Searched refs:keyId (Results 1 - 23 of 23) sorted by relevance

/frameworks/av/drm/mediadrm/plugins/clearkey/
H A DSession.cpp54 const KeyMap::key_type& keyId = keys.keyAt(i); local
56 mKeyMap.add(keyId, key);
65 const KeyId keyId, const Iv iv, const void* source,
71 keyIdVector.appendArray(keyId, kBlockSize);
64 decrypt( const KeyId keyId, const Iv iv, const void* source, void* destination, const SubSample* subSamples, size_t numSubSamples, size_t* bytesDecryptedOut) argument
H A DCryptoPlugin.cpp35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, argument
67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples,
H A DDrmPlugin.h172 const Vector<uint8_t>& keyId,
177 UNUSED(keyId);
186 const Vector<uint8_t>& keyId,
191 UNUSED(keyId);
200 const Vector<uint8_t>& keyId,
204 UNUSED(keyId);
212 const Vector<uint8_t>& keyId,
216 UNUSED(keyId);
170 encrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument
184 decrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument
198 sign( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, Vector<uint8_t>& signature) argument
210 verify( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, const Vector<uint8_t>& signature, bool& match) argument
H A DCryptoPlugin.h46 bool secure, const KeyId keyId, const Iv iv,
H A DJsonWebKey.h50 bool findKey(const String8& jsonObject, String8* keyId,
H A DSession.h49 const KeyId keyId, const Iv iv, const void* source,
H A DJsonWebKey.cpp132 bool JsonWebKey::findKey(const String8& jsonObject, String8* keyId, argument
145 findValue(kKeyIdTag, keyId);
/frameworks/av/include/ndk/
H A DNdkMediaDrm.h409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
/frameworks/av/media/libmedia/
H A DIDrm.cpp437 Vector<uint8_t> const &keyId,
445 writeVector(data, keyId);
459 Vector<uint8_t> const &keyId,
467 writeVector(data, keyId);
481 Vector<uint8_t> const &keyId,
488 writeVector(data, keyId);
501 Vector<uint8_t> const &keyId,
509 writeVector(data, keyId);
869 Vector<uint8_t> sessionId, keyId, input, iv, output; local
871 readVector(data, keyId);
436 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
458 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
480 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument
500 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument
883 Vector<uint8_t> sessionId, keyId, input, iv, output; local
897 Vector<uint8_t> sessionId, keyId, message, signature; local
910 Vector<uint8_t> sessionId, keyId, message, signature; local
[all...]
/frameworks/av/drm/mediadrm/plugins/mock/
H A DMockDrmCryptoPlugin.h112 Vector<uint8_t> const &keyId,
118 Vector<uint8_t> const &keyId,
124 Vector<uint8_t> const &keyId,
129 Vector<uint8_t> const &keyId,
H A DMockDrmCryptoPlugin.cpp558 Vector<uint8_t> const &keyId,
564 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)",
566 vectorToString(keyId).string(),
577 // byte[] keyId -> mock-keyid
580 mByteArrayProperties.add(String8("mock-keyid"), keyId);
597 Vector<uint8_t> const &keyId,
603 ALOGD("MockDrmPlugin::decrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)",
605 vectorToString(keyId).string(),
616 // byte[] keyId -> mock-keyid
619 mByteArrayProperties.add(String8("mock-keyid"), keyId);
557 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
596 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
635 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument
670 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument
[all...]
