/hardware/interfaces/macsec/aidl/aidl_api/android.hardware.macsec/1/android/hardware/macsec/ |
D | IMacsecPskPlugin.aidl | 37 void addTestKey(in byte[] keyId, in byte[] CAK, in byte[] CKN); in addTestKey() argument 38 byte[] calcIcv(in byte[] keyId, in byte[] data); in calcIcv() argument 39 byte[] generateSak(in byte[] keyId, in byte[] data, in int sakLength); in generateSak() argument 40 byte[] wrapSak(in byte[] keyId, in byte[] sak); in wrapSak() argument 41 byte[] unwrapSak(in byte[] keyId, in byte[] sak); in unwrapSak() argument
|
/hardware/interfaces/macsec/aidl/aidl_api/android.hardware.macsec/current/android/hardware/macsec/ |
D | IMacsecPskPlugin.aidl | 34 void addTestKey(in byte[] keyId, in byte[] CAK, in byte[] CKN); in addTestKey() argument 45 byte[] calcIcv(in byte[] keyId, in byte[] data); in calcIcv() argument 57 byte[] generateSak(in byte[] keyId, in byte[] data, in int sakLength); in generateSak() argument 68 byte[] wrapSak(in byte[] keyId, in byte[] sak); in wrapSak() argument 79 byte[] unwrapSak(in byte[] keyId, in byte[] sak); in unwrapSak() argument
|
/hardware/interfaces/macsec/aidl/android/hardware/macsec/ |
D | IMacsecPskPlugin.aidl | 34 void addTestKey(in byte[] keyId, in byte[] CAK, in byte[] CKN); in addTestKey() argument 46 byte[] calcIcv(in byte[] keyId, in byte[] data); in calcIcv() argument 62 byte[] generateSak(in byte[] keyId, in byte[] data, in int sakLength); in generateSak() argument 76 byte[] wrapSak(in byte[] keyId, in byte[] sak); in wrapSak() argument 90 byte[] unwrapSak(in byte[] keyId, in byte[] sak); in unwrapSak() argument
|
/hardware/interfaces/macsec/aidl/default/ |
D | MacsecPskPlugin.h | 27 std::vector<uint8_t> keyId; member 38 ndk::ScopedAStatus addTestKey(const std::vector<uint8_t>& keyId, 41 ndk::ScopedAStatus calcIcv(const std::vector<uint8_t>& keyId, const std::vector<uint8_t>& data, 44 ndk::ScopedAStatus generateSak(const std::vector<uint8_t>& keyId, 48 ndk::ScopedAStatus wrapSak(const std::vector<uint8_t>& keyId, const std::vector<uint8_t>& sak, 51 ndk::ScopedAStatus unwrapSak(const std::vector<uint8_t>& keyId, const std::vector<uint8_t>& sak,
|
D | MacsecPskPlugin.cpp | 136 ndk::ScopedAStatus MacsecPskPlugin::addTestKey(const std::vector<uint8_t>& keyId, in addTestKey() argument 143 if (keyId.size() != CAK.size()) { in addTestKey() 185 mKeys.push_back({keyId, kekEncCtx, kekDecCtx, ickCtx, cakCtx}); in addTestKey() 190 ndk::ScopedAStatus MacsecPskPlugin::calcIcv(const std::vector<uint8_t>& keyId, in calcIcv() argument 196 if (s.keyId == keyId) { in calcIcv() 214 ndk::ScopedAStatus MacsecPskPlugin::generateSak(const std::vector<uint8_t>& keyId, in generateSak() argument 228 if (s.keyId == keyId) { in generateSak() 248 ndk::ScopedAStatus MacsecPskPlugin::wrapSak(const std::vector<uint8_t>& keyId, in wrapSak() argument 259 if (s.keyId == keyId) { in wrapSak() 278 ndk::ScopedAStatus MacsecPskPlugin::unwrapSak(const std::vector<uint8_t>& keyId, in unwrapSak() argument [all …]
|
/hardware/interfaces/drm/aidl/android/hardware/drm/ |
D | IDrmPlugin.aidl | 76 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument 95 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument 700 byte[] sign(in byte[] sessionId, in byte[] keyId, in byte[] message); in sign() argument 742 in byte[] sessionId, in byte[] keyId, in byte[] message, in verify() argument
|
D | KeyStatus.aidl | 27 byte[] keyId;
|
D | DecryptArgs.aidl | 45 byte[] keyId;
|
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/1/android/hardware/drm/ |
D | IDrmPlugin.aidl | 38 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument 39 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument 73 byte[] sign(in byte[] sessionId, in byte[] keyId, in byte[] message); in sign() argument 75 boolean verify(in byte[] sessionId, in byte[] keyId, in byte[] message, in byte[] signature); in verify() argument
|
D | KeyStatus.aidl | 37 byte[] keyId;
|
D | DecryptArgs.aidl | 38 byte[] keyId;
|
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/current/android/hardware/drm/ |
