Searched refs:keyId (Results 1 - 21 of 21) sorted by relevance

/frameworks/av/drm/mediadrm/plugins/clearkey/
H A DSession.cpp54 const KeyMap::key_type& keyId = keys.keyAt(i); local
56 mKeyMap.add(keyId, key);
65 const KeyId keyId, const Iv iv, const void* source,
71 keyIdVector.appendArray(keyId, kBlockSize);
64 decrypt( const KeyId keyId, const Iv iv, const void* source, void* destination, const SubSample* subSamples, size_t numSubSamples, size_t* bytesDecryptedOut) argument
H A DCryptoPlugin.cpp35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, argument
67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples,
H A DDrmPlugin.h171 const Vector<uint8_t>& keyId,
176 UNUSED(keyId);
185 const Vector<uint8_t>& keyId,
190 UNUSED(keyId);
199 const Vector<uint8_t>& keyId,
203 UNUSED(keyId);
211 const Vector<uint8_t>& keyId,
215 UNUSED(keyId);
169 encrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument
183 decrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument
197 sign( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, Vector<uint8_t>& signature) argument
209 verify( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, const Vector<uint8_t>& signature, bool& match) argument
H A DCryptoPlugin.h43 bool secure, const KeyId keyId, const Iv iv,
H A DJsonWebKey.h50 bool findKey(const String8& jsonObject, String8* keyId,
H A DSession.h49 const KeyId keyId, const Iv iv, const void* source,
H A DJsonWebKey.cpp132 bool JsonWebKey::findKey(const String8& jsonObject, String8* keyId, argument
145 findValue(kKeyIdTag, keyId);
/frameworks/av/include/ndk/
H A DNdkMediaDrm.h409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
/frameworks/av/media/libmedia/
H A DIDrm.cpp359 Vector<uint8_t> const &keyId,
367 writeVector(data, keyId);
378 Vector<uint8_t> const &keyId,
386 writeVector(data, keyId);
397 Vector<uint8_t> const &keyId,
404 writeVector(data, keyId);
414 Vector<uint8_t> const &keyId,
422 writeVector(data, keyId);
771 Vector<uint8_t> sessionId, keyId, input, iv, output; local
773 readVector(data, keyId);
358 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
377 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
396 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument
413 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument
785 Vector<uint8_t> sessionId, keyId, input, iv, output; local
799 Vector<uint8_t> sessionId, keyId, message, signature; local
812 Vector<uint8_t> sessionId, keyId, message, signature; local
[all...]
/frameworks/av/drm/mediadrm/plugins/mock/
H A DMockDrmCryptoPlugin.cpp487 Vector<uint8_t> const &keyId,
493 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)",
495 vectorToString(keyId).string(),
506 // byte[] keyId -> mock-keyid
509 mByteArrayProperties.add(String8("mock-keyid"), keyId);
526 Vector<uint8_t> const &keyId,
532 ALOGD("MockDrmPlugin::decrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)",
534 vectorToString(keyId).string(),
545 // byte[] keyId -> mock-keyid
548 mByteArrayProperties.add(String8("mock-keyid"), keyId);
486 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
525 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
564 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument
599 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument
[all...]
H A DMockDrmCryptoPlugin.h111 Vector<uint8_t> const &keyId,
117 Vector<uint8_t> const &keyId,
123 Vector<uint8_t> const &keyId,
128 Vector<uint8_t> const &keyId,
/frameworks/av/include/media/
H A DIDrm.h96 Vector<uint8_t> const &keyId,
102 Vector<uint8_t> const &keyId,
108 Vector<uint8_t> const &keyId,
113 Vector<uint8_t> const &keyId,
/frameworks/av/media/libmediaplayerservice/
H A DDrm.h100 Vector<uint8_t> const &keyId,
106 Vector<uint8_t> const &keyId,
112 Vector<uint8_t> const &keyId,
117 Vector<uint8_t> const &keyId,
H A DDrm.cpp583 Vector<uint8_t> const &keyId,
597 return mPlugin->encrypt(sessionId, keyId, input, iv, output);
601 Vector<uint8_t> const &keyId,
615 return mPlugin->decrypt(sessionId, keyId, input, iv, output);
619 Vector<uint8_t> const &keyId,
632 return mPlugin->sign(sessionId, keyId, message, signature);
636 Vector<uint8_t> const &keyId,
650 return mPlugin->verify(sessionId, keyId, message, signature, match);
582 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
600 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
618 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument
635 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument
/frameworks/native/include/media/drm/
H A DDrmAPI.h266 // specified by setCipherAlgorithm and the key selected by keyId,
269 Vector<uint8_t> const &keyId,
275 // specified by setCipherAlgorithm and the key selected by keyId,
278 Vector<uint8_t> const &keyId,
284 // specified by setMacAlgorithm and the key selected by keyId,
287 Vector<uint8_t> const &keyId,
292 // specified by setMacAlgorithm and the key selected by keyId,
296 Vector<uint8_t> const &keyId,
/frameworks/base/media/java/android/media/
H A DMediaDrm.java659 byte[] keyId, byte[] input, byte[] iv);
662 byte[] keyId, byte[] input, byte[] iv);
665 byte[] keyId, byte[] message);
668 byte[] keyId, byte[] message, byte[] signature);
658 encryptNative(MediaDrm drm, byte[] sessionId, byte[] keyId, byte[] input, byte[] iv) argument
661 decryptNative(MediaDrm drm, byte[] sessionId, byte[] keyId, byte[] input, byte[] iv) argument
664 signNative(MediaDrm drm, byte[] sessionId, byte[] keyId, byte[] message) argument
667 verifyNative(MediaDrm drm, byte[] sessionId, byte[] keyId, byte[] message, byte[] signature) argument
/frameworks/base/keystore/java/android/security/
H A DKeyChain.java318 final String keyId = keyChainService.requestPrivateKey(alias);
319 if (keyId == null) {
324 return engine.getPrivateKeyById(keyId);
/frameworks/av/media/ndk/
H A DNdkMediaDrm.cpp588 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
606 keyIdVec.appendArray(keyId, kKeyIdSize);
629 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
634 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv,
640 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
645 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv,
651 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
672 keyIdVec.appendArray(keyId, kKeyIdSize);
690 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
711 keyIdVec.appendArray(keyId, kKeyIdSiz
586 encrypt_decrypt_common(AMediaDrm *mObj, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) argument
628 AMediaDrm_encrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument
639 AMediaDrm_decrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument
650 AMediaDrm_sign(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, uint8_t *signature, size_t *signatureSize) argument
689 AMediaDrm_verify(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, const uint8_t *signature, size_t signatureSize) argument
[all...]
/frameworks/base/services/core/java/com/android/server/pm/
H A DKeySetManagerService.java448 for (Long keyId : deletableKeys) {
449 mPublicKeys.delete(keyId);
610 for (long keyId : keys) {
612 serializer.attribute(null, "identifier", Long.toString(keyId));
/frameworks/base/media/jni/
H A Dandroid_media_MediaDrm.cpp1241 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId));
1246 status_t err = drm->encrypt(sessionId, keyId, input, iv, output);
1272 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId));
1277 status_t err = drm->decrypt(sessionId, keyId, input, iv, output);
1302 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId));
1306 status_t err = drm->sign(sessionId, keyId, message, signature);
1332 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId));
1337 status_t err = drm->verify(sessionId, keyId, message, signature, match);
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiConfigStore.java2846 String keyId = config.getKeyIdForCredentials(currentConfig);
2848 if (!installKeys(enterpriseConfig, keyId)) {

Completed in 1726 milliseconds