/hardware/interfaces/oemlock/1.0/ |
H A D | IOemLock.hal | 41 * The implementation may require a vendor defined signature to prove the 45 * @param signature to prove validity of this request or empty if not 48 * INVALID_SIGNATURE if a signature is required but the wrong one 51 setOemUnlockAllowedByCarrier(bool allowed, vec<uint8_t> signature)
|
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
H A D | wv_mod_drm_api.h | 66 uint8_t *signature, 72 const uint8_t *signature, 82 const uint8_t *signature, 102 const uint8_t *signature, 118 uint8_t *signature, 147 uint8_t *signature, 154 const uint8_t *signature, 161 const uint8_t *signature, 174 uint8_t *signature, 268 * @param[in] signature [all...] |
H A D | drm_common_api.h | 69 uint8_t signature[256]; member in struct:drm_secureclock_server_response
|
/hardware/intel/bootstub/ |
H A D | sfi.h | 32 char signature[4]; member in struct:sfi_table_header
|
H A D | bootparam.h | 68 __u32 signature; member in struct:ist_info
|
/hardware/interfaces/drm/1.0/ |
H A D | IDrmPlugin.hal | 212 * material to be used by signRSA when computing an RSA signature on a 231 * message to a server which verifies the signature to confirm that the 436 * Compute a signature over the provided message using the mac algorithm 438 * the signature. 442 * @param message the message to compute a signature over 448 * @return signature the computed signature 451 generates (Status status, vec<uint8_t> signature); 461 * @param signature the signature t [all...] |
/hardware/libhardware/include/hardware/ |
H A D | keymaster0.h | 126 const uint8_t* signature, const size_t signature_length);
|
H A D | keymaster1.h | 121 const uint8_t* signature, const size_t signature_length); 512 * \param[in] signature The signature to be verified if the purpose specified in the begin() 518 * If the operation being finished is a signature verification or an AEAD-mode decryption and 524 const keymaster_blob_t* signature,
|
H A D | keymaster2.h | 396 * \param[in] signature The signature to be verified if the purpose specified in the begin() 402 * If the operation being finished is a signature verification or an AEAD-mode decryption and 408 const keymaster_blob_t* input, const keymaster_blob_t* signature,
|
/hardware/qcom/keymaster/ |
H A D | keymaster_qcom.h | 172 * signed_data : signature 195 * signature : Offset to the signature data buffer (from signed data buffer) 204 uint32_t signature; member in struct:keymaster_verify_data_cmd
|
H A D | keymaster_qcom.cpp | 487 ALOGE("Output signature buffer == NULL"); 574 const uint8_t* signature, const size_t signatureLength) 581 if (signedData == NULL || signature == NULL) { 582 ALOGE("data or signature buffers == NULL"); 594 ALOGE("signed data length must be signature length"); 633 send_cmd->signature = signedDataLength; 636 signature, signatureLength); 570 qcom_km_verify_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
H A D | eapol.h | 80 unsigned char signature[EAPOL_KEY_SIG_LEN]; /* Key Signature */ member in struct:__anon71
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | keymaster_hidl_hal_test.cpp | 648 const string& input, const string& signature, AuthorizationSet* out_params, 654 ->finish(op_handle, in_params.hidl_data(), HidlBuf(input), HidlBuf(signature), 671 "" /* signature */, &out_params, output); 679 ErrorCode Finish(const string& message, const string& signature, string* output) { argument 682 ErrorCode error = Finish(op_handle_, AuthorizationSet() /* in_params */, message, signature, 754 string signature = ProcessMessage(key_blob, KeyPurpose::SIGN, message, params, &out_params); local 756 return signature; 781 string signature = MacMessage(message, digest, expected_mac.size() * 8); local 782 EXPECT_EQ(expected_mac, signature) << "Test vector didn't match for digest " << (int)digest; 806 void VerifyMessage(const HidlBuf& key_blob, const string& message, const string& signature, argument 647 Finish(OperationHandle op_handle, const AuthorizationSet& in_params, const string& input, const