Home
last modified time | relevance | path

Searched refs:decrypt (Results 1 – 25 of 175) sorted by relevance

1234567

/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
H A DSecureBoxTest.java176 SecureBox.decrypt( in decryptRecoveryClaim()
186 SecureBox.decrypt( in decryptRecoveryKey_doesNotThrowForValidAuthenticationTag()
201 state = SecureBox.decrypt(THM_PRIVATE_KEY, TEST_SHARED_SECRET, TEST_HEADER, state); in encryptThenDecrypt()
212 SecureBox.decrypt( in encryptThenDecrypt_nullPublicPrivateKeys()
223 SecureBox.decrypt(THM_PRIVATE_KEY, /*sharedSecret=*/ null, TEST_HEADER, encrypted); in encryptThenDecrypt_nullSharedSecret()
243 SecureBox.decrypt( in encryptThenDecrypt_nullPayload()
271 SecureBox.decrypt( in decrypt_nullPrivateKeyAndSharedSecret()
285 SecureBox.decrypt( in decrypt_nullEncryptedPayload()
302 SecureBox.decrypt( in decrypt_badAuthenticationTag()
327 () -> SecureBox.decrypt(privateKey, TEST_SHARED_SECRET, TEST_HEADER, encrypted)); in decrypt_invalidPrivateKey()
[all …]
H A DKeySyncUtilsTest.java298 byte[] decrypted = SecureBox.decrypt( in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant()
320 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutChallenge()
346 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey()
372 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams()
399 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader()
/aosp12/hardware/interfaces/drm/1.0/
H A DICryptoPlugin.hal25 * load crypto keys for a codec to decrypt protected video content.
60 * Set a shared memory base for subsequent decrypt operations. The buffer
62 * After the shared buffer base is established, the decrypt() method
64 * for decrypt source and destination addresses.
90 * of clear and encrypted bytes to process. This allows the decrypt
102 * ERROR_DRM_SESSION_NOT_OPENED if the decrypt session is not opened,
103 * ERROR_DRM_DECRYPT if the decrypt operation fails, and
110 decrypt(bool secure, uint8_t[16] keyId, uint8_t[16] iv, Mode mode,
H A Dtypes.hal94 * decrypt operation fails.
196 * The key is currently usable to decrypt media data.
201 * The key is no longer usable to decrypt media data because its expiration
207 * The key is not currently usable to decrypt media data because its output
218 * The key is not currently usable to decrypt media data because of an
302 * SharedBuffer describes a decrypt buffer which is defined by a bufferId, an
326 * A decrypt destination buffer can be either normal user-space shared
327 * memory for the non-secure decrypt case, or it can be a secure buffer
/aosp12/hardware/qcom/media/msm8974/mm-video-legacy/DivxDrmDecrypt/src/
H A DDivXDrmDecrypt.cpp92 DivXDrmDecrypt* decrypt = drmCreateFunc(); in Create() local
93 if( decrypt == NULL ) { in Create()
96 return decrypt; in Create()
/aosp12/hardware/qcom/media/msm8974/mm-video-v4l2/DivxDrmDecrypt/src/
H A DDivXDrmDecrypt.cpp97 DivXDrmDecrypt* decrypt = drmCreateFunc(); in Create() local
99 if ( decrypt == NULL ) { in Create()
103 return decrypt; in Create()
/aosp12/frameworks/base/services/core/java/com/android/server/locksettings/
H A DSyntheticPasswordCrypto.java61 private static byte[] decrypt(SecretKey key, byte[] blob) in decrypt() method in SyntheticPasswordCrypto
116 public static byte[] decrypt(byte[] keyBytes, byte[] personalisation, byte[] ciphertext) { in decrypt() method in SyntheticPasswordCrypto
121 return decrypt(key, ciphertext); in decrypt()
137 byte[] intermediate = decrypt(applicationId, APPLICATION_ID_PERSONALIZATION, blob); in decryptBlobV1()
138 return decrypt(decryptionKey, intermediate); in decryptBlobV1()
168 byte[] intermediate = decrypt(decryptionKey, blob); in decryptBlob()
169 return decrypt(applicationId, APPLICATION_ID_PERSONALIZATION, intermediate); in decryptBlob()
H A DRebootEscrowData.java82 byte[] ksEncryptedBlob = AesEncryptionUtil.decrypt(kk, dis); in decryptBlobCurrentVersion()
83 return AesEncryptionUtil.decrypt(ks.getKey(), ksEncryptedBlob); in decryptBlobCurrentVersion()
101 byte[] syntheticPassword = AesEncryptionUtil.decrypt(ks.getKey(), dis); in fromEncryptedData()
H A DAesEncryptionUtil.java42 static byte[] decrypt(SecretKey key, DataInputStream cipherStream) throws IOException { in decrypt() method in AesEncryptionUtil
75 static byte[] decrypt(SecretKey key, byte[] cipherText) throws IOException { in decrypt() method in AesEncryptionUtil
