/frameworks/av/drm/mediadrm/plugins/clearkey/ |
H A D | Session.cpp | 54 const KeyMap::key_type& keyId = keys.keyAt(i); local 56 mKeyMap.add(keyId, key); 65 const KeyId keyId, const Iv iv, const void* source, 71 keyIdVector.appendArray(keyId, kBlockSize); 64 decrypt( const KeyId keyId, const Iv iv, const void* source, void* destination, const SubSample* subSamples, size_t numSubSamples, size_t* bytesDecryptedOut) argument
|
H A D | CryptoPlugin.cpp | 35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, argument 67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples,
|
H A D | DrmPlugin.h | 168 const Vector<uint8_t>& keyId, 173 UNUSED(keyId); 182 const Vector<uint8_t>& keyId, 187 UNUSED(keyId); 196 const Vector<uint8_t>& keyId, 200 UNUSED(keyId); 208 const Vector<uint8_t>& keyId, 212 UNUSED(keyId); 166 encrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument 180 decrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument 194 sign( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, Vector<uint8_t>& signature) argument 206 verify( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, const Vector<uint8_t>& signature, bool& match) argument
|
H A D | CryptoPlugin.h | 46 bool secure, const KeyId keyId, const Iv iv,
|
H A D | JsonWebKey.h | 50 bool findKey(const String8& jsonObject, String8* keyId,
|
H A D | Session.h | 49 const KeyId keyId, const Iv iv, const void* source,
|
H A D | JsonWebKey.cpp | 132 bool JsonWebKey::findKey(const String8& jsonObject, String8* keyId, argument 145 findValue(kKeyIdTag, keyId);
|
/frameworks/av/include/ndk/ |
H A D | NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/frameworks/av/media/libmedia/ |
H A D | IDrm.cpp | 424 Vector<uint8_t> const &keyId, 432 writeVector(data, keyId); 446 Vector<uint8_t> const &keyId, 454 writeVector(data, keyId); 468 Vector<uint8_t> const &keyId, 475 writeVector(data, keyId); 488 Vector<uint8_t> const &keyId, 496 writeVector(data, keyId); 848 Vector<uint8_t> sessionId, keyId, input, iv, output; local 850 readVector(data, keyId); 423 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 445 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 467 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 487 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument 862 Vector<uint8_t> sessionId, keyId, input, iv, output; local 876 Vector<uint8_t> sessionId, keyId, message, signature; local 889 Vector<uint8_t> sessionId, keyId, message, signature; local [all...] |
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.h | 110 Vector<uint8_t> const &keyId, 116 Vector<uint8_t> const &keyId, 122 Vector<uint8_t> const &keyId, 127 Vector<uint8_t> const &keyId,
|
H A D | MockDrmCryptoPlugin.cpp | 552 Vector<uint8_t> const &keyId, 558 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 560 vectorToString(keyId).string(), 571 // byte[] keyId -> mock-keyid 574 mByteArrayProperties.add(String8("mock-keyid"), keyId); 591 Vector<uint8_t> const &keyId, 597 ALOGD("MockDrmPlugin::decrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 599 vectorToString(keyId).string(), 610 // byte[] keyId -> mock-keyid 613 mByteArrayProperties.add(String8("mock-keyid"), keyId); 551 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 590 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 629 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 664 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument [all...] |
/frameworks/av/include/media/ |
H A D | Drm.h | 100 Vector<uint8_t> const &keyId, 106 Vector<uint8_t> const &keyId, 112 Vector<uint8_t> const &keyId, 117 Vector<uint8_t> const &keyId,
|
H A D | IDrm.h | 95 Vector<uint8_t> const &keyId, 101 Vector<uint8_t> const &keyId, 107 Vector<uint8_t> const &keyId, 112 Vector<uint8_t> const &keyId,
|
/frameworks/native/include/media/drm/ |
H A D | DrmAPI.h | 294 // specified by setCipherAlgorithm and the key selected by keyId, 297 Vector<uint8_t> const &keyId, 303 // specified by setCipherAlgorithm and the key selected by keyId, 306 Vector<uint8_t> const &keyId, 312 // specified by setMacAlgorithm and the key selected by keyId, 315 Vector<uint8_t> const &keyId, 320 // specified by setMacAlgorithm and the key selected by keyId, 324 Vector<uint8_t> const &keyId,
|
/frameworks/av/drm/libmediadrm/ |
