Home
last modified time | relevance | path

Searched refs:keyId (Results 1 – 25 of 40) sorted by relevance

12

/frameworks/base/wifi/tests/src/android/net/wifi/
DWifiConfigurationTest.java220 String keyId = config.getKeyIdForCredentials(config); in testGetKeyIdForCredentials() local
221 assertEquals(keyId, mSsid + "_WPA_EAP_TLS_NULL"); in testGetKeyIdForCredentials()
227 keyId = config.getKeyIdForCredentials(config); in testGetKeyIdForCredentials()
228 assertEquals(keyId, mSsid + "_WPA_EAP_TTLS_MSCHAPV2"); in testGetKeyIdForCredentials()
235 keyId = config.getKeyIdForCredentials(config); in testGetKeyIdForCredentials()
236 assertEquals(keyId, mSsid + "_SUITE_B_192_PWD_GTC"); in testGetKeyIdForCredentials()
243 keyId = config.getKeyIdForCredentials(config); in testGetKeyIdForCredentials()
244 assertEquals(keyId, mSsid + "_IEEE8021X_SIM_NULL"); in testGetKeyIdForCredentials()
252 keyId = config.getKeyIdForCredentials(config); in testGetKeyIdForCredentials()
281 String keyId = config.getKeyIdForCredentials(config); in testGetKeyIdForCredentialsForSuggestion() local
[all …]
/frameworks/av/drm/mediadrm/plugins/clearkey/default/
DSession.cpp54 const KeyMap::key_type& keyId = keys.keyAt(i); in provideKeyResponse() local
56 mKeyMap.add(keyId, key); in provideKeyResponse()
65 const KeyId keyId, const Iv iv, const void* source, in decrypt() argument
71 keyIdVector.appendArray(keyId, kBlockSize); in decrypt()
DCryptoPlugin.cpp35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, in decrypt() argument
67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples, in decrypt()
DJsonWebKey.cpp132 bool JsonWebKey::findKey(const String8& jsonObject, String8* keyId, in findKey() argument
145 findValue(kKeyIdTag, keyId); in findKey()
/frameworks/av/drm/mediadrm/plugins/clearkey/default/include/
DDrmPlugin.h195 const Vector<uint8_t>& keyId, in encrypt() argument
199 if (sessionId.size() == 0 || keyId.size() == 0 || in encrypt()
209 const Vector<uint8_t>& keyId, in decrypt() argument
213 if (sessionId.size() == 0 || keyId.size() == 0 || in decrypt()
223 const Vector<uint8_t>& keyId, in sign() argument
226 if (sessionId.size() == 0 || keyId.size() == 0 || in sign()
236 const Vector<uint8_t>& keyId, in verify() argument
239 if (sessionId.size() == 0 || keyId.size() == 0 || in verify()
DCryptoPlugin.h46 bool secure, const KeyId keyId, const Iv iv,
DSession.h49 const KeyId keyId, const Iv iv, const void* source,
DJsonWebKey.h50 bool findKey(const String8& jsonObject, String8* keyId,
/frameworks/av/media/ndk/include/media/
DNdkMediaDrm.h154 AMediaDrmKeyId keyId; member
535 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
548 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
563 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
576 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
/frameworks/base/packages/BackupEncryption/test/robolectric/src/com/android/server/testing/fakes/
DFakeCryptoBackupServerTest.java78 String keyId = "karlin"; in addTertiaryKeys_updatesExistingSet() local
82 keyId, in addTertiaryKeys_updatesExistingSet()
88 keyId, in addTertiaryKeys_updatesExistingSet()
93 assertThat(mServer.getAllTertiaryKeys(keyId)) in addTertiaryKeys_updatesExistingSet()
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/
DSession.cpp72 const KeyId keyId, const Iv iv, const uint8_t* srcPtr, in decrypt() argument
83 keyIdVector.insert(keyIdVector.end(), keyId, keyId + kBlockSize); in decrypt()
DCryptoPlugin.cpp47 const hidl_array<uint8_t, 16>& keyId, in decrypt() argument
62 secure, keyId, iv, mode, pattern, subSamples, source, offset, destination, in decrypt()
80 const hidl_array<uint8_t, KEY_ID_SIZE>& keyId, in decrypt_1_2() argument
197 Status_V1_2 res = mSession->decrypt(keyId.data(), iv.data(), srcPtr, in decrypt_1_2()
/frameworks/av/drm/mediadrm/plugins/mock/
DMockDrmCryptoPlugin.cpp553 Vector<uint8_t> const &keyId, in encrypt() argument
561 vectorToString(keyId).string(), in encrypt()
