OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:encrypted_data
(Results
1 - 23
of
23
) sorted by null
/system/security/keystore/
keystore_client.proto
23
// MAC of (init_vector +
encrypted_data
).
25
optional bytes
encrypted_data
= 3;
keystore_client_impl.cpp
78
std::string*
encrypted_data
) {
124
if (!protobuf.SerializeToString(
encrypted_data
)) {
132
const std::string&
encrypted_data
,
135
if (!protobuf.ParseFromString(
encrypted_data
)) {
145
protobuf.init_vector() + protobuf.
encrypted_data
(),
157
protobuf.
encrypted_data
(), std::string(), /* signature_to_verify */
/system/tpm/attestation/common/
crypto_utility.h
40
// embedded in the |
encrypted_data
| to assist with decryption. It can be
41
// extracted from the |
encrypted_data
| using UnsealKey(). Returns true on
46
std::string*
encrypted_data
) = 0;
49
// the given |
encrypted_data
|. The |sealed_key| is also provided as an output
52
virtual bool UnsealKey(const std::string&
encrypted_data
,
56
// Decrypts |
encrypted_data
| using |aes_key|, producing the decrypted |data|.
58
virtual bool DecryptData(const std::string&
encrypted_data
,
87
std::string*
encrypted_data
) = 0;
crypto_utility_impl.h
43
std::string*
encrypted_data
) override;
44
bool UnsealKey(const std::string&
encrypted_data
,
47
bool DecryptData(const std::string&
encrypted_data
,
61
std::string*
encrypted_data
) override;
68
// padding and produces the |
encrypted_data
|. Returns true on success.
72
std::string*
encrypted_data
);
74
// Decrypts |
encrypted_data
| using |key| and |iv| for AES in CBC mode with
76
bool AesDecrypt(const std::string&
encrypted_data
,
mock_crypto_utility.h
41
std::string*
encrypted_data
));
43
MOCK_METHOD3(UnsealKey, bool(const std::string&
encrypted_data
,
47
MOCK_METHOD3(DecryptData, bool(const std::string&
encrypted_data
,
crypto_utility_impl.cc
98
std::string*
encrypted_data
) {
114
if (!encrypted_pb.SerializeToString(
encrypted_data
)) {
121
bool CryptoUtilityImpl::UnsealKey(const std::string&
encrypted_data
,
125
if (!encrypted_pb.ParseFromString(
encrypted_data
)) {
137
bool CryptoUtilityImpl::DecryptData(const std::string&
encrypted_data
,
141
if (!encrypted_pb.ParseFromString(
encrypted_data
)) {
146
encrypted_pb.iv() + encrypted_pb.
encrypted_data
(),
157
if (!AesDecrypt(encrypted_pb.
encrypted_data
(), aes_key, encrypted_pb.iv(),
272
std::string*
encrypted_data
) {
286
if (!TpmCompatibleOAEPEncrypt(bound_data, rsa.get(),
encrypted_data
)) {
[
all
...]
crypto_utility_impl_test.cc
89
std::string
encrypted_data
;
local
91
&
encrypted_data
));
95
EXPECT_TRUE(crypto_utility_->UnsealKey(
encrypted_data
, &key, &sealed_key));
96
EXPECT_TRUE(crypto_utility_->DecryptData(
encrypted_data
, key, &data));
common.proto
73
// MAC of (iv ||
encrypted_data
).
75
optional bytes
encrypted_data
= 5;
print_common_proto.cc
157
output += indent + "
encrypted_data
: ";
159
base::HexEncode(value.
encrypted_data
().data(),
160
value.
encrypted_data
().size()).c_str());
interface.proto
147
optional bytes
encrypted_data
= 3;
attestation_ca.proto
169
// ChallengeResponse.encrypted_key_info.
encrypted_data
field. This message holds
print_interface_proto.cc
539
output += indent + "
encrypted_data
: ";
541
base::HexEncode(value.
encrypted_data
().data(),
542
value.
encrypted_data
().size()).c_str());
tpm_utility_v1.cc
336
ScopedTssMemory
encrypted_data
(context_handle_);
342
encrypted_data
.ptr()))) {
346
sealed_data->assign(TSSBufferAsString(
encrypted_data
.value(),
/external/autotest/client/site_tests/network_DestinationVerification/
network_DestinationVerification.py
286
len(response.
encrypted_data
))
289
encrypted_data
= tempfile.NamedTemporaryFile()
292
encrypted_data
.write(response.
encrypted_data
)
293
encrypted_data
.flush()
295
(private_key.name,
encrypted_data
.name),
296
stdin=response.
encrypted_data
,
316
encrypted_data
.close()
/system/security/keystore/include/keystore/
keystore_client_mock.h
34
std::string*
encrypted_data
));
36
bool(const std::string& key_name, const std::string&
encrypted_data
,
keystore_client.h
58
// will be generated. On success returns true and populates |
encrypted_data
|.
62
std::string*
encrypted_data
) = 0;
64
// Decrypts and authenticates |
encrypted_data
| as output by
68
const std::string&
encrypted_data
,
keystore_client_impl.h
38
std::string*
encrypted_data
) override;
39
bool decryptWithAuthentication(const std::string& key_name, const std::string&
encrypted_data
,
/system/connectivity/shill/shims/protos/
crypto_util.proto
48
optional bytes
encrypted_data
= 2;
/system/connectivity/shill/test-scripts/
crypto_util_pb2.py
123
name='
encrypted_data
', full_name='shill_protos.EncryptDataResponse.
encrypted_data
', index=1,
/system/connectivity/shill/
crypto_util_proxy.cc
398
response.
encrypted_data
().empty()) {
406
brillo::data_encoding::Base64Encode(response.
encrypted_data
()));
/system/tpm/attestation/server/
dbus_service_test.cc
310
EXPECT_EQ("data", request.
encrypted_data
());
attestation_service.cc
437
if (!tpm_utility_->Unbind(key.key_blob(), request.
encrypted_data
(), &data)) {
/system/tpm/attestation/client/
dbus_proxy_test.cc
313
EXPECT_EQ("data", request_proto.
encrypted_data
());
Completed in 331 milliseconds