HomeSort by relevance Sort by last modified time
    Searched refs:key_id (Results 1 - 25 of 90) sorted by null

1 2 3 4

  /external/chromium_org/third_party/libjingle/source/talk/
libjingle_examples.gyp 271 'key_id%': '<!(security find-identity -p codesigning -v | grep "iPhone Developer" | awk \'{print $2}\')',
273 'key_id%': '<(key_id)',
279 'ensure_single_key': '<!(python -c "assert len(\'\'\'<(key_id)\'\'\') > 0 and \'\\n\' not in \'\'\'<(key_id)\'\'\', \'key_id gyp variable needs to be set explicitly because there are multiple codesigning keys, or none!\'")',
282 '/usr/bin/codesign', '-v', '--force', '--sign', '<(key_id)',
  /external/chromium_org/media/base/
decrypt_config.cc 11 DecryptConfig::DecryptConfig(const std::string& key_id,
15 : key_id_(key_id),
19 CHECK_GT(key_id.size(), 0u);
decrypt_config.h 37 // |key_id| is the ID that references the decryption key for this sample.
49 DecryptConfig(const std::string& key_id,
55 const std::string& key_id() const { return key_id_; } function in class:media::DecryptConfig
  /external/chromium_org/media/webm/
webm_crypto_helpers.h 28 const uint8* key_id, int key_id_size);
webm_crypto_helpers.cc 29 const uint8* key_id, int key_id_size) {
53 std::string(reinterpret_cast<const char*>(key_id), key_id_size),
  /external/marisa-trie/lib/marisa/
cell.h 18 void set_key_id(UInt32 key_id) {
19 key_id_ = key_id;
31 UInt32 key_id() const { function in class:marisa::Cell
trie-c.cc 16 bool operator()(marisa::UInt32 key_id, std::size_t key_length) const {
17 return func_(first_arg_, key_id, key_length) != 0;
37 bool operator()(marisa::UInt32 key_id, const std::string &key) const {
38 return func_(first_arg_, key_id, key.c_str(), key.length()) != 0;
162 marisa_status marisa_restore(const marisa_trie *h, marisa_uint32 key_id,
169 *key_length = h->trie.restore(key_id, key_buf, key_buf_size);
174 const char *ptr, size_t length, marisa_uint32 *key_id) {
177 } else if (key_id == NULL) {
181 *key_id = h->trie.lookup(ptr);
183 *key_id = h->trie.lookup(ptr, length)
    [all...]
trie-search.cc 20 bool operator()(marisa::UInt32 key_id, const std::string &key) {
22 key_ids_.insert(num_results_, key_id);
42 std::string Trie::restore(UInt32 key_id) const {
44 MARISA_THROW_IF(key_id >= num_keys_, MARISA_PARAM_ERROR);
46 restore_(key_id, &key);
50 void Trie::restore(UInt32 key_id, std::string *key) const {
52 MARISA_THROW_IF(key_id >= num_keys_, MARISA_PARAM_ERROR);
54 restore_(key_id, key);
57 std::size_t Trie::restore(UInt32 key_id, char *key_buf,
60 MARISA_THROW_IF(key_id >= num_keys_, MARISA_PARAM_ERROR)
538 const UInt32 key_id = node_to_key_id(node); local
    [all...]
  /external/marisa-trie/v0_1_5/lib/marisa_alpha/
cell.h 18 void set_key_id(UInt32 key_id) {
19 key_id_ = key_id;
31 UInt32 key_id() const { function in class:marisa_alpha::Cell
trie-c.cc 16 bool operator()(marisa_alpha::UInt32 key_id, std::size_t key_length) const {
17 return func_(first_arg_, key_id, key_length) != 0;
37 bool operator()(marisa_alpha::UInt32 key_id, const std::string &key) const {
38 return func_(first_arg_, key_id, key.c_str(), key.length()) != 0;
183 marisa_alpha_uint32 key_id, char *key_buf, size_t key_buf_size,
190 *key_length = h->trie.restore(key_id, key_buf, key_buf_size);
197 const char *ptr, size_t length, marisa_alpha_uint32 *key_id) try {
200 } else if (key_id == NULL) {
204 *key_id = h->trie.lookup(ptr);
206 *key_id = h->trie.lookup(ptr, length)
    [all...]
  /libcore/luni/src/test/native/
test_openssl_engine.cpp 42 static EVP_PKEY *test_load_key(ENGINE* e, const char *key_id,
44 void* data = static_cast<void*>(const_cast<char*>(key_id));
48 const size_t key_len = strlen(key_id);
49 if (key_len > HMAC_TAG_LEN && !strncmp(key_id, HMAC_TAG, HMAC_TAG_LEN)) {
50 key = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, e, reinterpret_cast<const unsigned char*>(key_id),
53 BIO* in = BIO_new_mem_buf(data, strlen(key_id));
72 static EVP_PKEY* test_load_privkey(ENGINE* e, const char* key_id, UI_METHOD*, void*) {
73 return test_load_key(e, key_id, PEM_read_bio_PrivateKey);
76 static EVP_PKEY* test_load_pubkey(ENGINE* e, const char* key_id, UI_METHOD*, void*) {
77 return test_load_key(e, key_id, PEM_read_bio_PUBKEY)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/examples/
openCryptoki.conf 34 key_id="4"
