/frameworks/av/media/libmediaplayer2/nuplayer2/ |
NuPlayer2Decoder.cpp | 308 int32_t secure = 0; local 309 if (format->findInt32("secure", &secure) && secure != 0) { 312 mComponentName.append(".secure"); 323 (secure ? "secure " : ""), mime.c_str()); 327 mIsSecure = secure; [all...] |
/frameworks/av/media/libmediaplayerservice/nuplayer/ |
NuPlayerDecoder.cpp | 299 int32_t secure = 0; local 300 if (format->findInt32("secure", &secure) && secure != 0) { 303 mComponentName.append(".secure"); 312 (secure ? "secure " : ""), mime.c_str()); 316 mIsSecure = secure; [all...] |
/hardware/qcom/display/msm8909/sdm/include/core/ |
display_interface.h | 151 bool secure = false; //!< If this display is capable of handling secure content. member in struct:sdm::DisplayConfigFixedInfo
|
layer_buffer.h | 190 uint32_t secure : 1; //!< This flag shall be set by client to indicate that the member in struct:sdm::LayerBufferFlags::__anon49790::__anon49791 203 //!< secure display session is in progress. Secure display 204 //!< session can not coexist with non-secure session. 207 //!< buffer is associated with secure camera session. A secure 208 //!< camera layer can co-exist with non-secure layer(s).
|
/hardware/qcom/display/msm8909w_3100/sdm/include/core/ |
display_interface.h | 151 bool secure = false; //!< If this display is capable of handling secure content. member in struct:sdm::DisplayConfigFixedInfo
|
layer_buffer.h | 190 uint32_t secure : 1; //!< This flag shall be set by client to indicate that the member in struct:sdm::LayerBufferFlags::__anon49874::__anon49875 203 //!< secure display session is in progress. Secure display 204 //!< session can not coexist with non-secure session. 207 //!< buffer is associated with secure camera session. A secure 208 //!< camera layer can co-exist with non-secure layer(s).
|
/hardware/qcom/display/msm8998/sdm/include/core/ |
display_interface.h | 145 bool secure = false; //!< If this display is capable of handling secure content. member in struct:sdm::DisplayConfigFixedInfo
|
layer_buffer.h | 188 uint32_t secure : 1; //!< This flag shall be set by client to indicate that the member in struct:sdm::LayerBufferFlags::__anon50157::__anon50158 201 //!< secure display session is in progress. Secure display 202 //!< session can not coexist with non-secure session. 205 //!< buffer is associated with secure camera session. A secure 206 //!< camera layer can co-exist with non-secure layer(s).
|
/libcore/ojluni/src/main/java/java/net/ |
HttpCookie.java | 73 RESERVED_NAMES.add("secure"); // Netscape RFC 2109 RFC 2965 RFC 6265 92 private boolean secure; // Secure ... e.g. use SSL field in class:HttpCookie 176 secure = false; 476 * Indicates whether the cookie should only be sent using a secure protocol, 482 * If {@code true}, the cookie can only be sent over a secure 489 secure = flag; 494 * secure protocol, or {@code false} if the it can be sent using any 503 return secure; [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
isdn.h | 124 int secure; /* Flag: Secure */ member in struct:__anon62591
|
/system/netd/server/ |
CommandListener.cpp | 1380 bool secure = atoi(argv[5]); local [all...] |
/external/apache-http/src/org/apache/http/impl/client/ |
DefaultRequestDirector.java | 649 boolean secure = createTunnelToTarget(route, context); 651 managedConn.tunnelTarget(secure, this.params); 660 boolean secure = createTunnelToProxy(route, hop, context); 663 secure, this.params); local 702 * @return <code>true</code> if the tunnelled route is secure, [all...] |
/external/robolectric/v1/src/main/java/com/xtremelabs/robolectric/tester/org/apache/http/impl/client/ |
DefaultRequestDirector.java | 664 boolean secure = createTunnelToTarget(route, context); 666 managedConn.tunnelTarget(secure, this.params); 675 boolean secure = createTunnelToProxy(route, hop, context); 678 secure, this.params); local 717 * @return <code>true</code> if the tunnelled route is secure, [all...] |
/external/robolectric-shadows/shadows/httpclient/src/main/java/org/robolectric/shadows/httpclient/ |
