/external/exoplayer/tree/library/extractor/src/main/java/com/google/android/exoplayer2/extractor/ |
D | TrackOutput.java | 49 public final byte[] encryptionKey; field in TrackOutput.CryptoData 69 public CryptoData(@C.CryptoMode int cryptoMode, byte[] encryptionKey, int encryptedBlocks, in CryptoData() argument 72 this.encryptionKey = encryptionKey; in CryptoData() 87 && clearBlocks == other.clearBlocks && Arrays.equals(encryptionKey, other.encryptionKey); in equals() 93 result = 31 * result + Arrays.hashCode(encryptionKey); in hashCode()
|
/external/exoplayer/tree/library/hls/src/test/java/com/google/android/exoplayer2/source/hls/ |
D | FullSegmentEncryptionKeyCacheTest.java | 33 private final byte[] encryptionKey = {5, 6, 7, 8}; field in FullSegmentEncryptionKeyCacheTest 38 cache.put(firstUri, encryptionKey); in putThenGetAndContains() 39 assertThat(cache.get(firstUri)).isEqualTo(encryptionKey); in putThenGetAndContains() 48 cache.put(firstUri, encryptionKey); in getNullReturnsNull() 56 cache.put(null, encryptionKey); in putNullKeyThrowsException() 96 cache.put(firstUri, encryptionKey); in oldestElementRemoved() 112 cache.put(firstUri, encryptionKey); in updatingElementDoesntChangeAgeForRemoval()
|
D | Aes128DataSourceTest.java | 80 public TestAes123DataSource(DataSource upstream, byte[] encryptionKey, byte[] encryptionIv) { in TestAes123DataSource() argument 81 super(upstream, encryptionKey, encryptionIv); in TestAes123DataSource()
|
/external/exoplayer/tree/library/hls/src/main/java/com/google/android/exoplayer2/source/hls/ |
D | Aes128DataSource.java | 51 private final byte[] encryptionKey; field in Aes128DataSource 61 public Aes128DataSource(DataSource upstream, byte[] encryptionKey, byte[] encryptionIv) { in Aes128DataSource() argument 63 this.encryptionKey = encryptionKey; in Aes128DataSource() 81 Key cipherKey = new SecretKeySpec(encryptionKey, "AES"); in open()
|
D | FullSegmentEncryptionKeyCache.java | 62 public byte[] put(Uri uri, byte[] encryptionKey) { in put() argument 63 return backingMap.put(Assertions.checkNotNull(uri), Assertions.checkNotNull(encryptionKey)); in put()
|
D | HlsChunkSource.java | 515 @Nullable byte[] encryptionKey = keyCache.remove(keyUri); in maybeCreateEncryptionChunkFor() 516 if (encryptionKey != null) { in maybeCreateEncryptionChunkFor() 520 keyCache.put(keyUri, encryptionKey); in maybeCreateEncryptionChunkFor()
|
/external/tpm2-tss/src/tss2-sys/api/ |
D | Tss2_Sys_Import.c | 18 const TPM2B_DATA *encryptionKey, in Tss2_Sys_Import_Prepare() argument 40 if (!encryptionKey) { in Tss2_Sys_Import_Prepare() 48 rval = Tss2_MU_TPM2B_DATA_Marshal(encryptionKey, ctx->cmdBuffer, in Tss2_Sys_Import_Prepare() 143 const TPM2B_DATA *encryptionKey, in Tss2_Sys_Import() argument 157 rval = Tss2_Sys_Import_Prepare(sysContext, parentHandle, encryptionKey, in Tss2_Sys_Import()
|
/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securemessage/ |
D | SecureMessageBuilder.java | 176 Key signingKey, SigType sigType, Key encryptionKey, EncType encType, byte[] body) in buildSignCryptedMessage() argument 180 || (encryptionKey == null) in buildSignCryptedMessage() 200 if (taggedPlaintextRequired(signingKey, sigType, encryptionKey)) { in buildSignCryptedMessage() 213 byte[] encryptedBody = CryptoOps.encrypt(encryptionKey, encType, rng, iv, taggedBody); in buildSignCryptedMessage() 223 static boolean taggedPlaintextRequired(Key signingKey, SigType sigType, Key encryptionKey) { in taggedPlaintextRequired() argument 226 || !Arrays.equals(signingKey.getEncoded(), encryptionKey.getEncoded()); in taggedPlaintextRequired()