D | IDrmPlugin.aidl | 38 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument 39 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument 73 byte[] sign(in byte[] sessionId, in byte[] keyId, in byte[] message); in sign() argument 75 boolean verify(in byte[] sessionId, in byte[] keyId, in byte[] message, in byte[] signature); in verify() argument
|
D | KeyStatus.aidl | 37 byte[] keyId;
|
D | DecryptArgs.aidl | 38 byte[] keyId;
|
/hardware/interfaces/drm/1.0/default/ |
D | DrmPlugin.cpp | 267 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& input, in encrypt() argument 272 toVector(keyId), toVector(input), toVector(iv), legacyOutput); in encrypt() 278 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& input, in decrypt() argument 283 toVector(keyId), toVector(input), toVector(iv), legacyOutput); in decrypt() 289 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message, in sign() argument 293 toVector(keyId), toVector(message), legacySignature); in sign() 299 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message, in verify() argument 304 toVector(keyId), toVector(message), toVector(signature), in verify() 424 keyStatus.keyId = toHidlVec(legacyKeyStatus.mKeyId); in sendKeysChange()
|
D | DrmPlugin.h | 110 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& input, 114 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& input, 118 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message, 122 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message,
|
D | CryptoPlugin.cpp | 64 const hidl_array<uint8_t, 16>& keyId, in decrypt() argument 182 ssize_t result = mLegacyPlugin->decrypt(secure, keyId.data(), iv.data(), in decrypt()
|
/hardware/interfaces/drm/1.0/vts/functional/ |
D | drm_hal_vendor_test.cpp | 73 ASSERT_TRUE(key.keyId.size() > 0) << kVendorStr in TEST_P() 75 ASSERT_TRUE(key.keyId.size() > 0) << kVendorStr in TEST_P() 780 hidl_vec<uint8_t> keyId, input, iv; in TEST_P() local 782 session, keyId, input, iv, in TEST_P() 792 hidl_vec<uint8_t> keyId, input, iv; in TEST_P() local 794 session, keyId, input, iv, in TEST_P() 804 hidl_vec<uint8_t> keyId, message; in TEST_P() local 806 session, keyId, message, in TEST_P() 816 hidl_vec<uint8_t> keyId, message, signature; in TEST_P() local 818 session, keyId, message, signature, [&](Status status, bool) { in TEST_P() [all …]
|
D | drm_hal_clearkey_test.cpp | 666 hidl_vec<uint8_t> keyId = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}; in TEST_P() local 669 auto res = drmPlugin->encrypt(session, keyId, input, iv, in TEST_P() 680 hidl_vec<uint8_t> keyId = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}; in TEST_P() local 683 auto res = drmPlugin->decrypt(session, keyId, input, iv, in TEST_P() 695 hidl_vec<uint8_t> keyId = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}; in TEST_P() local 697 auto res = drmPlugin->sign(session, keyId, message, in TEST_P() 709 hidl_vec<uint8_t> keyId = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}; in TEST_P() local 714 session, keyId, message, signature, [&](Status status, bool) { in TEST_P() 840 const vector<uint8_t> keyId = {0x60, 0x06, 0x1e, 0x01, 0x7e, 0x47, in decrypt() local 872 auto res = cryptoPlugin->decrypt(kNotSecure, toHidlArray(keyId), localIv, mode, in decrypt()
|
D | drm_hal_vendor_module_api.h | 199 const std::vector<uint8_t> keyId; member
|
/hardware/interfaces/drm/1.2/ |
D | ICryptoPlugin.hal | 43 * @param the keyId for the key that is used to do the the decryption. The 44 * keyId refers to a key in the associated MediaDrm instance. 80 decrypt_1_2(bool secure, uint8_t[16] keyId, uint8_t[16] iv, Mode mode,
|
/hardware/interfaces/staging/security/see/hwcrypto/aidl/android/hardware/security/see/hwcrypto/ |
D | IHwCryptoKey.aidl | 46 DeviceKeyId keyId;
|
/hardware/interfaces/drm/1.2/vts/functional/ |
D | drm_hal_clearkey_module.cpp | 62 .keyId = { // keyId in getContentConfigurations()
|
/hardware/interfaces/drm/1.0/ |
D | ICryptoPlugin.hal | 83 * @param the keyId for the key that should be used to do the 84 * the decryption. The keyId refers to a key in the associated 110 decrypt(bool secure, uint8_t[16] keyId, uint8_t[16] iv, Mode mode,
|
/hardware/interfaces/drm/1.0/vts/functional/include/ |
D | drm_hal_vendor_module_api.h | 199 const std::vector<uint8_t> keyId; member
|