Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 – 25 of 34) sorted by relevance

12

/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/
H A DAesCtrDecryptorUnittest.cpp47 const uint8_t* decrypted, in attemptDecryptExpectingSuccess() argument
56 EXPECT_EQ(0, memcmp(outputBuffer, decrypted, totalSize)); in attemptDecryptExpectingSuccess()
147 uint8_t decrypted[kTotalSize] = { in TEST_F() local
162 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F()
192 uint8_t decrypted[kTotalSize] = { in TEST_F() local
208 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F()
238 uint8_t decrypted[kTotalSize] = { in TEST_F() local
287 uint8_t decrypted[kTotalSize] = { in TEST_F() local
339 uint8_t decrypted[kTotalSize] = { in TEST_F() local
394 uint8_t decrypted[kTotalSize] = { in TEST_F() local
[all …]
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
H A DSecureBoxTest.java211 byte[] decrypted = in encryptThenDecrypt_nullPublicPrivateKeys()
214 assertThat(decrypted).isEqualTo(TEST_PAYLOAD); in encryptThenDecrypt_nullPublicPrivateKeys()
222 byte[] decrypted = in encryptThenDecrypt_nullSharedSecret()
224 assertThat(decrypted).isEqualTo(TEST_PAYLOAD); in encryptThenDecrypt_nullSharedSecret()
232 byte[] decrypted = in encryptThenDecrypt_nullHeader()
234 assertThat(decrypted).isEqualTo(TEST_PAYLOAD); in encryptThenDecrypt_nullHeader()
242 byte[] decrypted = in encryptThenDecrypt_nullPayload()
248 assertThat(decrypted.length).isEqualTo(0); in encryptThenDecrypt_nullPayload()
H A DKeySyncUtilsTest.java259 byte[] decrypted = KeySyncUtils.decryptRecoveryClaimResponse( in decryptRecoveryClaimResponse_decryptsAValidResponse()
262 assertArrayEquals(recoveryKey, decrypted); in decryptRecoveryClaimResponse_decryptsAValidResponse()
298 byte[] decrypted = SecureBox.decrypt( in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant()
303 assertArrayEquals(KeySyncUtils.concat(LOCK_SCREEN_HASH_1, keyClaimant), decrypted); in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() local
/aosp12/packages/modules/adb/pairing_auth/
H A Dpairing_auth.cpp185 Data decrypted(cipher_->DecryptedSize(data.size())); in Decrypt() local
186 size_t decrypted_size = decrypted.size(); in Decrypt()
187 auto out_size = cipher_->Decrypt(data.data(), data.size(), decrypted.data(), decrypted_size); in Decrypt()
192 decrypted.resize(*out_size); in Decrypt()
194 return decrypted; in Decrypt()
/aosp12/frameworks/base/packages/BackupEncryption/test/robolectric/src/com/android/server/backup/encryption/tasks/
H A DEncryptedFullRestoreTaskTest.java70 byte[] decrypted = fakeDecrypt(Files.toByteArray(source)); in setUp()
72 target.processChunk(decrypted, decrypted.length); in setUp()
H A DEncryptedBackupTaskTest.java364 byte[] decrypted = in decryptChunkOrdering()
369 return ChunkOrdering.parseFrom(decrypted); in decryptChunkOrdering()
/aosp12/hardware/interfaces/identity/aidl/vts/
H A DReaderAuthTests.cpp351 vector<uint8_t> decrypted; in retrieveData() local
356 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByA_, &decrypted).isOk()); in retrieveData()
362 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByAorB_, &decrypted).isOk()); in retrieveData()
368 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByB_, &decrypted).isOk()); in retrieveData()
374 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByC_, &decrypted).isOk()); in retrieveData()
380 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByAll_, &decrypted).isOk()); in retrieveData()
386 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByNone_, &decrypted).isOk()); in retrieveData()
H A DUserAuthTests.cpp245 vector<uint8_t> decrypted; in retrieveData() local
