Home
last modified time | relevance | path

Searched refs:encrypted_key (Results 1 – 7 of 7) sorted by relevance

/system/keymaster/key_blob_utils/
Dauth_encrypted_key_blob.cpp177 int plaintext_len = key.encrypted_key.ciphertext.size(); in AesGcmDecryptKey()
181 key.encrypted_key.nonce.peek_read()) && in AesGcmDecryptKey()
183 key.encrypted_key.ciphertext.key_material, in AesGcmDecryptKey()
184 key.encrypted_key.ciphertext.size()) && in AesGcmDecryptKey()
186 const_cast<uint8_t*>(key.encrypted_key.tag.peek_read())))) { in AesGcmDecryptKey()
197 if (key.encrypted_key.ciphertext.size() != plaintext.size() || 0 != unused_len) { in AesGcmDecryptKey()
206 KeymasterKeyBlob SerializeAuthEncryptedBlob(const EncryptedKey& encrypted_key, in SerializeAuthEncryptedBlob() argument
213 size_t size = 1 /* version byte */ + encrypted_key.nonce.SerializedSize() + in SerializeAuthEncryptedBlob()
214 encrypted_key.ciphertext.SerializedSize() + encrypted_key.tag.SerializedSize() + in SerializeAuthEncryptedBlob()
226 *buf++ = encrypted_key.format; in SerializeAuthEncryptedBlob()
[all …]
/system/keymaster/km_openssl/
Decies_kem.cpp129 bool EciesKem::Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) { in Decrypt() argument
130 return Decrypt(private_key, encrypted_key.peek_read(), encrypted_key.available_read(), in Decrypt()
135 bool EciesKem::Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key, size_t encrypted_key_len, in Decrypt() argument
145 if (!key_exchange_->CalculateSharedKey(encrypted_key, encrypted_key_len, &shared_secret)) { in Decrypt()
/system/keymaster/include/keymaster/km_openssl/
Dkem.h47 virtual bool Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) = 0;
48 virtual bool Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key,
Decies_kem.h47 bool Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) override;
48 bool Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key, size_t encrypted_key_len,
/system/keymaster/include/keymaster/key_blob_utils/
Dauth_encrypted_key_blob.h54 EncryptedKey encrypted_key; member
72 KeymasterKeyBlob SerializeAuthEncryptedBlob(const EncryptedKey& encrypted_key,
/system/keymaster/contexts/
Dpure_soft_keymaster_context.cpp507 Buffer encrypted_key, plaintext; in UnwrapKey() local
511 if (!encrypted_key.Reinitialize(secure_key.key_material_size + tag.data_length)) { in UnwrapKey()
514 if (!encrypted_key.write(secure_key.key_material, secure_key.key_material_size)) { in UnwrapKey()
517 if (!encrypted_key.write(tag.data, tag.data_length)) { in UnwrapKey()
530 error = aes_operation->Update(update_params, encrypted_key, &update_outparams, &plaintext, in UnwrapKey()
/system/security/keystore2/src/
Dsuper_key.rs671 let (encrypted_key, iv, tag) = aes_gcm_encrypt(super_key, &derived_key) in encrypt_with_password()
675 Ok((encrypted_key, metadata)) in encrypt_with_password()
716 let (encrypted_key, iv, tag) = aes_gcm_encrypt(key_blob, &(super_key.key)) in encrypt_with_aes_super_key()
721 Ok((encrypted_key, metadata)) in encrypt_with_aes_super_key()
767 let (ephem_key, salt, iv, encrypted_key, aead_tag) = in handle_super_encryption_on_key_init()
778 Ok((encrypted_key, metadata)) in handle_super_encryption_on_key_init()