HomeSort by relevance Sort by last modified time
    Searched refs:key_id (Results 1 - 25 of 85) sorted by null

1 2 3 4

  /external/chromium_org/media/base/
decrypt_config.cc 11 DecryptConfig::DecryptConfig(const std::string& key_id,
14 : key_id_(key_id),
17 CHECK_GT(key_id.size(), 0u);
decrypt_config.h 37 // |key_id| is the ID that references the decryption key for this sample.
44 DecryptConfig(const std::string& key_id,
49 const std::string& key_id() const { return key_id_; } function in class:media::DecryptConfig
  /external/chromium_org/media/formats/webm/
webm_crypto_helpers.h 27 const uint8* key_id, int key_id_size,
webm_crypto_helpers.cc 28 const uint8* key_id, int key_id_size,
54 std::string(reinterpret_cast<const char*>(key_id), key_id_size),
webm_stream_parser.h 66 void FireNeedKey(const std::string& key_id);
  /hardware/intel/img/psb_headers/DRM/cc54/inc/
wv_mod_oem_crypto.h 37 const uint8_t *key_id; member in struct:drm_wv_mod_key_object
48 const uint8_t *key_id; member in struct:drm_wv_mod_key_refresh_object
  /libcore/luni/src/test/native/
test_openssl_engine.cpp 42 static EVP_PKEY *test_load_key(ENGINE* e, const char *key_id,
44 void* data = static_cast<void*>(const_cast<char*>(key_id));
48 const size_t key_len = strlen(key_id);
49 if (key_len > HMAC_TAG_LEN && !strncmp(key_id, HMAC_TAG, HMAC_TAG_LEN)) {
50 key = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, e, reinterpret_cast<const unsigned char*>(key_id),
53 BIO* in = BIO_new_mem_buf(data, strlen(key_id));
72 static EVP_PKEY* test_load_privkey(ENGINE* e, const char* key_id, UI_METHOD*, void*) {
73 return test_load_key(e, key_id, PEM_read_bio_PrivateKey);
76 static EVP_PKEY* test_load_pubkey(ENGINE* e, const char* key_id, UI_METHOD*, void*) {
77 return test_load_key(e, key_id, PEM_read_bio_PUBKEY)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/examples/
openCryptoki.conf 34 key_id="4"
  /external/chromium_org/chromecast/media/cma/ipc_streamer/
decrypt_config_marshaller.cc 23 CHECK_GT(config.key_id().size(), 0);
27 CHECK(msg->WritePod(config.key_id().size()));
28 CHECK(msg->WriteBuffer(config.key_id().data(), config.key_id().size()));
45 scoped_ptr<char[]> key_id(new char[key_id_size]);
46 CHECK(msg->ReadBuffer(key_id.get(), key_id_size));
69 std::string(key_id.get(), key_id_size),
  /external/chromium_org/media/cdm/
json_web_key.h 51 // Vector of [key_id, key_value] pairs. Values are raw binary data, stored in
56 // Converts a single |key|, |key_id| pair to a JSON Web Key Set.
58 const uint8* key_id, int key_id_length);
67 // Create a license request message for the |key_id| and |session_type|
69 // so no need to take a list of |key_id|'s. |license| is updated to contain the
71 MEDIA_EXPORT void CreateLicenseRequest(const uint8* key_id,
aes_decryptor.h 113 // Creates a DecryptionKey using |key_string| and associates it with |key_id|.
116 const std::string& key_id,
119 // Gets a DecryptionKey associated with |key_id|. The AesDecryptor still owns
120 // the key. Returns NULL if no key is associated with |key_id|.
121 DecryptionKey* GetKey(const std::string& key_id) const;
json_web_key.cc 65 const uint8* key_id, int key_id_length) {
66 // Both |key| and |key_id| need to be base64 encoded strings in the JWK.
68 std::string key_id_base64 = EncodeBase64(key_id, key_id_length);
190 void CreateLicenseRequest(const uint8* key_id,
197 list->AppendString(EncodeBase64(key_id, key_id_length));
  /system/security/keystore-engine/
dsa_meth.cpp 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); local
54 if (key_id == NULL) {
55 ALOGE("key had no key_id!");
72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
ecdsa_meth.cpp 58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, local
60 if (key_id == NULL) {
61 ALOGE("key had no key_id!");
78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free,
eng_keystore.cpp 93 * Called to initialize RSA's ex_data for the key_id handle. This should
101 static EVP_PKEY* keystore_loadkey(ENGINE* e, const char* key_id, UI_METHOD* ui_method,
107 ALOGV("keystore_loadkey(%p, \"%s\", %p, %p)", e, key_id, ui_method, callback_data);
121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen);
142 dsa_pkey_setup(e, pkey.get(), key_id);
146 rsa_pkey_setup(e, pkey.get(), key_id);
150 ecdsa_pkey_setup(e, pkey.get(), key_id);
rsa_meth.cpp 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
77 if (key_id == NULL) {
78 ALOGE("key had no key_id!");
93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(),
120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
121 if (key_id == NULL) {
122 ALOGE("key had no key_id!");
139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from,
212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
    [all...]
  /external/openssl/crypto/engine/
eng_pkey.c 96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id,
122 pkey = e->load_privkey(e, key_id, ui_method, callback_data);
132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
eng_openssl.c 122 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id,
371 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id,
376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id);
377 in = BIO_new_file(key_id, "r");
  /external/chromium_org/chromecast/media/cma/base/
frame_generator_for_test.cc 88 char key_id[] = { local
98 std::string(key_id, arraysize(key_id)),
  /external/chromium_org/media/base/android/
demuxer_stream_player_params.h 46 std::vector<char> key_id; member in struct:media::AccessUnit
  /external/tcpdump/
ntp.h 90 u_int32_t key_id; member in struct:ntpdata
print-ntp.c 186 TCHECK(bp->key_id);
187 printf("\n\tKey id: %u", bp->key_id);
189 TCHECK(bp->key_id);
190 printf("\n\tKey id: %u", bp->key_id);
  /external/chromium_org/chromeos/network/
client_cert_util.cc 169 std::string key_id; local
171 &key_id);
173 if (cert_id != key_id) {
209 std::string key_id = local
216 key_id);
218 key_id);
346 std::string key_id = GetStringFromDictionary( local
350 return !cert_id.empty() && !key_id.empty() && !identity.empty();
  /external/chromium_org/net/cert/
ct_log_verifier.cc 25 if (sct.log_id != key_id()) {
ct_log_verifier.h 45 const std::string& key_id() const { return key_id_; } function in class:net::CTLogVerifier

Completed in 249 milliseconds

1 2 3 4