Home
last modified time | relevance | path

Searched refs:keyId (Results 1 – 25 of 37) sorted by relevance

12

/hardware/interfaces/macsec/aidl/aidl_api/android.hardware.macsec/1/android/hardware/macsec/
DIMacsecPskPlugin.aidl37 void addTestKey(in byte[] keyId, in byte[] CAK, in byte[] CKN); in addTestKey() argument
38 byte[] calcIcv(in byte[] keyId, in byte[] data); in calcIcv() argument
39 byte[] generateSak(in byte[] keyId, in byte[] data, in int sakLength); in generateSak() argument
40 byte[] wrapSak(in byte[] keyId, in byte[] sak); in wrapSak() argument
41 byte[] unwrapSak(in byte[] keyId, in byte[] sak); in unwrapSak() argument
/hardware/interfaces/macsec/aidl/aidl_api/android.hardware.macsec/current/android/hardware/macsec/
DIMacsecPskPlugin.aidl34 void addTestKey(in byte[] keyId, in byte[] CAK, in byte[] CKN); in addTestKey() argument
45 byte[] calcIcv(in byte[] keyId, in byte[] data); in calcIcv() argument
57 byte[] generateSak(in byte[] keyId, in byte[] data, in int sakLength); in generateSak() argument
68 byte[] wrapSak(in byte[] keyId, in byte[] sak); in wrapSak() argument
79 byte[] unwrapSak(in byte[] keyId, in byte[] sak); in unwrapSak() argument
/hardware/interfaces/macsec/aidl/android/hardware/macsec/
DIMacsecPskPlugin.aidl34 void addTestKey(in byte[] keyId, in byte[] CAK, in byte[] CKN); in addTestKey() argument
46 byte[] calcIcv(in byte[] keyId, in byte[] data); in calcIcv() argument
62 byte[] generateSak(in byte[] keyId, in byte[] data, in int sakLength); in generateSak() argument
76 byte[] wrapSak(in byte[] keyId, in byte[] sak); in wrapSak() argument
90 byte[] unwrapSak(in byte[] keyId, in byte[] sak); in unwrapSak() argument
/hardware/interfaces/macsec/aidl/default/
DMacsecPskPlugin.h27 std::vector<uint8_t> keyId; member
38 ndk::ScopedAStatus addTestKey(const std::vector<uint8_t>& keyId,
41 ndk::ScopedAStatus calcIcv(const std::vector<uint8_t>& keyId, const std::vector<uint8_t>& data,
44 ndk::ScopedAStatus generateSak(const std::vector<uint8_t>& keyId,
48 ndk::ScopedAStatus wrapSak(const std::vector<uint8_t>& keyId, const std::vector<uint8_t>& sak,
51 ndk::ScopedAStatus unwrapSak(const std::vector<uint8_t>& keyId, const std::vector<uint8_t>& sak,
DMacsecPskPlugin.cpp136 ndk::ScopedAStatus MacsecPskPlugin::addTestKey(const std::vector<uint8_t>& keyId, in addTestKey() argument
143 if (keyId.size() != CAK.size()) { in addTestKey()
185 mKeys.push_back({keyId, kekEncCtx, kekDecCtx, ickCtx, cakCtx}); in addTestKey()
190 ndk::ScopedAStatus MacsecPskPlugin::calcIcv(const std::vector<uint8_t>& keyId, in calcIcv() argument
196 if (s.keyId == keyId) { in calcIcv()
214 ndk::ScopedAStatus MacsecPskPlugin::generateSak(const std::vector<uint8_t>& keyId, in generateSak() argument
228 if (s.keyId == keyId) { in generateSak()
248 ndk::ScopedAStatus MacsecPskPlugin::wrapSak(const std::vector<uint8_t>& keyId, in wrapSak() argument
259 if (s.keyId == keyId) { in wrapSak()
278 ndk::ScopedAStatus MacsecPskPlugin::unwrapSak(const std::vector<uint8_t>& keyId, in unwrapSak() argument
[all …]
/hardware/interfaces/drm/aidl/android/hardware/drm/
DIDrmPlugin.aidl76 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument
95 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument
700 byte[] sign(in byte[] sessionId, in byte[] keyId, in byte[] message); in sign() argument
742 in byte[] sessionId, in byte[] keyId, in byte[] message, in verify() argument
DKeyStatus.aidl27 byte[] keyId;
DDecryptArgs.aidl45 byte[] keyId;
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/1/android/hardware/drm/
DIDrmPlugin.aidl38 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument
39 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument
73 byte[] sign(in byte[] sessionId, in byte[] keyId, in byte[] message); in sign() argument
75 boolean verify(in byte[] sessionId, in byte[] keyId, in byte[] message, in byte[] signature); in verify() argument
DKeyStatus.aidl37 byte[] keyId;
DDecryptArgs.aidl38 byte[] keyId;
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/current/android/hardware/drm/
DIDrmPlugin.aidl38 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument
