| /system/security/keystore2/src/ |
| D | ec_crypto.rs | 46 pub fn public_key(&self) -> Result<Vec<u8>> { in public_key() 56 salt: &[u8], in agree_key() 57 other_public_key: &[u8], in agree_key() 58 sender_public_key: &[u8], in agree_key() 59 recipient_public_key: &[u8], in agree_key() 78 recipient_public_key: &[u8], in encrypt_message() 79 message: &[u8], in encrypt_message() 80 ) -> Result<(Vec<u8>, Vec<u8>, Vec<u8>, Vec<u8>, Vec<u8>)> { in encrypt_message() 95 sender_public_key: &[u8], in decrypt_message() 96 salt: &[u8], in decrypt_message() [all …]
|
| D | sw_keyblob.rs | 56 data: &[u8], in export_key() 58 ) -> Result<(KeyFormat, Vec<u8>, Vec<KeyParameter>)> { in export_key() 157 fn pkcs8_wrap_nist_key(nist_key: &[u8], curve: EcCurve) -> Result<Vec<u8>> { in pkcs8_wrap_nist_key() 190 fn add_der_len(buf: &mut Vec<u8>, len: usize) -> Result<()> { in add_der_len() 228 fn new_from_serialized(mut data: &[u8], hidden: &[KeyParameter]) -> Result<Self> { in new_from_serialized() 265 fn compute_hmac(data: &[u8], hidden: &[KeyParameter]) -> Result<Vec<u8>> { in compute_hmac() 297 fn consume_u8(data: &mut &[u8]) -> Result<u8> { in consume_u8() 354 fn consume_vec(data: &mut &[u8]) -> Result<Vec<u8>> { in consume_vec() 370 data: &mut &[u8], in consume_blob() 372 blob_data: &[u8], in consume_blob() [all …]
|
| D | utils.rs | 206 inner_keyblob: &[u8], in import_keyblob_and_perform_op() 317 key_blob: &[u8], in upgrade_keyblob_and_perform_op() 350 key_blob: &[u8], in upgrade_keyblob_if_required_with() 641 fn decrypt(&self, data: &[u8], iv: &[u8], tag: &[u8]) -> Result<ZVec>; in decrypt() 646 fn encrypt(&self, plaintext: &[u8]) -> Result<(Vec<u8>, Vec<u8>, Vec<u8>)>; in encrypt() 652 fn key(&self) -> &[u8]; in key() 656 fn decrypt(&self, data: &[u8], iv: &[u8], tag: &[u8]) -> Result<ZVec> { in decrypt() 660 fn encrypt(&self, plaintext: &[u8]) -> Result<(Vec<u8>, Vec<u8>, Vec<u8>)> { in encrypt()
|
| D | km_compat.rs | 90 fn wrap_keyblob(keyblob: &[u8]) -> anyhow::Result<Vec<u8>> { in wrap_keyblob() 211 fn getRootOfTrust(&self, challenge: &[u8; 16]) -> binder::Result<Vec<u8>> { in getRootOfTrust() 245 key_data: &[u8], in importKey() 259 wrapped_key_data: &[u8], in importWrappedKey() 260 wrapping_key_blob: &[u8], in importWrappedKey() 261 masking_key: &[u8], in importWrappedKey() 282 keyblob_to_upgrade: &[u8], in upgradeKey() 284 ) -> binder::Result<Vec<u8>> { in upgradeKey() 307 keyblob: &[u8], in begin() 318 keyblob: &[u8], in getKeyCharacteristics() [all …]
|
| /system/cros-codecs/src/ |
| D | image_processing.rs | 22 src_y: &[u8], in nv12_copy() 24 dst_y: &mut [u8], in nv12_copy() 26 src_uv: &[u8], in nv12_copy() 28 dst_uv: &mut [u8], in nv12_copy() 46 y_plane: &mut [u8], in extend_border_nv12() 47 uv_plane: &mut [u8], in extend_border_nv12() 79 src: &[u8], in copy_plane() 81 dst: &mut [u8], in copy_plane() 98 src_y: &[u8], in i4xx_copy() 100 dst_y: &mut [u8], in i4xx_copy() [all …]
|
| /system/security/keystore2/test_utils/ |
