system/security/keystore2/src/crypto/ |
H A D | lib.rs | 22 extractSubjectFromCertificate, generateKeyFromPassword, randomBytes, AES_gcm_decrypt, 52 if unsafe { randomBytes(key.as_mut_ptr(), AES_256_KEY_LENGTH) } { in generate_aes256_key() 68 if unsafe { randomBytes(data.as_mut_ptr(), size) } { in generate_random_data() 127 if !unsafe { randomBytes(iv.as_mut_ptr(), GCM_IV_LENGTH) } { in aes_gcm_encrypt()
|
H A D | crypto.hpp | 25 bool randomBytes(uint8_t* out, size_t len);
|
H A D | Android.bp | 62 "--allowlist-function", "randomBytes",
|
H A D | crypto.cpp | 69 bool randomBytes(uint8_t* out, size_t len) { in randomBytes() function
|
/aosp12/hardware/interfaces/security/keymint/support/include/remote_prov/ |
H A D | remote_prov_utils.h | 58 bytevec randomBytes(size_t numBytes);
|
/aosp12/frameworks/base/services/backup/java/com/android/server/backup/fullbackup/ |
H A D | PerformAdbBackupTask.java | 146 .randomBytes(PasswordUtils.PBKDF2_SALT_SIZE); in emitAesBackupHeader() 156 .randomBytes(PasswordUtils.PBKDF2_SALT_SIZE); in emitAesBackupHeader()
|
/aosp12/hardware/interfaces/security/keymint/support/ |
H A D | remote_prov_utils.cpp | 31 bytevec randomBytes(size_t numBytes) { in randomBytes() function
|
/aosp12/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | InstantAppRegistry.java | 335 byte[] randomBytes = new byte[8]; 336 new SecureRandom().nextBytes(randomBytes); 337 String id = HexEncoding.encodeToString(randomBytes, false /* upperCase */);
|
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/ |
H A D | VtsRemotelyProvisionedComponentTests.cpp | 275 CertificateRequestTest() : eekId_(string_to_bytevec("eekid")), challenge_(randomBytes(32)) { in CertificateRequestTest()
|
/aosp12/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | UserBackupManagerService.java | 1197 public byte[] randomBytes(int bits) { in randomBytes() method in UserBackupManagerService
|
/aosp12/art/build/boot/hiddenapi/ |
H A D | hiddenapi-max-target-o-low-priority.txt | 4741 Ljava/security/SecureRandom;->randomBytes:[B
|