HomeSort by relevance Sort by last modified time
    Searched refs:keyId (Results 1 - 25 of 108) sorted by null

1 2 3 4 5

  /system/hardware/interfaces/wifi/keystore/1.0/
IKeystore.hal 49 * |keyId|.
51 * @param keyId the key identifier associated with the credential.
58 getPublicKey(string keyId)
63 * the credential identified by |keyId|. This is a raw RSA or ECDSA
67 * @param keyId the key identifier associated with the credential.
74 sign(string keyId, vec<uint8_t> dataToSign)
  /packages/inputmethods/LatinIME/native/jni/src/suggest/core/layout/
proximity_info.cpp 130 const int keyId, const int x, const int y, const bool isGeometric) const {
131 const float centerX = static_cast<float>(getKeyCenterXOfKeyIdG(keyId, x, isGeometric));
132 const float centerY = static_cast<float>(getKeyCenterYOfKeyIdG(keyId, y, isGeometric));
196 const int keyId, const int referencePointX, const bool isGeometric) const {
197 if (keyId < 0) {
200 int centerX = (hasTouchPositionCorrectionData()) ? static_cast<int>(mSweetSpotCenterXs[keyId])
201 : mCenterXsG[keyId];
202 const int keyWidth = mKeyWidths[keyId];
222 const int keyId, const int referencePointY, const bool isGeometric) const {
224 if (keyId < 0)
    [all...]
proximity_info_utils.h 133 const int *const keyWidths, const int *keyHeights, const int keyId, const int x,
135 if (keyId < 0) return true; // NOT_A_ID is -1, but return whenever < 0 just in case
136 const int left = keyXCoordinates[keyId];
137 const int top = keyYCoordinates[keyId];
138 const int right = left + keyWidths[keyId] + 1;
139 const int bottom = top + keyHeights[keyId];
222 const int keyId, const int x, const int y) {
224 if (keyId < 0) return MAX_VALUE_FOR_WEIGHTING;
225 const int left = keyXCoordinates[keyId];
226 const int top = keyYCoordinates[keyId];
    [all...]
proximity_info_state.cpp 171 const int keyId = mProximityInfo->getKeyIndexOf(codePoint);
172 if (keyId != NOT_AN_INDEX) {
173 const int index = inputIndex * mProximityInfo->getKeyCount() + keyId;
184 const int inputIndex, const int keyId) const {
187 keyId);
277 bool ProximityInfoState::isKeyInSerchKeysAfterIndex(const int index, const int keyId) const {
278 ASSERT(keyId >= 0 && index >= 0 && index < mSampledInputSize);
279 return mSampledSearchKeySets[index].test(keyId);
proximity_info.h 41 const int keyId, const int x, const int y, const bool isGeometric) const;
68 const int keyId, const int referencePointX, const bool isGeometric) const;
70 const int keyId, const int referencePointY, const bool isGeometric) const;
  /frameworks/av/drm/mediadrm/plugins/clearkey/
Session.cpp 54 const KeyMap::key_type& keyId = keys.keyAt(i);
56 mKeyMap.add(keyId, key);
65 const KeyId keyId, const Iv iv, const void* source,
71 keyIdVector.appendArray(keyId, kBlockSize);
DrmPlugin.h 178 const Vector<uint8_t>& keyId,
182 if (sessionId.size() == 0 || keyId.size() == 0 ||
192 const Vector<uint8_t>& keyId,
196 if (sessionId.size() == 0 || keyId.size() == 0 ||
206 const Vector<uint8_t>& keyId,
209 if (sessionId.size() == 0 || keyId.size() == 0 ||
219 const Vector<uint8_t>& keyId,
222 if (sessionId.size() == 0 || keyId.size() == 0 ||
CryptoPlugin.h 46 bool secure, const KeyId keyId, const Iv iv,
JsonWebKey.h 50 bool findKey(const String8& jsonObject, String8* keyId,
  /system/hardware/interfaces/wifi/keystore/1.0/default/
keystore.cpp 35 const hidl_string& keyId, getPublicKey_cb _hidl_cb) {
44 auto ret = service->get_pubkey(String16(keyId.c_str()), &pubkey);
54 const hidl_string& keyId, const hidl_vec<uint8_t>& dataToSign,
64 auto ret = service->sign(String16(keyId.c_str()), dataToSign, &signedData);
  /hardware/interfaces/drm/1.0/
ICryptoPlugin.hal 83 * @param the keyId for the key that should be used to do the
84 * the decryption. The keyId refers to a key in the associated
110 decrypt(bool secure, uint8_t[16] keyId, uint8_t[16] iv, Mode mode,
  /system/hardware/interfaces/wifi/keystore/1.0/default/include/wifikeystorehal/
keystore.h 34 const hidl_string& keyId, getPublicKey_cb _hidl_cb) override;
36 const hidl_string& keyId, const hidl_vec<uint8_t>& dataToSign,
  /development/ndk/platforms/android-21/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /frameworks/av/media/libmedia/include/media/
IDrm.h 96 Vector<uint8_t> const &keyId,
102 Vector<uint8_t> const &keyId,
108 Vector<uint8_t> const &keyId,
113 Vector<uint8_t> const &keyId,
  /frameworks/av/media/ndk/include/media/
NdkMediaDrm.h 411 * to use is identified by the 16 byte keyId. The key must have been loaded into
415 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
422 * to use is identified by the 16 byte keyId. The key must have been loaded into
426 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
435 * by the 16 byte keyId. The key must have been loaded into the session using
439 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
446 * use is identified by the 16 byte keyId. The key must have been loaded into the
450 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/r10/platforms/android-21/arch-arm/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/r10/platforms/android-21/arch-arm64/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/r10/platforms/android-21/arch-mips/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/r10/platforms/android-21/arch-mips64/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/r10/platforms/android-21/arch-x86/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/r10/platforms/android-21/arch-x86_64/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/r10/platforms/android-23/arch-arm/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/r10/platforms/android-23/arch-arm64/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/r10/platforms/android-23/arch-mips/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,
  /prebuilts/ndk/r10/platforms/android-23/arch-mips64/usr/include/media/
NdkMediaDrm.h 409 * to use is identified by the 16 byte keyId. The key must have been loaded into
413 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
420 * to use is identified by the 16 byte keyId. The key must have been loaded into
424 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv,
433 * by the 16 byte keyId. The key must have been loaded into the session using
437 const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize,
444 * use is identified by the 16 byte keyId. The key must have been loaded into the
448 const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize,

Completed in 368 milliseconds

1 2 3 4 5