/system/tpm/attestation/common/ |
D | crypto_utility_impl.h | 43 std::string* encrypted_data) override; 44 bool UnsealKey(const std::string& encrypted_data, 47 bool DecryptData(const std::string& encrypted_data, 61 std::string* encrypted_data) override; 72 std::string* encrypted_data); 76 bool AesDecrypt(const std::string& encrypted_data,
|
D | crypto_utility_impl.cc | 98 std::string* encrypted_data) { in EncryptData() argument 114 if (!encrypted_pb.SerializeToString(encrypted_data)) { in EncryptData() 121 bool CryptoUtilityImpl::UnsealKey(const std::string& encrypted_data, in UnsealKey() argument 125 if (!encrypted_pb.ParseFromString(encrypted_data)) { in UnsealKey() 137 bool CryptoUtilityImpl::DecryptData(const std::string& encrypted_data, in DecryptData() argument 141 if (!encrypted_pb.ParseFromString(encrypted_data)) { in DecryptData() 146 encrypted_pb.iv() + encrypted_pb.encrypted_data(), in DecryptData() 157 if (!AesDecrypt(encrypted_pb.encrypted_data(), aes_key, encrypted_pb.iv(), in DecryptData() 272 std::string* encrypted_data) { in EncryptForUnbind() argument 286 if (!TpmCompatibleOAEPEncrypt(bound_data, rsa.get(), encrypted_data)) { in EncryptForUnbind() [all …]
|
D | crypto_utility.h | 46 std::string* encrypted_data) = 0; 52 virtual bool UnsealKey(const std::string& encrypted_data, 58 virtual bool DecryptData(const std::string& encrypted_data, 87 std::string* encrypted_data) = 0;
|
D | mock_crypto_utility.h | 41 std::string* encrypted_data)); 43 MOCK_METHOD3(UnsealKey, bool(const std::string& encrypted_data, 47 MOCK_METHOD3(DecryptData, bool(const std::string& encrypted_data,
|
D | crypto_utility_impl_test.cc | 89 std::string encrypted_data; in TEST_F() local 91 &encrypted_data)); in TEST_F() 95 EXPECT_TRUE(crypto_utility_->UnsealKey(encrypted_data, &key, &sealed_key)); in TEST_F() 96 EXPECT_TRUE(crypto_utility_->DecryptData(encrypted_data, key, &data)); in TEST_F()
|
D | common.proto | 73 // MAC of (iv || encrypted_data). 75 optional bytes encrypted_data = 5; field
|
D | print_common_proto.cc | 159 base::HexEncode(value.encrypted_data().data(), in GetProtoDebugStringWithIndent() 160 value.encrypted_data().size()).c_str()); in GetProtoDebugStringWithIndent()
|
D | tpm_utility_v1.cc | 336 ScopedTssMemory encrypted_data(context_handle_); in SealToPCR0() local 342 encrypted_data.ptr()))) { in SealToPCR0() 346 sealed_data->assign(TSSBufferAsString(encrypted_data.value(), in SealToPCR0()
|
D | print_interface_proto.cc | 541 base::HexEncode(value.encrypted_data().data(), in GetProtoDebugStringWithIndent() 542 value.encrypted_data().size()).c_str()); in GetProtoDebugStringWithIndent()
|
D | interface.proto | 147 optional bytes encrypted_data = 3; field
|
D | attestation_ca.proto | 169 // ChallengeResponse.encrypted_key_info.encrypted_data field. This message holds
|
/system/security/keystore/ |
D | keystore_client.proto | 23 // MAC of (init_vector + encrypted_data). 25 optional bytes encrypted_data = 3; field
|
D | keystore_client_impl.cpp | 78 std::string* encrypted_data) { in encryptWithAuthentication() argument 124 if (!protobuf.SerializeToString(encrypted_data)) { in encryptWithAuthentication() 132 const std::string& encrypted_data, in decryptWithAuthentication() argument 135 if (!protobuf.ParseFromString(encrypted_data)) { in decryptWithAuthentication() 145 protobuf.init_vector() + protobuf.encrypted_data(), in decryptWithAuthentication() 157 protobuf.encrypted_data(), std::string(), /* signature_to_verify */ in decryptWithAuthentication()
|
/system/security/keystore/include/keystore/ |
D | keystore_client.h | 62 std::string* encrypted_data) = 0; 68 const std::string& encrypted_data,
|
D | keystore_client_mock.h | 34 std::string* encrypted_data)); 36 bool(const std::string& key_name, const std::string& encrypted_data,
|
D | keystore_client_impl.h | 38 std::string* encrypted_data) override; 39 bool decryptWithAuthentication(const std::string& key_name, const std::string& encrypted_data,
|
/system/connectivity/shill/ |
D | crypto_util_proxy.cc | 398 response.encrypted_data().empty()) { in HandleEncryptResult() 406 brillo::data_encoding::Base64Encode(response.encrypted_data())); in HandleEncryptResult()
|
/system/connectivity/shill/shims/protos/ |
D | crypto_util.proto | 48 optional bytes encrypted_data = 2; field
|
/system/tpm/attestation/server/ |
D | dbus_service_test.cc | 310 EXPECT_EQ("data", request.encrypted_data()); in TEST_F()
|
D | attestation_service.cc | 437 if (!tpm_utility_->Unbind(key.key_blob(), request.encrypted_data(), &data)) { in DecryptTask()
|
/system/tpm/attestation/client/ |
D | dbus_proxy_test.cc | 313 EXPECT_EQ("data", request_proto.encrypted_data()); in TEST_F()
|