/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 2200 string plaintext = DecryptMessage(ciphertext, params); in TEST_P() local 2201 EXPECT_EQ(message, plaintext); in TEST_P() 2303 string plaintext = DecryptMessage(ciphertext, params); in TEST_P() local 2304 EXPECT_EQ(message, plaintext); in TEST_P() 2396 string plaintext = DecryptMessage(ciphertext, params); in TEST_P() local 2398 EXPECT_EQ(expected_plaintext, plaintext); in TEST_P() 2612 string plaintext = DecryptMessage(ciphertext1, params); in TEST_P() local 2613 EXPECT_EQ(message, plaintext); in TEST_P() 2709 string plaintext = DecryptMessage(ciphertext1, params); in TEST_P() local 2710 EXPECT_EQ(message, plaintext); in TEST_P() [all …]
|
D | KeymasterHidlTest.cpp | 607 string plaintext = in DecryptMessage() local 610 return plaintext; in DecryptMessage()
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | KeyMintTest.cpp | 3354 string plaintext = DecryptMessage(ciphertext, params); in TEST_P() local 3355 EXPECT_EQ(message, plaintext); in TEST_P() 3421 string plaintext = DecryptMessage(ciphertext, params); in TEST_P() local 3422 EXPECT_EQ(message, plaintext); in TEST_P() 3739 string plaintext = DecryptMessage(ciphertext, params); in TEST_P() local 3740 EXPECT_EQ(message, plaintext); in TEST_P() 3769 string plaintext = DecryptMessage(ciphertext, params); in TEST_P() local 3770 EXPECT_EQ(message, plaintext); in TEST_P() 3900 string plaintext = DecryptMessage(ciphertext, params); in TEST_P() local 3902 EXPECT_EQ(expected_plaintext, plaintext); in TEST_P() [all …]
|
D | KeyMintAidlTestBase.cpp | 978 string plaintext = in DecryptMessage() local 981 return plaintext; in DecryptMessage()
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 847 string plaintext = in DecryptMessage() local 850 return plaintext; in DecryptMessage() 2500 string plaintext = DecryptMessage(ciphertext, params); in TEST_P() local 2501 EXPECT_EQ(message, plaintext); in TEST_P() 2571 string plaintext = DecryptMessage(ciphertext, params); in TEST_P() local 2573 EXPECT_EQ(expected_plaintext, plaintext); in TEST_P() 2785 string plaintext = DecryptMessage(ciphertext1, params); in TEST_P() local 2786 EXPECT_EQ(message, plaintext); in TEST_P() 2886 string plaintext = DecryptMessage(ciphertext1, params); in TEST_P() local 2887 EXPECT_EQ(message, plaintext); in TEST_P() [all …]
|
/hardware/interfaces/gatekeeper/1.0/ |
D | IGatekeeper.hal | 41 * plaintext. 77 * @param providedPassword The plaintext password to be verified against the
|
/hardware/interfaces/keymaster/4.1/ |
D | types.hal | 57 * without software having access to or the ability to set the plaintext keys. Instead, software
|
/hardware/interfaces/wifi/supplicant/1.0/ |
D | ISupplicantStaIfaceCallback.hal | 97 * plaintext connections, this state is entered when an association
|
/hardware/interfaces/keymaster/3.0/ |
D | types.hal | 187 * Padding modes that may be applied to plaintext for encryption operations. This list includes
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 533 * o keyFormat is an integer from the KeyFormat enum, defining the format of the plaintext 1277 * o BlockMode::GCM. During encryption, after processing all plaintext, compute the tag
|
D | types.hal | 904 * Padding modes that may be applied to plaintext for encryption operations. This list includes
|