| D | ffi_test_utils.rs | 31 fn validateCertChain(cert_buf: Vec<u8>, cert_len: u32, strict_issuer_check: bool) -> bool; in validateCertChain() 33 encrypted_secure_key: Vec<u8>, in createWrappedKey() 34 encrypted_transport_key: Vec<u8>, in createWrappedKey() 35 iv: Vec<u8>, in createWrappedKey() 36 tag: Vec<u8>, in createWrappedKey() 41 cert_buf: Vec<u8>, in getValueFromAttestRecord() 58 cert_buf: &[u8], in validate_certchain_with_strict_issuer_check() 73 fn get_result(result: ffi::CxxResult) -> Result<Vec<u8>, Error> { in get_result() 85 encrypted_secure_key: &[u8], in create_wrapped_key() 86 encrypted_transport_key: &[u8], in create_wrapped_key() [all …]
|
| /system/secretkeeper/core/src/ |
| D | cipher.rs | 31 external_aad: &[u8], in decrypt_message() 32 ) -> Result<Vec<u8>, ApiError> { in decrypt_message() 45 session_id: &[u8], in encrypt_message() 46 msg: &[u8], in encrypt_message() 47 external_aad: &[u8], in encrypt_message() 48 ) -> Result<Vec<u8>, ApiError> { in encrypt_message()
|
| D | ta.rs | 154 pub fn process_bootloader(&self, req_data: &[u8]) -> Vec<u8> { in process_bootloader() 185 pub fn process(&mut self, req_data: &[u8]) -> Vec<u8> { in process() 251 fn secret_management(&mut self, encrypt0: &[u8]) -> Result<Vec<u8>, ApiError> { in secret_management() 272 fn peer_cert_chain(&self, kid: &[u8; SESSION_ID_LEN]) -> Result<Vec<u8>, ApiError> { in peer_cert_chain() 289 req: &[u8], in process_inner() 290 peer_cert_chain: &[u8], in process_inner() 291 ) -> Result<Vec<u8>, SecretkeeperError> { in process_inner() 318 peer_cert_chain: &[u8], in store_secret() 330 peer_cert_chain: &[u8], in get_secret() 351 ) -> Result<Vec<u8>, ApiError> { [all …]
|
| /system/security/mls/mls-rs-crypto-boringssl/src/ |
| D | hpke.rs | 56 pub fn new(suite_id: Vec<u8>, kdf: KDF) -> Self { in new() 64 salt: &[u8], in labeled_extract() 65 label: &[u8], in labeled_extract() 66 ikm: &[u8], in labeled_extract() 67 ) -> Result<Vec<u8>, <KDF as KdfType>::Error> { in labeled_extract() 75 key: &[u8], in labeled_expand() 76 label: &[u8], in labeled_expand() 77 info: &[u8], in labeled_expand() 79 ) -> Result<Vec<u8>, <KDF as KdfType>::Error> { in labeled_expand() 162 _enc: &[u8], in decap() [all …]
|
| D | lib.rs | 191 async fn hash(&self, data: &[u8]) -> Result<Vec<u8>, Self::Error> { in hash() 195 async fn mac(&self, key: &[u8], data: &[u8]) -> Result<Vec<u8>, Self::Error> { in mac() 215 salt: &[u8], in kdf_extract() 216 ikm: &[u8], in kdf_extract() 217 ) -> Result<Zeroizing<Vec<u8>>, Self::Error> { in kdf_extract() 227 prk: &[u8], in kdf_expand() 228 info: &[u8], in kdf_expand() 230 ) -> Result<Zeroizing<Vec<u8>>, Self::Error> { in kdf_expand() 244 key: &[u8], in aead_seal() 245 data: &[u8], in aead_seal() [all …]
|
| D | aead.rs | 91 key: &[u8], in seal() 92 data: &[u8], in seal() 93 aad: Option<&'a [u8]>, in seal() 94 nonce: &[u8], in seal() 95 ) -> Result<Vec<u8>, AeadError> { in seal() 130 key: &[u8], in open() 131 ciphertext: &[u8], in open() 132 aad: Option<&'a [u8]>, in open() 133 nonce: &[u8], in open() 134 ) -> Result<Vec<u8>, AeadError> { in open()
