/external/chromium_org/media/base/ |
H A D | decrypt_config.cc | 11 DecryptConfig::DecryptConfig(const std::string& key_id, argument 14 : key_id_(key_id), 17 CHECK_GT(key_id.size(), 0u);
|
H A D | decrypt_config.h | 37 // |key_id| is the ID that references the decryption key for this sample. 44 DecryptConfig(const std::string& key_id, 49 const std::string& key_id() const { return key_id_; } function in class:media::DecryptConfig
|
/external/chromium_org/media/formats/webm/ |
H A D | webm_crypto_helpers.h | 27 const uint8* key_id, int key_id_size,
|
H A D | webm_crypto_helpers.cc | 28 const uint8* key_id, int key_id_size, 54 std::string(reinterpret_cast<const char*>(key_id), key_id_size), 27 WebMCreateDecryptConfig(const uint8* data, int data_size, const uint8* key_id, int key_id_size, scoped_ptr<DecryptConfig>* decrypt_config, int* data_offset) argument
|
H A D | webm_stream_parser.h | 66 void FireNeedKey(const std::string& key_id);
|
H A D | webm_stream_parser.cc | 278 void WebMStreamParser::FireNeedKey(const std::string& key_id) { argument 279 std::vector<uint8> key_id_vector(key_id.begin(), key_id.end());
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
H A D | openCryptoki.conf | 34 key_id="4"
|
/external/chromium_org/chromecast/media/cma/ipc_streamer/ |
H A D | decrypt_config_marshaller.cc | 23 CHECK_GT(config.key_id().size(), 0); 27 CHECK(msg->WritePod(config.key_id().size())); 28 CHECK(msg->WriteBuffer(config.key_id().data(), config.key_id().size())); 45 scoped_ptr<char[]> key_id(new char[key_id_size]); 46 CHECK(msg->ReadBuffer(key_id.get(), key_id_size)); 69 std::string(key_id.get(), key_id_size),
|
/external/chromium_org/media/cdm/ |
H A D | json_web_key.h | 51 // Vector of [key_id, key_value] pairs. Values are raw binary data, stored in 56 // Converts a single |key|, |key_id| pair to a JSON Web Key Set. 58 const uint8* key_id, int key_id_length); 67 // Create a license request message for the |key_id| and |session_type| 69 // so no need to take a list of |key_id|'s. |license| is updated to contain the 71 MEDIA_EXPORT void CreateLicenseRequest(const uint8* key_id,
|
H A D | json_web_key.cc | 65 const uint8* key_id, int key_id_length) { 66 // Both |key| and |key_id| need to be base64 encoded strings in the JWK. 68 std::string key_id_base64 = EncodeBase64(key_id, key_id_length); 190 void CreateLicenseRequest(const uint8* key_id, argument 197 list->AppendString(EncodeBase64(key_id, key_id_length)); 64 GenerateJWKSet(const uint8* key, int key_length, const uint8* key_id, int key_id_length) argument
|
H A D | aes_decryptor.cc | 418 const std::string& key_id = encrypted->decrypt_config()->key_id(); local 419 DecryptionKey* key = GetKey(key_id); 477 const std::string& key_id, 486 KeyIdToSessionKeysMap::iterator key_id_entry = key_map_.find(key_id); 492 // |key_id| not found, so need to create new entry. 496 key_map_.add(key_id, inner_map.Pass()); 501 const std::string& key_id) const { 503 KeyIdToSessionKeysMap::const_iterator key_id_found = key_map_.find(key_id); 521 // Need to get rid of the entry for this key_id 476 AddDecryptionKey(const std::string& web_session_id, const std::string& key_id, const std::string& key_string) argument [all...] |
H A D | aes_decryptor.h | 113 // Creates a DecryptionKey using |key_string| and associates it with |key_id|. 116 const std::string& key_id, 119 // Gets a DecryptionKey associated with |key_id|. The AesDecryptor still owns 120 // the key. Returns NULL if no key is associated with |key_id|. 121 DecryptionKey* GetKey(const std::string& key_id) const;
|
/external/openssl/crypto/engine/ |
H A D | eng_pkey.c | 96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument 122 pkey = e->load_privkey(e, key_id, ui_method, callback_data); 132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument 158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
|
H A D | eng_openssl.c | 122 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, 371 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument 376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id); 377 in = BIO_new_file(key_id, "r");
|
/external/chromium_org/chromecast/media/cma/base/ |
H A D | frame_generator_for_test.cc | 88 char key_id[] = { local 98 std::string(key_id, arraysize(key_id)),
|
/external/chromium_org/media/base/android/ |
H A D | demuxer_stream_player_params.h | 46 std::vector<char> key_id; member in struct:media::AccessUnit
|
/external/tcpdump/ |
H A D | ntp.h | 90 u_int32_t key_id; member in struct:ntpdata
|
H A D | print-ntp.c | 186 TCHECK(bp->key_id); 187 printf("\n\tKey id: %u", bp->key_id); 189 TCHECK(bp->key_id); 190 printf("\n\tKey id: %u", bp->key_id);
|
/external/chromium_org/chromeos/network/ |
H A D | client_cert_util.cc | 169 std::string key_id; local 171 &key_id); 173 if (cert_id != key_id) { 209 std::string key_id = local 216 key_id); 218 key_id); 346 std::string key_id = GetStringFromDictionary( local 350 return !cert_id.empty() && !key_id.empty() && !identity.empty();
|
/external/chromium_org/net/cert/ |
H A D | ct_log_verifier.cc | 25 if (sct.log_id != key_id()) {
|
H A D | ct_log_verifier.h | 45 const std::string& key_id() const { return key_id_; } function in class:net::CTLogVerifier
|
H A D | ct_log_verifier_unittest.cc | 25 ASSERT_EQ(log_->key_id(), ct::GetTestPublicKeyId());
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_config.h | 488 * key_id - Key ID for OpenSSL engine 493 char *key_id; member in struct:eap_peer_config
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_config.h | 488 * key_id - Key ID for OpenSSL engine 493 char *key_id; member in struct:eap_peer_config
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 488 * key_id - Key ID for OpenSSL engine 493 char *key_id; member in struct:eap_peer_config
|