/system/keymaster/tests/ |
D | key_blob_test.cpp | 67 keymaster_error_t Encrypt() { in Encrypt() function in keymaster::test::KeyBlobTest 100 ASSERT_EQ(KM_ERROR_OK, Encrypt()); in TEST_F() 128 ASSERT_EQ(KM_ERROR_OK, Encrypt()); in TEST_F() 138 ASSERT_EQ(KM_ERROR_OK, Encrypt()); in TEST_F() 155 ASSERT_EQ(KM_ERROR_OK, Encrypt()); in TEST_F() 172 ASSERT_EQ(KM_ERROR_OK, Encrypt()); in TEST_F() 189 ASSERT_EQ(KM_ERROR_OK, Encrypt()); in TEST_F() 203 ASSERT_EQ(KM_ERROR_OK, Encrypt()); in TEST_F() 226 ASSERT_EQ(KM_ERROR_OK, Encrypt()); in TEST_F() 249 ASSERT_EQ(KM_ERROR_OK, Encrypt()); in TEST_F() [all …]
|
D | ecies_kem_test.cpp | 60 ASSERT_TRUE(kem->Encrypt(peer_public_value, &output_clear_key, &output_encrypted_key)); in TEST()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | kem.h | 40 virtual bool Encrypt(const Buffer& peer_public_value, Buffer* output_clear_key, 42 virtual bool Encrypt(const uint8_t* peer_public_value, size_t peer_public_value_len,
|
D | ecies_kem.h | 42 bool Encrypt(const Buffer& peer_public_value, Buffer* output_clear_key, 44 bool Encrypt(const uint8_t* peer_public_value, size_t peer_public_value_len,
|
/system/bt/btif/test/ |
D | btif_keystore_test.cc | 43 std::string encrypted_hash = btif_keystore_->Encrypt(hash, 0); in TEST_F() 53 std::string encrypted_hash = btif_keystore_->Encrypt(hash, 0); in TEST_F()
|
/system/keymaster/km_openssl/ |
D | ecies_kem.cpp | 75 bool EciesKem::Encrypt(const Buffer& peer_public_value, Buffer* output_clear_key, in Encrypt() function in keymaster::EciesKem 77 return Encrypt(peer_public_value.peek_read(), peer_public_value.available_read(), in Encrypt() 82 bool EciesKem::Encrypt(const uint8_t* peer_public_value, size_t peer_public_value_len, in Encrypt() function in keymaster::EciesKem
|
/system/core/adb/pairing_auth/ |
D | pairing_auth.cpp | 69 Data Encrypt(const Data& data); 164 PairingAuthCtx::Data PairingAuthCtx::Encrypt(const PairingAuthCtx::Data& data) { in Encrypt() function in PairingAuthCtx 170 auto out_size = cipher_->Encrypt(data.data(), data.size(), encrypted.data(), encrypted.size()); in Encrypt() 260 auto out = ctx->Encrypt(in); in pairing_auth_encrypt()
|
D | aes_128_gcm.cpp | 48 std::optional<size_t> Aes128Gcm::Encrypt(const uint8_t* in, size_t in_len, uint8_t* out, in Encrypt() function in adb::pairing::Aes128Gcm
|
/system/bt/vendor_libs/test_vendor_lib/model/controller/ |
D | acl_connection.h | 36 void Encrypt();
|
D | acl_connection.cc | 26 void AclConnection::Encrypt() { encrypted_ = true; }; in Encrypt() function in test_vendor_lib::AclConnection
|
D | acl_connection_handler.cc | 169 void AclConnectionHandler::Encrypt(uint16_t handle) { in Encrypt() function in test_vendor_lib::AclConnectionHandler 173 acl_connections_.at(handle).Encrypt(); in Encrypt()
|
D | acl_connection_handler.h | 59 void Encrypt(uint16_t handle);
|
D | link_layer_controller.cc | 979 connections_.Encrypt(handle); in IncomingLeEncryptConnection() 1007 connections_.Encrypt(handle); in IncomingLeEncryptConnectionResponse()
|
/system/core/adb/pairing_auth/include/adb/pairing/ |
D | aes_128_gcm.h | 40 std::optional<size_t> Encrypt(const uint8_t* in, size_t in_len, uint8_t* out, size_t out_len);
|
/system/core/adb/pairing_auth/tests/ |
D | aes_128_gcm_test.cpp | 50 auto encrypted_size = alice.Encrypt(msg, sizeof(msg), encrypted, sizeof(encrypted)); in TEST()
|
/system/bt/gd/l2cap/classic/internal/ |
D | link.cc | 76 void Link::Encrypt() { in Encrypt() function in bluetooth::l2cap::classic::internal::Link 306 Encrypt(); in OnAuthenticationComplete()
|
D | link.h | 75 virtual void Encrypt();
|
/system/security/keystore/ |
D | operation_config.proto | 56 // What purpose is this operation serving? Encrypt, decrypt, sign verify?
|
D | keystore_cli_v2.cpp | 447 int Encrypt(const std::string& key_name, const std::string& input_filename, in Encrypt() function 650 return Encrypt( in main()
|