80 return decrypt(key, cipherStream); in decrypt()
/aosp12/hardware/interfaces/drm/1.2/
H A DICryptoPlugin.hal29 * load crypto keys for a codec to decrypt protected video content.
37 * decrypt_1_2() only differs from decrypt() in that additional status
49 * of clear and encrypted bytes to process. This allows the decrypt
68 * ERROR_DRM_SESSION_NOT_OPENED if the decrypt session is not
70 * ERROR_DRM_DECRYPT if the decrypt operation fails
H A Dtypes.hal45 * from the crypto plugin decrypt method when the security level
53 * decrypt method when the frame being decrypted into the secure
100 * The key is not yet usable to decrypt media because the start
/aosp12/system/vold/
H A Dvdc.rc4 # vold will set vold.decrypt to trigger_restart_framework (default
11 # vold will set vold.decrypt to trigger_restart_framework (default
/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/default/
H A DCryptoPlugin.cpp35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, in decrypt() function in clearkeydrm::CryptoPlugin
67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples, in decrypt()
H A DSession.cpp64 status_t Session::decrypt( in decrypt() function in clearkeydrm::Session
78 return decryptor.decrypt( in decrypt()
/aosp12/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/crypto/
H A DIkeCombinedModeCipherTest.java136 mAesGcm16Cipher.decrypt( in testAesGcmDecrypt()
157 mChaChaPolyCipher.decrypt( in testChaChaPolyDecrypt()
185 mAesGcm16Cipher.decrypt( in testDecrypWithWrongKey()
H A DIkeNormalModeCipherTest.java134 byte[] calculatedData = mAesCbcCipher.decrypt(mEncryptedPaddedData, mAesCbcKey, mIv); in testDecryptWithAesCbc()
148 byte[] calculatedData = mAesCtrCipher.decrypt(mAesCtrEncryptedData, mAesCtrKey, mAesCtrIv); in testDecryptWithAesCtr()
170 mAesCbcCipher.decrypt(dataToDecrypt, mAesCbcKey, mIv); in testDecryptWithNormalCipherWithBadPad()
/aosp12/system/libsysprop/srcs/android/sysprop/
H A DVoldProperties.sysprop18 api_name: "decrypt"
22 prop_name: "vold.decrypt"
/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/
H A DAesCtrDecryptorUnittest.cpp40 return decryptor.decrypt(keyVector, iv, source, destination, subSamples, in attemptDecrypt()
81 ASSERT_EQ(android::ERROR_DRM_DECRYPT, decryptor.decrypt(keyVector, iv, in TEST_F()
115 ASSERT_EQ(android::ERROR_DRM_DECRYPT, decryptor.decrypt(keyVector, iv, in TEST_F()
/aosp12/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/
H A DKeySyncUtils.java240 return SecureBox.decrypt( in decryptRecoveryClaimResponse()
259 return SecureBox.decrypt( in decryptRecoveryKey()
285 return SecureBox.decrypt( in decryptApplicationKey()
/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/
H A DSession.cpp71 Status_V1_2 Session::decrypt( in decrypt() function in android::hardware::drm::V1_4::clearkey::Session
91 Status status = decryptor.decrypt( in decrypt()
/aosp12/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/
H A DEncryptionHelper.java29 String voldState = VoldProperties.decrypt().orElse(""); in isDataEncrypted()
/aosp12/bootable/recovery/update_verifier/
H A Dupdate_verifier.rc7 service update_verifier /system/bin/update_verifier ${vold.decrypt}
/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/default/include/
H A DAesCtrDecryptor.h34 android::status_t decrypt(const android::Vector<uint8_t>& key, const Iv iv,
/aosp12/hardware/interfaces/drm/1.0/vts/functional/
H A Ddrm_hal_clearkey_test.cpp683 auto res = drmPlugin->decrypt(session, keyId, input, iv, in TEST_P()
836 uint32_t DrmHalClearkeyDecryptTest::decrypt(Mode mode, in decrypt() function in android::hardware::drm::V1_0::vts::DrmHalClearkeyDecryptTest
872 auto res = cryptoPlugin->decrypt(kNotSecure, toHidlArray(keyId), localIv, mode, in decrypt()
992 uint32_t byteCount = decrypt(Mode::UNENCRYPTED, &iv[0], subSamples, in TEST_P()
1015 uint32_t byteCount = decrypt(Mode::AES_CTR, &iv[0], subSamples, in TEST_P()
1034 uint32_t byteCount = decrypt(Mode::AES_CTR, &iv[0], subSamples, in TEST_P()
1061 uint32_t byteCount = decrypt(Mode::AES_CTR, &iv[0], subSamples, in decryptWithInvalidKeys()
/aosp12/frameworks/av/drm/libdrmframework/
H A DDrmManagerClient.cpp148 status_t DrmManagerClient::decrypt( in decrypt() function in DrmManagerClient
151 return mDrmManagerClientImpl->decrypt( in decrypt()

1234567