/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | SecureBoxTest.java | 176 SecureBox.decrypt( in decryptRecoveryClaim() 186 SecureBox.decrypt( in decryptRecoveryKey_doesNotThrowForValidAuthenticationTag() 201 state = SecureBox.decrypt(THM_PRIVATE_KEY, TEST_SHARED_SECRET, TEST_HEADER, state); in encryptThenDecrypt() 212 SecureBox.decrypt( in encryptThenDecrypt_nullPublicPrivateKeys() 223 SecureBox.decrypt(THM_PRIVATE_KEY, /*sharedSecret=*/ null, TEST_HEADER, encrypted); in encryptThenDecrypt_nullSharedSecret() 243 SecureBox.decrypt( in encryptThenDecrypt_nullPayload() 271 SecureBox.decrypt( in decrypt_nullPrivateKeyAndSharedSecret() 285 SecureBox.decrypt( in decrypt_nullEncryptedPayload() 302 SecureBox.decrypt( in decrypt_badAuthenticationTag() 327 () -> SecureBox.decrypt(privateKey, TEST_SHARED_SECRET, TEST_HEADER, encrypted)); in decrypt_invalidPrivateKey() [all …]
|
H A D | KeySyncUtilsTest.java | 298 byte[] decrypted = SecureBox.decrypt( in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 320 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutChallenge() 346 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 372 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() 399 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader()
|
/aosp12/hardware/interfaces/drm/1.0/ |
H A D | ICryptoPlugin.hal | 25 * load crypto keys for a codec to decrypt protected video content. 60 * Set a shared memory base for subsequent decrypt operations. The buffer 62 * After the shared buffer base is established, the decrypt() method 64 * for decrypt source and destination addresses. 90 * of clear and encrypted bytes to process. This allows the decrypt 102 * ERROR_DRM_SESSION_NOT_OPENED if the decrypt session is not opened, 103 * ERROR_DRM_DECRYPT if the decrypt operation fails, and 110 decrypt(bool secure, uint8_t[16] keyId, uint8_t[16] iv, Mode mode,
|
H A D | types.hal | 94 * decrypt operation fails. 196 * The key is currently usable to decrypt media data. 201 * The key is no longer usable to decrypt media data because its expiration 207 * The key is not currently usable to decrypt media data because its output 218 * The key is not currently usable to decrypt media data because of an 302 * SharedBuffer describes a decrypt buffer which is defined by a bufferId, an 326 * A decrypt destination buffer can be either normal user-space shared 327 * memory for the non-secure decrypt case, or it can be a secure buffer
|
/aosp12/hardware/qcom/media/msm8974/mm-video-legacy/DivxDrmDecrypt/src/ |
H A D | DivXDrmDecrypt.cpp | 92 DivXDrmDecrypt* decrypt = drmCreateFunc(); in Create() local 93 if( decrypt == NULL ) { in Create() 96 return decrypt; in Create()
|
/aosp12/hardware/qcom/media/msm8974/mm-video-v4l2/DivxDrmDecrypt/src/ |
H A D | DivXDrmDecrypt.cpp | 97 DivXDrmDecrypt* decrypt = drmCreateFunc(); in Create() local 99 if ( decrypt == NULL ) { in Create() 103 return decrypt; in Create()
|
/aosp12/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | SyntheticPasswordCrypto.java | 61 private static byte[] decrypt(SecretKey key, byte[] blob) in decrypt() method in SyntheticPasswordCrypto 116 public static byte[] decrypt(byte[] keyBytes, byte[] personalisation, byte[] ciphertext) { in decrypt() method in SyntheticPasswordCrypto 121 return decrypt(key, ciphertext); in decrypt() 137 byte[] intermediate = decrypt(applicationId, APPLICATION_ID_PERSONALIZATION, blob); in decryptBlobV1() 138 return decrypt(decryptionKey, intermediate); in decryptBlobV1() 168 byte[] intermediate = decrypt(decryptionKey, blob); in decryptBlob() 169 return decrypt(applicationId, APPLICATION_ID_PERSONALIZATION, intermediate); in decryptBlob()
|
H A D | RebootEscrowData.java | 82 byte[] ksEncryptedBlob = AesEncryptionUtil.decrypt(kk, dis); in decryptBlobCurrentVersion() 83 return AesEncryptionUtil.decrypt(ks.getKey(), ksEncryptedBlob); in decryptBlobCurrentVersion() 101 byte[] syntheticPassword = AesEncryptionUtil.decrypt(ks.getKey(), dis); in fromEncryptedData()
|
H A D | AesEncryptionUtil.java | 42 static byte[] decrypt(SecretKey key, DataInputStream cipherStream) throws IOException { in decrypt() method in AesEncryptionUtil 75 static byte[] decrypt(SecretKey key, byte[] cipherText) throws IOException { in decrypt() method in AesEncryptionUtil 80 return decrypt(key, cipherStream); in decrypt()
|