|
D | CryptoOps.java | 244 Key encryptionKey, EncType encType, @Nullable SecureRandom rng, byte[] iv, byte[] plaintext) in encrypt() argument 246 if ((encryptionKey == null) || (iv == null) || (plaintext == null)) { in encrypt() 255 deriveAes256KeyFor(getSecretKey(encryptionKey), getPurpose(encType)); in encrypt()
|
/external/tpm2-tss/src/tss2-esys/api/ |
D | Esys_Import.c | 75 const TPM2B_DATA *encryptionKey, in Esys_Import() argument 85 shandle3, encryptionKey, objectPublic, duplicate, in Esys_Import() 158 const TPM2B_DATA *encryptionKey, in Esys_Import_Async() argument 168 esysContext, parentHandle, encryptionKey, objectPublic, duplicate, in Esys_Import_Async() 194 : parentHandleNode->rsrc.handle, encryptionKey, in Esys_Import_Async()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/command/Duplication/ |
D | Import.c | 136 if(in->encryptionKey.t.size != (innerKeySize + 7) / 8) in TPM2_Import() 143 if(in->encryptionKey.t.size != 0) in TPM2_Import() 185 &in->encryptionKey.b, &sensitive); in TPM2_Import()
|
/external/tpm2-tss/src/tss2-fapi/api/ |
D | Fapi_ExportKey.c | 378 TPM2B_DATA encryptionKey; in Fapi_ExportKey_Finish() local 382 encryptionKey.size = 0; in Fapi_ExportKey_Finish() 391 &encryptionKey, &symmetric); in Fapi_ExportKey_Finish()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/include/prototypes/ |
D | Import_fp.h | 48 TPM2B_DATA encryptionKey; member
|
/external/tpm2-tss/test/integration/ |
D | esys-duplicate.int.c | 372 TPM2B_DATA encryptionKey = { in test_esys_duplicate() local 389 &encryptionKey, in test_esys_duplicate()
|
D | esys-import.int.c | 373 TPM2B_DATA encryptionKey = {0}; in test_esys_import() local 386 &encryptionKey, in test_esys_import()
|
/external/exoplayer/tree/library/core/src/main/java/com/google/android/exoplayer2/source/ |
D | SampleDataQueue.java | 284 cryptoData.encryptionKey, in readEncryptionData()
|
/external/exoplayer/tree/library/extractor/src/main/java/com/google/android/exoplayer2/extractor/mkv/ |
D | MatroskaExtractor.java | 726 MimeTypes.VIDEO_WEBM, currentTrack.cryptoData.encryptionKey)); in endMasterElement() 1089 byte[] encryptionKey = new byte[contentSize]; in binaryElement() 1090 input.readFully(encryptionKey, 0, contentSize); in binaryElement() 1091 currentTrack.cryptoData = new TrackOutput.CryptoData(C.CRYPTO_MODE_AES_CTR, encryptionKey, in binaryElement()
|
/external/exoplayer/tree/testutils/src/main/java/com/google/android/exoplayer2/testutil/ |
D | FakeTrackOutput.java | 231 dumper.add("encryption key", cryptoData.encryptionKey); in dump()
|
/external/tpm2-tss/include/tss2/ |
D | tss2_sys.h | 446 const TPM2B_DATA *encryptionKey, 460 const TPM2B_DATA *encryptionKey,
|
D | tss2_esys.h | 691 const TPM2B_DATA *encryptionKey, 705 const TPM2B_DATA *encryptionKey,
|
/external/tpm2-tss/test/unit/ |
D | esys-tcti-rcs.c | 719 TPM2B_DATA encryptionKey = DUMMY_2B_DATA(.buffer); in test_Import() local 730 &encryptionKey, in test_Import()
|
D | esys-tpm-rcs.c | 699 TPM2B_DATA encryptionKey = DUMMY_2B_DATA(.buffer); in test_Import() local 710 &encryptionKey, in test_Import()
|
D | esys-resubmissions.c | 754 TPM2B_DATA encryptionKey = DUMMY_2B_DATA(.buffer); in test_Import() local 765 &encryptionKey, in test_Import()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/include/ |
D | CommandDispatcher.h | 391 result = TPM2B_DATA_Unmarshal(&in->encryptionKey, paramBuffer, paramBufferSize);
|
D | CommandDispatchData.h | 1067 /* offsets */ {(UINT16)(offsetof(Import_In, encryptionKey)),
|