575 mByteArrayProperties.add(String8("mock-keyid"), keyId); in encrypt()
592 Vector<uint8_t> const &keyId, in decrypt() argument
600 vectorToString(keyId).string(), in decrypt()
614 mByteArrayProperties.add(String8("mock-keyid"), keyId); in decrypt()
631 Vector<uint8_t> const &keyId, in sign() argument
638 vectorToString(keyId).string(), in sign()
650 mByteArrayProperties.add(String8("mock-keyid"), keyId); in sign()
666 Vector<uint8_t> const &keyId, in verify() argument
[all …]
DMockDrmCryptoPlugin.h111 Vector<uint8_t> const &keyId,
117 Vector<uint8_t> const &keyId,
123 Vector<uint8_t> const &keyId,
128 Vector<uint8_t> const &keyId,
/frameworks/av/media/ndk/
DNdkMediaDrm.cpp136 keyStatus.keyId.ptr = drmKeyStatus.keyId.data(); in sendKeysChange()
137 keyStatus.keyId.length = drmKeyStatus.keyId.size(); in sendKeysChange()
726 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, in encrypt_decrypt_common() argument
744 keyIdVec.appendArray(keyId, kKeyIdSize); in encrypt_decrypt_common()
767 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, in AMediaDrm_encrypt() argument
772 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, in AMediaDrm_encrypt()
778 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, in AMediaDrm_decrypt() argument
783 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, in AMediaDrm_decrypt()
789 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, in AMediaDrm_sign() argument
810 keyIdVec.appendArray(keyId, kKeyIdSize); in AMediaDrm_sign()
[all …]
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/include/
DDrmPlugin.h220 const hidl_vec<uint8_t>& keyId, in encrypt()
224 if (sessionId.size() == 0 || keyId.size() == 0 || in encrypt()
235 const hidl_vec<uint8_t>& keyId, in decrypt()
239 if (sessionId.size() == 0 || keyId.size() == 0 || in decrypt()
250 const hidl_vec<uint8_t>& keyId, in sign()
253 if (sessionId.size() == 0 || keyId.size() == 0 || in sign()
264 const hidl_vec<uint8_t>& keyId, in verify()
269 if (sessionId.size() == 0 || keyId.size() == 0 || in verify()
DCryptoPlugin.h76 const hidl_array<uint8_t, KEY_ID_SIZE>& keyId,
88 const hidl_array<uint8_t, KEY_ID_SIZE>& keyId,
DJsonWebKey.h44 bool findKey(const std::string& jsonObject, std::string* keyId,
/frameworks/av/drm/libmediadrm/include/mediadrm/
DIDrm.h118 Vector<uint8_t> const &keyId,
124 Vector<uint8_t> const &keyId,
130 Vector<uint8_t> const &keyId,
135 Vector<uint8_t> const &keyId,
DDrmHal.h149 Vector<uint8_t> const &keyId,
155 Vector<uint8_t> const &keyId,
161 Vector<uint8_t> const &keyId,
166 Vector<uint8_t> const &keyId,
DIDrmClient.h31 const hardware::hidl_vec<uint8_t> keyId; member
/frameworks/native/headers/media_plugin/media/drm/
DDrmAPI.h364 Vector<uint8_t> const &keyId,
373 Vector<uint8_t> const &keyId,
382 Vector<uint8_t> const &keyId,
391 Vector<uint8_t> const &keyId,
/frameworks/base/media/java/android/media/
DMediaDrm.java609 KeyStatus(@NonNull byte[] keyId, @KeyStatusCode int statusCode) {
610 mKeyId = keyId;
882 byte[] keyId = parcel.createByteArray();
884 keyStatusList.add(new KeyStatus(keyId, keyStatusCode));
1703 @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv);
1708 @NonNull byte[] keyId, @NonNull byte[] input, @NonNull byte[] iv);
1713 @NonNull byte[] keyId, @NonNull byte[] message);
1717 @NonNull byte[] keyId, @NonNull byte[] message, @NonNull byte[] signature);
/frameworks/base/keystore/java/android/security/
DKeyChain.java598 final String keyId; in getKeyPair() local
600 keyId = keyChainConnection.getService().requestPrivateKey(alias); in getKeyPair()
608 if (keyId == null) { in getKeyPair()
613 KeyStore.getInstance(), keyId, KeyStore.UID_SELF); in getKeyPair()
/frameworks/av/drm/libmediadrm/
DCryptoHal.cpp313 ssize_t CryptoHal::decrypt(const uint8_t keyId[16], const uint8_t iv[16], in decrypt()
380 hResult = mPluginV1_2->decrypt_1_2(secure, toHidlArray16(keyId), toHidlArray16(iv), in decrypt()
391 hResult = mPlugin->decrypt(secure, toHidlArray16(keyId), toHidlArray16(iv), in decrypt()

12