H A D | Drm.cpp | 667 Vector<uint8_t> const &keyId, 683 return mPlugin->encrypt(sessionId, keyId, input, iv, output); 687 Vector<uint8_t> const &keyId, 703 return mPlugin->decrypt(sessionId, keyId, input, iv, output); 707 Vector<uint8_t> const &keyId, 722 return mPlugin->sign(sessionId, keyId, message, signature); 726 Vector<uint8_t> const &keyId, 742 return mPlugin->verify(sessionId, keyId, message, signature, match); 666 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 686 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 706 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 725 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument
|
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 403 KeyStatus(@NonNull byte[] keyId, @KeyStatusCode int statusCode) { argument 404 mKeyId = keyId; 590 byte[] keyId = parcel.createByteArray(); 592 keyStatusList.add(new KeyStatus(keyId, keyStatusCode)); 1033 @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv); 1038 @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv); 1043 @NonNull byte[] keyId, @NonNull byte[] message); 1047 @NonNull byte[] keyId, @NonNull byte[] message, @NonNull byte[] signature); 1031 encryptNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv) argument 1036 decryptNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv) argument 1041 signNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] message) argument 1045 verifyNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] message, @NonNull byte[] signature) argument
|
/frameworks/av/media/ndk/ |
H A D | NdkMediaDrm.cpp | 585 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 603 keyIdVec.appendArray(keyId, kKeyIdSize); 626 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 631 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 637 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 642 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 648 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 669 keyIdVec.appendArray(keyId, kKeyIdSize); 687 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, 708 keyIdVec.appendArray(keyId, kKeyIdSiz 583 encrypt_decrypt_common(AMediaDrm *mObj, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) argument 625 AMediaDrm_encrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument 636 AMediaDrm_decrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument 647 AMediaDrm_sign(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, uint8_t *signature, size_t *signatureSize) argument 686 AMediaDrm_verify(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, const uint8_t *signature, size_t signatureSize) argument [all...] |
/frameworks/base/keystore/java/android/security/ |
H A D | KeyChain.java | 378 final String keyId = keyChainService.requestPrivateKey(alias); 379 if (keyId == null) { 383 KeyStore.getInstance(), keyId, KeyStore.UID_SELF);
|
/frameworks/av/media/libstagefright/include/ |
H A D | MPEG4Extractor.h | 117 status_t parseQTMetaVal(int32_t keyId, off64_t data_offset, size_t data_size);
|
/frameworks/base/media/jni/ |
H A D | android_media_MediaDrm.cpp | 1303 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1308 status_t err = drm->encrypt(sessionId, keyId, input, iv, output); 1334 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1339 status_t err = drm->decrypt(sessionId, keyId, input, iv, output); 1364 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1368 status_t err = drm->sign(sessionId, keyId, message, signature); 1394 Vector<uint8_t> keyId(JByteArrayToVector(env, jkeyId)); 1399 status_t err = drm->verify(sessionId, keyId, message, signature, match);
|
/frameworks/av/media/libstagefright/matroska/ |
H A D | MatroskaExtractor.cpp | 564 const uint8_t *keyId; local 567 CHECK(trackMeta->findData(kKeyCryptoKey, &type, (const void **)&keyId, &keyIdSize)); 568 meta->setData(kKeyCryptoKey, 0, keyId, keyIdSize);
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | KeySetManagerService.java | 674 for (long keyId : keys) { 676 serializer.attribute(null, "identifier", Long.toString(keyId));
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiConfigStore.java | 768 String keyId = config.getKeyIdForCredentials(existingConfig); 771 ? existingConfig.enterpriseConfig : null, enterpriseConfig, keyId)) {
|
/frameworks/av/media/libstagefright/ |
H A D | MPEG4Extractor.cpp | 2540 int32_t keyId, off64_t offset, size_t size) { 2541 ssize_t index = mMetaKeyMap.indexOfKey(keyId); 2539 parseQTMetaVal( int32_t keyId, off64_t offset, size_t size) argument
|