string& signature, AuthorizationSet* out_params, string* output) argument 823 VerifyMessage(const string& message, const string& signature, const AuthorizationSet& params) argument 1426 string signature = SignMessage( local 1443 string signature = SignMessage( local 1460 string signature; local 1480 string signature = SignMessage(message, AuthorizationSetBuilder() local 1497 string signature = SignMessage( local 1520 string signature; local 1714 string signature; local 1819 string signature = MacMessage(message, digest, 160); local 2029 string signature = SignMessage( local 2070 string signature = local 2155 string signature = SignMessage(message, AuthorizationSetBuilder().Digest(digest)); local 2242 string signature = SignMessage( local 2364 string signature = SignMessage(message, params); local 2420 string signature = SignMessage(message, params); local 2446 string signature = SignMessage(message, params); local 2531 string signature = MacMessage(message, Digest::SHA_2_256, 256); local [all...] |
/hardware/interfaces/automotive/evs/1.0/default/ |
H A D | EvsDisplay.cpp | 279 // time varying frame signature to avoid getting fooled by a static image. 284 // we'll check the "uniqueness" of the frame signature below 306 uint32_t signature = pixels[0] & 0xFF; local 307 if (prevSignature == signature) {
|
/hardware/interfaces/keymaster/3.0/ |
H A D | IKeymasterDevice.hal | 326 * @param signature The signature to be verified if the purpose specified in the begin() call 336 vec<uint8_t> signature)
|
/hardware/interfaces/keymaster/3.0/default/ |
H A D | KeymasterDevice.h | 82 const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature,
|
H A D | KeymasterDevice.cpp | 689 const hidl_vec<uint8_t>& signature, finish_cb _hidl_cb) { 700 auto kmSignature = hidlVec2KmBlob(signature); 686 finish(uint64_t operationHandle, const hidl_vec<KeyParameter>& inParams, const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature, finish_cb _hidl_cb) argument
|
/hardware/interfaces/drm/1.0/default/ |
H A D | DrmPlugin.h | 123 const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) override;
|
H A D | DrmPlugin.cpp | 300 const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) { 304 toVector(keyId), toVector(message), toVector(signature), 298 verify(const hidl_vec<uint8_t>& sessionId, const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message, const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) argument
|
/hardware/interfaces/drm/1.0/vts/functional/ |
H A D | drm_hal_clearkey_test.cpp | 838 hidl_vec<uint8_t> signature = {0, 0, 0, 0, 0, 0, 0, 0, local 841 session, keyId, message, signature, [&](Status status, bool) {
|
H A D | drm_hal_vendor_test.cpp | 956 hidl_vec<uint8_t> keyId, message, signature; local 958 session, keyId, message, signature, [&](Status status, bool) {
|
/hardware/qcom/media/msm8974/mm-video-v4l2/vidc/vdec/src/ |
H A D | omx_vdec_msm8974.cpp | 1482 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header 1495 file_header.signature[0] = 'D'; 1496 file_header.signature[1] = 'K'; 1497 file_header.signature[2] = 'I'; 1498 file_header.signature[3] = 'F';
|
/hardware/qcom/media/sdm845/mm-video-v4l2/vidc/vdec/src/ |
H A D | omx_vdec_v4l2.cpp | 1990 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header 2003 file_header.signature[0] = 'D'; 2004 file_header.signature[1] = 'K'; 2005 file_header.signature[2] = 'I'; 2006 file_header.signature[3] = 'F';
|
/hardware/qcom/media/msm8996/mm-video-v4l2/vidc/vdec/src/ |
H A D | omx_vdec_v4l2.cpp | 1829 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header 1842 file_header.signature[0] = 'D'; 1843 file_header.signature[1] = 'K'; 1844 file_header.signature[2] = 'I'; 1845 file_header.signature[3] = 'F';
|
/hardware/qcom/media/msm8998/mm-video-v4l2/vidc/vdec/src/ |
H A D | omx_vdec_v4l2.cpp | 2032 OMX_U8 signature[4]; //='DKIF'; member in struct:ivf_file_header 2045 file_header.signature[0] = 'D'; 2046 file_header.signature[1] = 'K'; 2047 file_header.signature[2] = 'I'; 2048 file_header.signature[3] = 'F';
|