|
| /system/keymint/ta/src/ |
| D | rkp.rs | 64 pub fn uds_certs(&self) -> Result<Vec<u8>, Error> { in uds_certs() 71 pub fn rpc_device_info(&self) -> Result<Vec<u8>, Error> { in rpc_device_info() 166 ) -> Result<(MacedPublicKey, Vec<u8>), Error> { in generate_ecdsa_p256_keypair() 212 _eek_chain: &[u8], in generate_cert_req() 213 _challenge: &[u8], in generate_cert_req() 214 ) -> Result<(DeviceInfo, ProtectedData, Vec<u8>), Error> { in generate_cert_req() 225 challenge: &[u8], in generate_cert_req_v2() 226 ) -> Result<Vec<u8>, Error> { in generate_cert_req_v2() 318 fn build_maced_pub_key<F>(pub_cose_key: Vec<u8>, compute_mac: F) -> Result<Vec<u8>, Error> in build_maced_pub_key() 320 F: FnOnce(&[u8]) -> Result<Vec<u8>, Error>, in build_maced_pub_key() [all …]
|
| D | device.rs | 77 fn kek_context(&self) -> Result<Vec<u8>, Error> { in kek_context() 101 fn timestamp_token_mac_input(&self, token: &TimeStampToken) -> Result<Vec<u8>, Error> { in timestamp_token_mac_input() 109 fn hmac(&self, imp: &dyn crypto::Hmac, data: &[u8]) -> Result<Vec<u8>, Error>; in hmac() 193 context: &[u8], in derive_bytes_from_hbk() 195 ) -> Result<Vec<u8>, Error>; in derive_bytes_from_hbk() 202 input: &[u8], in compute_hmac_sha256() 203 ) -> Result<Vec<u8>, Error> { in compute_hmac_sha256() 229 data: &[u8], in sign_data() 231 ) -> Result<Vec<u8>, Error>; in sign_data() 240 payload: &[u8], in sign_data_in_cose_sign1() [all …]
|
| /system/authgraph/core/src/ |
| D | ta.rs | 69 pub fn process(&mut self, req_data: &[u8]) -> Vec<u8> { in process() 138 peer_pub_key: &[u8], in init() 139 peer_id: &[u8], in init() 140 peer_nonce: &[u8], in init() 151 peer_pub_key: &[u8], in finish() 152 peer_id: &[u8], in finish() 153 peer_signature: &[u8], in finish() 154 peer_nonce: &[u8], in finish() 173 peer_signature: &[u8], in auth_complete()
|
| D | traits.rs | 62 payload: &[u8], in encrypt() 63 aad: &[u8], in encrypt() 65 ) -> Result<Vec<u8>, Error>; in encrypt() 70 cipher_text: &[u8], in decrypt() 71 aad: &[u8], in decrypt() 73 ) -> Result<Vec<u8>, Error>; in decrypt() 111 fn sign(&self, sign_key: &EcSignKey, data: &[u8]) -> Result<Vec<u8>, Error>; in sign() 120 data: &[u8], in verify_signature() 121 signature: &[u8], in verify_signature() 128 fn compute_hmac(&self, key: &HmacKey, data: &[u8]) -> Result<Vec<u8>, Error>; in compute_hmac() [all …]
|
| D | keyexchange.rs | 170 peer_key: &[u8], in init() 171 peer_id: &[u8], in init() 172 peer_nonce: &[u8], in init() 240 peer_key: &[u8], in finish() 241 peer_id: &[u8], in finish() 242 peer_sig: &[u8], in finish() 243 peer_nonce: &[u8], in finish() 339 peer_sig: &[u8], in authentication_complete() 404 session_id: &[u8], in create_shared_key_arcs() 498 ) -> Result<(SessionIdentifier, Vec<u8>), Error> { in compute_sign_session_id() [all …]
|
| /system/authgraph/boringssl/src/ |
