/system/keymaster/tests/ |
D | key_blob_test.cpp | 73 keymaster_error_t Encrypt(AuthEncryptedBlobFormat format) { in Encrypt() function in keymaster::test::KeyBlobTest 128 ASSERT_EQ(KM_ERROR_OK, Encrypt(GetParam())); in TEST_P() 157 ASSERT_EQ(KM_ERROR_OK, Encrypt(GetParam())); in TEST_P() 167 ASSERT_EQ(KM_ERROR_OK, Encrypt(GetParam())); in TEST_P() 182 ASSERT_EQ(KM_ERROR_OK, Encrypt(GetParam())); in TEST_P() 197 ASSERT_EQ(KM_ERROR_OK, Encrypt(GetParam())); in TEST_P() 213 ASSERT_EQ(KM_ERROR_OK, Encrypt(GetParam())); in TEST_P() 227 ASSERT_EQ(KM_ERROR_OK, Encrypt(GetParam())); in TEST_P() 247 ASSERT_EQ(KM_ERROR_OK, Encrypt(GetParam())); in TEST_P() 267 ASSERT_EQ(KM_ERROR_OK, Encrypt(GetParam())); in TEST_P() [all …]
|
D | ecies_kem_test.cpp | 58 ASSERT_TRUE(kem->Encrypt(peer_public_value, &output_clear_key, &output_encrypted_key)); in TEST()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | kem.h | 40 virtual bool Encrypt(const Buffer& peer_public_value, Buffer* output_clear_key, 42 virtual bool Encrypt(const uint8_t* peer_public_value, size_t peer_public_value_len,
|
D | ecies_kem.h | 42 bool Encrypt(const Buffer& peer_public_value, Buffer* output_clear_key, 44 bool Encrypt(const uint8_t* peer_public_value, size_t peer_public_value_len,
|
/system/keymaster/km_openssl/ |
D | ecies_kem.cpp | 75 bool EciesKem::Encrypt(const Buffer& peer_public_value, Buffer* output_clear_key, in Encrypt() function in keymaster::EciesKem 77 return Encrypt(peer_public_value.peek_read(), peer_public_value.available_read(), in Encrypt() 82 bool EciesKem::Encrypt(const uint8_t* peer_public_value, size_t peer_public_value_len, in Encrypt() function in keymaster::EciesKem
|
/system/keymint/boringssl/src/ |
D | aes.rs | 23 crypto::SymmetricOperation::Encrypt => openssl::symm::Mode::Encrypt, in begin() 82 crypto::SymmetricOperation::Encrypt => openssl::symm::Mode::Encrypt, in begin_aead() 105 crypto::SymmetricOperation::Encrypt => Box::new({ in begin_aead()
|
D | des.rs | 19 crypto::SymmetricOperation::Encrypt => openssl::symm::Mode::Encrypt, in begin()
|
/system/keymint/common/src/tag/ |
D | tests.rs | 66 KeyPurpose::Encrypt, in test_check_begin_params_fail()
|
/system/keymint/ta/src/ |
D | operation.rs | 236 KeyPurpose::Encrypt => crypto::SymmetricOperation::Encrypt, in begin_operation() 294 KeyPurpose::Encrypt => crypto::SymmetricOperation::Encrypt, in begin_operation()
|
D | tests.rs | 96 assert!(purpose_values.contains(&KeyPurpose::Encrypt)); in test_secure_key_wrapper()
|
D | cert.rs | 195 KeyPurpose::Decrypt | KeyPurpose::Encrypt => { in key_usage_extension_bits()
|
/system/keymint/common/src/ |
D | tag.rs | 457 KeyPurpose::Verify | KeyPurpose::Encrypt => {} // public key operations in check_rsa_params() 938 (Algorithm::Aes, KeyPurpose::Encrypt) in check_begin_params() 940 | (Algorithm::TripleDes, KeyPurpose::Encrypt) in check_begin_params() 972 } else if nonce.is_some() && purpose == KeyPurpose::Encrypt { in check_begin_params() 1051 purpose == KeyPurpose::Encrypt in for_encryption()
|
D | keyblob.rs | 372 crypto::SymmetricOperation::Encrypt, in encrypt()
|
D | crypto.rs | 421 Encrypt, enumerator
|
/system/keymint/tests/src/ |
D | lib.rs | 414 SymmetricOperation::Encrypt, in test_aes_gcm() 494 .begin(des_key.clone().into(), des::Mode::EcbNoPadding, SymmetricOperation::Encrypt) in test_des()
|
/system/security/keystore/ |
D | keystore_cli_v2.cpp | 946 int Encrypt(const std::string& key_name, const std::string& input_filename, in Encrypt() function 1127 return Encrypt(command_line->GetSwitchValueASCII("name"), in main()
|
/system/keymint/wire/src/ |
D | keymint.rs | 952 Encrypt = 0, enumerator
|