Home
last modified time | relevance | path

Searched refs:algorithm (Results 1 – 25 of 31) sorted by relevance

12

/hardware/interfaces/usb/1.2/
DIUsb.hal30 * presence detection algorithm. Calling enableContaminantPresenceDetection
38 * @param enable true Enable contaminant presence detection algorithm.
39 * false Disable contaminant presence detection algorithm.
46 * presence protection algorithm. Calling
50 * Used to enable/disable contaminant presence protection algorithm.
57 * change in the status of contaminant presence protection algorithm.
Dtypes.hal117 * Current status of contaminant detection algorithm.
/hardware/libhardware/include/hardware/
Dkeymaster1.h150 keymaster_algorithm_t algorithm,
169 keymaster_algorithm_t algorithm,
188 keymaster_algorithm_t algorithm,
207 keymaster_algorithm_t algorithm,
225 keymaster_algorithm_t algorithm,
/hardware/interfaces/drm/1.0/vts/functional/
Ddrm_hal_clearkey_test.cpp594 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local
595 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
605 hidl_string algorithm; in TEST_P() local
606 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
616 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local
617 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
626 hidl_string algorithm = "HmacSHA256"; in TEST_P() local
627 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P()
637 hidl_string algorithm; in TEST_P() local
638 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P()
[all …]
Ddrm_hal_vendor_test.cpp690 hidl_string algorithm; in TEST_P() local
691 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
703 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local
704 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
718 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local
719 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
732 hidl_string algorithm; in TEST_P() local
733 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P()
745 hidl_string algorithm = "HmacSHA256"; in TEST_P() local
746 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P()
[all …]
/hardware/interfaces/drm/1.0/
DIDrmPlugin.hal369 * Set the cipher algorithm to be used for the specified session.
372 * @param algorithm the algorithm to use. The string conforms to JCA
374 * example algorithm is "AES/CBC/PKCS5Padding".
378 * if the HAL is in a state where the algorithm cannot be set.
380 setCipherAlgorithm(SessionId sessionId, string algorithm)
384 * Set the MAC algorithm to be used for computing hashes in a session.
387 * @param algorithm the algorithm to use. The string conforms to JCA
389 * algorithm string is "HmacSHA256".
393 * if the HAL is in a state where the algorithm cannot be set.
395 setMacAlgorithm(SessionId sessionId, string algorithm)
[all …]
/hardware/interfaces/drm/1.0/default/
DDrmPlugin.cpp252 const hidl_vec<uint8_t>& sessionId, const hidl_string& algorithm) { in setCipherAlgorithm() argument
255 String8(algorithm.c_str())); in setCipherAlgorithm()
260 const hidl_vec<uint8_t>& sessionId, const hidl_string& algorithm) { in setMacAlgorithm() argument
263 String8(algorithm.c_str())); in setMacAlgorithm()
312 const hidl_string& algorithm, const hidl_vec<uint8_t>& message, in signRSA() argument
317 String8(algorithm.c_str()), toVector(message), toVector(wrappedKey), in signRSA()
DDrmPlugin.h104 const hidl_string& algorithm) override;
107 const hidl_string& algorithm) override;
126 const hidl_string& algorithm, const hidl_vec<uint8_t>& message,
/hardware/interfaces/keymaster/4.0/vts/performance/
DBenchmark.cpp138 bool GenerateKey(Algorithm algorithm, int keySize, Digest digest = Digest::NONE, in GenerateKey() argument
147 .Authorization(TAG_ALGORITHM, algorithm)
154 if (algorithm == Algorithm::RSA) {
196 optional<Algorithm> algorithm = getAlgorithm(transform); in GenerateKey() local