| D | aes.rs | 40 payload: &[u8], in encrypt() 41 aad: &[u8], in encrypt() 43 ) -> Result<Vec<u8>, Error> { in encrypt() 63 ct: &[u8], in decrypt() 64 aad: &[u8], in decrypt() 66 ) -> Result<Vec<u8>, Error> { in decrypt()
|
| D | ec.rs | 85 fn sign(&self, sign_key: &EcSignKey, data: &[u8]) -> Result<Vec<u8>, Error> { in sign() 130 data: &[u8], in verify_signature() 131 signature: &[u8], in verify_signature() 167 fn ec_cose_signature_to_der(coord_len: usize, signature: &[u8]) -> Result<Vec<u8>, Error> { in ec_cose_signature_to_der() 183 fn ec_der_signature_to_cose(coord_len: usize, signature: &[u8]) -> Result<Vec<u8>, Error> { in ec_der_signature_to_cose() 196 pub fn create_p256_key_pair(algorithm: iana::Algorithm) -> Result<(Vec<u8>, CoseKey), Error> { in create_p256_key_pair() 204 pub fn create_p384_key_pair(algorithm: iana::Algorithm) -> Result<(Vec<u8>, CoseKey), Error> { in create_p384_key_pair() 214 ) -> Result<(Vec<u8>, CoseKey), Error> { in create_nist_key_pair() 250 pub fn coords_from_p256_pub_key(pub_key: &[u8]) -> Result<(Vec<u8>, Vec<u8>), Error> { in coords_from_p256_pub_key() 256 pub fn coords_from_p384_pub_key(pub_key: &[u8]) -> Result<(Vec<u8>, Vec<u8>), Error> { in coords_from_p384_pub_key() [all …]
|
| /system/keymint/hal/src/ |
| D | keymint.rs | 129 keyData: &[u8], in importKey() 149 wrappedKeyData: &[u8], in importWrappedKey() 150 wrappingKeyBlob: &[u8], in importWrappedKey() 151 maskingKey: &[u8], in importWrappedKey() 172 keyBlobToUpgrade: &[u8], in upgradeKey() 174 ) -> binder::Result<Vec<u8>> { in upgradeKey() 201 keyBlob: &[u8], in begin() 246 fn convertStorageKeyToEphemeral(&self, storageKeyBlob: &[u8]) -> binder::Result<Vec<u8>> { in convertStorageKeyToEphemeral() 255 keyBlob: &[u8], in getKeyCharacteristics() 256 appId: &[u8], in getKeyCharacteristics() [all …]
|
| D | rpc.rs | 65 ) -> binder::Result<Vec<u8>> { in generateEcdsaP256KeyPair() 75 endpointEncryptionCertChain: &[u8], in generateCertificateRequest() 76 challenge: &[u8], in generateCertificateRequest() 79 ) -> binder::Result<Vec<u8>> { in generateCertificateRequest() 94 challenge: &[u8], in generateCertificateRequestV2() 95 ) -> binder::Result<Vec<u8>> { in generateCertificateRequestV2()
|
| /system/security/keystore2/tests/ |
| D | keystore2_client_test_utils.rs | 365 pub fn get_op_nonce(parameters: &KeyParameters) -> Option<Vec<u8>> { in get_op_nonce() 382 nonce: &mut Option<Vec<u8>>, in perform_sample_sym_key_encrypt_op() 385 ) -> binder::Result<Option<Vec<u8>>> { in perform_sample_sym_key_encrypt_op() 410 input: &[u8], in perform_sample_sym_key_decrypt_op() 413 nonce: &mut Option<Vec<u8>>, in perform_sample_sym_key_decrypt_op() 416 ) -> binder::Result<Option<Vec<u8>>> { in perform_sample_sym_key_decrypt_op() 462 secure_key: &[u8], in encrypt_secure_key() 463 aad: &[u8], in encrypt_secure_key() 464 nonce: Vec<u8>, in encrypt_secure_key() 467 ) -> binder::Result<Option<Vec<u8>>> { in encrypt_secure_key() [all …]
|
| /system/security/keystore2/src/crypto/ |
