/prebuilts/go/darwin-x86/src/crypto/x509/ |
cert_pool.go | 72 keyId := string(cert.SubjectKeyId) 73 s.bySubjectKeyId[keyId] = append(s.bySubjectKeyId[keyId], n)
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
cert_pool.go | 72 keyId := string(cert.SubjectKeyId) 73 s.bySubjectKeyId[keyId] = append(s.bySubjectKeyId[keyId], n)
|
/packages/inputmethods/LatinIME/native/jni/src/suggest/core/layout/ |
proximity_info_state.cpp | 171 const int keyId = mProximityInfo->getKeyIndexOf(codePoint); 172 if (keyId != NOT_AN_INDEX) { 173 const int index = inputIndex * mProximityInfo->getKeyCount() + keyId; 184 const int inputIndex, const int keyId) const { 187 keyId); 277 bool ProximityInfoState::isKeyInSerchKeysAfterIndex(const int index, const int keyId) const { 278 ASSERT(keyId >= 0 && index >= 0 && index < mSampledInputSize); 279 return mSampledSearchKeySets[index].test(keyId);
|
/cts/tests/tests/media/src/android/media/cts/ |
MediaDrmMockTest.java | 548 byte[] keyId = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09}; 555 byte[] output = cs.encrypt(keyId, input, iv); 557 assertTrue(Arrays.equals(keyId, md.getPropertyByteArray("mock-keyid"))); 574 byte[] keyId = {0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49}; 581 byte[] output = cs.decrypt(keyId, input, iv); 583 assertTrue(Arrays.equals(keyId, md.getPropertyByteArray("mock-keyid"))); 600 byte[] keyId = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09}; 606 byte[] signature = cs.sign(keyId, message) [all...] |
/external/libvncserver/webclients/novnc/include/ |
keyboard.js | 290 // - determines a keyId identifying the key that was pressed (corresponding to the key/keyCode properties on the DOM event) 304 var keyId = kbdUtil.getKey(evt); 305 if (keyId) { 306 result.keyId = keyId; 449 if (!last || !evt.keyId || last.keyId !== evt.keyId) { 450 last = {keyId: evt.keyId, keysyms: {}} [all...] |
/external/wpa_supplicant_8/hs20/server/ca/ |
openssl.cnf | 117 authorityKeyIdentifier=keyid:always,issuer 174 authorityKeyIdentifier=keyid:always 186 authorityKeyIdentifier=keyid,issuer 196 authorityKeyIdentifier=keyid,issuer
|
/frameworks/av/drm/mediadrm/plugins/clearkey/ |
ClearKeyTypes.h | 28 typedef uint8_t KeyId[kBlockSize];
|
JsonWebKey.h | 50 bool findKey(const String8& jsonObject, String8* keyId,
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
MockDrmCryptoPlugin.h | 110 Vector<uint8_t> const &keyId, 116 Vector<uint8_t> const &keyId, 122 Vector<uint8_t> const &keyId, 127 Vector<uint8_t> const &keyId,
|
/frameworks/av/include/media/ |
Drm.h | 100 Vector<uint8_t> const &keyId, 106 Vector<uint8_t> const &keyId, 112 Vector<uint8_t> const &keyId, 117 Vector<uint8_t> const &keyId,
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
Vertex.java | 176 KeyIdentifier keyID = sKeyID.get( 178 sb.append("SubjKeyID: ").append(keyID.toString()); 183 KeyIdentifier keyID = (KeyIdentifier)aKeyID.get( 185 sb.append("AuthKeyID: ").append(keyID.toString());
|
/system/security/keystore/ |
operation.cpp | 26 sp<IBinder> OperationMap::addOperation(keymaster_operation_handle_t handle, uint64_t keyid, 32 mMap[token] = Operation(handle, keyid, purpose, dev, characteristics, appToken); 57 *outKeyid = entry->second.keyid; 151 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_),
|
/frameworks/av/media/ndk/ |
NdkMediaDrm.cpp | 585 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 603 keyIdVec.appendArray(keyId, kKeyIdSize); 626 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 631 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 637 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 642 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 648 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 669 keyIdVec.appendArray(keyId, kKeyIdSize); 687 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, 708 keyIdVec.appendArray(keyId, kKeyIdSize) [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/kms/ |
layer1.py | 182 use the key identified by the `keyId` parameter. 209 'KeyId': key_id, 317 params = {'KeyId': key_id, } 331 params = {'KeyId': key_id, } 345 params = {'KeyId': key_id, } 360 params = {'KeyId': key_id, } 374 params = {'KeyId': key_id, } 406 params = {'KeyId': key_id, 'Plaintext': plaintext, } 450 params = {'KeyId': key_id, } 501 params = {'KeyId': key_id, [all...] |
/development/ndk/platforms/android-21/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/frameworks/av/drm/libmediadrm/ |
Drm.cpp | 667 Vector<uint8_t> const &keyId, 683 return mPlugin->encrypt(sessionId, keyId, input, iv, output); 687 Vector<uint8_t> const &keyId, 703 return mPlugin->decrypt(sessionId, keyId, input, iv, output); 707 Vector<uint8_t> const &keyId, 722 return mPlugin->sign(sessionId, keyId, message, signature); 726 Vector<uint8_t> const &keyId, 742 return mPlugin->verify(sessionId, keyId, message, signature, match);
|
/frameworks/av/include/ndk/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/frameworks/native/include/media/drm/ |
DrmAPI.h | 294 // specified by setCipherAlgorithm and the key selected by keyId, 297 Vector<uint8_t> const &keyId, 303 // specified by setCipherAlgorithm and the key selected by keyId, 306 Vector<uint8_t> const &keyId, 312 // specified by setMacAlgorithm and the key selected by keyId, 315 Vector<uint8_t> const &keyId, 320 // specified by setMacAlgorithm and the key selected by keyId, 324 Vector<uint8_t> const &keyId,
|
/prebuilts/ndk/current/platforms/android-21/arch-arm/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/current/platforms/android-21/arch-arm64/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/current/platforms/android-21/arch-mips/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/current/platforms/android-21/arch-mips64/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/current/platforms/android-21/arch-x86/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/current/platforms/android-21/arch-x86_64/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/current/platforms/android-23/arch-arm/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|