/external/chromium_org/media/base/ |
decrypt_config.cc | 11 DecryptConfig::DecryptConfig(const std::string& key_id, 14 : key_id_(key_id), 17 CHECK_GT(key_id.size(), 0u);
|
decrypt_config.h | 37 // |key_id| is the ID that references the decryption key for this sample. 44 DecryptConfig(const std::string& key_id, 49 const std::string& key_id() const { return key_id_; } function in class:media::DecryptConfig
|
/external/chromium_org/media/formats/webm/ |
webm_crypto_helpers.h | 27 const uint8* key_id, int key_id_size,
|
webm_crypto_helpers.cc | 28 const uint8* key_id, int key_id_size, 54 std::string(reinterpret_cast<const char*>(key_id), key_id_size),
|
webm_stream_parser.h | 66 void FireNeedKey(const std::string& key_id);
|
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_mod_oem_crypto.h | 37 const uint8_t *key_id; member in struct:drm_wv_mod_key_object 48 const uint8_t *key_id; member in struct:drm_wv_mod_key_refresh_object
|
/libcore/luni/src/test/native/ |
test_openssl_engine.cpp | 42 static EVP_PKEY *test_load_key(ENGINE* e, const char *key_id, 44 void* data = static_cast<void*>(const_cast<char*>(key_id)); 48 const size_t key_len = strlen(key_id); 49 if (key_len > HMAC_TAG_LEN && !strncmp(key_id, HMAC_TAG, HMAC_TAG_LEN)) { 50 key = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, e, reinterpret_cast<const unsigned char*>(key_id), 53 BIO* in = BIO_new_mem_buf(data, strlen(key_id)); 72 static EVP_PKEY* test_load_privkey(ENGINE* e, const char* key_id, UI_METHOD*, void*) { 73 return test_load_key(e, key_id, PEM_read_bio_PrivateKey); 76 static EVP_PKEY* test_load_pubkey(ENGINE* e, const char* key_id, UI_METHOD*, void*) { 77 return test_load_key(e, key_id, PEM_read_bio_PUBKEY) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
openCryptoki.conf | 34 key_id="4"
|
/external/chromium_org/chromecast/media/cma/ipc_streamer/ |
decrypt_config_marshaller.cc | 23 CHECK_GT(config.key_id().size(), 0); 27 CHECK(msg->WritePod(config.key_id().size())); 28 CHECK(msg->WriteBuffer(config.key_id().data(), config.key_id().size())); 45 scoped_ptr<char[]> key_id(new char[key_id_size]); 46 CHECK(msg->ReadBuffer(key_id.get(), key_id_size)); 69 std::string(key_id.get(), key_id_size),
|
/external/chromium_org/media/cdm/ |
json_web_key.h | 51 // Vector of [key_id, key_value] pairs. Values are raw binary data, stored in 56 // Converts a single |key|, |key_id| pair to a JSON Web Key Set. 58 const uint8* key_id, int key_id_length); 67 // Create a license request message for the |key_id| and |session_type| 69 // so no need to take a list of |key_id|'s. |license| is updated to contain the 71 MEDIA_EXPORT void CreateLicenseRequest(const uint8* key_id,
|
aes_decryptor.h | 113 // Creates a DecryptionKey using |key_string| and associates it with |key_id|. 116 const std::string& key_id, 119 // Gets a DecryptionKey associated with |key_id|. The AesDecryptor still owns 120 // the key. Returns NULL if no key is associated with |key_id|. 121 DecryptionKey* GetKey(const std::string& key_id) const;
|
json_web_key.cc | 65 const uint8* key_id, int key_id_length) { 66 // Both |key| and |key_id| need to be base64 encoded strings in the JWK. 68 std::string key_id_base64 = EncodeBase64(key_id, key_id_length); 190 void CreateLicenseRequest(const uint8* key_id, 197 list->AppendString(EncodeBase64(key_id, key_id_length));
|
/system/security/keystore-engine/ |
dsa_meth.cpp | 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); local 54 if (key_id == NULL) { 55 ALOGE("key had no key_id!"); 72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, 124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
|
ecdsa_meth.cpp | 58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, local 60 if (key_id == NULL) { 61 ALOGE("key had no key_id!"); 78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, 124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free,
|
eng_keystore.cpp | 93 * Called to initialize RSA's ex_data for the key_id handle. This should 101 static EVP_PKEY* keystore_loadkey(ENGINE* e, const char* key_id, UI_METHOD* ui_method, 107 ALOGV("keystore_loadkey(%p, \"%s\", %p, %p)", e, key_id, ui_method, callback_data); 121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen); 142 dsa_pkey_setup(e, pkey.get(), key_id); 146 rsa_pkey_setup(e, pkey.get(), key_id); 150 ecdsa_pkey_setup(e, pkey.get(), key_id);
|
rsa_meth.cpp | 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local 77 if (key_id == NULL) { 78 ALOGE("key had no key_id!"); 93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(), 120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local 121 if (key_id == NULL) { 122 ALOGE("key had no key_id!"); 139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from, 212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { [all...] |
/external/openssl/crypto/engine/ |
eng_pkey.c | 96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, 122 pkey = e->load_privkey(e, key_id, ui_method, callback_data); 132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, 158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
|
eng_openssl.c | 122 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, 371 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, 376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id); 377 in = BIO_new_file(key_id, "r");
|
/external/chromium_org/chromecast/media/cma/base/ |
frame_generator_for_test.cc | 88 char key_id[] = { local 98 std::string(key_id, arraysize(key_id)),
|
/external/chromium_org/media/base/android/ |
demuxer_stream_player_params.h | 46 std::vector<char> key_id; member in struct:media::AccessUnit
|
/external/tcpdump/ |
ntp.h | 90 u_int32_t key_id; member in struct:ntpdata
|
print-ntp.c | 186 TCHECK(bp->key_id); 187 printf("\n\tKey id: %u", bp->key_id); 189 TCHECK(bp->key_id); 190 printf("\n\tKey id: %u", bp->key_id);
|
/external/chromium_org/chromeos/network/ |
client_cert_util.cc | 169 std::string key_id; local 171 &key_id); 173 if (cert_id != key_id) { 209 std::string key_id = local 216 key_id); 218 key_id); 346 std::string key_id = GetStringFromDictionary( local 350 return !cert_id.empty() && !key_id.empty() && !identity.empty();
|
/external/chromium_org/net/cert/ |
ct_log_verifier.cc | 25 if (sct.log_id != key_id()) {
|
ct_log_verifier.h | 45 const std::string& key_id() const { return key_id_; } function in class:net::CTLogVerifier
|