/system/keymaster/key_blob_utils/ |
D | auth_encrypted_key_blob.cpp | 171 DeriveAesGcmKeyEncryptionKey(key.encrypted_key.format, key.hw_enforced, key.sw_enforced, in AesGcmDecryptKey() 178 int plaintext_len = key.encrypted_key.ciphertext.size(); in AesGcmDecryptKey() 182 key.encrypted_key.nonce.peek_read()) && in AesGcmDecryptKey() 184 key.encrypted_key.ciphertext.key_material, in AesGcmDecryptKey() 185 key.encrypted_key.ciphertext.size()) && in AesGcmDecryptKey() 187 const_cast<uint8_t*>(key.encrypted_key.tag.peek_read())))) { in AesGcmDecryptKey() 196 if (key.encrypted_key.ciphertext.size() != plaintext.size() || 0 != unused_len) { in AesGcmDecryptKey() 205 KmErrorOr<KeymasterKeyBlob> SerializeAuthEncryptedBlob(const EncryptedKey& encrypted_key, in SerializeAuthEncryptedBlob() argument 209 bool use_key_slot = requiresSecureDeletion(encrypted_key.format); in SerializeAuthEncryptedBlob() 211 size_t size = 1 /* version byte */ + encrypted_key.nonce.SerializedSize() + in SerializeAuthEncryptedBlob() [all …]
|
/system/keymaster/km_openssl/ |
D | ecies_kem.cpp | 129 bool EciesKem::Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) { in Decrypt() argument 130 return Decrypt(private_key, encrypted_key.peek_read(), encrypted_key.available_read(), in Decrypt() 135 bool EciesKem::Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key, size_t encrypted_key_len, in Decrypt() argument 145 if (!key_exchange_->CalculateSharedKey(encrypted_key, encrypted_key_len, &shared_secret)) { in Decrypt()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | kem.h | 47 virtual bool Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) = 0; 48 virtual bool Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key,
|
D | ecies_kem.h | 47 bool Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) override; 48 bool Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key, size_t encrypted_key_len,
|
/system/keymaster/include/keymaster/key_blob_utils/ |
D | auth_encrypted_key_blob.h | 79 EncryptedKey encrypted_key; member 107 KmErrorOr<KeymasterKeyBlob> SerializeAuthEncryptedBlob(const EncryptedKey& encrypted_key,
|
/system/keymaster/contexts/ |
D | pure_soft_keymaster_context.cpp | 582 Buffer encrypted_key, plaintext; in UnwrapKey() local 586 if (!encrypted_key.Reinitialize(secure_key.key_material_size + tag.data_length)) { in UnwrapKey() 589 if (!encrypted_key.write(secure_key.key_material, secure_key.key_material_size)) { in UnwrapKey() 592 if (!encrypted_key.write(tag.data, tag.data_length)) { in UnwrapKey() 605 error = aes_operation->Update(update_params, encrypted_key, &update_outparams, &plaintext, in UnwrapKey()
|
/system/security/keystore2/src/ |
D | super_key.rs | 589 let (encrypted_key, iv, tag) = aes_gcm_encrypt(super_key, &derived_key) in encrypt_with_password() 593 Ok((encrypted_key, metadata)) in encrypt_with_password() 607 let (encrypted_key, iv, tag) = aes_gcm_encrypt(key_blob, &(super_key.key)) in encrypt_with_aes_super_key() 612 Ok((encrypted_key, metadata)) in encrypt_with_aes_super_key() 649 let (ephem_key, salt, iv, encrypted_key, aead_tag) = in encrypt_with_hybrid_super_key() 657 Ok((encrypted_key, metadata)) in encrypt_with_hybrid_super_key()
|
/system/security/keystore2/test_utils/ |
D | ffi_test_utils.cpp | 66 ASN1_OCTET_STRING* encrypted_key; member 75 ASN1_SIMPLE(TEST_SECURE_KEY_WRAPPER, encrypted_key, ASN1_OCTET_STRING), 409 if (enc_secure_key_size && !ASN1_OCTET_STRING_set(sec_key_wrapper->encrypted_key, in createWrappedKey()
|
/system/keymint/ta/src/ |
D | keys.rs | 68 pub encrypted_key: &'a [u8], field 635 let mut imported_key_data = op.update(secure_key_wrapper.encrypted_key)?; in import_wrapped_key()
|