DefaultRequestDirector.java | 682 boolean secure = createTunnelToTarget(route, context); 684 managedConn.tunnelTarget(secure, this.params); 693 boolean secure = createTunnelToProxy(route, hop, context); 696 secure, this.params); local 735 * @return {@code true} if the tunnelled route is secure, 854 // Even if that is secure, the hop to the target may be insecure. 874 * is secure, {@code false} otherwise. [all...] |
/external/webrtc/talk/session/media/ |
mediasession.h | 434 SecurePolicy secure() const { return secure_; } function in class:cricket::MediaSessionDescriptionFactory
|
/external/webrtc/webrtc/base/ |
httpcommon.h | 176 inline uint16_t HttpDefaultPort(bool secure) { 177 return secure ? HTTP_SECURE_PORT : HTTP_DEFAULT_PORT; 181 std::string HttpAddress(const SocketAddress& address, bool secure); 251 bool secure() const { return secure_; } function in class:rtc::Url
|
/external/webrtc/webrtc/p2p/base/ |
port.h | 102 bool secure; member in struct:cricket::ProtocolAddress 105 : address(a), proto(p), secure(false) { } 107 : address(a), proto(p), secure(sec) { }
|
/frameworks/base/core/jni/ |
android_view_SurfaceControl.cpp | 62 jfieldID secure; member in struct:android::__anon45708 476 jboolean secure) { 479 String8(name.c_str()), bool(secure))); 578 env->SetBooleanField(infoObj, gPhysicalDisplayInfoClassInfo.secure, info.secure); [all...] |
/frameworks/base/services/core/java/com/android/server/policy/keyguard/ |
KeyguardServiceDelegate.java | 7 import static com.android.server.wm.KeyguardServiceDelegateProto.SECURE; 70 boolean secure; field in class:KeyguardServiceDelegate.KeyguardState 82 // Assume keyguard is showing and secure until we know for sure. This is here in 87 secure = true; 152 mKeyguardState.secure = false; 279 mKeyguardState.secure = mKeyguardService.isSecure(userId); 281 return mKeyguardState.secure; 424 proto.write(SECURE, mKeyguardState.secure); 437 pw.println(prefix + "secure=" + mKeyguardState.secure) [all...] |
/hardware/qcom/display/msm8909/sdm/libs/hwc/ |
hwc_display.cpp | 456 layer_buffer.flags.secure = true; 461 // Gralloc Usage Protected Buffer - L3 - which needs to be treated as Secure & avoid fallback 561 bool secure = (pvt_handle->flags & private_handle_t::PRIV_FLAGS_SECURE_BUFFER) || local 564 if (NonIntegralSourceCrop && (!secure && pvt_handle->bufferType != BUFFER_TYPE_VIDEO)) { [all...] |
/hardware/qcom/display/msm8909w_3100/sdm/libs/hwc/ |
hwc_display.cpp | 456 layer_buffer.flags.secure = true; 461 // Gralloc Usage Protected Buffer - L3 - which needs to be treated as Secure & avoid fallback 561 bool secure = (pvt_handle->flags & private_handle_t::PRIV_FLAGS_SECURE_BUFFER) || local 564 if (NonIntegralSourceCrop && (!secure && pvt_handle->bufferType != BUFFER_TYPE_VIDEO)) { [all...] |
/external/webrtc/talk/app/webrtc/ |
peerconnection.cc | 317 bool secure = (service_type == TURNS); local 320 turn_transport_type, secure)); [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 379 "for secure operations - update keys later when " 2856 int wpa_ie_len, secure, keyidx, encr = 0; local 4564 int wpa_ie_len, secure, keyidx, encr = 0; local [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
RttManager.java | 208 /** Whether the secure RTT protocol is supported. */ 268 sb.append(" Secure RTT protocol is ") 345 * Whether the secure RTT protocol needs to be used for ranging this peer device. 347 public boolean secure; field in class:RttManager.RttParams 488 sb.append(", secure=" + secure); 539 dest.writeByte(params.secure ? (byte) 1 : 0); 570 params[i].secure = (in.readByte() != 0); 751 * Whether the secure RTT protocol was used for ranging. 753 public boolean secure; field in class:RttManager.RttResult [all...] |
/hardware/qcom/display/msm8994/libhwcomposer/ |
hwc_utils.h | 93 bool secure; member in struct:qhwc::DisplayAttributes 136 bool secureUI; // Secure display layer 142 // Secure RGB specific 507 // Returns true if the buffer is secure 522 //Return true if the buffer is intended for Secure Display 641 //Display in secure mode indicator
|