HomeSort by relevance Sort by last modified time
    Searched full:encrypted_data (Results 1 - 23 of 23) sorted by null

  /system/security/keystore/
keystore_client.proto 23 // MAC of (init_vector + encrypted_data).
25 optional bytes encrypted_data = 3;
keystore_client_impl.cpp 78 std::string* encrypted_data) {
124 if (!protobuf.SerializeToString(encrypted_data)) {
132 const std::string& encrypted_data,
135 if (!protobuf.ParseFromString(encrypted_data)) {
145 protobuf.init_vector() + protobuf.encrypted_data(),
157 protobuf.encrypted_data(), std::string(), /* signature_to_verify */
  /system/tpm/attestation/common/
crypto_utility.h 40 // embedded in the |encrypted_data| to assist with decryption. It can be
41 // extracted from the |encrypted_data| using UnsealKey(). Returns true on
46 std::string* encrypted_data) = 0;
49 // the given |encrypted_data|. The |sealed_key| is also provided as an output
52 virtual bool UnsealKey(const std::string& encrypted_data,
56 // Decrypts |encrypted_data| using |aes_key|, producing the decrypted |data|.
58 virtual bool DecryptData(const std::string& encrypted_data,
87 std::string* encrypted_data) = 0;
crypto_utility_impl.h 43 std::string* encrypted_data) override;
44 bool UnsealKey(const std::string& encrypted_data,
47 bool DecryptData(const std::string& encrypted_data,
61 std::string* encrypted_data) override;
68 // padding and produces the |encrypted_data|. Returns true on success.
72 std::string* encrypted_data);
74 // Decrypts |encrypted_data| using |key| and |iv| for AES in CBC mode with
76 bool AesDecrypt(const std::string& encrypted_data,
mock_crypto_utility.h 41 std::string* encrypted_data));
43 MOCK_METHOD3(UnsealKey, bool(const std::string& encrypted_data,
47 MOCK_METHOD3(DecryptData, bool(const std::string& encrypted_data,
crypto_utility_impl.cc 98 std::string* encrypted_data) {
114 if (!encrypted_pb.SerializeToString(encrypted_data)) {
121 bool CryptoUtilityImpl::UnsealKey(const std::string& encrypted_data,
125 if (!encrypted_pb.ParseFromString(encrypted_data)) {
137 bool CryptoUtilityImpl::DecryptData(const std::string& encrypted_data,
141 if (!encrypted_pb.ParseFromString(encrypted_data)) {
146 encrypted_pb.iv() + encrypted_pb.encrypted_data(),
157 if (!AesDecrypt(encrypted_pb.encrypted_data(), aes_key, encrypted_pb.iv(),
272 std::string* encrypted_data) {
286 if (!TpmCompatibleOAEPEncrypt(bound_data, rsa.get(), encrypted_data)) {
    [all...]
crypto_utility_impl_test.cc 89 std::string encrypted_data; local
91 &encrypted_data));
95 EXPECT_TRUE(crypto_utility_->UnsealKey(encrypted_data, &key, &sealed_key));
96 EXPECT_TRUE(crypto_utility_->DecryptData(encrypted_data, key, &data));
common.proto 73 // MAC of (iv || encrypted_data).
75 optional bytes encrypted_data = 5;
print_common_proto.cc 157 output += indent + " encrypted_data: ";
159 base::HexEncode(value.encrypted_data().data(),
160 value.encrypted_data().size()).c_str());
interface.proto 147 optional bytes encrypted_data = 3;
attestation_ca.proto 169 // ChallengeResponse.encrypted_key_info.encrypted_data field. This message holds
print_interface_proto.cc 539 output += indent + " encrypted_data: ";
541 base::HexEncode(value.encrypted_data().data(),
542 value.encrypted_data().size()).c_str());
tpm_utility_v1.cc 336 ScopedTssMemory encrypted_data(context_handle_);
342 encrypted_data.ptr()))) {
346 sealed_data->assign(TSSBufferAsString(encrypted_data.value(),
  /external/autotest/client/site_tests/network_DestinationVerification/
network_DestinationVerification.py 286 len(response.encrypted_data))
289 encrypted_data = tempfile.NamedTemporaryFile()
292 encrypted_data.write(response.encrypted_data)
293 encrypted_data.flush()
295 (private_key.name, encrypted_data.name),
296 stdin=response.encrypted_data,
316 encrypted_data.close()
  /system/security/keystore/include/keystore/
keystore_client_mock.h 34 std::string* encrypted_data));
36 bool(const std::string& key_name, const std::string& encrypted_data,
keystore_client.h 58 // will be generated. On success returns true and populates |encrypted_data|.
62 std::string* encrypted_data) = 0;
64 // Decrypts and authenticates |encrypted_data| as output by
68 const std::string& encrypted_data,
keystore_client_impl.h 38 std::string* encrypted_data) override;
39 bool decryptWithAuthentication(const std::string& key_name, const std::string& encrypted_data,
  /system/connectivity/shill/shims/protos/
crypto_util.proto 48 optional bytes encrypted_data = 2;
  /system/connectivity/shill/test-scripts/
crypto_util_pb2.py 123 name='encrypted_data', full_name='shill_protos.EncryptDataResponse.encrypted_data', index=1,
  /system/connectivity/shill/
crypto_util_proxy.cc 398 response.encrypted_data().empty()) {
406 brillo::data_encoding::Base64Encode(response.encrypted_data()));
  /system/tpm/attestation/server/
dbus_service_test.cc 310 EXPECT_EQ("data", request.encrypted_data());
attestation_service.cc 437 if (!tpm_utility_->Unbind(key.key_blob(), request.encrypted_data(), &data)) {
  /system/tpm/attestation/client/
dbus_proxy_test.cc 313 EXPECT_EQ("data", request_proto.encrypted_data());

Completed in 331 milliseconds