/frameworks/av/drm/mediadrm/plugins/clearkey/ |
H A D | Session.cpp | 54 const KeyMap::key_type& keyId = keys.keyAt(i); local 56 mKeyMap.add(keyId, key); 65 const KeyId keyId, const Iv iv, const void* source, 71 keyIdVector.appendArray(keyId, kBlockSize); 64 decrypt( const KeyId keyId, const Iv iv, const void* source, void* destination, const SubSample* subSamples, size_t numSubSamples, size_t* bytesDecryptedOut) argument
|
H A D | CryptoPlugin.cpp | 35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, argument 67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples,
|
H A D | DrmPlugin.h | 172 const Vector<uint8_t>& keyId, 177 UNUSED(keyId); 186 const Vector<uint8_t>& keyId, 191 UNUSED(keyId); 200 const Vector<uint8_t>& keyId, 204 UNUSED(keyId); 212 const Vector<uint8_t>& keyId, 216 UNUSED(keyId); 170 encrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument 184 decrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument 198 sign( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, Vector<uint8_t>& signature) argument 210 verify( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, const Vector<uint8_t>& signature, bool& match) argument
|
H A D | CryptoPlugin.h | 46 bool secure, const KeyId keyId, const Iv iv,
|
H A D | JsonWebKey.h | 50 bool findKey(const String8& jsonObject, String8* keyId,
|
H A D | Session.h | 49 const KeyId keyId, const Iv iv, const void* source,
|
H A D | JsonWebKey.cpp | 132 bool JsonWebKey::findKey(const String8& jsonObject, String8* keyId, argument 145 findValue(kKeyIdTag, keyId);
|
/frameworks/av/include/ndk/ |
H A D | NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/frameworks/av/media/libmedia/ |
H A D | IDrm.cpp | 437 Vector<uint8_t> const &keyId, 445 writeVector(data, keyId); 459 Vector<uint8_t> const &keyId, 467 writeVector(data, keyId); 481 Vector<uint8_t> const &keyId, 488 writeVector(data, keyId); 501 Vector<uint8_t> const &keyId, 509 writeVector(data, keyId); 869 Vector<uint8_t> sessionId, keyId, input, iv, output; local 871 readVector(data, keyId); 436 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 458 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 480 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 500 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument 883 Vector<uint8_t> sessionId, keyId, input, iv, output; local 897 Vector<uint8_t> sessionId, keyId, message, signature; local 910 Vector<uint8_t> sessionId, keyId, message, signature; local [all...] |
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.h | 112 Vector<uint8_t> const &keyId, 118 Vector<uint8_t> const &keyId, 124 Vector<uint8_t> const &keyId, 129 Vector<uint8_t> const &keyId,
|
H A D | MockDrmCryptoPlugin.cpp | 558 Vector<uint8_t> const &keyId, 564 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 566 vectorToString(keyId).string(), 577 // byte[] keyId -> mock-keyid 580 mByteArrayProperties.add(String8("mock-keyid"), keyId); 597 Vector<uint8_t> const &keyId, 603 ALOGD("MockDrmPlugin::decrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 605 vectorToString(keyId).string(), 616 // byte[] keyId -> mock-keyid 619 mByteArrayProperties.add(String8("mock-keyid"), keyId); 557 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 596 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 635 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 670 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument [all...] |
/frameworks/av/include/media/ |
H A D | IDrm.h | 97 Vector<uint8_t> const &keyId, 103 Vector<uint8_t> const &keyId, 109 Vector<uint8_t> const &keyId, 114 Vector<uint8_t> const &keyId,
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | Drm.h | 102 Vector<uint8_t> const &keyId, 108 Vector<uint8_t> const &keyId, 114 Vector<uint8_t> const &keyId, 119 Vector<uint8_t> const &keyId,
|
H A D | Drm.cpp | 689 Vector<uint8_t> const &keyId, 705 return mPlugin->encrypt(sessionId, keyId, input, iv, output); 709 Vector<uint8_t> const &keyId, 725 return mPlugin->decrypt(sessionId, keyId, input, iv, output); 729 Vector<uint8_t> const &keyId, 744 return mPlugin->sign(sessionId, keyId, message, signature); 748 Vector<uint8_t> const &keyId, 764 return mPlugin->verify(sessionId, keyId, message, signature, match); 688 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 708 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 728 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 747 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument
