/frameworks/base/media/lib/signer/java/com/android/mediadrm/signer/ |
MediaDrmSigner.java | 129 * @param wrappedKey - the wrapped (encrypted) RSA private key obtained
|
/frameworks/native/include/media/hardware/ |
CryptoAPI.h | 51 // Each subsample is encrypted w/ an iv of all zeroes.
|
/hardware/libhardware/include/hardware/ |
keymaster_common.h | 85 * this type are normally returned encrypted with a
|
/prebuilts/ndk/9/platforms/android-21/arch-arm/usr/include/media/ |
NdkMediaDrm.h | 156 * to obtain or release keys used to decrypt encrypted content. 388 * In addition to supporting decryption of DASH Common Encrypted Media, the 395 * encrypted session keys which can be used for general purpose crypto operations. 407 * by cipherAlgorithm, and write the encrypted result into output. The caller must
|
/prebuilts/ndk/9/platforms/android-21/arch-arm64/usr/include/media/ |
NdkMediaDrm.h | 156 * to obtain or release keys used to decrypt encrypted content. 388 * In addition to supporting decryption of DASH Common Encrypted Media, the 395 * encrypted session keys which can be used for general purpose crypto operations. 407 * by cipherAlgorithm, and write the encrypted result into output. The caller must
|
/prebuilts/ndk/9/platforms/android-21/arch-mips/usr/include/media/ |
NdkMediaDrm.h | 156 * to obtain or release keys used to decrypt encrypted content. 388 * In addition to supporting decryption of DASH Common Encrypted Media, the 395 * encrypted session keys which can be used for general purpose crypto operations. 407 * by cipherAlgorithm, and write the encrypted result into output. The caller must
|
/prebuilts/ndk/9/platforms/android-21/arch-mips64/usr/include/media/ |
NdkMediaDrm.h | 156 * to obtain or release keys used to decrypt encrypted content. 388 * In addition to supporting decryption of DASH Common Encrypted Media, the 395 * encrypted session keys which can be used for general purpose crypto operations. 407 * by cipherAlgorithm, and write the encrypted result into output. The caller must
|
/prebuilts/ndk/9/platforms/android-21/arch-x86/usr/include/media/ |
NdkMediaDrm.h | 156 * to obtain or release keys used to decrypt encrypted content. 388 * In addition to supporting decryption of DASH Common Encrypted Media, the 395 * encrypted session keys which can be used for general purpose crypto operations. 407 * by cipherAlgorithm, and write the encrypted result into output. The caller must
|
/prebuilts/ndk/9/platforms/android-21/arch-x86_64/usr/include/media/ |
NdkMediaDrm.h | 156 * to obtain or release keys used to decrypt encrypted content. 388 * In addition to supporting decryption of DASH Common Encrypted Media, the 395 * encrypted session keys which can be used for general purpose crypto operations. 407 * by cipherAlgorithm, and write the encrypted result into output. The caller must
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/lib-dynload/ |
grp.so | |
spwd.so | |
/system/core/fs_mgr/ |
fs_mgr_priv.h | 52 * Also, "encryptable" means that filesystem can be encrypted.
|
/system/extras/ext4_utils/ |
ext4_crypt_init_extensions.cpp | 96 // Already encrypted with password? If so bail
|
/build/tools/signtos/ |
SignTos.java | 89 * Decrypt an encrypted PKCS#8 format private key. 103 // Probably not an encrypted key.
|
/external/boringssl/src/crypto/modes/ |
ctr.c | 75 /* The input encrypted as though 128bit counter mode is being used. The extra 77 * contained in *num, and the encrypted counter is kept in ecount_buf. Both
|
/external/ipsec-tools/src/racoon/doc/ |
README.plainrsa | 6 encrypted by a public key can be decrypted only by the corresponding 9 parties. Similarly, any data encrypted by the private key can be
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 310 const u8 *encrypted; member in struct:ikev2_payloads 322 const u8 *encrypted, size_t encrypted_len,
|
/frameworks/base/packages/BackupRestoreConfirmation/src/com/android/backupconfirm/ |
BackupRestoreConfirmation.java | 211 // the device is encrypted. 280 // "secure" i.e. assuming that the device is encrypted.
|
/frameworks/base/core/java/android/os/ |
Environment.java | 169 * If Encrypted File system is enabled, it returns an encrypted directory (/data/secure/system). 184 * If Encrypted File system is enabled, it returns an encrypted directory (/data/secure). 220 * Returns whether the Encrypted File System feature is enabled on the device or not. 221 * @return <code>true</code> if Encrypted File System feature is enabled, <code>false</code>
|
/frameworks/base/media/java/android/media/ |
MediaDrm.java | 43 * Encrypted content is prepared using an encryption server and stored in a content 44 * library. The encrypted content is streamed or downloaded from the content library to 64 * involved while playing back encrypted content: 89 * encrypted content, the samples returned from the extractor remain encrypted, they 736 * to obtain or release keys used to decrypt encrypted content. [all...] |
/system/security/keystore/ |
keystore.cpp | 75 * values are encrypted with checksums. The encryption key is protected by a 489 uint8_t encrypted[0]; // Marks offset to encrypted data. member in struct:blob 492 int32_t length; // in network byte order when encrypted 571 void setEncrypted(bool encrypted) { 572 if (encrypted) { 607 ALOGD("couldn't insert encrypted blob while not unlocked"); 622 // encrypted data includes the digest value 625 memmove(&mBlob.encrypted[encryptedLength], &mBlob.value[mBlob.length], mBlob.info); 636 AES_cbc_encrypt(mBlob.encrypted, mBlob.encrypted, encryptedLength [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 448 const u8 *encrypted, 458 hdr, encrypted, encrypted_len, 495 if (pl->encrypted) { 496 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 498 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, 502 "encrypted payload"); 722 &data->keys, 0, hdr, pl->encrypted,
|
/external/srtp/srtp/ |
srtp.c | 47 #include "ekt.h" /* for SRTP Encrypted Key Transport */ 599 uint32_t *enc_start; /* pointer to start of encrypted portion */ 601 unsigned enc_octet_len = 0; /* number of octets in encrypted portion */ 688 * encrypted - the encrypted portion starts after the rtp header 842 uint32_t *enc_start; /* pointer to start of encrypted portion */ 844 unsigned enc_octet_len = 0;/* number of octets in encrypted portion */ 957 * decrypted - the encrypted portion starts after the rtp header [all...] |
/external/openssh/ |
sshconnect1.c | 645 /* Send the encrypted session key to the server. */ 653 /* Send and destroy the encrypted encryption key integer. */ 664 debug("Sent encrypted session key."); 677 * will be received in encrypted form. 681 debug("Received encrypted confirmation.");
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 409 * @in_data: Plaintext data to be encrypted 410 * Returns: Encrypted TLS data or %NULL on failure 413 * send data in the encrypted tunnel. The caller is responsible for freeing the 424 * @in_data: Encrypted TLS data 428 * receive data from the encrypted tunnel. The caller is responsible for
|