HomeSort by relevance Sort by last modified time
    Searched full:keyid (Results 26 - 50 of 284) sorted by null

12 3 4 5 6 7 8 91011>>

  /prebuilts/go/darwin-x86/src/crypto/x509/
cert_pool.go 72 keyId := string(cert.SubjectKeyId)
73 s.bySubjectKeyId[keyId] = append(s.bySubjectKeyId[keyId], n)
  /prebuilts/go/linux-x86/src/crypto/x509/
cert_pool.go 72 keyId := string(cert.SubjectKeyId)
73 s.bySubjectKeyId[keyId] = append(s.bySubjectKeyId[keyId], n)
  /packages/inputmethods/LatinIME/native/jni/src/suggest/core/layout/
proximity_info_state.cpp 171 const int keyId = mProximityInfo->getKeyIndexOf(codePoint);
172 if (keyId != NOT_AN_INDEX) {
173 const int index = inputIndex * mProximityInfo->getKeyCount() + keyId;
184 const int inputIndex, const int keyId) const {
187 keyId);
277 bool ProximityInfoState::isKeyInSerchKeysAfterIndex(const int index, const int keyId) const {
278 ASSERT(keyId >= 0 && index >= 0 && index < mSampledInputSize);
279 return mSampledSearchKeySets[index].test(keyId);
  /cts/tests/tests/media/src/android/media/cts/
MediaDrmMockTest.java 548 byte[] keyId = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09};
555 byte[] output = cs.encrypt(keyId, input, iv);
557 assertTrue(Arrays.equals(keyId, md.getPropertyByteArray("mock-keyid")));
574 byte[] keyId = {0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49};
581 byte[] output = cs.decrypt(keyId, input, iv);
583 assertTrue(Arrays.equals(keyId, md.getPropertyByteArray("mock-keyid")));
600 byte[] keyId = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09};
606 byte[] signature = cs.sign(keyId, message)
    [all...]
  /external/libvncserver/webclients/novnc/include/
keyboard.js 290 // - determines a keyId identifying the key that was pressed (corresponding to the key/keyCode properties on the DOM event)
304 var keyId = kbdUtil.getKey(evt);
305 if (keyId) {
306 result.keyId = keyId;
449 if (!last || !evt.keyId || last.keyId !== evt.keyId) {
450 last = {keyId: evt.keyId, keysyms: {}}
    [all...]
  /external/wpa_supplicant_8/hs20/server/ca/
openssl.cnf 117 authorityKeyIdentifier=keyid:always,issuer
174 authorityKeyIdentifier=keyid:always
186 authorityKeyIdentifier=keyid,issuer
196 authorityKeyIdentifier=keyid,issuer
  /frameworks/av/drm/mediadrm/plugins/clearkey/
ClearKeyTypes.h 28 typedef uint8_t KeyId[kBlockSize];
JsonWebKey.h 50 bool findKey(const String8& jsonObject, String8* keyId,
  /frameworks/av/drm/mediadrm/plugins/mock/
MockDrmCryptoPlugin.h 110 Vector<uint8_t> const &keyId,
116 Vector<uint8_t> const &keyId,
122 Vector<uint8_t> const &keyId,
127 Vector<uint8_t> const &keyId,
  /frameworks/av/include/media/
Drm.h 100 Vector<uint8_t> const &keyId,
106 Vector<uint8_t> const &keyId,
112 Vector<uint8_t> const &keyId,
117 Vector<uint8_t> const &keyId,
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
Vertex.java 176 KeyIdentifier keyID = sKeyID.get(
178 sb.append("SubjKeyID: ").append(keyID.toString());
183 KeyIdentifier keyID = (KeyIdentifier)aKeyID.get(
185 sb.append("AuthKeyID: ").append(keyID.toString());
  /system/security/keystore/
operation.cpp 26 sp<IBinder> OperationMap::addOperation(keymaster_operation_handle_t handle, uint64_t keyid,
32 mMap[token] = Operation(handle, keyid, purpose, dev, characteristics, appToken);
57 *outKeyid = entry->second.keyid;
151 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_),
  /frameworks/av/media/ndk/
NdkMediaDrm.cpp 585 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
603 keyIdVec.appendArray(keyId, kKeyIdSize);
626 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
631 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv,
637 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
642 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv,
648 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
669 keyIdVec.appendArray(keyId, kKeyIdSize);
687 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
708 keyIdVec.appendArray(keyId, kKeyIdSize)
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/kms/
layer1.py 182 use the key identified by the `keyId` parameter.
209 'KeyId': key_id,
317 params = {'KeyId': key_id, }
331 params = {'KeyId': key_id, }
345 params = {'KeyId': key_id, }
360 params = {'KeyId': key_id, }
374 params = {'KeyId': key_id, }
406 params = {'KeyId': key_id, 'Plaintext': plaintext, }
450 params = {'KeyId': key_id, }
501 params = {'KeyId': key_id,
    [all...]
  /development/ndk/platforms/android-21/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /frameworks/av/drm/libmediadrm/
Drm.cpp 667 Vector<uint8_t> const &keyId,
683 return mPlugin->encrypt(sessionId, keyId, input, iv, output);
687 Vector<uint8_t> const &keyId,
703 return mPlugin->decrypt(sessionId, keyId, input, iv, output);
707 Vector<uint8_t> const &keyId,
722 return mPlugin->sign(sessionId, keyId, message, signature);
726 Vector<uint8_t> const &keyId,
742 return mPlugin->verify(sessionId, keyId, message, signature, match);
  /frameworks/av/include/ndk/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /frameworks/native/include/media/drm/
DrmAPI.h 294 // specified by setCipherAlgorithm and the key selected by keyId,
297 Vector<uint8_t> const &keyId,
303 // specified by setCipherAlgorithm and the key selected by keyId,
306 Vector<uint8_t> const &keyId,
312 // specified by setMacAlgorithm and the key selected by keyId,
315 Vector<uint8_t> const &keyId,
320 // specified by setMacAlgorithm and the key selected by keyId,
324 Vector<uint8_t> const &keyId,
  /prebuilts/ndk/current/platforms/android-21/arch-arm/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/current/platforms/android-21/arch-arm64/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/current/platforms/android-21/arch-mips/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/current/platforms/android-21/arch-mips64/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/current/platforms/android-21/arch-x86/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/current/platforms/android-21/arch-x86_64/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/current/platforms/android-23/arch-arm/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,

Completed in 828 milliseconds

12 3 4 5 6 7 8 91011>>