39 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument
73 byte[] sign(in byte[] sessionId, in byte[] keyId, in byte[] message); in sign() argument
75 boolean verify(in byte[] sessionId, in byte[] keyId, in byte[] message, in byte[] signature); in verify() argument
DKeyStatus.aidl37 byte[] keyId;
DDecryptArgs.aidl38 byte[] keyId;
/hardware/interfaces/drm/1.0/default/
DDrmPlugin.cpp267 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& input, in encrypt() argument
272 toVector(keyId), toVector(input), toVector(iv), legacyOutput); in encrypt()
278 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& input, in decrypt() argument
283 toVector(keyId), toVector(input), toVector(iv), legacyOutput); in decrypt()
289 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message, in sign() argument
293 toVector(keyId), toVector(message), legacySignature); in sign()
299 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message, in verify() argument
304 toVector(keyId), toVector(message), toVector(signature), in verify()
424 keyStatus.keyId = toHidlVec(legacyKeyStatus.mKeyId); in sendKeysChange()
DDrmPlugin.h110 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& input,
114 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& input,
118 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message,
122 const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message,
DCryptoPlugin.cpp64 const hidl_array<uint8_t, 16>& keyId, in decrypt() argument
182 ssize_t result = mLegacyPlugin->decrypt(secure, keyId.data(), iv.data(), in decrypt()
/hardware/interfaces/drm/1.0/vts/functional/
Ddrm_hal_vendor_test.cpp73 ASSERT_TRUE(key.keyId.size() > 0) << kVendorStr in TEST_P()
75 ASSERT_TRUE(key.keyId.size() > 0) << kVendorStr in TEST_P()
780 hidl_vec<uint8_t> keyId, input, iv; in TEST_P() local
782 session, keyId, input, iv, in TEST_P()
792 hidl_vec<uint8_t> keyId, input, iv; in TEST_P() local
794 session, keyId, input, iv, in TEST_P()
804 hidl_vec<uint8_t> keyId, message; in TEST_P() local
806 session, keyId, message, in TEST_P()
816 hidl_vec<uint8_t> keyId, message, signature; in TEST_P() local
818 session, keyId, message, signature, [&](Status status, bool) { in TEST_P()
[all …]
Ddrm_hal_clearkey_test.cpp666 hidl_vec<uint8_t> keyId = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}; in TEST_P() local
669 auto res = drmPlugin->encrypt(session, keyId, input, iv, in TEST_P()
680 hidl_vec<uint8_t> keyId = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}; in TEST_P() local
683 auto res = drmPlugin->decrypt(session, keyId, input, iv, in TEST_P()
695 hidl_vec<uint8_t> keyId = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}; in TEST_P() local
697 auto res = drmPlugin->sign(session, keyId, message, in TEST_P()
709 hidl_vec<uint8_t> keyId = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}; in TEST_P() local
714 session, keyId, message, signature, [&](Status status, bool) { in TEST_P()
840 const vector<uint8_t> keyId = {0x60, 0x06, 0x1e, 0x01, 0x7e, 0x47, in decrypt() local
872 auto res = cryptoPlugin->decrypt(kNotSecure, toHidlArray(keyId), localIv, mode, in decrypt()
Ddrm_hal_vendor_module_api.h199 const std::vector<uint8_t> keyId; member
/hardware/interfaces/drm/1.2/
DICryptoPlugin.hal43 * @param the keyId for the key that is used to do the the decryption. The
44 * keyId refers to a key in the associated MediaDrm instance.
80 decrypt_1_2(bool secure, uint8_t[16] keyId, uint8_t[16] iv, Mode mode,
/hardware/interfaces/staging/security/see/hwcrypto/aidl/android/hardware/security/see/hwcrypto/
DIHwCryptoKey.aidl46 DeviceKeyId keyId;
/hardware/interfaces/drm/1.2/vts/functional/
Ddrm_hal_clearkey_module.cpp62 .keyId = { // keyId in getContentConfigurations()
/hardware/interfaces/drm/1.0/
DICryptoPlugin.hal83 * @param the keyId for the key that should be used to do the
84 * the decryption. The keyId refers to a key in the associated
110 decrypt(bool secure, uint8_t[16] keyId, uint8_t[16] iv, Mode mode,
/hardware/interfaces/drm/1.0/vts/functional/include/
Ddrm_hal_vendor_module_api.h199 const std::vector<uint8_t> keyId; member

12