Searched refs:signature (Results 1 - 23 of 23) sorted by relevance

/hardware/intel/img/psb_headers/DRM/cc54/inc/
H A Dwv_mod_drm_api.h66 uint8_t *signature,
72 const uint8_t *signature,
82 const uint8_t *signature,
102 const uint8_t *signature,
118 uint8_t *signature,
147 uint8_t *signature,
154 const uint8_t *signature,
161 const uint8_t *signature,
173 uint8_t *signature,
269 * @param[in] signature
[all...]
H A Ddrm_common_api.h69 uint8_t signature[256]; member in struct:drm_secureclock_server_response
/hardware/intel/bootstub/
H A Dsfi.h32 char signature[4]; member in struct:sfi_table_header
H A Dbootparam.h68 __u32 signature; member in struct:ist_info
/hardware/interfaces/drm/1.0/
H A DIDrmPlugin.hal212 * material to be used by signRSA when computing an RSA signature on a
231 * message to a server which verifies the signature to confirm that the
436 * Compute a signature over the provided message using the mac algorithm
438 * the signature.
442 * @param message the message to compute a signature over
448 * @return signature the computed signature
451 generates (Status status, vec<uint8_t> signature);
461 * @param signature the signature t
[all...]
/hardware/libhardware/include/hardware/
H A Dkeymaster0.h126 const uint8_t* signature, const size_t signature_length);
H A Dkeymaster1.h121 const uint8_t* signature, const size_t signature_length);
512 * \param[in] signature The signature to be verified if the purpose specified in the begin()
518 * If the operation being finished is a signature verification or an AEAD-mode decryption and
524 const keymaster_blob_t* signature,
H A Dkeymaster2.h396 * \param[in] signature The signature to be verified if the purpose specified in the begin()
402 * If the operation being finished is a signature verification or an AEAD-mode decryption and
408 const keymaster_blob_t* input, const keymaster_blob_t* signature,
/hardware/qcom/keymaster/
H A Dkeymaster_qcom.h172 * signed_data : signature
195 * signature : Offset to the signature data buffer (from signed data buffer)
204 uint32_t signature; member in struct:keymaster_verify_data_cmd
H A Dkeymaster_qcom.cpp487 ALOGE("Output signature buffer == NULL");
574 const uint8_t* signature, const size_t signatureLength)
581 if (signedData == NULL || signature == NULL) {
582 ALOGE("data or signature buffers == NULL");
594 ALOGE("signed data length must be signature length");
633 send_cmd->signature = signedDataLength;
636 signature, signatureLength);
570 qcom_km_verify_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
H A Deapol.h80 unsigned char signature[EAPOL_KEY_SIG_LEN]; /* Key Signature */ member in struct:__anon71
/hardware/interfaces/keymaster/3.0/vts/functional/
H A Dkeymaster_hidl_hal_test.cpp610 const string& input, const string& signature, AuthorizationSet* out_params,
616 ->finish(op_handle, in_params.hidl_data(), HidlBuf(input), HidlBuf(signature),
633 "" /* signature */, &out_params, output);
641 ErrorCode Finish(const string& message, const string& signature, string* output) { argument
644 ErrorCode error = Finish(op_handle_, AuthorizationSet() /* in_params */, message, signature,
712 string signature = ProcessMessage(key_blob, KeyPurpose::SIGN, message, params, &out_params); local
714 return signature;
739 string signature = MacMessage(message, digest, expected_mac.size() * 8); local
740 EXPECT_EQ(expected_mac, signature) << "Test vector didn't match for digest " << (int)digest;
764 void VerifyMessage(const HidlBuf& key_blob, const string& message, const string& signature, argument
609 Finish(OperationHandle op_handle, const AuthorizationSet& in_params, const string& input, const string& signature, AuthorizationSet* out_params, string* output) argument
781 VerifyMessage(const string& message, const string& signature, const AuthorizationSet& params) argument
1382 string signature = SignMessage( local
1399 string signature = SignMessage( local
1416 string signature; local
1436 string signature = SignMessage(message, AuthorizationSetBuilder() local
1453 string signature = SignMessage( local
1476 string signature; local
1670 string signature; local
1775 string signature = MacMessage(message, digest, 160); local
1985 string signature = SignMessage( local
2026 string signature = local
2111 string signature = SignMessage(message, AuthorizationSetBuilder().Digest(digest)); local
2198 string signature = SignMessage( local
2320 string signature = SignMessage(message, params); local
2376 string signature = SignMessage(message, params); local
2402 string signature = SignMessage(message, params); local
2488 string signature = MacMessage(message, Digest::SHA_2_256, 256); local
[all...]
/hardware/interfaces/automotive/evs/1.0/default/
H A DEvsDisplay.cpp279 // time varying frame signature to avoid getting fooled by a static image.
284 // we'll check the "uniqueness" of the frame signature below
306 uint32_t signature = pixels[0] & 0xFF; local
307 if (prevSignature == signature) {
/hardware/interfaces/keymaster/3.0/
H A DIKeymasterDevice.hal326 * @param signature The signature to be verified if the purpose specified in the begin() call
336 vec<uint8_t> signature)
/hardware/interfaces/keymaster/3.0/default/
H A DKeymasterDevice.h82 const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature,
H A DKeymasterDevice.cpp689 const hidl_vec<uint8_t>& signature, finish_cb _hidl_cb) {
700 auto kmSignature = hidlVec2KmBlob(signature);
686 finish(uint64_t operationHandle, const hidl_vec<KeyParameter>& inParams, const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature, finish_cb _hidl_cb) argument
/hardware/interfaces/drm/1.0/default/
H A DDrmPlugin.h123 const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) override;
H A DDrmPlugin.cpp300 const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) {
304 toVector(keyId), toVector(message), toVector(signature),
298 verify(const hidl_vec<uint8_t>& sessionId, const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message, const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) argument
/hardware/interfaces/drm/1.0/vts/functional/
H A Ddrm_hal_clearkey_test.cpp806 hidl_vec<uint8_t> signature = {0, 0, 0, 0, 0, 0, 0, 0, local
809 session, keyId, message, signature, [&](Status status, bool) {
H A Ddrm_hal_vendor_test.cpp957 hidl_vec<uint8_t> keyId, message, signature; local
959 session, keyId, message, signature, [&](Status status, bool) {
/hardware/qcom/media/msm8974/mm-video-v4l2/vidc/vdec/src/
H A Domx_vdec_msm8974.cpp1482 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header
1495 file_header.signature[0] = 'D';
1496 file_header.signature[1] = 'K';
1497 file_header.signature[2] = 'I';
1498 file_header.signature[3] = 'F';
/hardware/qcom/media/msm8996/mm-video-v4l2/vidc/vdec/src/
H A Domx_vdec_v4l2.cpp1840 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header
1853 file_header.signature[0] = 'D';
1854 file_header.signature[1] = 'K';
1855 file_header.signature[2] = 'I';
1856 file_header.signature[3] = 'F';
/hardware/qcom/media/msm8998/mm-video-v4l2/vidc/vdec/src/
H A Domx_vdec_v4l2.cpp2062 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header
2075 file_header.signature[0] = 'D';
2076 file_header.signature[1] = 'K';
2077 file_header.signature[2] = 'I';
2078 file_header.signature[3] = 'F';

Completed in 395 milliseconds