/frameworks/base/core/java/android/bluetooth/ |
H A D | BluetoothServerSocket.java | 80 * @param encrypt require the connection to be encrypted 85 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port) argument 88 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null); 98 * @param encrypt require the connection to be encrypted 105 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port, argument 109 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null, mitm, 120 * @param encrypt require the connection to be encrypted 125 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, ParcelUuid uuid) argument 127 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, -1, uuid);
|
H A D | BluetoothSocket.java | 157 * @param encrypt require the connection to be encrypted 164 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, argument 166 this(type, fd, auth, encrypt, device, port, uuid, false, false); 174 * @param encrypt require the connection to be encrypted 183 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, argument 200 mEncrypt = encrypt; 258 * @param encrypt require the connection to be encrypted 264 private BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, String address, argument 266 this(type, fd, auth, encrypt, new BluetoothDevice(address), port, null, false, false);
|
H A D | BluetoothAdapter.java | 1706 boolean auth, boolean encrypt) throws IOException { 1709 encrypt, new ParcelUuid(uuid)); 1705 createNewRfcommSocketAndRecord(String name, UUID uuid, boolean auth, boolean encrypt) argument
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | HDCP.cpp | 113 status_t HDCP::encrypt( function in class:android::HDCP 126 return mHDCPModule->encrypt(inData, size, streamCTR, outInputCTR, outData);
|
/frameworks/native/include/media/hardware/ |
H A D | HDCPAPI.h | 62 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt 106 virtual status_t encrypt( function in struct:android::HDCPModule
|
/frameworks/av/drm/mediadrm/plugins/clearkey/ |
H A D | DrmPlugin.h | 166 virtual status_t encrypt( function in class:clearkeydrm::DrmPlugin
|
/frameworks/av/media/libmedia/ |
H A D | IHDCP.cpp | 96 virtual status_t encrypt( function in struct:android::BpHDCP 263 status_t err = encrypt(inData, size, streamCTR, &inputCTR, outData);
|
H A D | IDrm.cpp | 423 virtual status_t encrypt(Vector<uint8_t> const &sessionId, function in struct:android::BpDrm 853 uint32_t result = encrypt(sessionId, keyId, input, iv, output);
|
/frameworks/av/drm/libmediadrm/ |
H A D | Drm.cpp | 666 status_t Drm::encrypt(Vector<uint8_t> const &sessionId, function in class:android::Drm 683 return mPlugin->encrypt(sessionId, keyId, input, iv, output);
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.cpp | 551 status_t MockDrmPlugin::encrypt(Vector<uint8_t> const &sessionId, function in class:android::MockDrmPlugin 558 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)",
|
/frameworks/av/media/ndk/ |
H A D | NdkMediaDrm.cpp | 586 const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) { 613 if (encrypt) { 614 status = mObj->mDrm->encrypt(*iter, keyIdVec, inputVec, ivVec, outputVec); 583 encrypt_decrypt_common(AMediaDrm *mObj, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) argument
|
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 1053 * root of trust, and then perform encrypt, decrypt, sign and verify operations 1056 * The CryptoSession class implements generic encrypt/decrypt/sign/verify methods 1088 * @param input the data to encrypt 1092 public byte[] encrypt( method in class:MediaDrm.CryptoSession 1101 * @param input the data to encrypt 1137 * Obtain a CryptoSession object which can be used to encrypt, decrypt, 1143 * to be used for encrypt, decrypt, sign and/or verify
|
/frameworks/base/core/java/android/app/admin/ |
H A D | DevicePolicyManager.java | 2602 * Important Note: On some devices, it is possible to encrypt storage without requiring the user 2608 * @param encrypt true to request encryption, false to release any previous request 2616 public int setStorageEncryption(@NonNull ComponentName admin, boolean encrypt) { argument 2620 return mService.setStorageEncryption(admin, encrypt);
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | DevicePolicyManagerService.java | 4997 public int setStorageEncryption(ComponentName who, boolean encrypt) { argument 5021 if (ap.encryptionRequested != encrypt) { 5022 ap.encryptionRequested = encrypt; 5148 private void setEncryptionRequested(boolean encrypt) { argument
|