/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/ |
H A D | AesCtrDecryptorUnittest.cpp | 47 const uint8_t* decrypted, in attemptDecryptExpectingSuccess() argument 56 EXPECT_EQ(0, memcmp(outputBuffer, decrypted, totalSize)); in attemptDecryptExpectingSuccess() 147 uint8_t decrypted[kTotalSize] = { in TEST_F() local 162 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F() 192 uint8_t decrypted[kTotalSize] = { in TEST_F() local 208 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F() 238 uint8_t decrypted[kTotalSize] = { in TEST_F() local 287 uint8_t decrypted[kTotalSize] = { in TEST_F() local 339 uint8_t decrypted[kTotalSize] = { in TEST_F() local 394 uint8_t decrypted[kTotalSize] = { in TEST_F() local [all …]
|
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | SecureBoxTest.java | 211 byte[] decrypted = in encryptThenDecrypt_nullPublicPrivateKeys() 214 assertThat(decrypted).isEqualTo(TEST_PAYLOAD); in encryptThenDecrypt_nullPublicPrivateKeys() 222 byte[] decrypted = in encryptThenDecrypt_nullSharedSecret() 224 assertThat(decrypted).isEqualTo(TEST_PAYLOAD); in encryptThenDecrypt_nullSharedSecret() 232 byte[] decrypted = in encryptThenDecrypt_nullHeader() 234 assertThat(decrypted).isEqualTo(TEST_PAYLOAD); in encryptThenDecrypt_nullHeader() 242 byte[] decrypted = in encryptThenDecrypt_nullPayload() 248 assertThat(decrypted.length).isEqualTo(0); in encryptThenDecrypt_nullPayload()
|
H A D | KeySyncUtilsTest.java | 259 byte[] decrypted = KeySyncUtils.decryptRecoveryClaimResponse( in decryptRecoveryClaimResponse_decryptsAValidResponse() 262 assertArrayEquals(recoveryKey, decrypted); in decryptRecoveryClaimResponse_decryptsAValidResponse() 298 byte[] decrypted = SecureBox.decrypt( in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 303 assertArrayEquals(KeySyncUtils.concat(LOCK_SCREEN_HASH_1, keyClaimant), decrypted); in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() local
|
/aosp12/packages/modules/adb/pairing_auth/ |
H A D | pairing_auth.cpp | 185 Data decrypted(cipher_->DecryptedSize(data.size())); in Decrypt() local 186 size_t decrypted_size = decrypted.size(); in Decrypt() 187 auto out_size = cipher_->Decrypt(data.data(), data.size(), decrypted.data(), decrypted_size); in Decrypt() 192 decrypted.resize(*out_size); in Decrypt() 194 return decrypted; in Decrypt()
|
/aosp12/frameworks/base/packages/BackupEncryption/test/robolectric/src/com/android/server/backup/encryption/tasks/ |
H A D | EncryptedFullRestoreTaskTest.java | 70 byte[] decrypted = fakeDecrypt(Files.toByteArray(source)); in setUp() 72 target.processChunk(decrypted, decrypted.length); in setUp()
|
H A D | EncryptedBackupTaskTest.java | 364 byte[] decrypted = in decryptChunkOrdering() 369 return ChunkOrdering.parseFrom(decrypted); in decryptChunkOrdering()
|
/aosp12/hardware/interfaces/identity/aidl/vts/ |
H A D | ReaderAuthTests.cpp | 351 vector<uint8_t> decrypted; in retrieveData() local 356 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByA_, &decrypted).isOk()); in retrieveData() 362 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByAorB_, &decrypted).isOk()); in retrieveData() 368 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByB_, &decrypted).isOk()); in retrieveData() 374 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByC_, &decrypted).isOk()); in retrieveData() 380 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByAll_, &decrypted).isOk()); in retrieveData() 386 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByNone_, &decrypted).isOk()); in retrieveData()
|
