Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 15 of 15) sorted by relevance

/system/authgraph/boringssl/src/
Daes.rs44 let cipher = Cipher::aes_256_gcm(); in encrypt() localVariable
45 let mut crypter = ossl!(Crypter::new(cipher, Mode::Encrypt, &key.0, Some(&nonce.0)))?; in encrypt()
48 let mut ct = vec_try![0; payload.len() + cipher.block_size()]?; in encrypt()
67 let cipher = Cipher::aes_256_gcm(); in decrypt() localVariable
68 let mut crypter = ossl!(Crypter::new(cipher, Mode::Decrypt, &key.0, Some(&nonce.0)))?; in decrypt()
75 let mut pt = vec_try![0; ct.len() + cipher.block_size()]?; in decrypt()
/system/security/mls/mls-rs-crypto-boringssl/src/
Daead.rs113 let cipher = Aes128Gcm::new(key[..self.key_size()].try_into()?); in seal() localVariable
114 Ok(cipher.seal(nonce_array, data, aad.unwrap_or_default())) in seal()
117 let cipher = Aes256Gcm::new(key[..self.key_size()].try_into()?); in seal() localVariable
118 Ok(cipher.seal(nonce_array, data, aad.unwrap_or_default())) in seal()
121 let cipher = Chacha20Poly1305::new(key[..self.key_size()].try_into()?); in seal() localVariable
122 Ok(cipher.seal(nonce_array, data, aad.unwrap_or_default())) in seal()
155 let cipher = Aes128Gcm::new(key[..self.key_size()].try_into()?); in open() localVariable
156 cipher in open()
161 let cipher = Aes256Gcm::new(key[..self.key_size()].try_into()?); in open() localVariable
162 cipher in open()
[all …]
/system/keymint/boringssl/src/
Ddes.rs39 let cipher = Cipher::des_ede3(); in begin() localVariable
40 let mut crypter = Crypter::new(cipher, dir_mode, &key.0, None) in begin()
52 let cipher = Cipher::des_ede3_cbc(); in begin() localVariable
53 let mut crypter = Crypter::new(cipher, dir_mode, &key.0, Some(&n[..])) in begin()
Daes.rs43 let (cipher, key) = match &key { in begin()
48 let mut crypter = Crypter::new(cipher, dir_mode, key, None) in begin()
60 let (cipher, key) = match &key { in begin()
65 let mut crypter = Crypter::new(cipher, dir_mode, key, Some(&n[..])) in begin()
76 let (cipher, key) = match &key { in begin()
81 Crypter::new(cipher, dir_mode, key, Some(&n[..])) in begin()
106 let (cipher, key) = match &key { in begin_aead()
111 Crypter::new(cipher, dir_mode, key, Some(&n[..])).map_err(openssl_err!( in begin_aead()
Daes_cmac.rs34 let (cipher, k) = unsafe { in begin()
58 cipher, in begin()
/system/security/keystore2/src/crypto/
Dcrypto.cpp64 const EVP_CIPHER* cipher = EVP_aes_256_gcm(); in getAesCipherForKey() local
66 cipher = EVP_aes_128_gcm(); in getAesCipherForKey()
68 return cipher; in getAesCipherForKey()
92 const EVP_CIPHER* cipher = getAesCipherForKey(key_size); in AES_gcm_encrypt() local
96 EVP_EncryptInit_ex(ctx.get(), cipher, nullptr /* engine */, key, iv); in AES_gcm_encrypt()
128 const EVP_CIPHER* cipher = getAesCipherForKey(key_size); in AES_gcm_decrypt() local
132 EVP_DecryptInit_ex(ctx.get(), cipher, nullptr /* engine */, key, iv); in AES_gcm_decrypt()
/system/vold/
DMetadataCrypt.cpp60 struct CryptoType cipher = invalid_crypto_type; member
83 return KeyGeneration{options.cipher.get_keysize(), true, options.use_hw_wrapped_key}; in makeGen()
179 auto target = std::make_unique<DmTargetDefaultKey>(0, *nr_sec, options.cipher.get_kernel_name(), in create_crypto_blk_dev()
230 options->cipher = lookup_cipher(cipher_name); in parse_options()
231 if (options->cipher.get_kernel_name() == nullptr) { in parse_options()
282 options.cipher = legacy_aes_256_xts; in fscrypt_mount_metadata_encrypted()
/system/secretkeeper/core/src/
Dlib.rs23 pub mod cipher; module
Dta.rs19 use crate::cipher;
349 cipher::decrypt_message(self.aes_gcm.as_ref(), recv_key, encrypt0, &seq_num_incoming)
365 cipher::encrypt_message(&*self.aes_gcm, &*self.rng, send_key, kid, rsp, &seq_num_outgoing)
/system/authgraph/core/src/
Darc.rs95 cipher: &dyn AesGcm, in create_arc()
128 cipher.encrypt(encrypting_key, input, aad, &nonce_for_enc) in create_arc()
138 cipher: &dyn AesGcm, in decipher_arc()
149 cipher.decrypt(decrypting_key, cipher_text, aad, &nonce) in decipher_arc()
/system/secretkeeper/client/src/
Dlib.rs36 use secretkeeper_core::cipher;
92 let request_bytes = cipher::encrypt_message( in secret_management_request()
106 cipher::decrypt_message( in secret_management_request()
/system/core/fs_mgr/libdm/include/libdm/
Ddm_target.h271 DmTargetCrypt(uint64_t start, uint64_t length, const std::string& cipher, in DmTargetCrypt() argument
275 cipher_(cipher), in DmTargetCrypt()
304 DmTargetDefaultKey(uint64_t start, uint64_t length, const std::string& cipher, in DmTargetDefaultKey() argument
307 cipher_(cipher), in DmTargetDefaultKey()
/system/extras/verity/
DUtils.java154 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); in decryptPrivateKey() local
155 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters()); in decryptPrivateKey()
158 return epkInfo.getKeySpec(cipher); in decryptPrivateKey()
/system/secretkeeper/client/
DAndroid.bp41 // TODO(b/291228655): This is required for 'cipher', refactor to cut this dependency.
/system/keymaster/km_openssl/
Dblock_cipher_operation.cpp234 const EVP_CIPHER* cipher = in InitializeCipher() local
238 if (!EVP_CipherInit_ex(&ctx_, cipher, nullptr /* engine */, key.key_material, iv_.data, in InitializeCipher()