Searched refs:signature (Results 1 - 15 of 15) sorted by relevance

/hardware/intel/img/psb_headers/DRM/cc54/inc/
H A Dwv_mod_drm_api.h54 uint8_t *signature,
60 const uint8_t *signature,
70 const uint8_t *signature,
90 const uint8_t *signature,
106 uint8_t *signature,
135 uint8_t *signature,
142 const uint8_t *signature,
149 const uint8_t *signature,
161 uint8_t *signature,
254 * @param[in] signature
[all...]
H A Ddrm_common_api.h69 uint8_t signature[256]; member in struct:drm_secureclock_server_response
H A Dpr_drm_api.h119 const uint8_t *signature,
130 uint8_t *signature,
141 uint8_t *signature,
151 uint8_t *signature,
/hardware/intel/bootstub/
H A Dsfi.h32 char signature[4]; member in struct:sfi_table_header
H A Dbootparam.h68 __u32 signature; member in struct:ist_info
/hardware/qcom/keymaster/
H A Dkeymaster_qcom.h172 * signed_data : signature
195 * signature : Offset to the signature data buffer (from signed data buffer)
204 uint32_t signature; member in struct:keymaster_verify_data_cmd
H A Dkeymaster_qcom.cpp487 ALOGE("Output signature buffer == NULL");
574 const uint8_t* signature, const size_t signatureLength)
581 if (signedData == NULL || signature == NULL) {
582 ALOGE("data or signature buffers == NULL");
594 ALOGE("signed data length must be signature length");
633 send_cmd->signature = signedDataLength;
636 signature, signatureLength);
570 qcom_km_verify_data(const keymaster_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
H A Deapol.h80 unsigned char signature[EAPOL_KEY_SIG_LEN]; /* Key Signature */ member in struct:__anon36
/hardware/libhardware/include/hardware/
H A Dkeymaster.h273 const uint8_t* signature, const size_t signature_length);
/hardware/samsung_slsi/exynos5/libkeymaster/
H A Dkeymaster_mobicore.cpp342 ALOGE("output signature buffer == NULL");
383 const uint8_t* signature, const size_t signatureLength) {
387 if (signedData == NULL || signature == NULL) {
388 ALOGE("data or signature buffers == NULL");
400 ALOGE("signed data length must be signature length");
407 memcpy(tmpSig, signature, signatureLength);
379 exynos_km_verify_data(const keymaster_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libwebm/
H A Dmkvparser.hpp226 unsigned char* signature; member in struct:mkvparser::ContentEncoding::ContentEncryption
H A Dmkvparser.cpp4405 signature(NULL),
4415 delete [] signature;
4520 encryption->signature = buf;
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/third_party/libwebm/
H A Dmkvparser.hpp243 unsigned char* signature; member in struct:mkvparser::ContentEncoding::ContentEncryption
H A Dmkvparser.cpp5062 signature(NULL),
5072 delete [] signature;
5404 delete[] encryption->signature;
5405 encryption->signature = NULL;
5423 encryption->signature = buf;
/hardware/qcom/media/mm-video-v4l2/vidc/vdec/src/
H A Domx_vdec_msm8974.cpp1361 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header
1374 file_header.signature[0] = 'D';
1375 file_header.signature[1] = 'K';
1376 file_header.signature[2] = 'I';
1377 file_header.signature[3] = 'F';

Completed in 456 milliseconds