/aosp12/hardware/interfaces/drm/1.2/ |
H A D | ICryptoPlugin.hal | 29 * load crypto keys for a codec to decrypt protected video content. 37 * decrypt_1_2() only differs from decrypt() in that additional status 49 * of clear and encrypted bytes to process. This allows the decrypt 68 * ERROR_DRM_SESSION_NOT_OPENED if the decrypt session is not 70 * ERROR_DRM_DECRYPT if the decrypt operation fails
|
H A D | types.hal | 45 * from the crypto plugin decrypt method when the security level 53 * decrypt method when the frame being decrypted into the secure 100 * The key is not yet usable to decrypt media because the start
|
/aosp12/system/vold/ |
H A D | vdc.rc | 4 # vold will set vold.decrypt to trigger_restart_framework (default 11 # vold will set vold.decrypt to trigger_restart_framework (default
|
/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/default/ |
H A D | CryptoPlugin.cpp | 35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, in decrypt() function in clearkeydrm::CryptoPlugin 67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples, in decrypt()
|
H A D | Session.cpp | 64 status_t Session::decrypt( in decrypt() function in clearkeydrm::Session 78 return decryptor.decrypt( in decrypt()
|
/aosp12/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/crypto/ |
H A D | IkeCombinedModeCipherTest.java | 136 mAesGcm16Cipher.decrypt( in testAesGcmDecrypt() 157 mChaChaPolyCipher.decrypt( in testChaChaPolyDecrypt() 185 mAesGcm16Cipher.decrypt( in testDecrypWithWrongKey()
|
H A D | IkeNormalModeCipherTest.java | 134 byte[] calculatedData = mAesCbcCipher.decrypt(mEncryptedPaddedData, mAesCbcKey, mIv); in testDecryptWithAesCbc() 148 byte[] calculatedData = mAesCtrCipher.decrypt(mAesCtrEncryptedData, mAesCtrKey, mAesCtrIv); in testDecryptWithAesCtr() 170 mAesCbcCipher.decrypt(dataToDecrypt, mAesCbcKey, mIv); in testDecryptWithNormalCipherWithBadPad()
|
/aosp12/system/libsysprop/srcs/android/sysprop/ |
H A D | VoldProperties.sysprop | 18 api_name: "decrypt" 22 prop_name: "vold.decrypt"
|
/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/ |
H A D | AesCtrDecryptorUnittest.cpp | 40 return decryptor.decrypt(keyVector, iv, source, destination, subSamples, in attemptDecrypt() 81 ASSERT_EQ(android::ERROR_DRM_DECRYPT, decryptor.decrypt(keyVector, iv, in TEST_F() 115 ASSERT_EQ(android::ERROR_DRM_DECRYPT, decryptor.decrypt(keyVector, iv, in TEST_F()
|
/aosp12/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncUtils.java | 240 return SecureBox.decrypt( in decryptRecoveryClaimResponse() 259 return SecureBox.decrypt( in decryptRecoveryKey() 285 return SecureBox.decrypt( in decryptApplicationKey()
|
/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/ |
H A D | Session.cpp | 71 Status_V1_2 Session::decrypt( in decrypt() function in android::hardware::drm::V1_4::clearkey::Session 91 Status status = decryptor.decrypt( in decrypt()
|
/aosp12/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/ |
H A D | EncryptionHelper.java | 29 String voldState = VoldProperties.decrypt().orElse(""); in isDataEncrypted()
|
/aosp12/bootable/recovery/update_verifier/ |
H A D | update_verifier.rc | 7 service update_verifier /system/bin/update_verifier ${vold.decrypt}
|
/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/default/include/ |
H A D | AesCtrDecryptor.h | 34 android::status_t decrypt(const android::Vector<uint8_t>& key, const Iv iv,
|
/aosp12/hardware/interfaces/drm/1.0/vts/functional/ |
H A D | drm_hal_clearkey_test.cpp | 683 auto res = drmPlugin->decrypt(session, keyId, input, iv, in TEST_P() 836 uint32_t DrmHalClearkeyDecryptTest::decrypt(Mode mode, in decrypt() function in android::hardware::drm::V1_0::vts::DrmHalClearkeyDecryptTest 872 auto res = cryptoPlugin->decrypt(kNotSecure, toHidlArray(keyId), localIv, mode, in decrypt() 992 uint32_t byteCount = decrypt(Mode::UNENCRYPTED, &iv[0], subSamples, in TEST_P() 1015 uint32_t byteCount = decrypt(Mode::AES_CTR, &iv[0], subSamples, in TEST_P() 1034 uint32_t byteCount = decrypt(Mode::AES_CTR, &iv[0], subSamples, in TEST_P() 1061 uint32_t byteCount = decrypt(Mode::AES_CTR, &iv[0], subSamples, in decryptWithInvalidKeys()
|
/aosp12/frameworks/av/drm/libdrmframework/ |
H A D | DrmManagerClient.cpp | 148 status_t DrmManagerClient::decrypt( in decrypt() function in DrmManagerClient 151 return mDrmManagerClientImpl->decrypt( in decrypt()
|