/system/hardware/interfaces/wifi/keystore/1.0/ |
IKeystore.hal | 49 * |keyId|. 51 * @param keyId the key identifier associated with the credential. 58 getPublicKey(string keyId) 63 * the credential identified by |keyId|. This is a raw RSA or ECDSA 67 * @param keyId the key identifier associated with the credential. 74 sign(string keyId, vec<uint8_t> dataToSign)
|
/packages/inputmethods/LatinIME/native/jni/src/suggest/core/layout/ |
proximity_info.cpp | 130 const int keyId, const int x, const int y, const bool isGeometric) const { 131 const float centerX = static_cast<float>(getKeyCenterXOfKeyIdG(keyId, x, isGeometric)); 132 const float centerY = static_cast<float>(getKeyCenterYOfKeyIdG(keyId, y, isGeometric)); 196 const int keyId, const int referencePointX, const bool isGeometric) const { 197 if (keyId < 0) { 200 int centerX = (hasTouchPositionCorrectionData()) ? static_cast<int>(mSweetSpotCenterXs[keyId]) 201 : mCenterXsG[keyId]; 202 const int keyWidth = mKeyWidths[keyId]; 222 const int keyId, const int referencePointY, const bool isGeometric) const { 224 if (keyId < 0) [all...] |
proximity_info_utils.h | 133 const int *const keyWidths, const int *keyHeights, const int keyId, const int x, 135 if (keyId < 0) return true; // NOT_A_ID is -1, but return whenever < 0 just in case 136 const int left = keyXCoordinates[keyId]; 137 const int top = keyYCoordinates[keyId]; 138 const int right = left + keyWidths[keyId] + 1; 139 const int bottom = top + keyHeights[keyId]; 222 const int keyId, const int x, const int y) { 224 if (keyId < 0) return MAX_VALUE_FOR_WEIGHTING; 225 const int left = keyXCoordinates[keyId]; 226 const int top = keyYCoordinates[keyId]; [all...] |
proximity_info_state.cpp | 171 const int keyId = mProximityInfo->getKeyIndexOf(codePoint); 172 if (keyId != NOT_AN_INDEX) { 173 const int index = inputIndex * mProximityInfo->getKeyCount() + keyId; 184 const int inputIndex, const int keyId) const { 187 keyId); 277 bool ProximityInfoState::isKeyInSerchKeysAfterIndex(const int index, const int keyId) const { 278 ASSERT(keyId >= 0 && index >= 0 && index < mSampledInputSize); 279 return mSampledSearchKeySets[index].test(keyId);
|
proximity_info.h | 41 const int keyId, const int x, const int y, const bool isGeometric) const; 68 const int keyId, const int referencePointX, const bool isGeometric) const; 70 const int keyId, const int referencePointY, const bool isGeometric) const;
|
/frameworks/av/drm/mediadrm/plugins/clearkey/ |
Session.cpp | 54 const KeyMap::key_type& keyId = keys.keyAt(i); 56 mKeyMap.add(keyId, key); 65 const KeyId keyId, const Iv iv, const void* source, 71 keyIdVector.appendArray(keyId, kBlockSize);
|
DrmPlugin.h | 178 const Vector<uint8_t>& keyId, 182 if (sessionId.size() == 0 || keyId.size() == 0 || 192 const Vector<uint8_t>& keyId, 196 if (sessionId.size() == 0 || keyId.size() == 0 || 206 const Vector<uint8_t>& keyId, 209 if (sessionId.size() == 0 || keyId.size() == 0 || 219 const Vector<uint8_t>& keyId, 222 if (sessionId.size() == 0 || keyId.size() == 0 ||
|
CryptoPlugin.h | 46 bool secure, const KeyId keyId, const Iv iv,
|
JsonWebKey.h | 50 bool findKey(const String8& jsonObject, String8* keyId,
|
/system/hardware/interfaces/wifi/keystore/1.0/default/ |
keystore.cpp | 35 const hidl_string& keyId, getPublicKey_cb _hidl_cb) { 44 auto ret = service->get_pubkey(String16(keyId.c_str()), &pubkey); 54 const hidl_string& keyId, const hidl_vec<uint8_t>& dataToSign, 64 auto ret = service->sign(String16(keyId.c_str()), dataToSign, &signedData);
|
/hardware/interfaces/drm/1.0/ |
ICryptoPlugin.hal | 83 * @param the keyId for the key that should be used to do the 84 * the decryption. The keyId refers to a key in the associated 110 decrypt(bool secure, uint8_t[16] keyId, uint8_t[16] iv, Mode mode,
|
/system/hardware/interfaces/wifi/keystore/1.0/default/include/wifikeystorehal/ |
keystore.h | 34 const hidl_string& keyId, getPublicKey_cb _hidl_cb) override; 36 const hidl_string& keyId, const hidl_vec<uint8_t>& dataToSign,
|
/development/ndk/platforms/android-21/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/frameworks/av/media/libmedia/include/media/ |
IDrm.h | 96 Vector<uint8_t> const &keyId, 102 Vector<uint8_t> const &keyId, 108 Vector<uint8_t> const &keyId, 113 Vector<uint8_t> const &keyId,
|
/frameworks/av/media/ndk/include/media/ |
NdkMediaDrm.h | 411 * to use is identified by the 16 byte keyId. The key must have been loaded into 415 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 422 * to use is identified by the 16 byte keyId. The key must have been loaded into 426 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 435 * by the 16 byte keyId. The key must have been loaded into the session using 439 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 446 * use is identified by the 16 byte keyId. The key must have been loaded into the 450 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/r10/platforms/android-21/arch-arm/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/r10/platforms/android-21/arch-arm64/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/r10/platforms/android-21/arch-mips/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/r10/platforms/android-21/arch-mips64/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/r10/platforms/android-21/arch-x86/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/r10/platforms/android-21/arch-x86_64/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/r10/platforms/android-23/arch-arm/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/r10/platforms/android-23/arch-arm64/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/r10/platforms/android-23/arch-mips/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|
/prebuilts/ndk/r10/platforms/android-23/arch-mips64/usr/include/media/ |
NdkMediaDrm.h | 409 * to use is identified by the 16 byte keyId. The key must have been loaded into 413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 420 * to use is identified by the 16 byte keyId. The key must have been loaded into 424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 433 * by the 16 byte keyId. The key must have been loaded into the session using 437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, 444 * use is identified by the 16 byte keyId. The key must have been loaded into the 448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
|