/external/chromium_org/content/renderer/media/android/ |
proxy_media_keys.cc | 29 const uint8* init_data, 34 std::vector<uint8>(init_data, init_data + init_data_length)); 39 const uint8* init_data, int init_data_length, 43 std::vector<uint8>(init_data, init_data + init_data_length),
|
proxy_media_keys.h | 27 const uint8* init_data, 30 const uint8* init_data, int init_data_length,
|
webmediaplayer_proxy_android.cc | 241 const std::vector<uint8>& init_data) { 243 routing_id(), media_keys_id, type, init_data)); 248 const std::vector<uint8>& init_data, 251 routing_id(), media_keys_id, key, init_data, session_id));
|
webmediaplayer_proxy_android.h | 89 const std::vector<uint8>& init_data); 92 const std::vector<uint8>& init_data,
|
/external/chromium_org/ppapi/proxy/ |
ppp_content_decryptor_private_proxy.h | 36 SerializedVarReceiveInput init_data); 40 SerializedVarReceiveInput init_data);
|
ppp_content_decryptor_private_proxy.cc | 115 PP_Var init_data) { 128 SerializedVarSendInput(dispatcher, init_data))); 134 PP_Var init_data) { 147 SerializedVarSendInput(dispatcher, init_data))); 421 SerializedVarReceiveInput init_data) { 427 ExtractReceivedVarAndAddRef(dispatcher(), &init_data)); 435 SerializedVarReceiveInput init_data) { 441 ExtractReceivedVarAndAddRef(dispatcher(), &init_data));
|
/external/chromium_org/content/renderer/media/crypto/ |
proxy_decryptor.cc | 90 const uint8* init_data, 92 if (!media_keys_->GenerateKeyRequest(type, init_data, init_data_length)) { 105 const uint8* init_data, 111 media_keys_->AddKey(key, key_length, init_data, init_data_length, session_id);
|
ppapi_decryptor.h | 44 const uint8* init_data, 47 const uint8* init_data, int init_data_length,
|
proxy_decryptor.h | 62 const uint8* init_data, 65 const uint8* init_data, int init_data_length,
|
ppapi_decryptor.cc | 80 const uint8* init_data, 87 type, init_data, init_data_length)) { 97 const uint8* init_data, 104 session_id, key, key_length, init_data, init_data_length)) {
|
/external/chromium_org/media/base/ |
media_keys.h | 43 // Generates a key request with the |type| and |init_data| provided. 48 const uint8* init_data, 56 const uint8* init_data, int init_data_length, 85 scoped_ptr<uint8[]> init_data,
|
/external/chromium_org/media/cdm/ |
aes_decryptor.cc | 151 const uint8* init_data, 156 // just fire the event with the |init_data| as the request. 158 if (init_data && init_data_length) 159 message.assign(init_data, init_data + init_data_length); 167 const uint8* init_data, 181 // TODO(xhwang): Fix the decryptor to accept no |init_data|. See 184 if (!init_data) { 185 init_data = kDummyInitData; 189 // TODO(xhwang): For now, use |init_data| for key ID. Make this more spe [all...] |
aes_decryptor.h | 37 const uint8* init_data, 40 const uint8* init_data, int init_data_length,
|
/external/chromium_org/content/renderer/media/ |
webcontentdecryptionmodulesession_impl.cc | 35 const uint8* init_data, size_t init_data_length) { 45 init_data, init_data_length); local
|
webcontentdecryptionmodulesession_impl.h | 37 const uint8* init_data,
|
webmediaplayer_impl.h | 163 const unsigned char* init_data, 169 const unsigned char* init_data, 200 scoped_ptr<uint8[]> init_data, 243 const unsigned char* init_data, 248 const unsigned char* init_data,
|
/external/chromium_org/media/base/android/ |
media_drm_bridge.h | 37 const uint8* init_data, 40 const uint8* init_data, int init_data_length,
|
media_drm_bridge.cc | 162 const uint8* init_data, 165 if (!GetPsshData(init_data, init_data_length, uuid_, &pssh_data)) 177 const uint8* init_data, int init_data_length,
|
/external/chromium_org/ppapi/api/private/ |
ppp_content_decryptor_private.idl | 25 * to use. type contains the MIME type of init_data. init_data is a data 37 * <code>PP_VARTYPE_STRING</code> containing the MIME type for init_data. 39 * @param[in] init_data A <code>PP_Var</code> of type 47 [in] PP_Var init_data); 67 * @param[in] init_data A <code>PP_Var</code> of type 75 [in] PP_Var init_data);
|
/external/chromium_org/ppapi/c/private/ |
ppp_content_decryptor_private.h | 48 * to use. type contains the MIME type of init_data. init_data is a data 60 * <code>PP_VARTYPE_STRING</code> containing the MIME type for init_data. 62 * @param[in] init_data A <code>PP_Var</code> of type 69 struct PP_Var init_data); 88 * @param[in] init_data A <code>PP_Var</code> of type 95 struct PP_Var init_data);
|
/external/chromium_org/ppapi/cpp/private/ |
content_decryptor_private.h | 36 pp::VarArrayBuffer init_data) = 0; 39 pp::VarArrayBuffer init_data) = 0; 63 pp::VarArrayBuffer init_data);
|
content_decryptor_private.cc | 75 pp::VarArrayBuffer init_data(init_data_var); 81 init_data); 219 pp::VarArrayBuffer init_data) { 229 init_data.pp_var());
|
/external/chromium_org/ppapi/thunk/ |
ppb_content_decryptor_private_thunk.cc | 24 struct PP_Var init_data) { 29 enter.functions()->NeedKey(instance, key_system, session_id, init_data);
|
/external/chromium_org/content/renderer/pepper/ |
content_decryptor_delegate.h | 50 const uint8* init_data, 55 const uint8* init_data, 82 void NeedKey(PP_Var key_system, PP_Var session_id, PP_Var init_data);
|
/external/chromium_org/media/filters/ |
pipeline_integration_test.cc | 85 scoped_ptr<uint8[]> init_data, int init_data_length, 122 scoped_ptr<uint8[]> init_data, int init_data_length) { 123 app_->NeedKey(session_id, type, init_data.Pass(), init_data_length, 150 scoped_ptr<uint8[]> init_data, int init_data_length, 161 // Clear Key really needs the key ID in |init_data|. For WebM, they are the 164 const uint8* key_id = init_data.get(); 196 scoped_ptr<uint8[]> init_data, int init_data_length, 297 scoped_ptr<uint8[]> init_data, int init_data_size) { 298 DCHECK(init_data.get()); 301 need_key_cb_.Run(std::string(), type, init_data.Pass(), init_data_size) [all...] |