/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | SyntheticPasswordCrypto.java | 67 private static byte[] encrypt(SecretKey key, byte[] blob) method in class:SyntheticPasswordCrypto 88 public static byte[] encrypt(byte[] keyBytes, byte[] personalisation, byte[] message) { method in class:SyntheticPasswordCrypto 93 return encrypt(key, message); 167 byte[] intermediate = encrypt(applicationId, APPLICATION_ID_PERSONALIZATION, data); 168 return encrypt(secretKey, intermediate); 174 throw new RuntimeException("Failed to encrypt blob", e);
|
/frameworks/native/headers/media_plugin/media/hardware/ |
H A D | HDCPAPI.h | 61 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt 105 virtual status_t encrypt( function in struct:android::HDCPModule
|
/frameworks/native/include/media/hardware/ |
H A D | HDCPAPI.h | 61 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt 105 virtual status_t encrypt( function in struct:android::HDCPModule
|
/frameworks/base/core/java/android/bluetooth/ |
H A D | BluetoothServerSocket.java | 82 * @param encrypt require the connection to be encrypted 87 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port) argument 90 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null); 101 * @param encrypt require the connection to be encrypted 108 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port, argument 112 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null, mitm, 124 * @param encrypt require the connection to be encrypted 129 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, ParcelUuid uuid) argument 131 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, -1, uuid);
|
H A D | BluetoothSocket.java | 166 * @param encrypt require the connection to be encrypted 173 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, argument 175 this(type, fd, auth, encrypt, device, port, uuid, false, false); 184 * @param encrypt require the connection to be encrypted 193 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, argument 212 mEncrypt = encrypt; 274 * @param encrypt require the connection to be encrypted 280 private BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, String address, argument 282 this(type, fd, auth, encrypt, new BluetoothDevice(address), port, null, false, false);
|
H A D | BluetoothAdapter.java | 2064 boolean auth, boolean encrypt) throws IOException { 2066 socket = new BluetoothServerSocket(BluetoothSocket.TYPE_RFCOMM, auth, encrypt, 2063 createNewRfcommSocketAndRecord(String name, UUID uuid, boolean auth, boolean encrypt) argument
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/include/ |
H A D | DrmPlugin.h | 193 virtual status_t encrypt( function in class:clearkeydrm::DrmPlugin
|
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/include/ |
H A D | DrmPlugin.h | 174 Return<void> encrypt( function in struct:android::hardware::drm::V1_1::clearkey::DrmPlugin
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
H A D | SecureBox.java | 131 * Randomly generates a public-key pair that can be used for the functions {@link #encrypt} and 175 public static byte[] encrypt( method in class:SecureBox 218 * <p>Note that {@code header} should be the same data used for {@link #encrypt}, which is
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.cpp | 552 status_t MockDrmPlugin::encrypt(Vector<uint8_t> const &sessionId, function in class:android::MockDrmPlugin 559 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)",
|
/frameworks/av/drm/libmediadrm/ |
H A D | IDrm.cpp | 553 virtual status_t encrypt(Vector<uint8_t> const &sessionId, function in struct:android::BpDrm 1070 uint32_t result = encrypt(sessionId, keyId, input, iv, output);
|
H A D | DrmHal.cpp | 1208 status_t DrmHal::encrypt(Vector<uint8_t> const &sessionId, function in class:android::DrmHal 1218 Return<void> hResult = mPlugin->encrypt(toHidlVec(sessionId),
|
/frameworks/av/media/ndk/ |
H A D | NdkMediaDrm.cpp | 587 const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) { 614 if (encrypt) { 615 status = mObj->mDrm->encrypt(*iter, keyIdVec, inputVec, ivVec, outputVec); 584 encrypt_decrypt_common(AMediaDrm *mObj, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) argument
|
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 1347 * root of trust, and then perform encrypt, decrypt, sign and verify operations 1350 * The CryptoSession class implements generic encrypt/decrypt/sign/verify methods 1382 * @param input the data to encrypt 1386 public byte[] encrypt( method in class:MediaDrm.CryptoSession 1395 * @param input the data to encrypt 1431 * Obtain a CryptoSession object which can be used to encrypt, decrypt, 1437 * to be used for encrypt, decrypt, sign and/or verify
|
/frameworks/base/core/java/android/app/admin/ |
H A D | DevicePolicyManager.java | 3747 * Important Note: On some devices, it is possible to encrypt storage without requiring the user 3753 * @param encrypt true to request encryption, false to release any previous request 3764 public int setStorageEncryption(@NonNull ComponentName admin, boolean encrypt) { argument 3768 return mService.setStorageEncryption(admin, encrypt);
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | DevicePolicyManagerService.java | 6439 public int setStorageEncryption(ComponentName who, boolean encrypt) { argument 6463 if (ap.encryptionRequested != encrypt) { 6464 ap.encryptionRequested = encrypt; 6586 private void setEncryptionRequested(boolean encrypt) { argument
|