251 credential_->retrieveEntryValue(encContentUserAuthPerSession_, &decrypted).isOk()); in retrieveData()
257 ASSERT_TRUE(credential_->retrieveEntryValue(encContentUserAuthTimeout_, &decrypted).isOk()); in retrieveData()
263 ASSERT_TRUE(credential_->retrieveEntryValue(encContentAccessibleByAll_, &decrypted).isOk()); in retrieveData()
270 credential_->retrieveEntryValue(encContentAccessibleByNone_, &decrypted).isOk()); in retrieveData()
/aosp12/system/security/keystore2/src/
H A Dec_crypto.rs131 let decrypted = in test_crypto_roundtrip() localVariable
133 let dc: &[u8] = &decrypted; in test_crypto_roundtrip()
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
H A DRebootEscrowDataTest.java106 byte [] decrypted = AesEncryptionUtil.decrypt(mKeyStoreEncryptionKey, encrypted); in aesEncryptedBlob_loopback_success()
108 assertThat(decrypted, is(testSp)); in aesEncryptedBlob_loopback_success()
/aosp12/frameworks/base/packages/BackupEncryption/test/robolectric/src/com/android/server/backup/encryption/chunking/
H A DChunkEncryptorTest.java154 byte[] decrypted = cipher.doFinal(chunk.encryptedBytes()); in encrypt_decryptedResultCorrespondsToPlaintext()
155 assertThat(decrypted).isEqualTo(PLAINTEXT_BYTES); in encrypt_decryptedResultCorrespondsToPlaintext()
/aosp12/frameworks/base/packages/BackupEncryption/src/com/android/server/backup/encryption/tasks/
H A DBackupFileDecryptorTask.java296 byte[] decrypted = in decryptChunkOrdering()
302 return ChunkOrdering.parseFrom(decrypted); in decryptChunkOrdering()
/aosp12/hardware/interfaces/drm/1.0/
H A Dtypes.hal338 * If type == SHARED_MEMORY, the decrypted data must be written
344 * If type == NATIVE_HANDLE, the decrypted data must be written
H A DIDrmPlugin.hal411 * @return output the decrypted data
419 * and return the decrypted data.
430 * @return output the decrypted data
/aosp12/hardware/interfaces/drm/1.2/
H A Dtypes.hal53 * decrypt method when the frame being decrypted into the secure
H A DICryptoPlugin.hal66 * ERROR_DRM_FRAME_TOO_LARGE if the frame being decrypted into
/aosp12/frameworks/av/media/codec2/sfplugin/
H A DCodec2Buffer.h367 bool copyDecryptedContent(const sp<IMemory> &decrypted, size_t length);
H A DCodec2Buffer.cpp924 const sp<IMemory> &decrypted, size_t length) { in copyDecryptedContent() argument
932 memcpy(view.data(), decrypted->unsecurePointer(), length); in copyDecryptedContent()
/aosp12/system/core/bootstat/
H A Dbootstat.rc45 # the device, /data is decrypted, and the system is entering the main boot phase.
/aosp12/system/sepolicy/prebuilts/api/29.0/private/
H A Dgsid.te76 # init. It cannot use userdata since data cannot be decrypted during this
/aosp12/system/sepolicy/prebuilts/api/30.0/private/
H A Dgsid.te101 # init. It cannot use userdata since data cannot be decrypted during this
/aosp12/frameworks/base/services/core/java/com/android/server/locksettings/
H A DSyntheticPasswordManager.java1298 final byte[] decrypted = SyntheticPasswordCrypto.decrypt(authToken.deriveMetricsKey(), in getPasswordMetrics()
1300 if (decrypted == null) return null; in getPasswordMetrics()
1301 return VersionedPasswordMetrics.deserialize(decrypted).getMetrics(); in getPasswordMetrics()
/aosp12/system/sepolicy/prebuilts/api/31.0/private/
H A Dgsid.te114 # init. It cannot use userdata since data cannot be decrypted during this
/aosp12/system/sepolicy/prebuilts/api/32.0/private/
H A Dgsid.te114 # init. It cannot use userdata since data cannot be decrypted during this
/aosp12/system/sepolicy/private/
H A Dgsid.te114 # init. It cannot use userdata since data cannot be decrypted during this

12