Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 16 of 16) sorted by relevance

/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/
DAesCtrDecryptorUnittest.cpp46 const uint8_t* encrypted, in attemptDecryptExpectingSuccess() argument
52 ASSERT_EQ(android::OK, attemptDecrypt(key, iv, encrypted, outputBuffer, in attemptDecryptExpectingSuccess()
136 uint8_t encrypted[kTotalSize] = { in TEST_F() local
162 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F()
181 uint8_t encrypted[kTotalSize] = { in TEST_F() local
208 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F()
227 uint8_t encrypted[kTotalSize] = { in TEST_F() local
254 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F()
273 uint8_t encrypted[kTotalSize] = { in TEST_F() local
303 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F()
[all …]
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
DSecureBoxTest.java208 byte[] encrypted = in encryptThenDecrypt_nullPublicPrivateKeys()
213 /*ourPrivateKey=*/ null, TEST_SHARED_SECRET, TEST_HEADER, encrypted); in encryptThenDecrypt_nullPublicPrivateKeys()
219 byte[] encrypted = in encryptThenDecrypt_nullSharedSecret()
223 SecureBox.decrypt(THM_PRIVATE_KEY, /*sharedSecret=*/ null, TEST_HEADER, encrypted); in encryptThenDecrypt_nullSharedSecret()
229 byte[] encrypted = in encryptThenDecrypt_nullHeader()
233 SecureBox.decrypt(THM_PRIVATE_KEY, TEST_SHARED_SECRET, /*header=*/ null, encrypted); in encryptThenDecrypt_nullHeader()
239 byte[] encrypted = in encryptThenDecrypt_nullPayload()
247 /*encryptedPayload=*/ encrypted); in encryptThenDecrypt_nullPayload()
295 byte[] encrypted = in decrypt_badAuthenticationTag()
297 encrypted[encrypted.length - 1] ^= (byte) 1; in decrypt_badAuthenticationTag()
[all …]
DKeySyncUtilsTest.java227 byte[] encrypted = KeySyncUtils.locallyEncryptRecoveryKey( in decryptRecoveryKey_decryptsALocallyEncryptedKey()
230 byte[] keyMaterial = KeySyncUtils.decryptRecoveryKey(LOCK_SCREEN_HASH_1, encrypted); in decryptRecoveryKey_decryptsALocallyEncryptedKey()
238 byte[] encrypted = KeySyncUtils.locallyEncryptRecoveryKey(LOCK_SCREEN_HASH_1, recoveryKey); in decryptRecoveryKey_throwsIfCannotDecrypt()
241 KeySyncUtils.decryptRecoveryKey(LOCK_SCREEN_HASH_2, encrypted); in decryptRecoveryKey_throwsIfCannotDecrypt()
/frameworks/base/tests/LegacyRestoreTest/
DREADME1 The file "jbmr2-encrypted-settings-abcd.ab" in this directory is an encrypted
12 The file "kk-fixed-encrypted-settings-abcd.ab" is a similar encrypted "adb backup"
17 These archives can be used as an ongoing test to verify that historical encrypted
/frameworks/av/media/libstagefright/mpeg2ts/
DHlsSampleDecryptor.cpp119 uint8_t *encrypted = nalData + offset; in processNal() local
120 status_t ret = decryptBlock(encrypted, AES_BLOCK_SIZE, AESInitVec); in processNal()
186 uint8_t *encrypted = data + offset; in processAAC() local
187 status_t ret = decryptBlock(encrypted, encryptedBytes, AESInitVec); in processAAC()
242 uint8_t *encrypted = data + offset; in processAC3() local
243 status_t ret = decryptBlock(encrypted, encryptedBytes, AESInitVec); in processAC3()
/frameworks/base/packages/BackupEncryption/proto/
Dbackup_chunks_metadata.proto24 // Cipher type with which the chunks are encrypted. For now we only support AES/GCM/NoPadding, but
40 // The chunk ordering contains a list of the start position of each chunk in the encrypted file,
45 // The chunk ordering does not contain any start positions, and instead each encrypted chunk in
56 // Number of bytes in encrypted chunk
70 // Cipher algorithm with which the chunks are encrypted.
89 // information about which parts of the backup are changing over time.) This proto is encrypted
115 // data structure is only ever uploaded to the server encrypted with a key unknown to the server.
118 // Cipher algorithm with which the chunk listing and chunks are encrypted.
Dwrapped_key.proto24 // An encrypted tertiary key.
26 // The Cipher with which the key was encrypted.
44 // The encrypted bytes of the key material.
Dkey_value_pair.proto24 // Serialized form of a key-value pair, when it is to be encrypted in a blob.
25 // The backup blob for a key-value database consists of repeated encrypted
/frameworks/base/media/java/android/media/tv/
DTvTrackInfo.java79 String encoding, boolean encrypted, int audioChannelCount, int audioSampleRate, in TvTrackInfo() argument
88 mEncrypted = encrypted; in TvTrackInfo()
523 public Builder setEncrypted(boolean encrypted) { in setEncrypted() argument
524 mEncrypted = encrypted; in setEncrypted()
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
DRebootEscrowDataTest.java105 byte [] encrypted = AesEncryptionUtil.encrypt(mKeyStoreEncryptionKey, testSp); in aesEncryptedBlob_loopback_success()
106 byte [] decrypted = AesEncryptionUtil.decrypt(mKeyStoreEncryptionKey, encrypted); in aesEncryptedBlob_loopback_success()
/frameworks/opt/telephony/proto/src/
Dpin_storage.proto55 // Stores the encrypted version of StoredPin.
/frameworks/base/services/core/java/com/android/server/locksettings/
DSyntheticPasswordManager.java1296 final byte[] encrypted = loadState(PASSWORD_METRICS_NAME, handle, userId); in getPasswordMetrics()
1297 if (encrypted == null) return null; in getPasswordMetrics()
1299 /* personalization= */ new byte[0], encrypted); in getPasswordMetrics()
1306 final byte[] encrypted = SyntheticPasswordCrypto.encrypt(authToken.deriveMetricsKey(), in savePasswordMetrics()
1309 saveState(PASSWORD_METRICS_NAME, encrypted, handle, userId); in savePasswordMetrics()
/frameworks/base/cmds/bootanimation/
DFORMAT.md7 /system/media/bootanimation-encrypted.zip (if getprop("vold.decrypt") = '1')
/frameworks/av/media/extractors/mkv/
DMatroskaExtractor.cpp658 bool encrypted = data[0] & 0x1; in setWebmBlockCryptoInfo() local
660 if (encrypted && mbuf->range_length() < 9) { in setWebmBlockCryptoInfo()
666 if (encrypted) { in setWebmBlockCryptoInfo()
/frameworks/base/services/core/java/com/android/server/rollback/
DREADME.md134 restored for all users, even for credential encrypted users that have not been
/frameworks/proto_logging/stats/
Datoms.proto5635 // BOOT_COMPLETE for encrypted device.
5639 // Adjusted BOOT_COMPLETE for encrypted device extracting decryption time.
12205 // Credential encrypted storage is unlocked.
12207 // Credential encrypted storage is locked.