/frameworks/av/include/media/
H A DIDrm.h97 Vector<uint8_t> const &keyId,
103 Vector<uint8_t> const &keyId,
109 Vector<uint8_t> const &keyId,
114 Vector<uint8_t> const &keyId,
/frameworks/av/media/libmediaplayerservice/
H A DDrm.h102 Vector<uint8_t> const &keyId,
108 Vector<uint8_t> const &keyId,
114 Vector<uint8_t> const &keyId,
119 Vector<uint8_t> const &keyId,
H A DDrm.cpp689 Vector<uint8_t> const &keyId,
705 return mPlugin->encrypt(sessionId, keyId, input, iv, output);
709 Vector<uint8_t> const &keyId,
725 return mPlugin->decrypt(sessionId, keyId, input, iv, output);
729 Vector<uint8_t> const &keyId,
744 return mPlugin->sign(sessionId, keyId, message, signature);
748 Vector<uint8_t> const &keyId,
764 return mPlugin->verify(sessionId, keyId, message, signature, match);
688 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
708 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
728 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument
747 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument
/frameworks/native/include/media/drm/
H A DDrmAPI.h297 // specified by setCipherAlgorithm and the key selected by keyId,
300 Vector<uint8_t> const &keyId,
306 // specified by setCipherAlgorithm and the key selected by keyId,
309 Vector<uint8_t> const &keyId,
315 // specified by setMacAlgorithm and the key selected by keyId,
318 Vector<uint8_t> const &keyId,
323 // specified by setMacAlgorithm and the key selected by keyId,
327 Vector<uint8_t> const &keyId,
/frameworks/base/media/java/android/media/
H A DMediaDrm.java403 KeyStatus(@NonNull byte[] keyId, @KeyStatusCode int statusCode) { argument
404 mKeyId = keyId;
590 byte[] keyId = parcel.createByteArray();
592 keyStatusList.add(new KeyStatus(keyId, keyStatusCode));
1045 @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv);
1050 @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv);
1055 @NonNull byte[] keyId, @NonNull byte[] message);
1059 @NonNull byte[] keyId, @NonNull byte[] message, @NonNull byte[] signature);
1043 encryptNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv) argument
1048 decryptNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv) argument
1053 signNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] message) argument
1057 verifyNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] message, @NonNull byte[] signature) argument
/frameworks/av/media/ndk/
H A DNdkMediaDrm.cpp590 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
608 keyIdVec.appendArray(keyId, kKeyIdSize);
631 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
636 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv,
642 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
647 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv,
653 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
674 keyIdVec.appendArray(keyId, kKeyIdSize);
692 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
713 keyIdVec.appendArray(keyId, kKeyIdSiz
588 encrypt_decrypt_common(AMediaDrm *mObj, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) argument
630 AMediaDrm_encrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument
641 AMediaDrm_decrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument
652 AMediaDrm_sign(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, uint8_t *signature, size_t *signatureSize) argument
691 AMediaDrm_verify(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, const uint8_t *signature, size_t signatureSize) argument
[all...]
/frameworks/base/keystore/java/android/security/
H A DKeyChain.java372 final String keyId = keyChainService.requestPrivateKey(alias);
373 if (keyId == null) {
377 KeyStore.getInstance(), keyId);
/frameworks/av/media/libstagefright/include/
H A DMPEG4Extractor.h115 status_t parseQTMetaVal(int32_t keyId, off64_t data_offset, size_t data_size);
/frameworks/base/media/jni/
H A Dandroid_media_MediaDrm.cpp1323 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId));
1328 status_t err = drm->encrypt(sessionId, keyId, input, iv, output);
1354 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId));
1359 status_t err = drm->decrypt(sessionId, keyId, input, iv, output);
1384 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId));
1388 status_t err = drm->sign(sessionId, keyId, message, signature);
1414 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId));
1419 status_t err = drm->verify(sessionId, keyId, message, signature, match);
/frameworks/base/services/core/java/com/android/server/pm/
H A DKeySetManagerService.java674 for (long keyId : keys) {
676 serializer.attribute(null, "identifier", Long.toString(keyId));
/frameworks/av/media/libstagefright/
H A DMPEG4Extractor.cpp2312 int32_t keyId, off64_t offset, size_t size) {
2313 ssize_t index = mMetaKeyMap.indexOfKey(keyId);
2311 parseQTMetaVal( int32_t keyId, off64_t offset, size_t size) argument
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiConfigStore.java2832 String keyId = config.getKeyIdForCredentials(currentConfig);
2834 if (!installKeys(enterpriseConfig, keyId)) {

Completed in 1006 milliseconds