/frameworks/av/drm/mediadrm/plugins/clearkey/default/ |
Session.cpp | 54 const KeyMap::key_type& keyId = keys.keyAt(i); 56 mKeyMap.add(keyId, key); 65 const KeyId keyId, const Iv iv, const void* source, 71 keyIdVector.appendArray(keyId, kBlockSize);
|
CryptoPlugin.cpp | 35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, 67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples,
|
JsonWebKey.cpp | 132 bool JsonWebKey::findKey(const String8& jsonObject, String8* keyId, 145 findValue(kKeyIdTag, keyId);
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/include/ |
DrmPlugin.h | 195 const Vector<uint8_t>& keyId, 199 if (sessionId.size() == 0 || keyId.size() == 0 || 209 const Vector<uint8_t>& keyId, 213 if (sessionId.size() == 0 || keyId.size() == 0 || 223 const Vector<uint8_t>& keyId, 226 if (sessionId.size() == 0 || keyId.size() == 0 || 236 const Vector<uint8_t>& keyId, 239 if (sessionId.size() == 0 || keyId.size() == 0 ||
|
CryptoPlugin.h | 46 bool secure, const KeyId keyId, const Iv iv,
|
JsonWebKey.h | 50 bool findKey(const String8& jsonObject, String8* keyId,
|
Session.h | 49 const KeyId keyId, const Iv iv, const void* source,
|
/frameworks/av/media/ndk/include/media/ |
NdkMediaDrm.h | 154 AMediaDrmKeyId keyId; 488 * to use is identified by the 16 byte keyId. The key must have been loaded into 492 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 499 * to use is identified by the 16 byte keyId. The key must have been loaded into 503 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 512 * by the 16 byte keyId. The key must have been loaded into the session using 516 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 523 * use is identified by the 16 byte keyId. The key must have been loaded into the 527 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/ |
Session.cpp | 72 const KeyId keyId, const Iv iv, const uint8_t* srcPtr, 83 keyIdVector.insert(keyIdVector.end(), keyId, keyId + kBlockSize);
|
CryptoPlugin.cpp | 47 const hidl_array<uint8_t, 16>& keyId, 62 secure, keyId, iv, mode, pattern, subSamples, source, offset, destination, 82 const hidl_array<uint8_t, KEY_ID_SIZE>& keyId, 183 Status_V1_2 res = mSession->decrypt(keyId.data(), iv.data(), srcPtr,
|
JsonWebKey.cpp | 136 bool JsonWebKey::findKey(const std::string& jsonObject, std::string* keyId, 149 findValue(kKeyIdTag, keyId);
|
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/include/ |
JsonWebKey.h | 44 bool findKey(const std::string& jsonObject, std::string* keyId,
|
CryptoPlugin.h | 76 const hidl_array<uint8_t, KEY_ID_SIZE>& keyId, 88 const hidl_array<uint8_t, KEY_ID_SIZE>& keyId,
|
DrmPlugin.h | 220 const hidl_vec<uint8_t>& keyId, 224 if (sessionId.size() == 0 || keyId.size() == 0 || 235 const hidl_vec<uint8_t>& keyId, 239 if (sessionId.size() == 0 || keyId.size() == 0 || 250 const hidl_vec<uint8_t>& keyId, 253 if (sessionId.size() == 0 || keyId.size() == 0 || 264 const hidl_vec<uint8_t>& keyId, 269 if (sessionId.size() == 0 || keyId.size() == 0 ||
|
Session.h | 57 const KeyId keyId, const Iv iv, const uint8_t* srcPtr,
|
/external/walt/android/WALT/app/src/main/java/org/chromium/latency/walt/ |
Utils.java | 165 static int getIntPreference(Context context, @StringRes int keyId, int defaultValue) { 167 return preferences.getInt(context.getString(keyId), defaultValue); 170 static boolean getBooleanPreference(Context context, @StringRes int keyId, boolean defaultValue) { 172 return preferences.getBoolean(context.getString(keyId), defaultValue); 175 static String getStringPreference(Context context, @StringRes int keyId, String defaultValue) { 177 return preferences.getString(context.getString(keyId), defaultValue);
|
/device/google/contexthub/util/nanoapp_encr/ |
nanoapp_encr.c | 56 static int handleEncrypt(uint8_t **pbuf, uint32_t bufUsed, FILE *out, uint64_t keyId, uint32_t *key) 68 encr.keyID = keyId; 75 // if (encr.keyID <= 0xFFFF) 76 // encr.keyID = AES_KEY_ID(encr.keyID); 78 fprintf(stderr, "Using Key ID: %016" PRIX64 "\n", encr.keyID); 192 if (!encr->keyID) { 196 fprintf(stderr, "Using Key ID: %016" PRIX64 "\n", encr->keyID); 255 uint64_t keyId = 0 [all...] |
/frameworks/av/drm/mediadrm/plugins/mock/ |
MockDrmCryptoPlugin.h | 111 Vector<uint8_t> const &keyId, 117 Vector<uint8_t> const &keyId, 123 Vector<uint8_t> const &keyId, 128 Vector<uint8_t> const &keyId,
|
MockDrmCryptoPlugin.cpp | 553 Vector<uint8_t> const &keyId, 559 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 561 vectorToString(keyId).string(), 572 // byte[] keyId -> mock-keyid 575 mByteArrayProperties.add(String8("mock-keyid"), keyId); 592 Vector<uint8_t> const &keyId, 598 ALOGD("MockDrmPlugin::decrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 600 vectorToString(keyId).string() [all...] |
/frameworks/av/media/libmedia/include/media/ |
IDrm.h | 119 Vector<uint8_t> const &keyId, 125 Vector<uint8_t> const &keyId, 131 Vector<uint8_t> const &keyId, 136 Vector<uint8_t> const &keyId,
|
DrmHal.h | 146 Vector<uint8_t> const &keyId, 152 Vector<uint8_t> const &keyId, 158 Vector<uint8_t> const &keyId, 163 Vector<uint8_t> const &keyId,
|
/frameworks/av/media/ndk/ |
NdkMediaDrm.cpp | 136 keyStatus.keyId.ptr = nullptr; 137 keyStatus.keyId.length = 0; 146 keyStatus.keyId.ptr = data.get(); 147 keyStatus.keyId.length = idSize; 755 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 773 keyIdVec.appendArray(keyId, kKeyIdSize); 796 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 801 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 807 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 812 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv [all...] |
/cts/tests/tests/media/src/android/media/cts/ |
MediaDrmMockTest.java | 554 byte[] keyId = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09}; 561 byte[] output = cs.encrypt(keyId, input, iv); 563 assertTrue(Arrays.equals(keyId, md.getPropertyByteArray("mock-keyid"))); 580 byte[] keyId = {0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49}; 587 byte[] output = cs.decrypt(keyId, input, iv); 589 assertTrue(Arrays.equals(keyId, md.getPropertyByteArray("mock-keyid"))); 606 byte[] keyId = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09}; 612 byte[] signature = cs.sign(keyId, message) [all...] |
/frameworks/av/drm/libmediadrm/ |
IDrm.cpp | 607 Vector<uint8_t> const &keyId, 615 writeVector(data, keyId); 629 Vector<uint8_t> const &keyId, 637 writeVector(data, keyId); 651 Vector<uint8_t> const &keyId, 658 writeVector(data, keyId); 671 Vector<uint8_t> const &keyId, 679 writeVector(data, keyId); [all...] |
/frameworks/av/media/libstagefright/mpeg2ts/ |
ESQueue.h | 65 int32_t keyId, bool isSync,
|