/frameworks/av/drm/drmserver/ |
DrmManager.h | 125 status_t decrypt(int uniqueId, DecryptHandle* decryptHandle, int decryptUnitId,
|
DrmManagerService.h | 51 DECRYPT = 5, 132 status_t decrypt(int uniqueId, DecryptHandle* decryptHandle, int decryptUnitId,
|
DrmManagerService.cpp | 46 "decrypt", 312 status_t DrmManagerService::decrypt( function in class:DrmManagerService 315 ALOGV("Entering decrypt"); 316 if (!isProtectedCallAllowed(DECRYPT)) { 319 return mDrmManager->decrypt(uniqueId, decryptHandle, decryptUnitId, encBuffer, decBuffer, IV);
|
/frameworks/av/drm/libdrmframework/include/ |
DrmManagerClientImpl.h | 298 * Open the decrypt session to decrypt the given protected content 312 * Open the decrypt session to decrypt the given protected content 324 * Open the decrypt session to decrypt the given protected content 327 * @param[in] buf Data to initiate decrypt session 336 * Close the decrypt session for the given handle 359 * Decrypt the protected content buffers for the given unit 375 virtual status_t decrypt(int uniqueId, sp<DecryptHandle> &decryptHandle, int decryptUnitId [all...] |
/hardware/interfaces/drm/1.0/ |
IDrmPlugin.hal | 25 * obtaining drm keys that may be used by a codec to decrypt protected 57 * Server to obtain the keys required to decrypt the content. 364 * encrypt, decrypt, sign verify operations on operator-provided 417 * Decrypt the provided input buffer with the cipher algorithm 423 * @param input the input data to decrypt 428 * if the HAL is in a state where the decrypt operation cannot be 432 decrypt(SessionId sessionId, vec<uint8_t> keyId, vec<uint8_t> input,
|
/hardware/interfaces/drm/1.0/vts/functional/ |
drm_hal_clearkey_test.cpp | 352 * Helper method to load keys for subsequent decrypt tests. 787 * Clearkey doesn't support generic encrypt/decrypt/sign/verify. 809 auto res = drmPlugin->decrypt(session, keyId, input, iv, 979 uint32_t DrmHalClearkeyDecryptTest::decrypt(Mode mode, function in class:DrmHalClearkeyDecryptTest [all...] |
drm_hal_vendor_test.cpp | 456 * Helper method to load keys for subsequent decrypt tests. 935 * Generic encrypt/decrypt/sign/verify should fail on invalid 954 auto res = drmPlugin->decrypt( 1314 uint32_t DrmHalVendorDecryptTest::decrypt(Mode mode, bool isSecure, function in class:DrmHalVendorDecryptTest [all...] |
/prebuilts/go/darwin-x86/src/crypto/aes/ |
cipher_s390x.go | 71 func (c *aesCipherAsm) Decrypt(dst, src []byte) { 78 // The decrypt function code is equal to the function code + 128.
|
/prebuilts/go/linux-x86/src/crypto/aes/ |
cipher_s390x.go | 71 func (c *aesCipherAsm) Decrypt(dst, src []byte) { 78 // The decrypt function code is equal to the function code + 128.
|
/prebuilts/tools/common/m2/repository/org/sonatype/plexus/plexus-sec-dispatcher/1.3/ |
plexus-sec-dispatcher-1.3.jar | |
/external/scapy/scapy/layers/ |
dot11.py | 171 self.payload.decrypt(key) 294 def decrypt(self, key=None): member in class:Dot11WEP 306 self.decrypt()
|
/external/syslinux/gpxe/src/net/80211/ |
wpa_ccmp.c | 172 * Encrypt or decrypt data stream using AES in Counter mode 176 * @v srcv Data to encrypt or decrypt 178 * @v msrcv MIC value to encrypt or decrypt (may be NULL) 380 * Decrypt a packet using CCMP 434 /* Copy-decrypt data and MIC */ 461 .decrypt = ccmp_decrypt, 494 * Decrypt key data in EAPOL-Key frame 498 * @v msg Message to decrypt 527 .decrypt = ccmp_kie_decrypt,
|
/frameworks/av/drm/libdrmframework/ |
DrmManagerClientImpl.cpp | 303 status_t DrmManagerClientImpl::decrypt( function in class:DrmManagerClientImpl 310 status = getDrmManagerService()->decrypt(
|
/frameworks/av/drm/libmediadrm/ |
CryptoHal.cpp | 321 ssize_t CryptoHal::decrypt(const uint8_t keyId[16], const uint8_t iv[16], function in class:android::CryptoHal 392 Return<void> hResult = mPlugin->decrypt(secure, toHidlArray16(keyId), toHidlArray16(iv), hMode,
|
ICrypto.cpp | 36 DECRYPT, 99 virtual ssize_t decrypt(const uint8_t key[16], const uint8_t iv[16], function in struct:android::BpCrypto 150 remote()->transact(DECRYPT, data, &reply); 309 case DECRYPT: 404 result = decrypt(key, iv, mode, pattern, source, offset,
|
/frameworks/av/drm/mediacas/plugins/clearkey/ |
ClearKeyCasPlugin.cpp | 211 // AES-128 CBC-CTS decrypt optimized for Transport Packets. |key| is the AES 255 // Decrypt block[n-1] using block[n] as IV, consistent with the original 267 // Decrypt block[n-1] using previous IV. 342 ssize_t ClearKeyCasSession::decrypt( function in class:android::clearkeycas::ClearKeyCasSession 361 ALOGE("decrypt: key %d is invalid", keyIndex); 377 // Don't decrypt if len < AES_BLOCK_SIZE. 455 return mCASSession->decrypt(
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
cipher.go | 13 // or decrypt individual blocks. The mode implementations 23 // Decrypt decrypts the first block in src into dst. 25 Decrypt(dst, src []byte)
|
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
rsa_test.go | 117 m2, err := decrypt(nil, priv, c) 126 m3, err := decrypt(rand.Reader, priv, c) 168 decrypt(nil, test2048Key, c) 203 decrypt(nil, priv, c) 261 // Decrypt with blinding.
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
example_test.go | 109 // The resulting file can be used with Wireshark to decrypt the TLS
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
cipher.go | 13 // or decrypt individual blocks. The mode implementations 23 // Decrypt decrypts the first block in src into dst. 25 Decrypt(dst, src []byte)
|
/prebuilts/go/linux-x86/src/crypto/rsa/ |
rsa_test.go | 117 m2, err := decrypt(nil, priv, c) 126 m3, err := decrypt(rand.Reader, priv, c) 168 decrypt(nil, test2048Key, c) 203 decrypt(nil, priv, c) 261 // Decrypt with blinding.
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
example_test.go | 109 // The resulting file can be used with Wireshark to decrypt the TLS
|
/external/scapy/scapy/layers/tls/crypto/ |
cipher_block.py | 90 def decrypt(self, data): member in class:_BlockCipher 92 Decrypt the data. Also, update the cipher iv. This is needed for SSLv3
|
/external/scapy/scapy/layers/tls/ |
tools.py | 161 p.fragment = alg.decrypt(c.fragment) 190 in order to authenticate the data and decrypt c.fragment. When those
|
/external/syslinux/gpxe/src/include/gpxe/ |
net80211.h | 736 /** Decrypt a frame using the cryptosystem 742 * This method is called to decrypt a single frame. It is 748 * the returned packet, decrypt the data stream, remove any 759 struct io_buffer * ( * decrypt ) ( struct net80211_crypto *crypto, member in struct:net80211_crypto [all...] |