Searched refs:key_id (Results 1 - 25 of 84) sorted by relevance

1234

/external/chromium_org/media/base/
H A Ddecrypt_config.cc11 DecryptConfig::DecryptConfig(const std::string& key_id, argument
14 : key_id_(key_id),
17 CHECK_GT(key_id.size(), 0u);
H A Ddecrypt_config.h37 // |key_id| is the ID that references the decryption key for this sample.
44 DecryptConfig(const std::string& key_id,
49 const std::string& key_id() const { return key_id_; } function in class:media::DecryptConfig
/external/chromium_org/media/formats/webm/
H A Dwebm_crypto_helpers.h27 const uint8* key_id, int key_id_size,
H A Dwebm_crypto_helpers.cc28 const uint8* key_id, int key_id_size,
54 std::string(reinterpret_cast<const char*>(key_id), key_id_size),
27 WebMCreateDecryptConfig(const uint8* data, int data_size, const uint8* key_id, int key_id_size, scoped_ptr<DecryptConfig>* decrypt_config, int* data_offset) argument
H A Dwebm_stream_parser.h66 void FireNeedKey(const std::string& key_id);
H A Dwebm_stream_parser.cc278 void WebMStreamParser::FireNeedKey(const std::string& key_id) { argument
279 std::vector<uint8> key_id_vector(key_id.begin(), key_id.end());
/external/wpa_supplicant_8/wpa_supplicant/examples/
H A DopenCryptoki.conf34 key_id="4"
/external/chromium_org/chromecast/media/cma/ipc_streamer/
H A Ddecrypt_config_marshaller.cc23 CHECK_GT(config.key_id().size(), 0);
27 CHECK(msg->WritePod(config.key_id().size()));
28 CHECK(msg->WriteBuffer(config.key_id().data(), config.key_id().size()));
45 scoped_ptr<char[]> key_id(new char[key_id_size]);
46 CHECK(msg->ReadBuffer(key_id.get(), key_id_size));
69 std::string(key_id.get(), key_id_size),
/external/chromium_org/media/cdm/
H A Djson_web_key.h51 // Vector of [key_id, key_value] pairs. Values are raw binary data, stored in
56 // Converts a single |key|, |key_id| pair to a JSON Web Key Set.
58 const uint8* key_id, int key_id_length);
67 // Create a license request message for the |key_id| and |session_type|
69 // so no need to take a list of |key_id|'s. |license| is updated to contain the
71 MEDIA_EXPORT void CreateLicenseRequest(const uint8* key_id,
H A Djson_web_key.cc65 const uint8* key_id, int key_id_length) {
66 // Both |key| and |key_id| need to be base64 encoded strings in the JWK.
68 std::string key_id_base64 = EncodeBase64(key_id, key_id_length);
190 void CreateLicenseRequest(const uint8* key_id, argument
197 list->AppendString(EncodeBase64(key_id, key_id_length));
64 GenerateJWKSet(const uint8* key, int key_length, const uint8* key_id, int key_id_length) argument
H A Daes_decryptor.cc418 const std::string& key_id = encrypted->decrypt_config()->key_id(); local
419 DecryptionKey* key = GetKey(key_id);
477 const std::string& key_id,
486 KeyIdToSessionKeysMap::iterator key_id_entry = key_map_.find(key_id);
492 // |key_id| not found, so need to create new entry.
496 key_map_.add(key_id, inner_map.Pass());
501 const std::string& key_id) const {
503 KeyIdToSessionKeysMap::const_iterator key_id_found = key_map_.find(key_id);
521 // Need to get rid of the entry for this key_id
476 AddDecryptionKey(const std::string& web_session_id, const std::string& key_id, const std::string& key_string) argument
[all...]
H A Daes_decryptor.h113 // Creates a DecryptionKey using |key_string| and associates it with |key_id|.
116 const std::string& key_id,
119 // Gets a DecryptionKey associated with |key_id|. The AesDecryptor still owns
120 // the key. Returns NULL if no key is associated with |key_id|.
121 DecryptionKey* GetKey(const std::string& key_id) const;
/external/openssl/crypto/engine/
H A Deng_pkey.c96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument
122 pkey = e->load_privkey(e, key_id, ui_method, callback_data);
132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument
158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
H A Deng_openssl.c122 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id,
371 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument
376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id);
377 in = BIO_new_file(key_id, "r");
/external/chromium_org/chromecast/media/cma/base/
H A Dframe_generator_for_test.cc88 char key_id[] = { local
98 std::string(key_id, arraysize(key_id)),
/external/chromium_org/media/base/android/
H A Ddemuxer_stream_player_params.h46 std::vector<char> key_id; member in struct:media::AccessUnit
/external/tcpdump/
H A Dntp.h90 u_int32_t key_id; member in struct:ntpdata
H A Dprint-ntp.c186 TCHECK(bp->key_id);
187 printf("\n\tKey id: %u", bp->key_id);
189 TCHECK(bp->key_id);
190 printf("\n\tKey id: %u", bp->key_id);
/external/chromium_org/chromeos/network/
H A Dclient_cert_util.cc169 std::string key_id; local
171 &key_id);
173 if (cert_id != key_id) {
209 std::string key_id = local
216 key_id);
218 key_id);
346 std::string key_id = GetStringFromDictionary( local
350 return !cert_id.empty() && !key_id.empty() && !identity.empty();
/external/chromium_org/net/cert/
H A Dct_log_verifier.cc25 if (sct.log_id != key_id()) {
H A Dct_log_verifier.h45 const std::string& key_id() const { return key_id_; } function in class:net::CTLogVerifier
H A Dct_log_verifier_unittest.cc25 ASSERT_EQ(log_->key_id(), ct::GetTestPublicKeyId());
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_config.h488 * key_id - Key ID for OpenSSL engine
493 char *key_id; member in struct:eap_peer_config
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_config.h488 * key_id - Key ID for OpenSSL engine
493 char *key_id; member in struct:eap_peer_config
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_config.h488 * key_id - Key ID for OpenSSL engine
493 char *key_id; member in struct:eap_peer_config

Completed in 2217 milliseconds

1234