  /external/chromium_org/media/cdm/
aes_decryptor_unittest.cc 31 // |encrypted_data| is encrypted from |plain_text| using |key|. |key_id| is
36 uint8 key_id[32]; member in struct:media::WebmEncryptedData
52 // key_id
69 // key_id
87 // key_id
103 // key_id
196 // decryptor. |data| is the payload of a WebM encrypted Block. |key_id| is
204 const uint8* key_id, int key_id_size) {
225 std::string(reinterpret_cast<const char*>(key_id), key_id_size),
237 const uint8* key_id, int key_id_size
    [all...]
  /system/security/keystore-engine/
dsa_meth.cpp 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); local
54 if (key_id == NULL) {
55 ALOGE("key had no key_id!");
72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
ecdsa_meth.cpp 58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, local
60 if (key_id == NULL) {
61 ALOGE("key had no key_id!");
78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free,
eng_keystore.cpp 93 * Called to initialize RSA's ex_data for the key_id handle. This should
101 static EVP_PKEY* keystore_loadkey(ENGINE* e, const char* key_id, UI_METHOD* ui_method,
107 ALOGV("keystore_loadkey(%p, \"%s\", %p, %p)", e, key_id, ui_method, callback_data);
121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen);
142 dsa_pkey_setup(e, pkey.get(), key_id);
146 rsa_pkey_setup(e, pkey.get(), key_id);
150 ecdsa_pkey_setup(e, pkey.get(), key_id);
rsa_meth.cpp 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
77 if (key_id == NULL) {
78 ALOGE("key had no key_id!");
93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(),
120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
121 if (key_id == NULL) {
122 ALOGE("key had no key_id!");
139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from,
212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
    [all...]
  /external/marisa-trie/tests/
c-test.c 61 marisa_uint32 key_id, size_t key_length) {
63 ASSERT(key_id == 1);
70 marisa_uint32 key_id, const char *key, size_t key_length) {
74 ASSERT(key_id == 0);
80 ASSERT(key_id == 3);
97 marisa_uint32 key_id; local
143 keys[i], MARISA_ZERO_TERMINATED, &key_id) == MARISA_OK);
144 ASSERT(key_id == key_ids[i]);
147 keys[i], strlen(keys[i]), &key_id) == MARISA_OK);
148 ASSERT(key_id == key_ids[i])
    [all...]
  /external/marisa-trie/v0_1_5/tests/
c-test.c 66 marisa_alpha_uint32 key_id, size_t key_length) {
68 ASSERT(key_id == 1);
75 marisa_alpha_uint32 key_id, const char *key, size_t key_length) {
79 ASSERT(key_id == 0);
85 ASSERT(key_id == 3);
102 marisa_alpha_uint32 key_id; local
151 keys[i], MARISA_ALPHA_ZERO_TERMINATED, &key_id) == MARISA_ALPHA_OK);
152 ASSERT(key_id == key_ids[i]);
155 keys[i], strlen(keys[i]), &key_id) == MARISA_ALPHA_OK);
156 ASSERT(key_id == key_ids[i])
    [all...]
  /external/marisa-trie/tools/
marisa-find.cc 58 const marisa::UInt32 key_id = trie.find_first(str, &length); local
59 if (key_id != trie.notfound()) {
60 std::cout << key_id << '\t'; local
69 const marisa::UInt32 key_id = trie.find_last(str, &length); local
70 if (key_id != trie.notfound()) {
71 std::cout << key_id << '\t'; local
marisa-lookup.cc 55 const marisa::UInt32 key_id = trie.lookup(str); local
56 if (key_id != trie.notfound()) {
57 std::cout << key_id << '\t' << str << '\n';
  /external/marisa-trie/v0_1_5/tools/
marisa_alpha-find.cc 58 const marisa_alpha::UInt32 key_id = trie.find_first(str, &length); local
59 if (key_id != trie.notfound()) {
60 std::cout << key_id << '\t'; local
69 const marisa_alpha::UInt32 key_id = trie.find_last(str, &length); local
70 if (key_id != trie.notfound()) {
71 std::cout << key_id << '\t'; local
marisa_alpha-lookup.cc 55 const marisa_alpha::UInt32 key_id = trie.lookup(str); local
56 if (key_id != trie.notfound()) {
57 std::cout << key_id << '\t' << str << '\n';
  /external/chromium_org/third_party/openssl/openssl/crypto/engine/
eng_pkey.c 96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id,
122 pkey = e->load_privkey(e, key_id, ui_method, callback_data);
132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
  /external/openssl/crypto/engine/
eng_pkey.c 96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id,
122 pkey = e->load_privkey(e, key_id, ui_method, callback_data);
132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);

Completed in 1024 milliseconds

1 2 3 4