/external/chromium_org/media/base/ |
decrypt_config.h | 37 // |key_id| is the ID that references the decryption key for this sample. 44 DecryptConfig(const std::string& key_id, 49 const std::string& key_id() const { return key_id_; } function in class:media::DecryptConfig
|
/external/chromium_org/net/cert/ |
ct_log_verifier.h | 45 const std::string& key_id() const { return key_id_; } function in class:net::CTLogVerifier
|
/external/chromium_org/chromecast/media/cma/base/ |
frame_generator_for_test.cc | 88 char key_id[] = { local 98 std::string(key_id, arraysize(key_id)),
|
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_mod_oem_crypto.h | 37 const uint8_t *key_id; member in struct:drm_wv_mod_key_object 48 const uint8_t *key_id; member in struct:drm_wv_mod_key_refresh_object
|
/system/security/keystore-engine/ |
dsa_meth.cpp | 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); local 54 if (key_id == NULL) { 55 ALOGE("key had no key_id!"); 72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, 124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
|
ecdsa_meth.cpp | 58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, local 60 if (key_id == NULL) { 61 ALOGE("key had no key_id!"); 78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, 124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free,
|
rsa_meth.cpp | 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local 77 if (key_id == NULL) { 78 ALOGE("key had no key_id!"); 93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(), 120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local 121 if (key_id == NULL) { 122 ALOGE("key had no key_id!"); 139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from, 212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { [all...] |
/external/chromium_org/media/base/android/ |
demuxer_stream_player_params.h | 46 std::vector<char> key_id; member in struct:media::AccessUnit
|
/external/chromium_org/chromeos/network/ |
client_cert_util.cc | 169 std::string key_id; local 171 &key_id); 173 if (cert_id != key_id) { 209 std::string key_id = local 216 key_id); 218 key_id); 346 std::string key_id = GetStringFromDictionary( local 350 return !cert_id.empty() && !key_id.empty() && !identity.empty();
|
/external/tcpdump/ |
ntp.h | 90 u_int32_t key_id; member in struct:ntpdata
|
/bionic/libc/dns/nameser/ |
ns_print.c | 467 u_int keyflags, protocol, algorithm, key_id; local 476 key_id = dst_s_dns_key_id(rdata, edata-rdata); 478 key_id = 0; 505 n = SPRINTF((tmp, " ; key_tag= %u", key_id));
|
/external/chromium_org/media/cdm/ |
aes_decryptor.cc | 418 const std::string& key_id = encrypted->decrypt_config()->key_id(); local 419 DecryptionKey* key = GetKey(key_id); 477 const std::string& key_id, 486 KeyIdToSessionKeysMap::iterator key_id_entry = key_map_.find(key_id); 492 // |key_id| not found, so need to create new entry. 496 key_map_.add(key_id, inner_map.Pass()); 501 const std::string& key_id) const { 503 KeyIdToSessionKeysMap::const_iterator key_id_found = key_map_.find(key_id); 521 // Need to get rid of the entry for this key_id. This will mess up th [all...] |
aes_decryptor_unittest.cc | 189 const std::vector<uint8>& key_id, 197 reinterpret_cast<const char*>(key_id.empty() ? NULL : &key_id[0]), 198 key_id.size()); 296 // Creates a new session using |key_id|. Returns the session ID. 297 std::string CreateSession(const std::vector<uint8>& key_id) { 298 DCHECK(!key_id.empty()); 303 &key_id[0], local 304 key_id.size(),
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 488 * key_id - Key ID for OpenSSL engine 493 char *key_id; member in struct:eap_peer_config
|
/external/chromium_org/content/renderer/pepper/ |
content_decryptor_delegate.cc | 123 if (!CopyStringToArray(decrypt_config->key_id(), block_info->key_id) || 127 block_info->key_id_size = decrypt_config->key_id().size(); 751 std::vector<uint8> key_id; local 753 key_id.assign(data, data + array_buffer->ByteLength()); 754 key_ids_vector.push_back(key_id); [all...] |
/external/chromium_org/media/filters/ |
pipeline_integration_test.cc | 268 const uint8* key_id = init_data.empty() ? NULL : &init_data[0]; variable 271 key_id = kKeyId; 277 kSecretKey, arraysize(kSecretKey), key_id, key_id_length); 310 std::vector<uint8> key_id; variable 312 EXPECT_TRUE(GetKeyAndKeyId(init_data, &key, &key_id)); 317 vector_as_array(&key_id), 318 key_id.size()); 328 std::vector<uint8>* key_id) { 329 // For WebM, init_data is key_id; for ISO CENC, init_data should contain 330 // the key_id. We assume key_id is in the end of init_data here (that i [all...] |
/external/chromium_org/ppapi/c/private/ |
pp_content_decryptor.h | 114 uint8_t key_id[64]; member in struct:PP_EncryptedBlockInfo
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 122 * @key_id: the private key's id when using engine (this is OpenSSL 161 const char *key_id; member in struct:tls_connection_params
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
eapol.h | 179 uint16 key_id; member in struct:__anon19247
|
/external/chromium_org/media/formats/mp4/ |
box_definitions.h | 383 std::vector<uint8> key_id; member in struct:media::mp4::CencSampleEncryptionInfoEntry
|
/external/chromium_org/ppapi/proxy/ |
ppb_instance_proxy.cc | 601 ArrayBufferVar* key_id = ArrayBufferVar::FromPPVar(key_ids_array->Get(i)); local 602 if (!key_id || key_id->ByteLength() < media::limits::kMinKeyIdLength || 603 key_id->ByteLength() > media::limits::kMaxKeyIdLength) { 608 const uint8_t* key_id_ptr = static_cast<const uint8_t*>(key_id->Map()); 609 const uint32_t key_id_size = key_id->ByteLength(); [all...] |
/external/ipsec-tools/src/racoon/ |
oakley.c | 1819 const char *key_id; local [all...] |
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libwebm/ |
mkvparser.hpp | 224 unsigned char* key_id;
member in struct:mkvparser::ContentEncoding::ContentEncryption
|
/external/chromium_org/third_party/libvpx/source/libvpx/third_party/libwebm/ |
mkvparser.hpp | 216 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
|
/external/libvpx/libvpx/third_party/libwebm/ |
mkvparser.hpp | 241 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
|