|
/frameworks/native/include/media/drm/ |
H A D | DrmAPI.h | 297 // specified by setCipherAlgorithm and the key selected by keyId, 300 Vector<uint8_t> const &keyId, 306 // specified by setCipherAlgorithm and the key selected by keyId, 309 Vector<uint8_t> const &keyId, 315 // specified by setMacAlgorithm and the key selected by keyId, 318 Vector<uint8_t> const &keyId, 323 // specified by setMacAlgorithm and the key selected by keyId, 327 Vector<uint8_t> const &keyId,
|
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 403 KeyStatus(@NonNull byte[] keyId, @KeyStatusCode int statusCode) { argument 404 mKeyId = keyId; 590 byte[] keyId = parcel.createByteArray(); 592 keyStatusList.add(new KeyStatus(keyId, keyStatusCode)); 1045 @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv); 1050 @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv); 1055 @NonNull byte[] keyId, @NonNull byte[] message); 1059 @NonNull byte[] keyId, @NonNull byte[] message, @NonNull byte[] signature); 1043 encryptNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv) argument 1048 decryptNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv) argument 1053 signNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] message) argument 1057 verifyNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] message, @NonNull byte[] signature) argument
|
/frameworks/av/media/ndk/ |
H A D | NdkMediaDrm.cpp | 590 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 608 keyIdVec.appendArray(keyId, kKeyIdSize); 631 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 636 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 642 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 647 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 653 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 674 keyIdVec.appendArray(keyId, kKeyIdSize); 692 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, 713 keyIdVec.appendArray(keyId, kKeyIdSiz 588 encrypt_decrypt_common(AMediaDrm *mObj, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) argument 630 AMediaDrm_encrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument 641 AMediaDrm_decrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument 652 AMediaDrm_sign(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, uint8_t *signature, size_t *signatureSize) argument 691 AMediaDrm_verify(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, const uint8_t *signature, size_t signatureSize) argument [all...] |
/frameworks/base/keystore/java/android/security/ |
H A D | KeyChain.java | 372 final String keyId = keyChainService.requestPrivateKey(alias); 373 if (keyId == null) { 377 KeyStore.getInstance(), keyId);
|
/frameworks/av/media/libstagefright/include/ |
H A D | MPEG4Extractor.h | 115 status_t parseQTMetaVal(int32_t keyId, off64_t data_offset, size_t data_size);
|
/frameworks/base/media/jni/ |
H A D | android_media_MediaDrm.cpp | 1323 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1328 status_t err = drm->encrypt(sessionId, keyId, input, iv, output); 1354 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1359 status_t err = drm->decrypt(sessionId, keyId, input, iv, output); 1384 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1388 status_t err = drm->sign(sessionId, keyId, message, signature); 1414 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1419 status_t err = drm->verify(sessionId, keyId, message, signature, match);
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | KeySetManagerService.java | 674 for (long keyId : keys) { 676 serializer.attribute(null, "identifier", Long.toString(keyId));
|
/frameworks/av/media/libstagefright/ |
H A D | MPEG4Extractor.cpp | 2312 int32_t keyId, off64_t offset, size_t size) { 2313 ssize_t index = mMetaKeyMap.indexOfKey(keyId); 2311 parseQTMetaVal( int32_t keyId, off64_t offset, size_t size) argument
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiConfigStore.java | 2832 String keyId = config.getKeyIdForCredentials(currentConfig); 2834 if (!installKeys(enterpriseConfig, keyId)) {
|