Searched refs:encrypted (Results 1 – 10 of 10) sorted by relevance
/hardware/interfaces/wifi/supplicant/1.1/ |
D | ISupplicantStaNetwork.hal | 51 * networks which supports encrypted IMSI. 53 * This identity is then encrypted using the public key of the carrier. 58 * Identity string is built from encrypted IMSI. Format is: 71 * Set EAP encrypted IMSI Identity for this network. 73 * @param identity Identity string built from the encrypted IMSI. 89 * @param encryptedIdentity Identity string containing the encrypted IMSI.
|
/hardware/interfaces/drm/1.0/ |
D | types.hal | 261 AES_CTR = 1, // Samples are encrypted with AES CTR mode 262 AES_CBC_CTS = 2, // Samples are encrypted with AES CBC CTS mode 263 AES_CBC = 3, // Samples are encrypted with AES CBC mode 268 * data followed by a number of bytes of encrypted data. 276 * A crypto Pattern is a repeating sequence of encrypted and clear blocks 280 * 10th block is encrypted. 284 * The number of blocks to be encrypted in the pattern. If zero,
|
D | IDrmPlugin.hal | 211 * @return wrappedKey an opaque object containing encrypted private key 401 * encrypted data.
|
/hardware/interfaces/drm/1.2/ |
D | ICryptoPlugin.hal | 49 * of clear and encrypted bytes to process. This allows the decrypt 52 * @param offset the offset of the first byte of encrypted data from
|
/hardware/qcom/wlan/qcwcn/wifi_hal/ |
D | pkt_stats.h | 146 u32 encrypted : 1; //[13] member
|
D | wifilogger_diag.cpp | 1609 if (rx_stats_rcvd->mpdu_start.encrypted) in parse_rx_stats_v2() 1739 if (rx_stats_rcvd->mpdu_start.encrypted) in parse_rx_stats()
|
/hardware/interfaces/keymaster/3.0/ |
D | IKeymasterDevice.hal | 83 * @return keyBlob Opaque, encrypted descriptor of the generated key, which generally contains a 104 * @return keyBlob Opaque, encrypted descriptor of the generated key, which will generally
|
D | types.hal | 244 * encrypted key material stored in the file system cannot be used until the file system is
|
/hardware/interfaces/keymaster/4.0/ |
D | types.hal | 135 * PaddingMode::NONE is used with block mode ECB or CBC and the data to be encrypted or 221 * that can be used without file system support. This is critical for devices with encrypted 816 * tag is provided to update and specifies data that is not encrypted/decrypted, but is used in 974 * encrypted key material stored in the file system cannot be used until the file system is
|
D | IKeymasterDevice.hal | 466 * strategy is to include an encrypted copy of the key material, wrapped in a key 501 * strategy is to include an encrypted copy of the key material, wrapped in a key 540 * o encryptedTransportKey is a 256-bit AES key, XORed with a masking key and then encrypted 544 * encrypted with encryptedEphemeralKey in AES-GCM mode, with the DER-encoded 1154 * to be encrypted or decrypted. An update call may receive both associated data and data to
|