/external/chromium_org/media/base/ |
decrypt_config.cc | 11 DecryptConfig::DecryptConfig(const std::string& key_id, 15 : key_id_(key_id), 19 CHECK_GT(key_id.size(), 0u);
|
decrypt_config.h | 37 // |key_id| is the ID that references the decryption key for this sample. 49 DecryptConfig(const std::string& key_id, 55 const std::string& key_id() const { return key_id_; } function in class:media::DecryptConfig
|
/external/chromium_org/media/webm/ |
webm_crypto_helpers.h | 28 const uint8* key_id, int key_id_size);
|
webm_crypto_helpers.cc | 29 const uint8* key_id, int key_id_size) { 53 std::string(reinterpret_cast<const char*>(key_id), key_id_size),
|
/external/marisa-trie/lib/marisa/ |
cell.h | 18 void set_key_id(UInt32 key_id) { 19 key_id_ = key_id; 31 UInt32 key_id() const { function in class:marisa::Cell
|
trie-c.cc | 16 bool operator()(marisa::UInt32 key_id, std::size_t key_length) const { 17 return func_(first_arg_, key_id, key_length) != 0; 37 bool operator()(marisa::UInt32 key_id, const std::string &key) const { 38 return func_(first_arg_, key_id, key.c_str(), key.length()) != 0; 162 marisa_status marisa_restore(const marisa_trie *h, marisa_uint32 key_id, 169 *key_length = h->trie.restore(key_id, key_buf, key_buf_size); 174 const char *ptr, size_t length, marisa_uint32 *key_id) { 177 } else if (key_id == NULL) { 181 *key_id = h->trie.lookup(ptr); 183 *key_id = h->trie.lookup(ptr, length) [all...] |
trie-search.cc | 20 bool operator()(marisa::UInt32 key_id, const std::string &key) { 22 key_ids_.insert(num_results_, key_id); 42 std::string Trie::restore(UInt32 key_id) const { 44 MARISA_THROW_IF(key_id >= num_keys_, MARISA_PARAM_ERROR); 46 restore_(key_id, &key); 50 void Trie::restore(UInt32 key_id, std::string *key) const { 52 MARISA_THROW_IF(key_id >= num_keys_, MARISA_PARAM_ERROR); 54 restore_(key_id, key); 57 std::size_t Trie::restore(UInt32 key_id, char *key_buf, 60 MARISA_THROW_IF(key_id >= num_keys_, MARISA_PARAM_ERROR) 538 const UInt32 key_id = node_to_key_id(node); local [all...] |
/external/marisa-trie/v0_1_5/lib/marisa_alpha/ |
cell.h | 18 void set_key_id(UInt32 key_id) { 19 key_id_ = key_id; 31 UInt32 key_id() const { function in class:marisa_alpha::Cell
|
trie-c.cc | 16 bool operator()(marisa_alpha::UInt32 key_id, std::size_t key_length) const { 17 return func_(first_arg_, key_id, key_length) != 0; 37 bool operator()(marisa_alpha::UInt32 key_id, const std::string &key) const { 38 return func_(first_arg_, key_id, key.c_str(), key.length()) != 0; 183 marisa_alpha_uint32 key_id, char *key_buf, size_t key_buf_size, 190 *key_length = h->trie.restore(key_id, key_buf, key_buf_size); 197 const char *ptr, size_t length, marisa_alpha_uint32 *key_id) try { 200 } else if (key_id == NULL) { 204 *key_id = h->trie.lookup(ptr); 206 *key_id = h->trie.lookup(ptr, length) [all...] |
/libcore/luni/src/test/native/ |
test_openssl_engine.cpp | 42 static EVP_PKEY *test_load_key(ENGINE* e, const char *key_id, 44 void* data = static_cast<void*>(const_cast<char*>(key_id)); 48 const size_t key_len = strlen(key_id); 49 if (key_len > HMAC_TAG_LEN && !strncmp(key_id, HMAC_TAG, HMAC_TAG_LEN)) { 50 key = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, e, reinterpret_cast<const unsigned char*>(key_id), 53 BIO* in = BIO_new_mem_buf(data, strlen(key_id)); 72 static EVP_PKEY* test_load_privkey(ENGINE* e, const char* key_id, UI_METHOD*, void*) { 73 return test_load_key(e, key_id, PEM_read_bio_PrivateKey); 76 static EVP_PKEY* test_load_pubkey(ENGINE* e, const char* key_id, UI_METHOD*, void*) { 77 return test_load_key(e, key_id, PEM_read_bio_PUBKEY) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
openCryptoki.conf | 34 key_id="4"
|
/external/chromium_org/media/cdm/ |
json_web_key.h | 30 // Vector of [key_id, key_value] pairs. Values are raw binary data, stored in 35 // Converts a single |key|, |key_id| pair to a JSON Web Key Set. 37 const uint8* key_id, int key_id_length);
|
/system/security/keystore-engine/ |
