/frameworks/av/drm/mediadrm/plugins/clearkey/ |
H A D | Session.cpp | 54 const KeyMap::key_type& keyId = keys.keyAt(i); local 56 mKeyMap.add(keyId, key); 65 const KeyId keyId, const Iv iv, const void* source, 71 keyIdVector.appendArray(keyId, kBlockSize); 64 decrypt( const KeyId keyId, const Iv iv, const void* source, void* destination, const SubSample* subSamples, size_t numSubSamples, size_t* bytesDecryptedOut) argument
|
H A D | CryptoPlugin.cpp | 35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, argument 67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples,
|
H A D | DrmPlugin.h | 171 const Vector<uint8_t>& keyId, 176 UNUSED(keyId); 185 const Vector<uint8_t>& keyId, 190 UNUSED(keyId); 199 const Vector<uint8_t>& keyId, 203 UNUSED(keyId); 211 const Vector<uint8_t>& keyId, 215 UNUSED(keyId); 169 encrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument 183 decrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument 197 sign( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, Vector<uint8_t>& signature) argument 209 verify( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, const Vector<uint8_t>& signature, bool& match) argument
|
H A D | CryptoPlugin.h | 43 bool secure, const KeyId keyId, const Iv iv,
|
H A D | JsonWebKey.h | 50 bool findKey(const String8& jsonObject, String8* keyId,
|
H A D | Session.h | 49 const KeyId keyId, const Iv iv, const void* source,
|
H A D | JsonWebKey.cpp | 132 bool JsonWebKey::findKey(const String8& jsonObject, String8* keyId, argument 145 findValue(kKeyIdTag, keyId);
|
/frameworks/av/include/ndk/ |
H A D | NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/frameworks/av/media/libmedia/ |
H A D | IDrm.cpp | 359 Vector<uint8_t> const &keyId, 367 writeVector(data, keyId); 378 Vector<uint8_t> const &keyId, 386 writeVector(data, keyId); 397 Vector<uint8_t> const &keyId, 404 writeVector(data, keyId); 414 Vector<uint8_t> const &keyId, 422 writeVector(data, keyId); 771 Vector<uint8_t> sessionId, keyId, input, iv, output; local 773 readVector(data, keyId); 358 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 377 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 396 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 413 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument 785 Vector<uint8_t> sessionId, keyId, input, iv, output; local 799 Vector<uint8_t> sessionId, keyId, message, signature; local 812 Vector<uint8_t> sessionId, keyId, message, signature; local [all...] |
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.cpp | 487 Vector<uint8_t> const &keyId, 493 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 495 vectorToString(keyId).string(), 506 // byte[] keyId -> mock-keyid 509 mByteArrayProperties.add(String8("mock-keyid"), keyId); 526 Vector<uint8_t> const &keyId, 532 ALOGD("MockDrmPlugin::decrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 534 vectorToString(keyId).string(), 545 // byte[] keyId -> mock-keyid 548 mByteArrayProperties.add(String8("mock-keyid"), keyId); 486 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 525 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 564 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 599 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument [all...] |
H A D | MockDrmCryptoPlugin.h | 111 Vector<uint8_t> const &keyId, 117 Vector<uint8_t> const &keyId, 123 Vector<uint8_t> const &keyId, 128 Vector<uint8_t> const &keyId,
|
/frameworks/av/include/media/ |
H A D | IDrm.h | 96 Vector<uint8_t> const &keyId, 102 Vector<uint8_t> const &keyId, 108 Vector<uint8_t> const &keyId, 113 Vector<uint8_t> const &keyId,
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | Drm.h | 100 Vector<uint8_t> const &keyId, 106 Vector<uint8_t> const &keyId, 112 Vector<uint8_t> const &keyId, 117 Vector<uint8_t> const &keyId,
|
H A D | Drm.cpp | 583 Vector<uint8_t> const &keyId, 597 return mPlugin->encrypt(sessionId, keyId, input, iv, output); 601 Vector<uint8_t> const &keyId, 615 return mPlugin->decrypt(sessionId, keyId, input, iv, output); 619 Vector<uint8_t> const &keyId, 632 return mPlugin->sign(sessionId, keyId, message, signature); 636 Vector<uint8_t> const &keyId, 650 return mPlugin->verify(sessionId, keyId, message, signature, match); 582 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 600 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 618 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 635 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument
|
/frameworks/native/include/media/drm/ |
H A D | DrmAPI.h | 266 // specified by setCipherAlgorithm and the key selected by keyId, 269 Vector<uint8_t> const &keyId, 275 // specified by setCipherAlgorithm and the key selected by keyId, 278 Vector<uint8_t> const &keyId, 284 // specified by setMacAlgorithm and the key selected by keyId, 287 Vector<uint8_t> const &keyId, 292 // specified by setMacAlgorithm and the key selected by keyId, 296 Vector<uint8_t> const &keyId,
|
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 659 byte[] keyId, byte[] input, byte[] iv); 662 byte[] keyId, byte[] input, byte[] iv); 665 byte[] keyId, byte[] message); 668 byte[] keyId, byte[] message, byte[] signature); 658 encryptNative(MediaDrm drm, byte[] sessionId, byte[] keyId, byte[] input, byte[] iv) argument 661 decryptNative(MediaDrm drm, byte[] sessionId, byte[] keyId, byte[] input, byte[] iv) argument 664 signNative(MediaDrm drm, byte[] sessionId, byte[] keyId, byte[] message) argument 667 verifyNative(MediaDrm drm, byte[] sessionId, byte[] keyId, byte[] message, byte[] signature) argument
|
/frameworks/base/keystore/java/android/security/ |
H A D | KeyChain.java | 318 final String keyId = keyChainService.requestPrivateKey(alias); 319 if (keyId == null) { 324 return engine.getPrivateKeyById(keyId);
|
/frameworks/av/media/ndk/ |
H A D | NdkMediaDrm.cpp | 588 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 606 keyIdVec.appendArray(keyId, kKeyIdSize); 629 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 634 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 640 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 645 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 651 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 672 keyIdVec.appendArray(keyId, kKeyIdSize); 690 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, 711 keyIdVec.appendArray(keyId, kKeyIdSiz 586 encrypt_decrypt_common(AMediaDrm *mObj, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) argument 628 AMediaDrm_encrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument 639 AMediaDrm_decrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument 650 AMediaDrm_sign(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, uint8_t *signature, size_t *signatureSize) argument 689 AMediaDrm_verify(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, const uint8_t *signature, size_t signatureSize) argument [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | KeySetManagerService.java | 448 for (Long keyId : deletableKeys) { 449 mPublicKeys.delete(keyId); 610 for (long keyId : keys) { 612 serializer.attribute(null, "identifier", Long.toString(keyId));
|
/frameworks/base/media/jni/ |
H A D | android_media_MediaDrm.cpp | 1241 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1246 status_t err = drm->encrypt(sessionId, keyId, input, iv, output); 1272 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1277 status_t err = drm->decrypt(sessionId, keyId, input, iv, output); 1302 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1306 status_t err = drm->sign(sessionId, keyId, message, signature); 1332 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1337 status_t err = drm->verify(sessionId, keyId, message, signature, match);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiConfigStore.java | 2846 String keyId = config.getKeyIdForCredentials(currentConfig); 2848 if (!installKeys(enterpriseConfig, keyId)) {
|