/system/authgraph/boringssl/src/ |
D | aes.rs | 44 let cipher = Cipher::aes_256_gcm(); in encrypt() localVariable 45 let mut crypter = ossl!(Crypter::new(cipher, Mode::Encrypt, &key.0, Some(&nonce.0)))?; in encrypt() 48 let mut ct = vec_try![0; payload.len() + cipher.block_size()]?; in encrypt() 67 let cipher = Cipher::aes_256_gcm(); in decrypt() localVariable 68 let mut crypter = ossl!(Crypter::new(cipher, Mode::Decrypt, &key.0, Some(&nonce.0)))?; in decrypt() 75 let mut pt = vec_try![0; ct.len() + cipher.block_size()]?; in decrypt()
|
/system/security/mls/mls-rs-crypto-boringssl/src/ |
D | aead.rs | 113 let cipher = Aes128Gcm::new(key[..self.key_size()].try_into()?); in seal() localVariable 114 Ok(cipher.seal(nonce_array, data, aad.unwrap_or_default())) in seal() 117 let cipher = Aes256Gcm::new(key[..self.key_size()].try_into()?); in seal() localVariable 118 Ok(cipher.seal(nonce_array, data, aad.unwrap_or_default())) in seal() 121 let cipher = Chacha20Poly1305::new(key[..self.key_size()].try_into()?); in seal() localVariable 122 Ok(cipher.seal(nonce_array, data, aad.unwrap_or_default())) in seal() 155 let cipher = Aes128Gcm::new(key[..self.key_size()].try_into()?); in open() localVariable 156 cipher in open() 161 let cipher = Aes256Gcm::new(key[..self.key_size()].try_into()?); in open() localVariable 162 cipher in open() [all …]
|
/system/keymint/boringssl/src/ |
D | des.rs | 39 let cipher = Cipher::des_ede3(); in begin() localVariable 40 let mut crypter = Crypter::new(cipher, dir_mode, &key.0, None) in begin() 52 let cipher = Cipher::des_ede3_cbc(); in begin() localVariable 53 let mut crypter = Crypter::new(cipher, dir_mode, &key.0, Some(&n[..])) in begin()
|
D | aes.rs | 43 let (cipher, key) = match &key { in begin() 48 let mut crypter = Crypter::new(cipher, dir_mode, key, None) in begin() 60 let (cipher, key) = match &key { in begin() 65 let mut crypter = Crypter::new(cipher, dir_mode, key, Some(&n[..])) in begin() 76 let (cipher, key) = match &key { in begin() 81 Crypter::new(cipher, dir_mode, key, Some(&n[..])) in begin() 106 let (cipher, key) = match &key { in begin_aead() 111 Crypter::new(cipher, dir_mode, key, Some(&n[..])).map_err(openssl_err!( in begin_aead()
|
D | aes_cmac.rs | 34 let (cipher, k) = unsafe { in begin() 58 cipher, in begin()
|
/system/security/keystore2/src/crypto/ |
D | crypto.cpp | 64 const EVP_CIPHER* cipher = EVP_aes_256_gcm(); in getAesCipherForKey() local 66 cipher = EVP_aes_128_gcm(); in getAesCipherForKey() 68 return cipher; in getAesCipherForKey() 92 const EVP_CIPHER* cipher = getAesCipherForKey(key_size); in AES_gcm_encrypt() local 96 EVP_EncryptInit_ex(ctx.get(), cipher, nullptr /* engine */, key, iv); in AES_gcm_encrypt() 128 const EVP_CIPHER* cipher = getAesCipherForKey(key_size); in AES_gcm_decrypt() local 132 EVP_DecryptInit_ex(ctx.get(), cipher, nullptr /* engine */, key, iv); in AES_gcm_decrypt()
|
/system/vold/ |
D | MetadataCrypt.cpp | 60 struct CryptoType cipher = invalid_crypto_type; member 83 return KeyGeneration{options.cipher.get_keysize(), true, options.use_hw_wrapped_key}; in makeGen() 179 auto target = std::make_unique<DmTargetDefaultKey>(0, *nr_sec, options.cipher.get_kernel_name(), in create_crypto_blk_dev() 230 options->cipher = lookup_cipher(cipher_name); in parse_options() 231 if (options->cipher.get_kernel_name() == nullptr) { in parse_options() 282 options.cipher = legacy_aes_256_xts; in fscrypt_mount_metadata_encrypted()
|
/system/secretkeeper/core/src/ |
D | lib.rs | 23 pub mod cipher; module
|
D | ta.rs | 19 use crate::cipher; 349 cipher::decrypt_message(self.aes_gcm.as_ref(), recv_key, encrypt0, &seq_num_incoming) 365 cipher::encrypt_message(&*self.aes_gcm, &*self.rng, send_key, kid, rsp, &seq_num_outgoing)
|
/system/authgraph/core/src/ |
D | arc.rs | 95 cipher: &dyn AesGcm, in create_arc() 128 cipher.encrypt(encrypting_key, input, aad, &nonce_for_enc) in create_arc() 138 cipher: &dyn AesGcm, in decipher_arc() 149 cipher.decrypt(decrypting_key, cipher_text, aad, &nonce) in decipher_arc()
|
/system/secretkeeper/client/src/ |
D | lib.rs | 36 use secretkeeper_core::cipher; 92 let request_bytes = cipher::encrypt_message( in secret_management_request() 106 cipher::decrypt_message( in secret_management_request()
|
/system/core/fs_mgr/libdm/include/libdm/ |
D | dm_target.h | 271 DmTargetCrypt(uint64_t start, uint64_t length, const std::string& cipher, in DmTargetCrypt() argument 275 cipher_(cipher), in DmTargetCrypt() 304 DmTargetDefaultKey(uint64_t start, uint64_t length, const std::string& cipher, in DmTargetDefaultKey() argument 307 cipher_(cipher), in DmTargetDefaultKey()
|
/system/extras/verity/ |
D | Utils.java | 154 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); in decryptPrivateKey() local 155 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters()); in decryptPrivateKey() 158 return epkInfo.getKeySpec(cipher); in decryptPrivateKey()
|
/system/secretkeeper/client/ |
D | Android.bp | 41 // TODO(b/291228655): This is required for 'cipher', refactor to cut this dependency.
|
/system/keymaster/km_openssl/ |
D | block_cipher_operation.cpp | 234 const EVP_CIPHER* cipher = in InitializeCipher() local 238 if (!EVP_CipherInit_ex(&ctx_, cipher, nullptr /* engine */, key.key_material, iv_.data, in InitializeCipher()
|