/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/ |
D | AesCtrDecryptorUnittest.cpp | 46 const uint8_t* encrypted, in attemptDecryptExpectingSuccess() argument 52 ASSERT_EQ(android::OK, attemptDecrypt(key, iv, encrypted, outputBuffer, in attemptDecryptExpectingSuccess() 136 uint8_t encrypted[kTotalSize] = { in TEST_F() local 162 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F() 181 uint8_t encrypted[kTotalSize] = { in TEST_F() local 208 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F() 227 uint8_t encrypted[kTotalSize] = { in TEST_F() local 254 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F() 273 uint8_t encrypted[kTotalSize] = { in TEST_F() local 303 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F() [all …]
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
D | SecureBoxTest.java | 208 byte[] encrypted = in encryptThenDecrypt_nullPublicPrivateKeys() 213 /*ourPrivateKey=*/ null, TEST_SHARED_SECRET, TEST_HEADER, encrypted); in encryptThenDecrypt_nullPublicPrivateKeys() 219 byte[] encrypted = in encryptThenDecrypt_nullSharedSecret() 223 SecureBox.decrypt(THM_PRIVATE_KEY, /*sharedSecret=*/ null, TEST_HEADER, encrypted); in encryptThenDecrypt_nullSharedSecret() 229 byte[] encrypted = in encryptThenDecrypt_nullHeader() 233 SecureBox.decrypt(THM_PRIVATE_KEY, TEST_SHARED_SECRET, /*header=*/ null, encrypted); in encryptThenDecrypt_nullHeader() 239 byte[] encrypted = in encryptThenDecrypt_nullPayload() 247 /*encryptedPayload=*/ encrypted); in encryptThenDecrypt_nullPayload() 295 byte[] encrypted = in decrypt_badAuthenticationTag() 297 encrypted[encrypted.length - 1] ^= (byte) 1; in decrypt_badAuthenticationTag() [all …]
|
D | KeySyncUtilsTest.java | 227 byte[] encrypted = KeySyncUtils.locallyEncryptRecoveryKey( in decryptRecoveryKey_decryptsALocallyEncryptedKey() 230 byte[] keyMaterial = KeySyncUtils.decryptRecoveryKey(LOCK_SCREEN_HASH_1, encrypted); in decryptRecoveryKey_decryptsALocallyEncryptedKey() 238 byte[] encrypted = KeySyncUtils.locallyEncryptRecoveryKey(LOCK_SCREEN_HASH_1, recoveryKey); in decryptRecoveryKey_throwsIfCannotDecrypt() 241 KeySyncUtils.decryptRecoveryKey(LOCK_SCREEN_HASH_2, encrypted); in decryptRecoveryKey_throwsIfCannotDecrypt()
|
/frameworks/base/tests/LegacyRestoreTest/ |
D | README | 1 The file "jbmr2-encrypted-settings-abcd.ab" in this directory is an encrypted 12 The file "kk-fixed-encrypted-settings-abcd.ab" is a similar encrypted "adb backup" 17 These archives can be used as an ongoing test to verify that historical encrypted
|
/frameworks/av/media/libstagefright/mpeg2ts/ |
D | HlsSampleDecryptor.cpp | 119 uint8_t *encrypted = nalData + offset; in processNal() local 120 status_t ret = decryptBlock(encrypted, AES_BLOCK_SIZE, AESInitVec); in processNal() 186 uint8_t *encrypted = data + offset; in processAAC() local 187 status_t ret = decryptBlock(encrypted, encryptedBytes, AESInitVec); in processAAC() 242 uint8_t *encrypted = data + offset; in processAC3() local 243 status_t ret = decryptBlock(encrypted, encryptedBytes, AESInitVec); in processAC3()
|
/frameworks/base/packages/BackupEncryption/proto/ |
D | backup_chunks_metadata.proto | 24 // Cipher type with which the chunks are encrypted. For now we only support AES/GCM/NoPadding, but 40 // The chunk ordering contains a list of the start position of each chunk in the encrypted file, 45 // The chunk ordering does not contain any start positions, and instead each encrypted chunk in 56 // Number of bytes in encrypted chunk 70 // Cipher algorithm with which the chunks are encrypted. 89 // information about which parts of the backup are changing over time.) This proto is encrypted 115 // data structure is only ever uploaded to the server encrypted with a key unknown to the server. 118 // Cipher algorithm with which the chunk listing and chunks are encrypted.
|
D | wrapped_key.proto | 24 // An encrypted tertiary key. 26 // The Cipher with which the key was encrypted. 44 // The encrypted bytes of the key material.
|
D | key_value_pair.proto | 24 // Serialized form of a key-value pair, when it is to be encrypted in a blob. 25 // The backup blob for a key-value database consists of repeated encrypted
|
/frameworks/base/media/java/android/media/tv/ |
D | TvTrackInfo.java | 79 String encoding, boolean encrypted, int audioChannelCount, int audioSampleRate, in TvTrackInfo() argument 88 mEncrypted = encrypted; in TvTrackInfo() 523 public Builder setEncrypted(boolean encrypted) { in setEncrypted() argument 524 mEncrypted = encrypted; in setEncrypted()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
D | RebootEscrowDataTest.java | 105 byte [] encrypted = AesEncryptionUtil.encrypt(mKeyStoreEncryptionKey, testSp); in aesEncryptedBlob_loopback_success() 106 byte [] decrypted = AesEncryptionUtil.decrypt(mKeyStoreEncryptionKey, encrypted); in aesEncryptedBlob_loopback_success()
|
/frameworks/opt/telephony/proto/src/ |
D | pin_storage.proto | 55 // Stores the encrypted version of StoredPin.
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
D | SyntheticPasswordManager.java | 1296 final byte[] encrypted = loadState(PASSWORD_METRICS_NAME, handle, userId); in getPasswordMetrics() 1297 if (encrypted == null) return null; in getPasswordMetrics() 1299 /* personalization= */ new byte[0], encrypted); in getPasswordMetrics() 1306 final byte[] encrypted = SyntheticPasswordCrypto.encrypt(authToken.deriveMetricsKey(), in savePasswordMetrics() 1309 saveState(PASSWORD_METRICS_NAME, encrypted, handle, userId); in savePasswordMetrics()
|
/frameworks/base/cmds/bootanimation/ |
D | FORMAT.md | 7 /system/media/bootanimation-encrypted.zip (if getprop("vold.decrypt") = '1')
|
/frameworks/av/media/extractors/mkv/ |
D | MatroskaExtractor.cpp | 658 bool encrypted = data[0] & 0x1; in setWebmBlockCryptoInfo() local 660 if (encrypted && mbuf->range_length() < 9) { in setWebmBlockCryptoInfo() 666 if (encrypted) { in setWebmBlockCryptoInfo()
|
/frameworks/base/services/core/java/com/android/server/rollback/ |
D | README.md | 134 restored for all users, even for credential encrypted users that have not been
|
/frameworks/proto_logging/stats/ |
D | atoms.proto | 5635 // BOOT_COMPLETE for encrypted device. 5639 // Adjusted BOOT_COMPLETE for encrypted device extracting decryption time. 12205 // Credential encrypted storage is unlocked. 12207 // Credential encrypted storage is locked.
|