/frameworks/av/drm/mediadrm/plugins/clearkey/default/ |
Session.cpp | 54 const KeyMap::key_type& keyId = keys.keyAt(i); 56 mKeyMap.add(keyId, key); 65 const KeyId keyId, const Iv iv, const void* source, 71 keyIdVector.appendArray(keyId, kBlockSize);
|
/device/google/contexthub/util/nanoapp_encr/ |
nanoapp_encr.c | 56 static int handleEncrypt(uint8_t **pbuf, uint32_t bufUsed, FILE *out, uint64_t keyId, uint32_t *key) 68 encr.keyID = keyId; 75 // if (encr.keyID <= 0xFFFF) 76 // encr.keyID = AES_KEY_ID(encr.keyID); 78 fprintf(stderr, "Using Key ID: %016" PRIX64 "\n", encr.keyID); 192 if (!encr->keyID) { 196 fprintf(stderr, "Using Key ID: %016" PRIX64 "\n", encr->keyID); 255 uint64_t keyId = 0 [all...] |
/frameworks/av/media/ndk/include/media/ |
NdkMediaDrm.h | 154 AMediaDrmKeyId keyId; 488 * to use is identified by the 16 byte keyId. The key must have been loaded into 492 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 499 * to use is identified by the 16 byte keyId. The key must have been loaded into 503 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 512 * by the 16 byte keyId. The key must have been loaded into the session using 516 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 523 * use is identified by the 16 byte keyId. The key must have been loaded into the 527 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/device/google/contexthub/util/nanoapp_postprocess/ |
postprocess.c | 573 static int handleKey(uint8_t **pbuf, uint32_t bufUsed, FILE *out, uint32_t layoutFlags, uint64_t appId, uint64_t keyId) 576 struct KeyInfo ki = { .data = keyId }; 639 uint64_t keyId = 0; 668 u64Arg = &keyId; 719 if (layoutId == LAYOUT_KEY && !keyId) 721 if (layoutId == LAYOUT_OS && (keyId || appId)) 742 ret = handleKey(&buf, bufUsed, out, layoutFlags, appId, keyId);
|
postprocess_elf.c | [all...] |
/frameworks/av/drm/libmediadrm/ |
IDrm.cpp | 607 Vector<uint8_t> const &keyId, 615 writeVector(data, keyId); 629 Vector<uint8_t> const &keyId, 637 writeVector(data, keyId); 651 Vector<uint8_t> const &keyId, 658 writeVector(data, keyId); 671 Vector<uint8_t> const &keyId, 679 writeVector(data, keyId); [all...] |
/frameworks/av/media/libstagefright/mpeg2ts/ |
ESQueue.cpp | 703 int32_t keyId, bool isSync, 731 scrambledInfo.mKeyId = keyId; 751 int32_t keyId = pesScramblingControl, isSync = 0, scrambledLength = 0; 764 // TODO: handle key id change, use first non-zero keyId for now 765 if (keyId == 0) { 766 keyId = it->mKeyId; 856 scrambledAccessUnit->meta()->setInt32("cryptoKey", keyId); [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
BlockCipherTestBase.java | [all...] |
/device/google/contexthub/firmware/os/core/ |
nanohubCommand.c | 207 static AppSecErr osSecretKeyLookup(uint64_t keyId, void *keyBuf) 218 if (sz == sizeof(struct SeosEedataEncrKeyData) && kd.keyID == keyId) { 228 static AppSecErr osSecretKeyDelete(uint64_t keyId) 242 if (sz == sizeof(kd) && kd.keyID == keyId) { 251 static AppSecErr osSecretKeyAdd(uint64_t keyId, void *keyBuf) 256 if (osSecretKeyLookup(keyId, NULL) != APP_SEC_KEY_NOT_FOUND) 260 kd.keyID = keyId; [all...] |
/external/python/apitools/samples/iam_sample/iam_v1/ |
iam_v1_messages.py | [all...] |
/frameworks/av/media/extractors/mkv/ |
MatroskaExtractor.cpp | 663 const uint8_t *keyId; 667 (void**)&keyId, &keyIdSize); 668 AMediaFormat_setBuffer(meta, AMEDIAFORMAT_KEY_CRYPTO_KEY, keyId, keyIdSize); [all...] |
/developers/build/prebuilts/androidtv/sample-inputs/app/libs/ |
exoplayer_dev-hls_20150123.jar | |
/external/kotlinc/lib/ |
kotlin-main-kts.jar | |