/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
H A D | wv_mod_drm_api.h | 54 uint8_t *signature, 60 const uint8_t *signature, 70 const uint8_t *signature, 90 const uint8_t *signature, 106 uint8_t *signature, 135 uint8_t *signature, 142 const uint8_t *signature, 149 const uint8_t *signature, 161 uint8_t *signature, 254 * @param[in] signature [all...] |
H A D | drm_common_api.h | 69 uint8_t signature[256]; member in struct:drm_secureclock_server_response
|
H A D | pr_drm_api.h | 119 const uint8_t *signature, 130 uint8_t *signature, 141 uint8_t *signature, 151 uint8_t *signature,
|
/hardware/intel/bootstub/ |
H A D | sfi.h | 32 char signature[4]; member in struct:sfi_table_header
|
H A D | bootparam.h | 68 __u32 signature; member in struct:ist_info
|
/hardware/qcom/keymaster/ |
H A D | keymaster_qcom.h | 172 * signed_data : signature 195 * signature : Offset to the signature data buffer (from signed data buffer) 204 uint32_t signature; member in struct:keymaster_verify_data_cmd
|
H A D | keymaster_qcom.cpp | 487 ALOGE("Output signature buffer == NULL"); 574 const uint8_t* signature, const size_t signatureLength) 581 if (signedData == NULL || signature == NULL) { 582 ALOGE("data or signature buffers == NULL"); 594 ALOGE("signed data length must be signature length"); 633 send_cmd->signature = signedDataLength; 636 signature, signatureLength); 570 qcom_km_verify_data(const keymaster_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
H A D | eapol.h | 80 unsigned char signature[EAPOL_KEY_SIG_LEN]; /* Key Signature */ member in struct:__anon36
|
/hardware/libhardware/include/hardware/ |
H A D | keymaster.h | 273 const uint8_t* signature, const size_t signature_length);
|
/hardware/samsung_slsi/exynos5/libkeymaster/ |
H A D | keymaster_mobicore.cpp | 342 ALOGE("output signature buffer == NULL"); 383 const uint8_t* signature, const size_t signatureLength) { 387 if (signedData == NULL || signature == NULL) { 388 ALOGE("data or signature buffers == NULL"); 400 ALOGE("signed data length must be signature length"); 407 memcpy(tmpSig, signature, signatureLength); 379 exynos_km_verify_data(const keymaster_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libwebm/ |
H A D | mkvparser.hpp | 226 unsigned char* signature;
member in struct:mkvparser::ContentEncoding::ContentEncryption
|
H A D | mkvparser.cpp | 4405 signature(NULL),
4415 delete [] signature;
4520 encryption->signature = buf;
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/third_party/libwebm/ |
H A D | mkvparser.hpp | 243 unsigned char* signature; member in struct:mkvparser::ContentEncoding::ContentEncryption
|
H A D | mkvparser.cpp | 5062 signature(NULL), 5072 delete [] signature; 5404 delete[] encryption->signature; 5405 encryption->signature = NULL; 5423 encryption->signature = buf;
|
/hardware/qcom/media/mm-video-v4l2/vidc/vdec/src/ |
H A D | omx_vdec_msm8974.cpp | 1361 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header 1374 file_header.signature[0] = 'D'; 1375 file_header.signature[1] = 'K'; 1376 file_header.signature[2] = 'I'; 1377 file_header.signature[3] = 'F';
|