Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 10 of 10) sorted by relevance

/hardware/interfaces/wifi/supplicant/1.1/
DISupplicantStaNetwork.hal51 * networks which supports encrypted IMSI.
53 * This identity is then encrypted using the public key of the carrier.
58 * Identity string is built from encrypted IMSI. Format is:
71 * Set EAP encrypted IMSI Identity for this network.
73 * @param identity Identity string built from the encrypted IMSI.
89 * @param encryptedIdentity Identity string containing the encrypted IMSI.
/hardware/interfaces/drm/1.0/
Dtypes.hal261 AES_CTR = 1, // Samples are encrypted with AES CTR mode
262 AES_CBC_CTS = 2, // Samples are encrypted with AES CBC CTS mode
263 AES_CBC = 3, // Samples are encrypted with AES CBC mode
268 * data followed by a number of bytes of encrypted data.
276 * A crypto Pattern is a repeating sequence of encrypted and clear blocks
280 * 10th block is encrypted.
284 * The number of blocks to be encrypted in the pattern. If zero,
DIDrmPlugin.hal211 * @return wrappedKey an opaque object containing encrypted private key
401 * encrypted data.
/hardware/interfaces/drm/1.2/
DICryptoPlugin.hal49 * of clear and encrypted bytes to process. This allows the decrypt
52 * @param offset the offset of the first byte of encrypted data from
/hardware/qcom/wlan/qcwcn/wifi_hal/
Dpkt_stats.h146 u32 encrypted : 1; //[13] member
Dwifilogger_diag.cpp1609 if (rx_stats_rcvd->mpdu_start.encrypted) in parse_rx_stats_v2()
1739 if (rx_stats_rcvd->mpdu_start.encrypted) in parse_rx_stats()
/hardware/interfaces/keymaster/3.0/
DIKeymasterDevice.hal83 * @return keyBlob Opaque, encrypted descriptor of the generated key, which generally contains a
104 * @return keyBlob Opaque, encrypted descriptor of the generated key, which will generally
Dtypes.hal244 * encrypted key material stored in the file system cannot be used until the file system is
/hardware/interfaces/keymaster/4.0/
Dtypes.hal135 * PaddingMode::NONE is used with block mode ECB or CBC and the data to be encrypted or
221 * that can be used without file system support. This is critical for devices with encrypted
816 * tag is provided to update and specifies data that is not encrypted/decrypted, but is used in
974 * encrypted key material stored in the file system cannot be used until the file system is
DIKeymasterDevice.hal466 * strategy is to include an encrypted copy of the key material, wrapped in a key
501 * strategy is to include an encrypted copy of the key material, wrapped in a key
540 * o encryptedTransportKey is a 256-bit AES key, XORed with a masking key and then encrypted
544 * encrypted with encryptedEphemeralKey in AES-GCM mode, with the DER-encoded
1154 * to be encrypted or decrypted. An update call may receive both associated data and data to