/aosp12/frameworks/av/drm/mediacas/plugins/clearkey/ |
H A D | KeyFetcher.h | 33 struct KeyInfo { struct 50 uint64_t* asset_id, vector<KeyInfo>* keys) = 0; argument
|
H A D | ClearKeySessionLibrary.h | 53 struct KeyInfo { struct 60 KeyInfo mKeyInfo[kNumKeys]; argument
|
H A D | ClearKeyFetcher.cpp | 51 uint64_t* asset_id, std::vector<KeyInfo>* keys) { in ObtainKey() 117 KeyInfo key; in ObtainKey()
|
H A D | ClearKeyFetcher.h | 51 std::vector<KeyInfo>* keys) override;
|
H A D | ClearKeyCasPlugin.cpp | 374 std::vector<KeyFetcher::KeyInfo> keys; in updateECM()
|
/aosp12/system/keymaster/android_keymaster/ |
H A D | remote_provisioning_utils.cpp | 45 struct KeyInfo { struct 51 bool operator==(const KeyInfo& other) const { in operator ==() argument 62 inline constexpr KeyInfo kAuthorizedEekRoots[] = { 107 KeyInfo matcher = {static_cast<CoseKeyCurve>(*curve), in validateAndExtractEekPubAndId()
|
/aosp12/frameworks/base/keystore/java/android/security/keystore2/ |
H A D | AndroidKeyStoreSecretKeyFactorySpi.java | 25 import android.security.keystore.KeyInfo; 65 if (!KeyInfo.class.equals(keySpecClass)) { in engineGetKeySpec() 73 static @NonNull KeyInfo getKeyInfo(@NonNull AndroidKeyStoreKey key) { in getKeyInfo() 241 return new KeyInfo(key.getUserKeyDescriptor().alias, in getKeyInfo()
|
H A D | AndroidKeyStoreKeyFactorySpi.java | 21 import android.security.keystore.KeyInfo; 60 } else if (KeyInfo.class.equals(keySpecClass)) { in engineGetKeySpec()
|
/aosp12/frameworks/base/keystore/java/android/security/keystore/ |
H A D | KeyInfo.java | 66 public class KeyInfo implements KeySpec { class 93 public KeyInfo(String keystoreKeyAlias, in KeyInfo() method in KeyInfo
|
/aosp12/frameworks/av/drm/mediacas/plugins/clearkey/tests/ |
H A D | ClearKeyFetcherTest.cpp | 94 std::vector<KeyFetcher::KeyInfo> keys; in TEST_F()
|
/aosp12/frameworks/native/services/inputflinger/tests/ |
H A D | InputReader_test.cpp | 397 struct KeyInfo { struct in android::FakeEventHub 417 KeyedVector<int32_t, KeyInfo> keysByScanCode; 418 KeyedVector<int32_t, KeyInfo> keysByUsageCode; 570 KeyInfo info; in addKey() 723 const KeyInfo* key = getKey(device, scanCode, usageCode); in mapKey() 740 const KeyInfo* getKey(Device* device, int32_t scanCode, int32_t usageCode) const { in getKey()
|
/aosp12/packages/apps/RemoteProvisioner/tests/unittests/ |
H A D | tink-android-1.5.0.jar | com/google/crypto/tink/subtle/prf/StreamingPrf.class
StreamingPrf.java
package ... |
/aosp12/frameworks/base/boot/hiddenapi/ |
H A D | hiddenapi-max-target-o.txt | 51440 Landroid/security/keystore/KeyInfo;->mBlockModes:[Ljava/lang/String; 51441 Landroid/security/keystore/KeyInfo;->mDigests:[Ljava/lang/String; 51443 Landroid/security/keystore/KeyInfo;->mInsideSecureHardware:Z 51445 Landroid/security/keystore/KeyInfo;->mKeySize:I 51446 Landroid/security/keystore/KeyInfo;->mKeystoreAlias:Ljava/lang/String; 51449 Landroid/security/keystore/KeyInfo;->mKeyValidityStart:Ljava/util/Date; 51450 Landroid/security/keystore/KeyInfo;->mOrigin:I 51451 Landroid/security/keystore/KeyInfo;->mPurposes:I 51453 Landroid/security/keystore/KeyInfo;->mTrustedUserPresenceRequired:Z 51454 Landroid/security/keystore/KeyInfo;->mUserAuthenticationRequired:Z [all …]
|
/aosp12/frameworks/base/boot/ |
H A D | preloaded-classes | 6091 android.security.keystore.KeyInfo
|
H A D | boot-image-profile.txt | 29483 Landroid/security/keystore/KeyInfo;
|
/aosp12/frameworks/base/config/ |
H A D | preloaded-classes | 6089 android.security.keystore.KeyInfo
|
H A D | boot-image-profile.txt | 39120 Landroid/security/keystore/KeyInfo;
|
/aosp12/frameworks/base/tools/aapt2/integration-tests/CommandTests/ |
H A D | android-28.jar | META-INF/
META-INF/MANIFEST.MF
javax/
javax/net/
javax/ ... |
/aosp12/frameworks/base/core/api/ |
H A D | current.txt | 37584 public class KeyInfo implements java.security.spec.KeySpec {
|