HomeSort by relevance Sort by last modified time
    Searched defs:key_id (Results 1 - 25 of 32) sorted by null

1 2

  /external/chromium_org/media/base/
decrypt_config.h 37 // |key_id| is the ID that references the decryption key for this sample.
44 DecryptConfig(const std::string& key_id,
49 const std::string& key_id() const { return key_id_; } function in class:media::DecryptConfig
  /external/chromium_org/net/cert/
ct_log_verifier.h 45 const std::string& key_id() const { return key_id_; } function in class:net::CTLogVerifier
  /external/chromium_org/chromecast/media/cma/base/
frame_generator_for_test.cc 88 char key_id[] = { local
98 std::string(key_id, arraysize(key_id)),
  /hardware/intel/img/psb_headers/DRM/cc54/inc/
wv_mod_oem_crypto.h 37 const uint8_t *key_id; member in struct:drm_wv_mod_key_object
48 const uint8_t *key_id; member in struct:drm_wv_mod_key_refresh_object
  /system/security/keystore-engine/
dsa_meth.cpp 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); local
54 if (key_id == NULL) {
55 ALOGE("key had no key_id!");
72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
ecdsa_meth.cpp 58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, local
60 if (key_id == NULL) {
61 ALOGE("key had no key_id!");
78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free,
rsa_meth.cpp 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
77 if (key_id == NULL) {
78 ALOGE("key had no key_id!");
93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(),
120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
121 if (key_id == NULL) {
122 ALOGE("key had no key_id!");
139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from,
212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
    [all...]
  /external/chromium_org/media/base/android/
demuxer_stream_player_params.h 46 std::vector<char> key_id; member in struct:media::AccessUnit
  /external/chromium_org/chromeos/network/
client_cert_util.cc 169 std::string key_id; local
171 &key_id);
173 if (cert_id != key_id) {
209 std::string key_id = local
216 key_id);
218 key_id);
346 std::string key_id = GetStringFromDictionary( local
350 return !cert_id.empty() && !key_id.empty() && !identity.empty();
  /external/tcpdump/
ntp.h 90 u_int32_t key_id; member in struct:ntpdata
  /bionic/libc/dns/nameser/
ns_print.c 467 u_int keyflags, protocol, algorithm, key_id; local
476 key_id = dst_s_dns_key_id(rdata, edata-rdata);
478 key_id = 0;
505 n = SPRINTF((tmp, " ; key_tag= %u", key_id));
  /external/chromium_org/media/cdm/
aes_decryptor.cc 418 const std::string& key_id = encrypted->decrypt_config()->key_id(); local
419 DecryptionKey* key = GetKey(key_id);
477 const std::string& key_id,
486 KeyIdToSessionKeysMap::iterator key_id_entry = key_map_.find(key_id);
492 // |key_id| not found, so need to create new entry.
496 key_map_.add(key_id, inner_map.Pass());
501 const std::string& key_id) const {
503 KeyIdToSessionKeysMap::const_iterator key_id_found = key_map_.find(key_id);
521 // Need to get rid of the entry for this key_id. This will mess up th
    [all...]
aes_decryptor_unittest.cc 189 const std::vector<uint8>& key_id,
197 reinterpret_cast<const char*>(key_id.empty() ? NULL : &key_id[0]),
198 key_id.size());
296 // Creates a new session using |key_id|. Returns the session ID.
297 std::string CreateSession(const std::vector<uint8>& key_id) {
298 DCHECK(!key_id.empty());
303 &key_id[0], local
304 key_id.size(),
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 488 * key_id - Key ID for OpenSSL engine
493 char *key_id; member in struct:eap_peer_config
  /external/chromium_org/content/renderer/pepper/
content_decryptor_delegate.cc 123 if (!CopyStringToArray(decrypt_config->key_id(), block_info->key_id) ||
127 block_info->key_id_size = decrypt_config->key_id().size();
751 std::vector<uint8> key_id; local
753 key_id.assign(data, data + array_buffer->ByteLength());
754 key_ids_vector.push_back(key_id);
    [all...]
  /external/chromium_org/media/filters/
pipeline_integration_test.cc 268 const uint8* key_id = init_data.empty() ? NULL : &init_data[0]; variable
271 key_id = kKeyId;
277 kSecretKey, arraysize(kSecretKey), key_id, key_id_length);
310 std::vector<uint8> key_id; variable
312 EXPECT_TRUE(GetKeyAndKeyId(init_data, &key, &key_id));
317 vector_as_array(&key_id),
318 key_id.size());
328 std::vector<uint8>* key_id) {
329 // For WebM, init_data is key_id; for ISO CENC, init_data should contain
330 // the key_id. We assume key_id is in the end of init_data here (that i
    [all...]
  /external/chromium_org/ppapi/c/private/
pp_content_decryptor.h 114 uint8_t key_id[64]; member in struct:PP_EncryptedBlockInfo
  /external/wpa_supplicant_8/src/crypto/
tls.h 122 * @key_id: the private key's id when using engine (this is OpenSSL
161 const char *key_id; member in struct:tls_connection_params
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 179 uint16 key_id; member in struct:__anon19247
  /external/chromium_org/media/formats/mp4/
box_definitions.h 383 std::vector<uint8> key_id; member in struct:media::mp4::CencSampleEncryptionInfoEntry
  /external/chromium_org/ppapi/proxy/
ppb_instance_proxy.cc 601 ArrayBufferVar* key_id = ArrayBufferVar::FromPPVar(key_ids_array->Get(i)); local
602 if (!key_id || key_id->ByteLength() < media::limits::kMinKeyIdLength ||
603 key_id->ByteLength() > media::limits::kMaxKeyIdLength) {
608 const uint8_t* key_id_ptr = static_cast<const uint8_t*>(key_id->Map());
609 const uint32_t key_id_size = key_id->ByteLength();
    [all...]
  /external/ipsec-tools/src/racoon/
oakley.c 1819 const char *key_id; local
    [all...]
  /hardware/intel/common/omx-components/videocodec/libvpx_internal/libwebm/
mkvparser.hpp 224 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
  /external/chromium_org/third_party/libvpx/source/libvpx/third_party/libwebm/
mkvparser.hpp 216 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
  /external/libvpx/libvpx/third_party/libwebm/
mkvparser.hpp 241 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption

Completed in 603 milliseconds

1 2