H A D | UserAuthTests.cpp | 245 vector<uint8_t> decrypted; in retrieveData() local 251 credential_->retrieveEntryValue(encContentUserAuthPerSession_, &decrypted).isOk()); in retrieveData() 257 ASSERT_TRUE(credential_->retrieveEntryValue(encContentUserAuthTimeout_, &decrypted).isOk()); in retrieveData() 263 ASSERT_TRUE(credential_->retrieveEntryValue(encContentAccessibleByAll_, &decrypted).isOk()); in retrieveData() 270 credential_->retrieveEntryValue(encContentAccessibleByNone_, &decrypted).isOk()); in retrieveData()
|
/aosp12/system/security/keystore2/src/ |
H A D | ec_crypto.rs | 131 let decrypted = in test_crypto_roundtrip() localVariable 133 let dc: &[u8] = &decrypted; in test_crypto_roundtrip()
|
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | RebootEscrowDataTest.java | 106 byte [] decrypted = AesEncryptionUtil.decrypt(mKeyStoreEncryptionKey, encrypted); in aesEncryptedBlob_loopback_success() 108 assertThat(decrypted, is(testSp)); in aesEncryptedBlob_loopback_success()
|
/aosp12/frameworks/base/packages/BackupEncryption/test/robolectric/src/com/android/server/backup/encryption/chunking/ |
H A D | ChunkEncryptorTest.java | 154 byte[] decrypted = cipher.doFinal(chunk.encryptedBytes()); in encrypt_decryptedResultCorrespondsToPlaintext() 155 assertThat(decrypted).isEqualTo(PLAINTEXT_BYTES); in encrypt_decryptedResultCorrespondsToPlaintext()
|
/aosp12/frameworks/base/packages/BackupEncryption/src/com/android/server/backup/encryption/tasks/ |
H A D | BackupFileDecryptorTask.java | 296 byte[] decrypted = in decryptChunkOrdering() 302 return ChunkOrdering.parseFrom(decrypted); in decryptChunkOrdering()
|
/aosp12/hardware/interfaces/drm/1.0/ |
H A D | types.hal | 338 * If type == SHARED_MEMORY, the decrypted data must be written 344 * If type == NATIVE_HANDLE, the decrypted data must be written
|
H A D | IDrmPlugin.hal | 411 * @return output the decrypted data 419 * and return the decrypted data. 430 * @return output the decrypted data
|
/aosp12/hardware/interfaces/drm/1.2/ |
H A D | types.hal | 53 * decrypt method when the frame being decrypted into the secure
|
H A D | ICryptoPlugin.hal | 66 * ERROR_DRM_FRAME_TOO_LARGE if the frame being decrypted into
|
/aosp12/frameworks/av/media/codec2/sfplugin/ |
H A D | Codec2Buffer.h | 367 bool copyDecryptedContent(const sp<IMemory> &decrypted, size_t length);
|
H A D | Codec2Buffer.cpp | 924 const sp<IMemory> &decrypted, size_t length) { in copyDecryptedContent() argument 932 memcpy(view.data(), decrypted->unsecurePointer(), length); in copyDecryptedContent()
|
/aosp12/system/core/bootstat/ |
H A D | bootstat.rc | 45 # the device, /data is decrypted, and the system is entering the main boot phase.
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/ |
H A D | gsid.te | 76 # init. It cannot use userdata since data cannot be decrypted during this
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/ |
H A D | gsid.te | 101 # init. It cannot use userdata since data cannot be decrypted during this
|
/aosp12/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | SyntheticPasswordManager.java | 1298 final byte[] decrypted = SyntheticPasswordCrypto.decrypt(authToken.deriveMetricsKey(), in getPasswordMetrics() 1300 if (decrypted == null) return null; in getPasswordMetrics() 1301 return VersionedPasswordMetrics.deserialize(decrypted).getMetrics(); in getPasswordMetrics()
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/ |
H A D | gsid.te | 114 # init. It cannot use userdata since data cannot be decrypted during this
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/ |
H A D | gsid.te | 114 # init. It cannot use userdata since data cannot be decrypted during this
|
/aosp12/system/sepolicy/private/ |
H A D | gsid.te | 114 # init. It cannot use userdata since data cannot be decrypted during this
|