197 if (!algorithm) { in GenerateKey()
202 return GenerateKey(*algorithm, keySize, getDigest(transform), getPadding(transform, sign), in GenerateKey()
/hardware/interfaces/keymaster/3.0/vts/functional/
Dattestation_record.cpp62 ASN1_INTEGER* algorithm; member
89 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.maskedTag()),
228 copyAuthTag(record->algorithm, TAG_ALGORITHM, auth_list); in extract_auth_list()
Dkeymaster_tags.h217 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_ALGORITHM, f.algorithm)
356 inline const char* stringify(Algorithm algorithm) {
357 switch (algorithm) {
Dkey_param_output.cpp82 return os << param.f.algorithm; in operator <<()
/hardware/interfaces/keymaster/4.0/support/
Dkey_param_output.cpp54 return os << param.f.algorithm; in operator <<()
Dattestation_record.cpp68 ASN1_INTEGER* algorithm; member
99 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.maskedTag()),
243 copyAuthTag(record->algorithm, TAG_ALGORITHM, auth_list); in extract_auth_list()
/hardware/interfaces/keymaster/4.1/support/
Dattestation_record.cpp76 ASN1_INTEGER* algorithm; member
109 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.maskedTag()),
260 copyAuthTag(record->algorithm, TAG_ALGORITHM, auth_list); in extract_auth_list()
/hardware/interfaces/keymaster/4.0/vts/functional/
DKeymasterHidlTest.cpp636 std::vector<uint32_t> KeymasterHidlTest::ValidKeySizes(Algorithm algorithm) { in ValidKeySizes() argument
637 switch (algorithm) { in ValidKeySizes()
673 ADD_FAILURE() << "Invalid Algorithm: " << algorithm; in ValidKeySizes()
680 std::vector<uint32_t> KeymasterHidlTest::InvalidKeySizes(Algorithm algorithm) { in InvalidKeySizes() argument
682 switch (algorithm) { in InvalidKeySizes()
DKeymasterHidlTest.h208 std::vector<uint32_t> ValidKeySizes(Algorithm algorithm);
209 std::vector<uint32_t> InvalidKeySizes(Algorithm algorithm);
/hardware/interfaces/cas/1.2/
Dtypes.hal106 * a symmetric key algorithm.
/hardware/interfaces/nfc/1.1/
Dtypes.hal49 /** Lets the stack select an algorithm */
/hardware/interfaces/wifi/hostapd/1.0/
DIHostapd.hal83 * this flag, which must enable the ACS survey based algorithm.
/hardware/interfaces/keymaster/3.0/
Dtypes.hal189 * provide all possible combinations of algorithm and padding, only the
379 Algorithm algorithm;
/hardware/interfaces/camera/metadata/3.2/
Dtypes.hal179 * <p>Mode of operation for the chromatic aberration correction algorithm.</p>
197 * algorithm's antibanding compensation.</p>
439 * <p>Current state of the auto-exposure (AE) algorithm.</p>
445 * <p>Current state of auto-focus (AF) algorithm.</p>
458 * <p>Current state of auto-white balance (AWB) algorithm.</p>
639 * <p>32 characters describing GPS algorithm to
849 * <p>Mode of operation for the noise reduction algorithm.</p>
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/
Dkeymaster_tags.h222 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_ALGORITHM, f.algorithm)
/hardware/interfaces/keymaster/4.0/
Dtypes.hal77 * Tag::ALGORITHM specifies the cryptographic algorithm with which the key is used. This tag
87 * key's algorithm. For example, for RSA keys, Tag::KEY_SIZE specifies the size of the public
142 * algorithm, the generation or import method must return ErrorCode::INCOMPATIBLE_PADDING_MODE.
906 * provide all possible combinations of algorithm and padding, only the
1143 Algorithm algorithm;
DIKeymasterDevice.hal660 * o signature -- contains an the AlgorithmIdentifier of the algorithm used to sign, must be
720 * algorithm [2] EXPLICIT INTEGER OPTIONAL,
1256 * on begin() must be used as the PSS digest algorithm, MGF1 must be used as the mask
1257 * generation function and SHA1 must be used as the MGF1 digest algorithm.
1260 * used as the OAEP digest algorithm, MGF1 must be used as the mask generation function and
1261 * and SHA1 must be used as the MGF1 digest algorithm.

12