/frameworks/base/core/java/android/bluetooth/ |
H A D | BluetoothServerSocket.java | 80 * @param encrypt require the connection to be encrypted 85 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port) argument 88 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null); 98 * @param encrypt require the connection to be encrypted 105 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port, argument 109 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null, mitm, 120 * @param encrypt require the connection to be encrypted 125 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, ParcelUuid uuid) argument 127 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, -1, uuid);
|
H A D | BluetoothSocket.java | 157 * @param encrypt require the connection to be encrypted 164 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, argument 166 this(type, fd, auth, encrypt, device, port, uuid, false, false); 174 * @param encrypt require the connection to be encrypted 183 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, argument 200 mEncrypt = encrypt; 258 * @param encrypt require the connection to be encrypted 264 private BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, String address, argument 266 this(type, fd, auth, encrypt, new BluetoothDevice(address), port, null, false, false);
|
H A D | BluetoothAdapter.java | 1706 boolean auth, boolean encrypt) throws IOException { 1709 encrypt, new ParcelUuid(uuid)); 1705 createNewRfcommSocketAndRecord(String name, UUID uuid, boolean auth, boolean encrypt) argument
|
/frameworks/av/include/media/ |
H A D | IHDCP.h | 51 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt 70 virtual status_t encrypt(
|
H A D | Drm.h | 99 virtual status_t encrypt(Vector<uint8_t> const &sessionId,
|
H A D | IDrm.h | 94 virtual status_t encrypt(Vector<uint8_t> const &sessionId,
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | HDCP.h | 35 virtual status_t encrypt(
|
H A D | HDCP.cpp | 113 status_t HDCP::encrypt( function in class:android::HDCP 126 return mHDCPModule->encrypt(inData, size, streamCTR, outInputCTR, outData);
|
/frameworks/native/include/media/hardware/ |
H A D | HDCPAPI.h | 62 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt 106 virtual status_t encrypt( function in struct:android::HDCPModule
|
/frameworks/av/media/libmedia/ |
H A D | IHDCP.cpp | 96 virtual status_t encrypt( function in struct:android::BpHDCP 263 status_t err = encrypt(inData, size, streamCTR, &inputCTR, outData);
|
H A D | IDrm.cpp | 423 virtual status_t encrypt(Vector<uint8_t> const &sessionId, function in struct:android::BpDrm 853 uint32_t result = encrypt(sessionId, keyId, input, iv, output);
|
/frameworks/av/drm/mediadrm/plugins/clearkey/ |
H A D | DrmPlugin.h | 166 virtual status_t encrypt( function in class:clearkeydrm::DrmPlugin
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.h | 109 status_t encrypt(Vector<uint8_t> const &sessionId,
|
H A D | MockDrmCryptoPlugin.cpp | 551 status_t MockDrmPlugin::encrypt(Vector<uint8_t> const &sessionId, function in class:android::MockDrmPlugin 558 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)",
|
/frameworks/native/include/media/drm/ |
H A D | DrmAPI.h | 272 // encrypt, decrypt, sign verify operations on operator-provided 296 virtual status_t encrypt(Vector<uint8_t> const &sessionId,
|
/frameworks/av/drm/libmediadrm/ |
H A D | Drm.cpp | 666 status_t Drm::encrypt(Vector<uint8_t> const &sessionId, function in class:android::Drm 683 return mPlugin->encrypt(sessionId, keyId, input, iv, output);
|
/frameworks/av/media/ndk/ |
H A D | NdkMediaDrm.cpp | 586 const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) { 613 if (encrypt) { 614 status = mObj->mDrm->encrypt(*iter, keyIdVec, inputVec, ivVec, outputVec); 583 encrypt_decrypt_common(AMediaDrm *mObj, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) argument
|
/frameworks/av/media/libstagefright/wifi-display/ |
H A D | MediaSender.cpp | 437 err = mHDCP->encrypt( 445 ALOGE("Failed to HDCP-encrypt media data (err %d)",
|
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 1053 * root of trust, and then perform encrypt, decrypt, sign and verify operations 1056 * The CryptoSession class implements generic encrypt/decrypt/sign/verify methods 1088 * @param input the data to encrypt 1092 public byte[] encrypt( method in class:MediaDrm.CryptoSession 1101 * @param input the data to encrypt 1137 * Obtain a CryptoSession object which can be used to encrypt, decrypt, 1143 * to be used for encrypt, decrypt, sign and/or verify
|
/frameworks/base/core/java/android/app/admin/ |
H A D | IDevicePolicyManager.aidl | 93 int setStorageEncryption(in ComponentName who, boolean encrypt);
|
H A D | DevicePolicyManager.java | 2602 * Important Note: On some devices, it is possible to encrypt storage without requiring the user 2608 * @param encrypt true to request encryption, false to release any previous request 2616 public int setStorageEncryption(@NonNull ComponentName admin, boolean encrypt) { argument 2620 return mService.setStorageEncryption(admin, encrypt);
|
/frameworks/base/media/jni/ |
H A D | android_media_MediaDrm.cpp | 1308 status_t err = drm->encrypt(sessionId, keyId, input, iv, output); 1310 if (throwExceptionAsNecessary(env, err, "Failed to encrypt")) {
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | DevicePolicyManagerService.java | 4997 public int setStorageEncryption(ComponentName who, boolean encrypt) { argument 5021 if (ap.encryptionRequested != encrypt) { 5022 ap.encryptionRequested = encrypt; 5148 private void setEncryptionRequested(boolean encrypt) { argument
|