/external/chromium_org/media/base/ |
H A D | decrypt_config.cc | 11 DecryptConfig::DecryptConfig(const std::string& key_id, argument 14 : key_id_(key_id), 17 CHECK_GT(key_id.size(), 0u);
|
H A D | decrypt_config.h | 37 // |key_id| is the ID that references the decryption key for this sample. 44 DecryptConfig(const std::string& key_id, 49 const std::string& key_id() const { return key_id_; } function in class:media::DecryptConfig
|
/external/chromium_org/media/formats/webm/ |
H A D | webm_crypto_helpers.cc | 28 const uint8* key_id, int key_id_size, 54 std::string(reinterpret_cast<const char*>(key_id), key_id_size), 27 WebMCreateDecryptConfig(const uint8* data, int data_size, const uint8* key_id, int key_id_size, scoped_ptr<DecryptConfig>* decrypt_config, int* data_offset) argument
|
H A D | webm_stream_parser.cc | 278 void WebMStreamParser::FireNeedKey(const std::string& key_id) { argument 279 std::vector<uint8> key_id_vector(key_id.begin(), key_id.end());
|
/external/chromium_org/net/cert/ |
H A D | ct_log_verifier.h | 45 const std::string& key_id() const { return key_id_; } function in class:net::CTLogVerifier
|
/external/chromium_org/chromecast/media/cma/base/ |
H A D | frame_generator_for_test.cc | 88 char key_id[] = { local 98 std::string(key_id, arraysize(key_id)),
|
/external/chromium_org/media/base/android/ |
H A D | demuxer_stream_player_params.h | 46 std::vector<char> key_id; member in struct:media::AccessUnit
|
H A D | media_codec_bridge.cc | 294 const uint8* key_id, 309 base::android::ToJavaByteArray(env, key_id, key_id_size); 290 QueueSecureInputBuffer( int index, const uint8* data, size_t data_size, const uint8* key_id, int key_id_size, const uint8* iv, int iv_size, const SubsampleEntry* subsamples, int subsamples_size, const base::TimeDelta& presentation_time) argument
|
/external/openssl/crypto/engine/ |
H A D | eng_pkey.c | 96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument 122 pkey = e->load_privkey(e, key_id, ui_method, callback_data); 132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument 158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
|
H A D | eng_openssl.c | 122 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, 371 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument 376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id); 377 in = BIO_new_file(key_id, "r");
|
/external/chromium_org/media/cdm/ |
H A D | json_web_key_unittest.cc | 42 void CreateLicenseAndExpect(const uint8* key_id, argument 47 CreateLicenseRequest(key_id, key_id_length, session_type, &result);
|
H A D | json_web_key.cc | 65 const uint8* key_id, int key_id_length) { 66 // Both |key| and |key_id| need to be base64 encoded strings in the JWK. 68 std::string key_id_base64 = EncodeBase64(key_id, key_id_length); 190 void CreateLicenseRequest(const uint8* key_id, argument 197 list->AppendString(EncodeBase64(key_id, key_id_length)); 64 GenerateJWKSet(const uint8* key, int key_length, const uint8* key_id, int key_id_length) argument
|
H A D | aes_decryptor.cc | 418 const std::string& key_id = encrypted->decrypt_config()->key_id(); local 419 DecryptionKey* key = GetKey(key_id); 477 const std::string& key_id, 486 KeyIdToSessionKeysMap::iterator key_id_entry = key_map_.find(key_id); 492 // |key_id| not found, so need to create new entry. 496 key_map_.add(key_id, inner_map.Pass()); 501 const std::string& key_id) const { 503 KeyIdToSessionKeysMap::const_iterator key_id_found = key_map_.find(key_id); 521 // Need to get rid of the entry for this key_id 476 AddDecryptionKey(const std::string& web_session_id, const std::string& key_id, const std::string& key_string) argument [all...] |
H A D | aes_decryptor_unittest.cc | 189 const std::vector<uint8>& key_id, 197 reinterpret_cast<const char*>(key_id.empty() ? NULL : &key_id[0]), 198 key_id.size()); 296 // Creates a new session using |key_id|. Returns the session ID. 297 std::string CreateSession(const std::vector<uint8>& key_id) { argument 298 DCHECK(!key_id.empty()); 303 &key_id[0], local 304 key_id.size(), 187 CreateEncryptedBuffer( const std::vector<uint8>& data, const std::vector<uint8>& key_id, const std::vector<uint8>& iv, const std::vector<SubsampleEntry>& subsample_entries) argument
|
/external/tcpdump/ |
H A D | ntp.h | 90 u_int32_t key_id; member in struct:ntpdata
|
/external/chromium_org/chromeos/network/ |
H A D | client_cert_util.cc | 169 std::string key_id; local 171 &key_id); 173 if (cert_id != key_id) { 209 std::string key_id = local 216 key_id); 218 key_id); 346 std::string key_id = GetStringFromDictionary( local 350 return !cert_id.empty() && !key_id.empty() && !identity.empty();
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_config.h | 488 * key_id - Key ID for OpenSSL engine 493 char *key_id; member in struct:eap_peer_config
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_config.h | 488 * key_id - Key ID for OpenSSL engine 493 char *key_id; member in struct:eap_peer_config
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 488 * key_id - Key ID for OpenSSL engine 493 char *key_id; member in struct:eap_peer_config
|
/external/chromium_org/ppapi/c/private/ |
H A D | pp_content_decryptor.h | 114 uint8_t key_id[64]; member in struct:PP_EncryptedBlockInfo
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 122 * @key_id: the private key's id when using engine (this is OpenSSL 161 const char *key_id; member in struct:tls_connection_params
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls.h | 122 * @key_id: the private key's id when using engine (this is OpenSSL 161 const char *key_id; member in struct:tls_connection_params
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls.h | 122 * @key_id: the private key's id when using engine (this is OpenSSL 161 const char *key_id; member in struct:tls_connection_params
|
/external/chromium_org/content/renderer/pepper/ |
H A D | content_decryptor_delegate.cc | 123 if (!CopyStringToArray(decrypt_config->key_id(), block_info->key_id) || 127 block_info->key_id_size = decrypt_config->key_id().size(); 751 std::vector<uint8> key_id; local 753 key_id.assign(data, data + array_buffer->ByteLength()); 754 key_ids_vector.push_back(key_id);
|
/external/chromium_org/media/filters/ |
H A D | pipeline_integration_test.cc | 268 const uint8* key_id = init_data.empty() ? NULL : &init_data[0]; variable 271 key_id = kKeyId; 277 kSecretKey, arraysize(kSecretKey), key_id, key_id_length); 310 std::vector<uint8> key_id; variable 312 EXPECT_TRUE(GetKeyAndKeyId(init_data, &key, &key_id)); 317 vector_as_array(&key_id), 318 key_id.size()); 328 std::vector<uint8>* key_id) { 329 // For WebM, init_data is key_id; for ISO CENC, init_data should contain 330 // the key_id 326 GetKeyAndKeyId(std::vector<uint8> init_data, std::vector<uint8>* key, std::vector<uint8>* key_id) argument [all...] |