Home
last modified time | relevance | path

Searched refs:decrypt (Results 1 – 19 of 19) sorted by relevance

/aosp14/frameworks/base/libs/securebox/tests/src/com/android/security/
H A DSecureBoxTest.java178 SecureBox.decrypt( in decryptRecoveryClaim()
188 SecureBox.decrypt( in decryptRecoveryKey_doesNotThrowForValidAuthenticationTag()
203 state = SecureBox.decrypt(THM_PRIVATE_KEY, TEST_SHARED_SECRET, TEST_HEADER, state); in encryptThenDecrypt()
214 SecureBox.decrypt( in encryptThenDecrypt_nullPublicPrivateKeys()
225 SecureBox.decrypt(THM_PRIVATE_KEY, /*sharedSecret=*/ null, TEST_HEADER, encrypted); in encryptThenDecrypt_nullSharedSecret()
245 SecureBox.decrypt( in encryptThenDecrypt_nullPayload()
273 SecureBox.decrypt( in decrypt_nullPrivateKeyAndSharedSecret()
287 SecureBox.decrypt( in decrypt_nullEncryptedPayload()
304 SecureBox.decrypt( in decrypt_badAuthenticationTag()
329 () -> SecureBox.decrypt(privateKey, TEST_SHARED_SECRET, TEST_HEADER, encrypted)); in decrypt_invalidPrivateKey()
[all …]
/aosp14/frameworks/base/services/core/java/com/android/server/locksettings/
H A DSyntheticPasswordCrypto.java63 private static byte[] decrypt(SecretKey key, byte[] blob) in decrypt() method in SyntheticPasswordCrypto
115 public static byte[] decrypt(byte[] keyBytes, byte[] personalization, byte[] ciphertext) { in decrypt() method in SyntheticPasswordCrypto
120 return decrypt(key, ciphertext); in decrypt()
142 byte[] intermediate = decrypt(protectorSecret, PROTECTOR_SECRET_PERSONALIZATION, blob); in decryptBlobV1()
143 return decrypt(protectorKey, intermediate); in decryptBlobV1()
178 byte[] intermediate = decrypt(protectorKey, blob); in decryptBlob()
179 return decrypt(protectorSecret, PROTECTOR_SECRET_PERSONALIZATION, intermediate); in decryptBlob()
H A DRebootEscrowData.java82 byte[] ksEncryptedBlob = AesEncryptionUtil.decrypt(kk, dis); in decryptBlobCurrentVersion()
83 return AesEncryptionUtil.decrypt(ks.getKey(), ksEncryptedBlob); in decryptBlobCurrentVersion()
101 byte[] syntheticPassword = AesEncryptionUtil.decrypt(ks.getKey(), dis); in fromEncryptedData()
H A DAesEncryptionUtil.java42 static byte[] decrypt(SecretKey key, DataInputStream cipherStream) throws IOException { in decrypt() method in AesEncryptionUtil
75 static byte[] decrypt(SecretKey key, byte[] cipherText) throws IOException { in decrypt() method in AesEncryptionUtil
80 return decrypt(key, cipherStream); in decrypt()
H A DRebootEscrowProviderServerBasedImpl.java117 byte[] decryptedBlob = AesEncryptionUtil.decrypt(decryptionKey, serverBlob); in unwrapServerBlob()
H A DSyntheticPasswordManager.java332 return SyntheticPasswordCrypto.decrypt(mSyntheticPassword, PERSONALIZATION_E0, in getEscrowSecret()
1533 secdiscardable = SyntheticPasswordCrypto.decrypt(response.getGatekeeperHAT(), in unlockTokenBasedProtectorInternal()
1768 final byte[] decrypted = SyntheticPasswordCrypto.decrypt(sp.deriveMetricsKey(), in getPasswordMetrics()
1973 return SyntheticPasswordCrypto.decrypt( in readVendorAuthSecret()
/aosp14/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/
H A DKeySyncUtils.java242 return SecureBox.decrypt( in decryptRecoveryClaimResponse()
261 return SecureBox.decrypt( in decryptRecoveryKey()
287 return SecureBox.decrypt( in decryptApplicationKey()
H A DRecoverableKeyStoreManager.java1055 decryptedCredentials = SecureBox.decrypt( in validateRemoteLockscreen()
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
H A DKeySyncUtilsTest.java290 byte[] decrypted = SecureBox.decrypt( in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant()
312 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutChallenge()
338 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey()
364 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams()
391 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader()
H A DKeySyncTaskTest.java835 byte[] locallyEncryptedKey = SecureBox.decrypt( in decryptThmEncryptedKey()
/aosp14/system/core/rootdir/
H A Dasan_extract.sh34 VOLD_STATUS=$(getprop vold.decrypt)
H A Dinit.rc549 # Now we can mount /data. File encryption requires keymaster to decrypt
/aosp14/frameworks/base/services/companion/java/com/android/server/companion/transport/
H A DCryptoManager.java93 public byte[] decrypt(byte[] input) { in decrypt() method in CryptoManager
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
H A DRebootEscrowDataTest.java111 byte [] decrypted = AesEncryptionUtil.decrypt(mKeyStoreEncryptionKey, encrypted); in aesEncryptedBlob_loopback_success()
/aosp14/frameworks/base/libs/securebox/src/com/android/security/
H A DSecureBox.java240 public static byte[] decrypt( in decrypt() method in SecureBox
/aosp14/frameworks/base/media/java/android/media/
H A DMediaDrm.java2371 public byte[] decrypt(
/aosp14/frameworks/base/media/jni/
H A Dandroid_media_MediaDrm.cpp1902 DrmStatus err = drm->decrypt(sessionId, keyId, input, iv, output); in android_media_MediaDrm_decryptNative()
/aosp14/frameworks/base/tools/aapt2/integration-tests/CommandTests/
H A Dandroid-33.jarAndroidManifest.xml META-INF/ META-INF/MANIFEST.MF NOTICES/ NOTICES/libcore ...
/aosp14/frameworks/base/core/api/
H A Dcurrent.txt23298 method @NonNull public byte[] decrypt(@NonNull byte[], @NonNull byte[], @NonNull byte[]);