/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
H A D | wv_mod_drm_api.h | 66 uint8_t *signature, 72 const uint8_t *signature, 82 const uint8_t *signature, 102 const uint8_t *signature, 118 uint8_t *signature, 147 uint8_t *signature, 154 const uint8_t *signature, 161 const uint8_t *signature, 173 uint8_t *signature, 269 * @param[in] signature [all...] |
H A D | drm_common_api.h | 69 uint8_t signature[256]; member in struct:drm_secureclock_server_response
|
/hardware/intel/bootstub/ |
H A D | sfi.h | 32 char signature[4]; member in struct:sfi_table_header
|
H A D | bootparam.h | 68 __u32 signature; member in struct:ist_info
|
/hardware/interfaces/drm/1.0/ |
H A D | IDrmPlugin.hal | 212 * material to be used by signRSA when computing an RSA signature on a 231 * message to a server which verifies the signature to confirm that the 436 * Compute a signature over the provided message using the mac algorithm 438 * the signature. 442 * @param message the message to compute a signature over 448 * @return signature the computed signature 451 generates (Status status, vec<uint8_t> signature); 461 * @param signature the signature t [all...] |
/hardware/libhardware/include/hardware/ |
H A D | keymaster0.h | 126 const uint8_t* signature, const size_t signature_length);
|
H A D | keymaster1.h | 121 const uint8_t* signature, const size_t signature_length); 512 * \param[in] signature The signature to be verified if the purpose specified in the begin() 518 * If the operation being finished is a signature verification or an AEAD-mode decryption and 524 const keymaster_blob_t* signature,
|
H A D | keymaster2.h | 396 * \param[in] signature The signature to be verified if the purpose specified in the begin() 402 * If the operation being finished is a signature verification or an AEAD-mode decryption and 408 const keymaster_blob_t* input, const keymaster_blob_t* signature,
|
/hardware/qcom/keymaster/ |
H A D | keymaster_qcom.h | 172 * signed_data : signature 195 * signature : Offset to the signature data buffer (from signed data buffer) 204 uint32_t signature; member in struct:keymaster_verify_data_cmd
|
H A D | keymaster_qcom.cpp | 487 ALOGE("Output signature buffer == NULL"); 574 const uint8_t* signature, const size_t signatureLength) 581 if (signedData == NULL || signature == NULL) { 582 ALOGE("data or signature buffers == NULL"); 594 ALOGE("signed data length must be signature length"); 633 send_cmd->signature = signedDataLength; 636 signature, signatureLength); 570 qcom_km_verify_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
H A D | eapol.h | 80 unsigned char signature[EAPOL_KEY_SIG_LEN]; /* Key Signature */ member in struct:__anon71
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | keymaster_hidl_hal_test.cpp | 610 const string& input, const string& signature, AuthorizationSet* out_params, 616 ->finish(op_handle, in_params.hidl_data(), HidlBuf(input), HidlBuf(signature), 633 "" /* signature */, &out_params, output); 641 ErrorCode Finish(const string& message, const string& signature, string* output) { argument 644 ErrorCode error = Finish(op_handle_, AuthorizationSet() /* in_params */, message, signature, 712 string signature = ProcessMessage(key_blob, KeyPurpose::SIGN, message, params, &out_params); local 714 return signature; 739 string signature = MacMessage(message, digest, expected_mac.size() * 8); local 740 EXPECT_EQ(expected_mac, signature) << "Test vector didn't match for digest " << (int)digest; 764 void VerifyMessage(const HidlBuf& key_blob, const string& message, const string& signature, argument 609 Finish(OperationHandle op_handle, const AuthorizationSet& in_params, const string& input, const string& signature, AuthorizationSet* out_params, string* output) argument 781 VerifyMessage(const string& message, const string& signature, const AuthorizationSet& params) argument 1382 string signature = SignMessage( local 1399 string signature = SignMessage( local 1416 string signature; local 1436 string signature = SignMessage(message, AuthorizationSetBuilder() local 1453 string signature = SignMessage( local 1476 string signature; local 1670 string signature; local 1775 string signature = MacMessage(message, digest, 160); local 1985 string signature = SignMessage( local 2026 string signature = local 2111 string signature = SignMessage(message, AuthorizationSetBuilder().Digest(digest)); local 2198 string signature = SignMessage( local 2320 string signature = SignMessage(message, params); local 2376 string signature = SignMessage(message, params); local 2402 string signature = SignMessage(message, params); local 2488 string signature = MacMessage(message, Digest::SHA_2_256, 256); local [all...] |
/hardware/interfaces/automotive/evs/1.0/default/ |
H A D | EvsDisplay.cpp | 279 // time varying frame signature to avoid getting fooled by a static image. 284 // we'll check the "uniqueness" of the frame signature below 306 uint32_t signature = pixels[0] & 0xFF; local 307 if (prevSignature == signature) {
|
/hardware/interfaces/keymaster/3.0/ |
H A D | IKeymasterDevice.hal | 326 * @param signature The signature to be verified if the purpose specified in the begin() call 336 vec<uint8_t> signature)
|
/hardware/interfaces/keymaster/3.0/default/ |
H A D | KeymasterDevice.h | 82 const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature,
|
H A D | KeymasterDevice.cpp | 689 const hidl_vec<uint8_t>& signature, finish_cb _hidl_cb) { 700 auto kmSignature = hidlVec2KmBlob(signature); 686 finish(uint64_t operationHandle, const hidl_vec<KeyParameter>& inParams, const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature, finish_cb _hidl_cb) argument
|
/hardware/interfaces/drm/1.0/default/ |
H A D | DrmPlugin.h | 123 const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) override;
|
H A D | DrmPlugin.cpp | 300 const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) { 304 toVector(keyId), toVector(message), toVector(signature), 298 verify(const hidl_vec<uint8_t>& sessionId, const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message, const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) argument
|
/hardware/interfaces/drm/1.0/vts/functional/ |
H A D | drm_hal_clearkey_test.cpp | 806 hidl_vec<uint8_t> signature = {0, 0, 0, 0, 0, 0, 0, 0, local 809 session, keyId, message, signature, [&](Status status, bool) {
|
H A D | drm_hal_vendor_test.cpp | 957 hidl_vec<uint8_t> keyId, message, signature; local 959 session, keyId, message, signature, [&](Status status, bool) {
|
/hardware/qcom/media/msm8974/mm-video-v4l2/vidc/vdec/src/ |
H A D | omx_vdec_msm8974.cpp | 1482 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header 1495 file_header.signature[0] = 'D'; 1496 file_header.signature[1] = 'K'; 1497 file_header.signature[2] = 'I'; 1498 file_header.signature[3] = 'F';
|
/hardware/qcom/media/msm8996/mm-video-v4l2/vidc/vdec/src/ |
H A D | omx_vdec_v4l2.cpp | 1840 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header 1853 file_header.signature[0] = 'D'; 1854 file_header.signature[1] = 'K'; 1855 file_header.signature[2] = 'I'; 1856 file_header.signature[3] = 'F';
|
/hardware/qcom/media/msm8998/mm-video-v4l2/vidc/vdec/src/ |
H A D | omx_vdec_v4l2.cpp | 2062 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header 2075 file_header.signature[0] = 'D'; 2076 file_header.signature[1] = 'K'; 2077 file_header.signature[2] = 'I'; 2078 file_header.signature[3] = 'F';
|