/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
D | wv_mod_drm_api.h | 66 uint8_t *signature, 72 const uint8_t *signature, 82 const uint8_t *signature, 102 const uint8_t *signature, 118 uint8_t *signature, 147 uint8_t *signature, 154 const uint8_t *signature, 161 const uint8_t *signature, 173 uint8_t *signature, 281 const uint8_t *const signature,
|
D | drm_common_api.h | 69 uint8_t signature[256]; member
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 610 const string& input, const string& signature, AuthorizationSet* out_params, in Finish() argument 616 ->finish(op_handle, in_params.hidl_data(), HidlBuf(input), HidlBuf(signature), in Finish() 641 ErrorCode Finish(const string& message, const string& signature, string* output) { in Finish() argument 644 ErrorCode error = Finish(op_handle_, AuthorizationSet() /* in_params */, message, signature, in Finish() 712 string signature = ProcessMessage(key_blob, KeyPurpose::SIGN, message, params, &out_params); in SignMessage() local 714 return signature; in SignMessage() 739 string signature = MacMessage(message, digest, expected_mac.size() * 8); in CheckHmacTestVector() local 740 EXPECT_EQ(expected_mac, signature) << "Test vector didn't match for digest " << (int)digest; in CheckHmacTestVector() 764 void VerifyMessage(const HidlBuf& key_blob, const string& message, const string& signature, in VerifyMessage() argument 775 EXPECT_EQ(ErrorCode::OK, Finish(op_handle_, finish_params, message, signature, in VerifyMessage() [all …]
|
/hardware/interfaces/drm/1.0/ |
D | IDrmPlugin.hal | 212 * material to be used by signRSA when computing an RSA signature on a 231 * message to a server which verifies the signature to confirm that the 436 * Compute a signature over the provided message using the mac algorithm 438 * the signature. 442 * @param message the message to compute a signature over 448 * @return signature the computed signature 451 generates (Status status, vec<uint8_t> signature); 461 * @param signature the signature to verify 467 * @return match true if the signature is verified positively, 471 vec<uint8_t> signature) generates (Status status, bool match); [all …]
|
/hardware/libhardware/include/hardware/ |
D | keymaster1.h | 121 const uint8_t* signature, const size_t signature_length); 524 const keymaster_blob_t* signature,
|
D | keymaster0.h | 126 const uint8_t* signature, const size_t signature_length);
|
D | keymaster2.h | 408 const keymaster_blob_t* input, const keymaster_blob_t* signature,
|
/hardware/intel/bootstub/ |
D | sfi.h | 32 char signature[4]; member
|
D | bootparam.h | 68 __u32 signature; member
|
D | LICENSE | 340 <signature of Ty Coon>, 1 April 1989
|
/hardware/interfaces/automotive/evs/1.0/default/ |
D | EvsDisplay.cpp | 306 uint32_t signature = pixels[0] & 0xFF; in returnTargetBufferForDisplay() local 307 if (prevSignature == signature) { in returnTargetBufferForDisplay()
|
/hardware/qcom/keymaster/ |
D | keymaster_qcom.h | 204 uint32_t signature; member
|
D | keymaster_qcom.cpp | 574 const uint8_t* signature, const size_t signatureLength) in qcom_km_verify_data() argument 581 if (signedData == NULL || signature == NULL) { in qcom_km_verify_data() 633 send_cmd->signature = signedDataLength; in qcom_km_verify_data() 636 signature, signatureLength); in qcom_km_verify_data()
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
D | eapol.h | 80 unsigned char signature[EAPOL_KEY_SIG_LEN]; /* Key Signature */
|
/hardware/interfaces/keymaster/3.0/default/ |
D | KeymasterDevice.h | 82 const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature,
|
D | KeymasterDevice.cpp | 689 const hidl_vec<uint8_t>& signature, finish_cb _hidl_cb) { in finish() argument 700 auto kmSignature = hidlVec2KmBlob(signature); in finish()
|
/hardware/interfaces/drm/1.0/default/ |
D | DrmPlugin.cpp | 300 const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) { in verify() argument 304 toVector(keyId), toVector(message), toVector(signature), in verify()
|
D | DrmPlugin.h | 123 const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) override;
|
/hardware/interfaces/keymaster/3.0/ |
D | IKeymasterDevice.hal | 326 * @param signature The signature to be verified if the purpose specified in the begin() call 336 vec<uint8_t> signature)
|
/hardware/interfaces/drm/1.0/vts/functional/ |
D | drm_hal_clearkey_test.cpp | 806 hidl_vec<uint8_t> signature = {0, 0, 0, 0, 0, 0, 0, 0, in TEST_F() local 809 session, keyId, message, signature, [&](Status status, bool) { in TEST_F()
|
D | drm_hal_vendor_test.cpp | 957 hidl_vec<uint8_t> keyId, message, signature; in TEST_P() local 959 session, keyId, message, signature, [&](Status status, bool) { in TEST_P()
|
/hardware/interfaces/radio/1.0/ |
D | IRadioIndication.hal | 459 * may be a crash signature if the restart was due to a crash or some
|
/hardware/qcom/media/msm8974/mm-video-v4l2/vidc/vdec/src/ |
D | omx_vdec_msm8974.cpp | 1482 OMX_U8 signature[4]; //='DKIF'; in log_input_buffers() member 1495 file_header.signature[0] = 'D'; in log_input_buffers() 1496 file_header.signature[1] = 'K'; in log_input_buffers() 1497 file_header.signature[2] = 'I'; in log_input_buffers() 1498 file_header.signature[3] = 'F'; in log_input_buffers()
|
/hardware/qcom/media/msm8996/mm-video-v4l2/vidc/vdec/src/ |
D | omx_vdec_v4l2.cpp | 1840 OMX_U8 signature[4]; //='DKIF'; in log_input_buffers() member 1853 file_header.signature[0] = 'D'; in log_input_buffers() 1854 file_header.signature[1] = 'K'; in log_input_buffers() 1855 file_header.signature[2] = 'I'; in log_input_buffers() 1856 file_header.signature[3] = 'F'; in log_input_buffers()
|
/hardware/qcom/media/msm8998/mm-video-v4l2/vidc/vdec/src/ |
D | omx_vdec_v4l2.cpp | 2062 OMX_U8 signature[4]; //='DKIF'; in log_input_buffers() member 2075 file_header.signature[0] = 'D'; in log_input_buffers() 2076 file_header.signature[1] = 'K'; in log_input_buffers() 2077 file_header.signature[2] = 'I'; in log_input_buffers() 2078 file_header.signature[3] = 'F'; in log_input_buffers()
|