/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncTaskTest.java | 304 verify(mMockScrypt).scrypt(eq(password.getBytes()), any(), in run_useScryptToHashPasswordInTestMode() 341 verify(mMockScrypt, never()).scrypt(any(), any(), anyInt(), anyInt(), anyInt(), anyInt()); in run_useSha256ToHashPatternInProdMode() 375 verify(mMockScrypt).scrypt(eq(shortPassword.getBytes()), any(), in run_useScryptToHashPasswordInProdMode() 427 verify(mMockScrypt, never()).scrypt(any(), any(), anyInt(), anyInt(), anyInt(), anyInt()); in run_InTestModeWithWhitelistedCredentials() 450 verify(mMockScrypt, never()).scrypt(any(), any(), anyInt(), anyInt(), anyInt(), anyInt()); in run_InTestModeWithNonWhitelistedCredentials() 657 verify(mMockScrypt).scrypt(eq(password.getBytes()), any(), in run_setsCorrectTypeForPassword() 690 verify(mMockScrypt).scrypt(eq(pin.getBytes()), any(), in run_setsCorrectTypeForPin() 721 verify(mMockScrypt, never()).scrypt(any(), any(), anyInt(), anyInt(), anyInt(), anyInt()); in run_setsCorrectTypeForPattern() 807 verify(mMockScrypt, never()).scrypt(any(), any(), anyInt(), anyInt(), anyInt(), anyInt()); in run_customLockScreen_RecoveryStatusFailure()
|
H A D | MockScrypt.java | 31 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() method in MockScrypt
|
/aosp12/frameworks/base/core/java/android/security/ |
H A D | Scrypt.java | 29 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() method in Scrypt
|
/aosp12/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncTask.java | 141 Scrypt scrypt) { in KeySyncTask() argument 151 mScrypt = scrypt; in KeySyncTask() 511 return mScrypt.scrypt( in hashCredentialsByScrypt()
|
/aosp12/system/core/gatekeeperd/ |
H A D | Android.bp | 51 include_dirs: ["external/scrypt/lib/crypto"],
|
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | MockSyntheticPasswordManager.java | 98 protected byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() method in MockSyntheticPasswordManager
|
/aosp12/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | SyntheticPasswordManager.java | 1372 return scrypt(password, data.salt, 1 << data.scryptN, 1 << data.scryptR, 1 << data.scryptP, in computePasswordToken() 1392 protected byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { in scrypt() method in SyntheticPasswordManager 1393 return new Scrypt().scrypt(password, salt, n, r, p, outLen); in scrypt()
|
/aosp12/system/vold/ |
H A D | cryptfs.cpp | 1247 static int scrypt(const char* passwd, const unsigned char* salt, unsigned char* ikey, void* params)… in scrypt() function 1326 if (scrypt(passwd, salt, ikey, crypt_ftr)) { in encrypt_master_key() 1439 *kdf = scrypt; in get_kdf_func()
|
/aosp12/frameworks/base/boot/hiddenapi/ |
H A D | hiddenapi-max-target-o.txt | 52015 Landroid/security/Scrypt;->scrypt([B[BIIII)[B
|
/aosp12/frameworks/base/services/ |
H A D | art-profile | 23908 HPLcom/android/server/locksettings/SyntheticPasswordManager;->scrypt([B[BIIII)[B+]Landroid/security…
|