/hardware/interfaces/usb/1.2/ |
D | IUsb.hal | 30 * presence detection algorithm. Calling enableContaminantPresenceDetection 38 * @param enable true Enable contaminant presence detection algorithm. 39 * false Disable contaminant presence detection algorithm. 46 * presence protection algorithm. Calling 50 * Used to enable/disable contaminant presence protection algorithm. 57 * change in the status of contaminant presence protection algorithm.
|
D | types.hal | 117 * Current status of contaminant detection algorithm.
|
/hardware/libhardware/include/hardware/ |
D | keymaster1.h | 150 keymaster_algorithm_t algorithm, 169 keymaster_algorithm_t algorithm, 188 keymaster_algorithm_t algorithm, 207 keymaster_algorithm_t algorithm, 225 keymaster_algorithm_t algorithm,
|
/hardware/interfaces/drm/1.0/vts/functional/ |
D | drm_hal_clearkey_test.cpp | 594 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local 595 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 605 hidl_string algorithm; in TEST_P() local 606 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 616 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local 617 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 626 hidl_string algorithm = "HmacSHA256"; in TEST_P() local 627 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P() 637 hidl_string algorithm; in TEST_P() local 638 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P() [all …]
|
D | drm_hal_vendor_test.cpp | 690 hidl_string algorithm; in TEST_P() local 691 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 703 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local 704 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 718 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local 719 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 732 hidl_string algorithm; in TEST_P() local 733 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P() 745 hidl_string algorithm = "HmacSHA256"; in TEST_P() local 746 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P() [all …]
|
/hardware/interfaces/drm/1.0/ |
D | IDrmPlugin.hal | 369 * Set the cipher algorithm to be used for the specified session. 372 * @param algorithm the algorithm to use. The string conforms to JCA 374 * example algorithm is "AES/CBC/PKCS5Padding". 378 * if the HAL is in a state where the algorithm cannot be set. 380 setCipherAlgorithm(SessionId sessionId, string algorithm) 384 * Set the MAC algorithm to be used for computing hashes in a session. 387 * @param algorithm the algorithm to use. The string conforms to JCA 389 * algorithm string is "HmacSHA256". 393 * if the HAL is in a state where the algorithm cannot be set. 395 setMacAlgorithm(SessionId sessionId, string algorithm) [all …]
|
/hardware/interfaces/drm/1.0/default/ |
D | DrmPlugin.cpp | 252 const hidl_vec<uint8_t>& sessionId, const hidl_string& algorithm) { in setCipherAlgorithm() argument 255 String8(algorithm.c_str())); in setCipherAlgorithm() 260 const hidl_vec<uint8_t>& sessionId, const hidl_string& algorithm) { in setMacAlgorithm() argument 263 String8(algorithm.c_str())); in setMacAlgorithm() 312 const hidl_string& algorithm, const hidl_vec<uint8_t>& message, in signRSA() argument 317 String8(algorithm.c_str()), toVector(message), toVector(wrappedKey), in signRSA()
|
D | DrmPlugin.h | 104 const hidl_string& algorithm) override; 107 const hidl_string& algorithm) override; 126 const hidl_string& algorithm, const hidl_vec<uint8_t>& message,
|
/hardware/interfaces/keymaster/4.0/vts/performance/ |
D | Benchmark.cpp | 138 bool GenerateKey(Algorithm algorithm, int keySize, Digest digest = Digest::NONE, in GenerateKey() argument 147 .Authorization(TAG_ALGORITHM, algorithm) 154 if (algorithm == Algorithm::RSA) { 196 optional<Algorithm> algorithm = getAlgorithm(transform); in GenerateKey() local 197 if (!algorithm) { in GenerateKey() 202 return GenerateKey(*algorithm, keySize, getDigest(transform), getPadding(transform, sign), in GenerateKey()
