HomeSort by relevance Sort by last modified time
    Searched defs:keyId (Results 1 - 13 of 13) sorted by null

  /frameworks/av/drm/mediadrm/plugins/clearkey/default/
Session.cpp 54 const KeyMap::key_type& keyId = keys.keyAt(i);
56 mKeyMap.add(keyId, key);
65 const KeyId keyId, const Iv iv, const void* source,
71 keyIdVector.appendArray(keyId, kBlockSize);
  /device/google/contexthub/util/nanoapp_encr/
nanoapp_encr.c 56 static int handleEncrypt(uint8_t **pbuf, uint32_t bufUsed, FILE *out, uint64_t keyId, uint32_t *key)
68 encr.keyID = keyId;
75 // if (encr.keyID <= 0xFFFF)
76 // encr.keyID = AES_KEY_ID(encr.keyID);
78 fprintf(stderr, "Using Key ID: %016" PRIX64 "\n", encr.keyID);
192 if (!encr->keyID) {
196 fprintf(stderr, "Using Key ID: %016" PRIX64 "\n", encr->keyID);
255 uint64_t keyId = 0
    [all...]
  /frameworks/av/media/ndk/include/media/
NdkMediaDrm.h 154 AMediaDrmKeyId keyId;
488 * to use is identified by the 16 byte keyId. The key must have been loaded into
492 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
499 * to use is identified by the 16 byte keyId. The key must have been loaded into
503 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
512 * by the 16 byte keyId. The key must have been loaded into the session using
516 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
523 * use is identified by the 16 byte keyId. The key must have been loaded into the
527 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /device/google/contexthub/util/nanoapp_postprocess/
postprocess.c 573 static int handleKey(uint8_t **pbuf, uint32_t bufUsed, FILE *out, uint32_t layoutFlags, uint64_t appId, uint64_t keyId)
576 struct KeyInfo ki = { .data = keyId };
639 uint64_t keyId = 0;
668 u64Arg = &keyId;
719 if (layoutId == LAYOUT_KEY && !keyId)
721 if (layoutId == LAYOUT_OS && (keyId || appId))
742 ret = handleKey(&buf, bufUsed, out, layoutFlags, appId, keyId);
postprocess_elf.c     [all...]
  /frameworks/av/drm/libmediadrm/
IDrm.cpp 607 Vector<uint8_t> const &keyId,
615 writeVector(data, keyId);
629 Vector<uint8_t> const &keyId,
637 writeVector(data, keyId);
651 Vector<uint8_t> const &keyId,
658 writeVector(data, keyId);
671 Vector<uint8_t> const &keyId,
679 writeVector(data, keyId);
    [all...]
  /frameworks/av/media/libstagefright/mpeg2ts/
ESQueue.cpp 703 int32_t keyId, bool isSync,
731 scrambledInfo.mKeyId = keyId;
751 int32_t keyId = pesScramblingControl, isSync = 0, scrambledLength = 0;
764 // TODO: handle key id change, use first non-zero keyId for now
765 if (keyId == 0) {
766 keyId = it->mKeyId;
856 scrambledAccessUnit->meta()->setInt32("cryptoKey", keyId);
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
BlockCipherTestBase.java     [all...]
  /device/google/contexthub/firmware/os/core/
nanohubCommand.c 207 static AppSecErr osSecretKeyLookup(uint64_t keyId, void *keyBuf)
218 if (sz == sizeof(struct SeosEedataEncrKeyData) && kd.keyID == keyId) {
228 static AppSecErr osSecretKeyDelete(uint64_t keyId)
242 if (sz == sizeof(kd) && kd.keyID == keyId) {
251 static AppSecErr osSecretKeyAdd(uint64_t keyId, void *keyBuf)
256 if (osSecretKeyLookup(keyId, NULL) != APP_SEC_KEY_NOT_FOUND)
260 kd.keyID = keyId;
    [all...]
  /external/python/apitools/samples/iam_sample/iam_v1/
iam_v1_messages.py     [all...]
  /frameworks/av/media/extractors/mkv/
MatroskaExtractor.cpp 663 const uint8_t *keyId;
667 (void**)&keyId, &keyIdSize);
668 AMediaFormat_setBuffer(meta, AMEDIAFORMAT_KEY_CRYPTO_KEY, keyId, keyIdSize);
    [all...]
  /developers/build/prebuilts/androidtv/sample-inputs/app/libs/
exoplayer_dev-hls_20150123.jar 
  /external/kotlinc/lib/
kotlin-main-kts.jar 

Completed in 950 milliseconds