HomeSort by relevance Sort by last modified time
    Searched defs:key_id (Results 1 - 25 of 29) sorted by null

1 2

  /external/chromium_org/media/base/
decrypt_config.h 37 // |key_id| is the ID that references the decryption key for this sample.
44 DecryptConfig(const std::string& key_id,
49 const std::string& key_id() const { return key_id_; } function in class:media::DecryptConfig
  /external/chromium_org/net/cert/
ct_log_verifier.h 45 const std::string& key_id() const { return key_id_; } function in class:net::CTLogVerifier
  /hardware/intel/img/psb_headers/DRM/cc54/inc/
wv_mod_oem_crypto.h 37 const uint8_t *key_id; member in struct:drm_wv_mod_key_object
48 const uint8_t *key_id; member in struct:drm_wv_mod_key_refresh_object
  /system/security/keystore-engine/
dsa_meth.cpp 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); local
54 if (key_id == NULL) {
55 ALOGE("key had no key_id!");
72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
ecdsa_meth.cpp 58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, local
60 if (key_id == NULL) {
61 ALOGE("key had no key_id!");
78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free,
rsa_meth.cpp 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
77 if (key_id == NULL) {
78 ALOGE("key had no key_id!");
93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(),
120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
121 if (key_id == NULL) {
122 ALOGE("key had no key_id!");
139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from,
212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
    [all...]
  /external/chromium_org/chromeos/network/
client_cert_util.cc 274 std::string key_id = GetStringFromDictionary( local
278 return !cert_id.empty() && !key_id.empty() && !identity.empty();
  /external/chromium_org/media/base/android/
demuxer_stream_player_params.h 46 std::vector<char> key_id; member in struct:media::AccessUnit
  /external/tcpdump/
ntp.h 90 u_int32_t key_id; member in struct:ntpdata
print-rsvp.c 305 u_int8_t key_id[6]; member in struct:rsvp_obj_integrity_t
    [all...]
  /external/chromium_org/media/cdm/
aes_decryptor.cc 367 const std::string& key_id = encrypted->decrypt_config()->key_id(); local
368 DecryptionKey* key = GetKey(key_id);
426 const std::string& key_id,
435 KeyIdToSessionKeysMap::iterator key_id_entry = key_map_.find(key_id);
441 // |key_id| not found, so need to create new entry.
445 key_map_.add(key_id, inner_map.Pass());
450 const std::string& key_id) const {
452 KeyIdToSessionKeysMap::const_iterator key_id_found = key_map_.find(key_id);
470 // Need to get rid of the entry for this key_id. This will mess up th
    [all...]
aes_decryptor_unittest.cc 181 const std::vector<uint8>& key_id,
189 reinterpret_cast<const char*>(key_id.empty() ? NULL : &key_id[0]),
190 key_id.size());
261 // Creates a new session using |key_id|. Returns the session ID.
262 std::string CreateSession(const std::vector<uint8>& key_id) {
263 DCHECK(!key_id.empty());
265 OnSessionMessage(IsNotEmpty(), key_id, GURL::EmptyGURL()));
267 &key_id[0], local
268 key_id.size()
    [all...]
  /bionic/libc/dns/nameser/
ns_print.c 467 u_int keyflags, protocol, algorithm, key_id; local
476 key_id = dst_s_dns_key_id(rdata, edata-rdata);
478 key_id = 0;
505 n = SPRINTF((tmp, " ; key_tag= %u", key_id));
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 488 * key_id - Key ID for OpenSSL engine
493 char *key_id; member in struct:eap_peer_config
  /external/chromium_org/media/filters/
pipeline_integration_test.cc 259 const uint8* key_id = init_data.empty() ? NULL : &init_data[0]; variable
262 key_id = kKeyId;
268 kSecretKey, arraysize(kSecretKey), key_id, key_id_length);
301 std::vector<uint8> key_id; variable
303 EXPECT_TRUE(GetKeyAndKeyId(init_data, &key, &key_id));
308 vector_as_array(&key_id),
309 key_id.size());
319 std::vector<uint8>* key_id) {
320 // For WebM, init_data is key_id; for ISO CENC, init_data should contain
321 // the key_id. We assume key_id is in the end of init_data here (that i
    [all...]
  /external/chromium_org/ppapi/c/private/
pp_content_decryptor.h 114 uint8_t key_id[64]; member in struct:PP_EncryptedBlockInfo
  /external/wpa_supplicant_8/src/crypto/
tls.h 122 * @key_id: the private key's id when using engine (this is OpenSSL
161 const char *key_id; member in struct:tls_connection_params
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 179 uint16 key_id; member in struct:__anon39258
  /external/chromium_org/media/formats/mp4/
box_definitions.h 383 std::vector<uint8> key_id; member in struct:media::mp4::CencSampleEncryptionInfoEntry
  /external/ipsec-tools/src/racoon/
oakley.c 1819 const char *key_id; local
    [all...]
  /hardware/intel/common/omx-components/videocodec/libvpx_internal/libwebm/
mkvparser.hpp 224 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
  /external/chromium_org/third_party/libvpx/source/libvpx/third_party/libwebm/
mkvparser.hpp 216 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
  /external/libvpx/libvpx/third_party/libwebm/
mkvparser.hpp 241 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
  /external/libvpx/libwebm/
mkvparser.hpp 216 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
  /external/wpa_supplicant_8/src/common/
wpa_common.h 188 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member in struct:wpa_eapol_key

Completed in 2471 milliseconds

1 2