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | attestation_record.cpp | 62 ASN1_INTEGER* algorithm; member 89 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.maskedTag()), 228 copyAuthTag(record->algorithm, TAG_ALGORITHM, auth_list); in extract_auth_list()
|
D | keymaster_tags.h | 217 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_ALGORITHM, f.algorithm) 356 inline const char* stringify(Algorithm algorithm) { 357 switch (algorithm) {
|
D | key_param_output.cpp | 82 return os << param.f.algorithm; in operator <<()
|
/hardware/interfaces/keymaster/4.0/support/ |
D | key_param_output.cpp | 54 return os << param.f.algorithm; in operator <<()
|
D | attestation_record.cpp | 68 ASN1_INTEGER* algorithm; member 99 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.maskedTag()), 243 copyAuthTag(record->algorithm, TAG_ALGORITHM, auth_list); in extract_auth_list()
|
/hardware/interfaces/keymaster/4.1/support/ |
D | attestation_record.cpp | 76 ASN1_INTEGER* algorithm; member 109 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.maskedTag()), 260 copyAuthTag(record->algorithm, TAG_ALGORITHM, auth_list); in extract_auth_list()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | KeymasterHidlTest.cpp | 636 std::vector<uint32_t> KeymasterHidlTest::ValidKeySizes(Algorithm algorithm) { in ValidKeySizes() argument 637 switch (algorithm) { in ValidKeySizes() 673 ADD_FAILURE() << "Invalid Algorithm: " << algorithm; in ValidKeySizes() 680 std::vector<uint32_t> KeymasterHidlTest::InvalidKeySizes(Algorithm algorithm) { in InvalidKeySizes() argument 682 switch (algorithm) { in InvalidKeySizes()
|
D | KeymasterHidlTest.h | 208 std::vector<uint32_t> ValidKeySizes(Algorithm algorithm); 209 std::vector<uint32_t> InvalidKeySizes(Algorithm algorithm);
|
/hardware/interfaces/cas/1.2/ |
D | types.hal | 106 * a symmetric key algorithm.
|
/hardware/interfaces/nfc/1.1/ |
D | types.hal | 49 /** Lets the stack select an algorithm */
|
/hardware/interfaces/wifi/hostapd/1.0/ |
D | IHostapd.hal | 83 * this flag, which must enable the ACS survey based algorithm.
|
/hardware/interfaces/keymaster/3.0/ |
D | types.hal | 189 * provide all possible combinations of algorithm and padding, only the 379 Algorithm algorithm;
|
/hardware/interfaces/camera/metadata/3.2/ |
D | types.hal | 179 * <p>Mode of operation for the chromatic aberration correction algorithm.</p> 197 * algorithm's antibanding compensation.</p> 439 * <p>Current state of the auto-exposure (AE) algorithm.</p> 445 * <p>Current state of auto-focus (AF) algorithm.</p> 458 * <p>Current state of auto-white balance (AWB) algorithm.</p> 639 * <p>32 characters describing GPS algorithm to 849 * <p>Mode of operation for the noise reduction algorithm.</p>
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | keymaster_tags.h | 222 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_ALGORITHM, f.algorithm)
|
/hardware/interfaces/keymaster/4.0/ |
D | types.hal | 77 * Tag::ALGORITHM specifies the cryptographic algorithm with which the key is used. This tag 87 * key's algorithm. For example, for RSA keys, Tag::KEY_SIZE specifies the size of the public 142 * algorithm, the generation or import method must return ErrorCode::INCOMPATIBLE_PADDING_MODE. 906 * provide all possible combinations of algorithm and padding, only the 1143 Algorithm algorithm;
|
D | IKeymasterDevice.hal | 660 * o signature -- contains an the AlgorithmIdentifier of the algorithm used to sign, must be 720 * algorithm [2] EXPLICIT INTEGER OPTIONAL, 1256 * on begin() must be used as the PSS digest algorithm, MGF1 must be used as the mask 1257 * generation function and SHA1 must be used as the MGF1 digest algorithm. 1260 * used as the OAEP digest algorithm, MGF1 must be used as the mask generation function and 1261 * and SHA1 must be used as the MGF1 digest algorithm.
|