/system/secretkeeper/core/src/ |
D | cipher.rs | 22 use authgraph_core::traits::{AesGcm, Rng}; 28 aes_gcm: &dyn AesGcm, in decrypt_message() argument 42 aes_gcm: &dyn AesGcm, in encrypt_message() argument
|
D | ta.rs | 30 use authgraph_core::traits::{AesGcm, CryptoTraitImpl, Device, EcDsa, Rng, Sha256}; 73 aes_gcm: Box<dyn AesGcm>, 370 fn get_or_create_per_boot_key(&self, _: &dyn AesGcm, _: &mut dyn Rng) -> Result<AesKey, Error> { in get_or_create_per_boot_key() argument
|
/system/authgraph/boringssl/src/ |
D | aes.rs | 23 traits::AesGcm, 36 impl AesGcm for BoringAes { 84 fn box_clone(&self) -> Box<dyn AesGcm> { in box_clone() argument
|
D | test_device.rs | 67 aes: &dyn traits::AesGcm, in get_or_create_per_boot_key() argument
|
/system/authgraph/core/src/ |
D | traits.rs | 35 pub aes_gcm: Box<dyn AesGcm>, 51 pub trait AesGcm: Send { trait 75 fn box_clone(&self) -> Box<dyn AesGcm>; in box_clone() argument 159 aes: &dyn AesGcm, in get_or_create_per_boot_key() argument
|
D | arc.rs | 23 traits::{AesGcm, Rng}, 95 cipher: &dyn AesGcm, in create_arc() argument 138 cipher: &dyn AesGcm, in decipher_arc() argument
|
/system/secretkeeper/client/src/ |
D | authgraph_dev.rs | 34 use authgraph_core::traits::{AesGcm, Device, EcDsa}; 95 _aes: &dyn traits::AesGcm, in get_or_create_per_boot_key() argument
|
/system/security/keystore2/src/ |
D | legacy_importer.rs | 28 watchdog as wd, AesGcm, 296 super_key: Option<Arc<dyn AesGcm + Send + Sync>>, in with_try_import() 334 let super_key = super_key.map(|sk| -> Arc<dyn AesGcm> { sk }); in with_try_import() 484 super_key: &Option<Arc<dyn AesGcm>>, in characteristics_file_to_cache() argument 589 super_key: Option<Arc<dyn AesGcm>>, in check_and_import() argument
|
D | utils.rs | 595 pub trait AesGcm { trait 613 impl<T: AesGcmKey> AesGcm for T {
|
D | super_key.rs | 31 utils::{watchdog as wd, AesGcm, AID_KEYSTORE}, 166 impl AesGcm for SuperKey { 405 ) -> Option<Arc<dyn AesGcm + Send + Sync>> { in get_after_first_unlock_key_by_user_id() 407 .map(|sk| -> Arc<dyn AesGcm + Send + Sync> { sk }) in get_after_first_unlock_key_by_user_id()
|
D | legacy_blob.rs | 22 utils::AesGcm, 630 fn decrypt_if_required(super_key: &Option<Arc<dyn AesGcm>>, blob: Blob) -> Result<Blob> { in decrypt_if_required() argument 693 super_key: &Option<Arc<dyn AesGcm>>, in read_characteristics_file() argument 1236 super_key: &Option<Arc<dyn AesGcm>>, in load_by_uid_alias() argument 2171 let super_key: Option<Arc<dyn AesGcm>> = Some(super_key); in test_in_place_key_migration()
|
D | database.rs | 2923 use crate::utils::AesGcm;
|
/system/keymint/ta/src/ |
D | operation.rs | 45 AesGcm(Box<dyn AadOperation>), enumerator 292 crypto_op: CryptoOperation::AesGcm( in begin_operation() 442 CryptoOperation::AesGcm(op) => op.update_aad(data), in op_update_aad() 486 CryptoOperation::AesGcm(op) => op.update(data), in op_update() 554 CryptoOperation::AesGcm(mut op) => { in op_finish()
|
/system/authgraph/tests/src/ |
D | lib.rs | 10 AesGcm, Device, EcDh, EcDsa, Hkdf, Hmac, MonotonicClock, Rng, Sha256, 150 pub fn test_aes_gcm_keygen<A: AesGcm, R: Rng>(aes: &A, rng: &mut R) { in test_aes_gcm_keygen() argument 157 pub fn test_aes_gcm_roundtrip<A: AesGcm, R: Rng>(aes: &A, rng: &mut R) { in test_aes_gcm_roundtrip() argument 180 pub fn test_aes_gcm<A: AesGcm>(aes: &A) { in test_aes_gcm()
|
/system/security/keystore2/tests/legacy_blobs/ |
D | keystore2_legacy_blob_tests.rs | 38 use keystore2::utils::AesGcm;
|