/aosp14/frameworks/base/libs/securebox/tests/src/com/android/security/ |
H A D | SecureBoxTest.java | 178 SecureBox.decrypt( in decryptRecoveryClaim() 188 SecureBox.decrypt( in decryptRecoveryKey_doesNotThrowForValidAuthenticationTag() 203 state = SecureBox.decrypt(THM_PRIVATE_KEY, TEST_SHARED_SECRET, TEST_HEADER, state); in encryptThenDecrypt() 214 SecureBox.decrypt( in encryptThenDecrypt_nullPublicPrivateKeys() 225 SecureBox.decrypt(THM_PRIVATE_KEY, /*sharedSecret=*/ null, TEST_HEADER, encrypted); in encryptThenDecrypt_nullSharedSecret() 245 SecureBox.decrypt( in encryptThenDecrypt_nullPayload() 273 SecureBox.decrypt( in decrypt_nullPrivateKeyAndSharedSecret() 287 SecureBox.decrypt( in decrypt_nullEncryptedPayload() 304 SecureBox.decrypt( in decrypt_badAuthenticationTag() 329 () -> SecureBox.decrypt(privateKey, TEST_SHARED_SECRET, TEST_HEADER, encrypted)); in decrypt_invalidPrivateKey() [all …]
|
/aosp14/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | SyntheticPasswordCrypto.java | 63 private static byte[] decrypt(SecretKey key, byte[] blob) in decrypt() method in SyntheticPasswordCrypto 115 public static byte[] decrypt(byte[] keyBytes, byte[] personalization, byte[] ciphertext) { in decrypt() method in SyntheticPasswordCrypto 120 return decrypt(key, ciphertext); in decrypt() 142 byte[] intermediate = decrypt(protectorSecret, PROTECTOR_SECRET_PERSONALIZATION, blob); in decryptBlobV1() 143 return decrypt(protectorKey, intermediate); in decryptBlobV1() 178 byte[] intermediate = decrypt(protectorKey, blob); in decryptBlob() 179 return decrypt(protectorSecret, PROTECTOR_SECRET_PERSONALIZATION, intermediate); in decryptBlob()
|
H A D | RebootEscrowData.java | 82 byte[] ksEncryptedBlob = AesEncryptionUtil.decrypt(kk, dis); in decryptBlobCurrentVersion() 83 return AesEncryptionUtil.decrypt(ks.getKey(), ksEncryptedBlob); in decryptBlobCurrentVersion() 101 byte[] syntheticPassword = AesEncryptionUtil.decrypt(ks.getKey(), dis); in fromEncryptedData()
|
H A D | AesEncryptionUtil.java | 42 static byte[] decrypt(SecretKey key, DataInputStream cipherStream) throws IOException { in decrypt() method in AesEncryptionUtil 75 static byte[] decrypt(SecretKey key, byte[] cipherText) throws IOException { in decrypt() method in AesEncryptionUtil 80 return decrypt(key, cipherStream); in decrypt()
|
H A D | RebootEscrowProviderServerBasedImpl.java | 117 byte[] decryptedBlob = AesEncryptionUtil.decrypt(decryptionKey, serverBlob); in unwrapServerBlob()
|
H A D | SyntheticPasswordManager.java | 332 return SyntheticPasswordCrypto.decrypt(mSyntheticPassword, PERSONALIZATION_E0, in getEscrowSecret() 1533 secdiscardable = SyntheticPasswordCrypto.decrypt(response.getGatekeeperHAT(), in unlockTokenBasedProtectorInternal() 1768 final byte[] decrypted = SyntheticPasswordCrypto.decrypt(sp.deriveMetricsKey(), in getPasswordMetrics() 1973 return SyntheticPasswordCrypto.decrypt( in readVendorAuthSecret()
|
/aosp14/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncUtils.java | 242 return SecureBox.decrypt( in decryptRecoveryClaimResponse() 261 return SecureBox.decrypt( in decryptRecoveryKey() 287 return SecureBox.decrypt( in decryptApplicationKey()
|
H A D | RecoverableKeyStoreManager.java | 1055 decryptedCredentials = SecureBox.decrypt( in validateRemoteLockscreen()
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncUtilsTest.java | 290 byte[] decrypted = SecureBox.decrypt( in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 312 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutChallenge() 338 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 364 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() 391 SecureBox.decrypt( in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader()
|
H A D | KeySyncTaskTest.java | 835 byte[] locallyEncryptedKey = SecureBox.decrypt( in decryptThmEncryptedKey()
|
/aosp14/system/core/rootdir/ |
H A D | asan_extract.sh | 34 VOLD_STATUS=$(getprop vold.decrypt)
|
H A D | init.rc | 549 # Now we can mount /data. File encryption requires keymaster to decrypt
|
/aosp14/frameworks/base/services/companion/java/com/android/server/companion/transport/ |
H A D | CryptoManager.java | 93 public byte[] decrypt(byte[] input) { in decrypt() method in CryptoManager
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | RebootEscrowDataTest.java | 111 byte [] decrypted = AesEncryptionUtil.decrypt(mKeyStoreEncryptionKey, encrypted); in aesEncryptedBlob_loopback_success()
|
/aosp14/frameworks/base/libs/securebox/src/com/android/security/ |
H A D | SecureBox.java | 240 public static byte[] decrypt( in decrypt() method in SecureBox
|
/aosp14/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 2371 public byte[] decrypt(
|
/aosp14/frameworks/base/media/jni/ |
H A D | android_media_MediaDrm.cpp | 1902 DrmStatus err = drm->decrypt(sessionId, keyId, input, iv, output); in android_media_MediaDrm_decryptNative()
|
/aosp14/frameworks/base/tools/aapt2/integration-tests/CommandTests/ |
H A D | android-33.jar | AndroidManifest.xml
META-INF/
META-INF/MANIFEST.MF
NOTICES/
NOTICES/libcore ... |
/aosp14/frameworks/base/core/api/ |
H A D | current.txt | 23298 method @NonNull public byte[] decrypt(@NonNull byte[], @NonNull byte[], @NonNull byte[]);
|