dsa_meth.cpp | 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); local 54 if (key_id == NULL) { 55 ALOGE("key had no key_id!"); 72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, 124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
|
ecdsa_meth.cpp | 58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, local 60 if (key_id == NULL) { 61 ALOGE("key had no key_id!"); 78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, 124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free,
|
eng_keystore.cpp | 93 * Called to initialize RSA's ex_data for the key_id handle. This should 101 static EVP_PKEY* keystore_loadkey(ENGINE* e, const char* key_id, UI_METHOD* ui_method, 107 ALOGV("keystore_loadkey(%p, \"%s\", %p, %p)", e, key_id, ui_method, callback_data); 121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen); 142 dsa_pkey_setup(e, pkey.get(), key_id); 146 rsa_pkey_setup(e, pkey.get(), key_id); 150 ecdsa_pkey_setup(e, pkey.get(), key_id);
|
rsa_meth.cpp | 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local 77 if (key_id == NULL) { 78 ALOGE("key had no key_id!"); 93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(), 120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local 121 if (key_id == NULL) { 122 ALOGE("key had no key_id!"); 139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from, 212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { [all...] |
/external/marisa-trie/tests/ |
c-test.c | 61 marisa_uint32 key_id, size_t key_length) { 63 ASSERT(key_id == 1); 70 marisa_uint32 key_id, const char *key, size_t key_length) { 74 ASSERT(key_id == 0); 80 ASSERT(key_id == 3); 97 marisa_uint32 key_id; local 143 keys[i], MARISA_ZERO_TERMINATED, &key_id) == MARISA_OK); 144 ASSERT(key_id == key_ids[i]); 147 keys[i], strlen(keys[i]), &key_id) == MARISA_OK); 148 ASSERT(key_id == key_ids[i]) [all...] |
/external/marisa-trie/v0_1_5/tests/ |
c-test.c | 66 marisa_alpha_uint32 key_id, size_t key_length) { 68 ASSERT(key_id == 1); 75 marisa_alpha_uint32 key_id, const char *key, size_t key_length) { 79 ASSERT(key_id == 0); 85 ASSERT(key_id == 3); 102 marisa_alpha_uint32 key_id; local 151 keys[i], MARISA_ALPHA_ZERO_TERMINATED, &key_id) == MARISA_ALPHA_OK); 152 ASSERT(key_id == key_ids[i]); 155 keys[i], strlen(keys[i]), &key_id) == MARISA_ALPHA_OK); 156 ASSERT(key_id == key_ids[i]) [all...] |
/external/marisa-trie/tools/ |
marisa-find.cc | 58 const marisa::UInt32 key_id = trie.find_first(str, &length); local 59 if (key_id != trie.notfound()) { 60 std::cout << key_id << '\t'; local 69 const marisa::UInt32 key_id = trie.find_last(str, &length); local 70 if (key_id != trie.notfound()) { 71 std::cout << key_id << '\t'; local
|
marisa-lookup.cc | 55 const marisa::UInt32 key_id = trie.lookup(str); local 56 if (key_id != trie.notfound()) { 57 std::cout << key_id << '\t' << str << '\n';
|
/external/marisa-trie/v0_1_5/tools/ |
marisa_alpha-find.cc | 58 const marisa_alpha::UInt32 key_id = trie.find_first(str, &length); local 59 if (key_id != trie.notfound()) { 60 std::cout << key_id << '\t'; local 69 const marisa_alpha::UInt32 key_id = trie.find_last(str, &length); local 70 if (key_id != trie.notfound()) { 71 std::cout << key_id << '\t'; local
|
marisa_alpha-lookup.cc | 55 const marisa_alpha::UInt32 key_id = trie.lookup(str); local 56 if (key_id != trie.notfound()) { 57 std::cout << key_id << '\t' << str << '\n';
|
/external/chromium_org/third_party/openssl/openssl/crypto/engine/ |
eng_pkey.c | 96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, 122 pkey = e->load_privkey(e, key_id, ui_method, callback_data); 132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, 158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
|
/external/openssl/crypto/engine/ |
eng_pkey.c | 96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, 122 pkey = e->load_privkey(e, key_id, ui_method, callback_data); 132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, 158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
|
/external/chromium_org/media/base/android/ |
demuxer_stream_player_params.h | 53 std::vector<char> key_id; member in struct:media::AccessUnit
|