| D | lib.rs | 67 pub fn generate_random_data(size: usize) -> Result<Vec<u8>, Error> { in generate_random_data() 78 pub fn hmac_sha256(key: &[u8], msg: &[u8]) -> Result<Vec<u8>, Error> { in hmac_sha256() 99 pub fn aes_gcm_decrypt(data: &[u8], iv: &[u8], tag: &[u8], key: &[u8]) -> Result<ZVec, Error> { in aes_gcm_decrypt() 141 pub fn aes_gcm_encrypt(plaintext: &[u8], key: &[u8]) -> Result<(Vec<u8>, Vec<u8>, Vec<u8>), Error> { in aes_gcm_encrypt() 190 fn get_key(&'a self) -> &'a [u8] { in get_key() 203 pub fn derive_key_pbkdf2(&self, salt: &[u8], out_len: usize) -> Result<ZVec, Error> { in derive_key_pbkdf2() 231 pub fn derive_key_hkdf(&self, salt: &[u8], out_len: usize) -> Result<ZVec, Error> { in derive_key_hkdf() 244 pub fn hkdf_extract(secret: &[u8], salt: &[u8]) -> Result<ZVec, Error> { in hkdf_extract() 274 pub fn hkdf_expand(out_len: usize, prk: &[u8], info: &[u8]) -> Result<ZVec, Error> { in hkdf_expand() 403 pub fn ec_point_point_to_oct(point: &EC_POINT) -> Result<Vec<u8>, Error> { in ec_point_point_to_oct() [all …]
|
| /system/keymint/common/src/crypto/ |
| D | traits.rs | 64 fn add_entropy(&mut self, data: &[u8]); in add_entropy() 66 fn fill_bytes(&mut self, dest: &mut [u8]); in fill_bytes() 79 fn eq(&self, left: &[u8], right: &[u8]) -> bool; in eq() 81 fn ne(&self, left: &[u8], right: &[u8]) -> bool { in ne() 130 data: &[u8], in import_key() 175 fn import_key(&self, data: &[u8], _params: &[keymint::KeyParam]) -> Result<KeyMaterial, Error> { in import_key() 214 data: &[u8], in import_key() 258 data: &[u8], in import_pkcs8_key() 272 fn subject_public_key(&self, key: &OpaqueOr<rsa::Key>) -> Result<Vec<u8>, Error> { in subject_public_key() 327 data: &[u8], in import_pkcs8_key() [all …]
|
| /system/keymint/common/src/tag/ |
| D | legacy.rs | 30 pub fn consume_u8(data: &mut &[u8]) -> Result<u8, Error> { in consume_u8() 94 pub fn consume_vec(data: &mut &[u8]) -> Result<Vec<u8>, Error> { in consume_vec() 125 pub fn serialize(params: &[KeyParam]) -> Result<Vec<u8>, Error> { in serialize() 267 data: &mut &[u8], in consume_blob() 269 blob_data: &[u8], in consume_blob() 270 ) -> Result<Vec<u8>, Error> { in consume_blob()
|
| /system/secure_element/omapi/src/ara/ |
| D | tlv.rs | 28 fn parse(input: &'a [u8]) -> Result<(Self, &'a [u8]), TlvParseError>; in parse() 71 fn parse(input: &'a [u8]) -> Result<(Self, &'a [u8]), TlvParseError> { in parse() 98 fn parse(header: Header, input: &'a [u8]) -> Result<(Tag, Value<'a>, &'a [u8]), TlvParseError> { in parse() 119 fn parse(input: &[u8]) -> Result<(Self, &[u8]), TlvParseError> { in parse() 130 fn parse(input: &[u8]) -> Result<(Self, &[u8]), TlvParseError> { in parse() 179 pub fn bytes(&self) -> &[u8] { in bytes() 200 fn first_byte(&self) -> Result<&u8, TlvParseError> { in first_byte() 206 fn parse(input: &[u8]) -> Result<(Self, &[u8]), TlvParseError> { in parse() 228 pub fn parse(input: &[u8]) -> Result<(Object, &[u8]), TlvParseError> { in parse() 232 fn parse_multi_byte_tag(input: &[u8]) -> Result<(Tag, &[u8]), TlvParseError> { in parse_multi_byte_tag() [all …]
|