Home
last modified time | relevance | path

Searched refs:encrypted_key (Results 1 – 9 of 9) sorted by relevance

/system/keymaster/key_blob_utils/
Dauth_encrypted_key_blob.cpp171 DeriveAesGcmKeyEncryptionKey(key.encrypted_key.format, key.hw_enforced, key.sw_enforced, in AesGcmDecryptKey()
178 int plaintext_len = key.encrypted_key.ciphertext.size(); in AesGcmDecryptKey()
182 key.encrypted_key.nonce.peek_read()) && in AesGcmDecryptKey()
184 key.encrypted_key.ciphertext.key_material, in AesGcmDecryptKey()
185 key.encrypted_key.ciphertext.size()) && in AesGcmDecryptKey()
187 const_cast<uint8_t*>(key.encrypted_key.tag.peek_read())))) { in AesGcmDecryptKey()
196 if (key.encrypted_key.ciphertext.size() != plaintext.size() || 0 != unused_len) { in AesGcmDecryptKey()
205 KmErrorOr<KeymasterKeyBlob> SerializeAuthEncryptedBlob(const EncryptedKey& encrypted_key, in SerializeAuthEncryptedBlob() argument
209 bool use_key_slot = requiresSecureDeletion(encrypted_key.format); in SerializeAuthEncryptedBlob()
211 size_t size = 1 /* version byte */ + encrypted_key.nonce.SerializedSize() + in SerializeAuthEncryptedBlob()
[all …]
/system/keymaster/km_openssl/
Decies_kem.cpp129 bool EciesKem::Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) { in Decrypt() argument
130 return Decrypt(private_key, encrypted_key.peek_read(), encrypted_key.available_read(), in Decrypt()
135 bool EciesKem::Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key, size_t encrypted_key_len, in Decrypt() argument
145 if (!key_exchange_->CalculateSharedKey(encrypted_key, encrypted_key_len, &shared_secret)) { in Decrypt()
/system/keymaster/include/keymaster/km_openssl/
Dkem.h47 virtual bool Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) = 0;
48 virtual bool Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key,
Decies_kem.h47 bool Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) override;
48 bool Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key, size_t encrypted_key_len,
/system/keymaster/include/keymaster/key_blob_utils/
Dauth_encrypted_key_blob.h79 EncryptedKey encrypted_key; member
107 KmErrorOr<KeymasterKeyBlob> SerializeAuthEncryptedBlob(const EncryptedKey& encrypted_key,
/system/keymaster/contexts/
Dpure_soft_keymaster_context.cpp582 Buffer encrypted_key, plaintext; in UnwrapKey() local
586 if (!encrypted_key.Reinitialize(secure_key.key_material_size + tag.data_length)) { in UnwrapKey()
589 if (!encrypted_key.write(secure_key.key_material, secure_key.key_material_size)) { in UnwrapKey()
592 if (!encrypted_key.write(tag.data, tag.data_length)) { in UnwrapKey()
605 error = aes_operation->Update(update_params, encrypted_key, &update_outparams, &plaintext, in UnwrapKey()
/system/security/keystore2/src/
Dsuper_key.rs589 let (encrypted_key, iv, tag) = aes_gcm_encrypt(super_key, &derived_key) in encrypt_with_password()
593 Ok((encrypted_key, metadata)) in encrypt_with_password()
607 let (encrypted_key, iv, tag) = aes_gcm_encrypt(key_blob, &(super_key.key)) in encrypt_with_aes_super_key()
612 Ok((encrypted_key, metadata)) in encrypt_with_aes_super_key()
649 let (ephem_key, salt, iv, encrypted_key, aead_tag) = in encrypt_with_hybrid_super_key()
657 Ok((encrypted_key, metadata)) in encrypt_with_hybrid_super_key()
/system/security/keystore2/test_utils/
Dffi_test_utils.cpp66 ASN1_OCTET_STRING* encrypted_key; member
75 ASN1_SIMPLE(TEST_SECURE_KEY_WRAPPER, encrypted_key, ASN1_OCTET_STRING),
409 if (enc_secure_key_size && !ASN1_OCTET_STRING_set(sec_key_wrapper->encrypted_key, in createWrappedKey()
/system/keymint/ta/src/
Dkeys.rs68 pub encrypted_key: &'a [u8], field
635 let mut imported_key_data = op.update(secure_key_wrapper.encrypted_key)?; in import_wrapped_key()