/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/ |
H A D | CellTileView.java | 46 protected void updateIcon(ImageView iv, State state) { argument 48 super.updateIcon(iv, state); 50 } else if (!Objects.equals(state.icon, iv.getTag(R.id.qs_icon_tag))) { 52 iv.setImageDrawable(mSignalDrawable); 53 iv.setTag(R.id.qs_icon_tag, state.icon);
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/ |
H A D | AesCtrDecryptor.cpp | 30 const Iv iv, const uint8_t* source, 48 memcpy(opensslIv, iv, sizeof(opensslIv)); 29 decrypt(const android::Vector<uint8_t>& key, const Iv iv, const uint8_t* source, uint8_t* destination, const SubSample* subSamples, size_t numSubSamples, size_t* bytesDecryptedOut) argument
|
H A D | CryptoPlugin.cpp | 35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, argument 67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples,
|
H A D | Session.cpp | 65 const KeyId keyId, const Iv iv, const void* source, 79 key, iv, 64 decrypt( const KeyId keyId, const Iv iv, const void* source, void* destination, const SubSample* subSamples, size_t numSubSamples, size_t* bytesDecryptedOut) argument
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/ |
H A D | AesCtrDecryptorUnittest.cpp | 33 status_t attemptDecrypt(const Key& key, const Iv& iv, const uint8_t* source, argument 40 return decryptor.decrypt(keyVector, iv, source, destination, subSamples, 45 void attemptDecryptExpectingSuccess(const Key& key, const Iv& iv, argument 52 ASSERT_EQ(android::OK, attemptDecrypt(key, iv, encrypted, outputBuffer, 65 Iv iv = { local 81 ASSERT_EQ(android::ERROR_DRM_DECRYPT, decryptor.decrypt(keyVector, iv, 99 Iv iv = { local 115 ASSERT_EQ(android::ERROR_DRM_DECRYPT, decryptor.decrypt(keyVector, iv, 131 Iv iv = { local 162 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypte 176 Iv iv = { local 222 Iv iv = { local 268 Iv iv = { local 317 Iv iv = { local 371 Iv iv = { local 426 Iv iv = { local [all...] |
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/ |
H A D | AesCtrDecryptor.cpp | 39 const Iv iv, const uint8_t* source, 57 memcpy(opensslIv, iv, sizeof(opensslIv)); 37 decrypt( const std::vector<uint8_t>& key, const Iv iv, const uint8_t* source, uint8_t* destination, const std::vector<SubSample> subSamples, size_t numSubSamples, size_t* bytesDecryptedOut) argument
|
H A D | Session.cpp | 71 const KeyId keyId, const Iv iv, const uint8_t* srcPtr, 87 itr->second /*key*/, iv, srcPtr, destPtr, subSamples, 70 decrypt( const KeyId keyId, const Iv iv, const uint8_t* srcPtr, uint8_t* destPtr, const std::vector<SubSample> subSamples, size_t* bytesDecryptedOut) argument
|
H A D | CryptoPlugin.cpp | 51 const hidl_array<uint8_t, KEY_IV_SIZE>& iv, 151 Status res = mSession->decrypt(keyId.data(), iv.data(), srcPtr, 48 decrypt( bool secure, const hidl_array<uint8_t, KEY_ID_SIZE>& keyId, const hidl_array<uint8_t, KEY_IV_SIZE>& iv, Mode mode, const Pattern& pattern, const hidl_vec<SubSample>& subSamples, const SharedBuffer& source, uint64_t offset, const DestinationBuffer& destination, decrypt_cb _hidl_cb) argument
|
/frameworks/av/media/libmediaplayerservice/nuplayer/ |
H A D | NuPlayerDrm.h | 98 uint8_t iv[kBlockSize]; member in struct:android::NuPlayerDrm::CryptoInfo 107 uint8_t iv[kBlockSize],
|
H A D | NuPlayerDrm.cpp | 236 uint8_t iv[kBlockSize], 251 memcpy(ret->iv, iv, kBlockSize); 306 const void *iv; local 308 if (meta.findData(kKeyCryptoIV, &type, &iv, &ivsize)) { 324 (uint8_t*) iv, 233 makeCryptoInfo( int numSubSamples, uint8_t key[kBlockSize], uint8_t iv[kBlockSize], CryptoPlugin::Mode mode, size_t *clearbytes, size_t *encryptedbytes) argument
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | CryptoHelper.java | 30 private static final String KEY_IV = "iv"; 66 byte[] iv = cipher.getIV(); 67 byte[] mac = createMac(encryptedBytes, iv); 72 encryptedBundle.putByteArray(KEY_IV, iv); 80 byte[] iv = bundle.getByteArray(KEY_IV); 83 if (!verifyMac(encryptedBytes, iv, mac)) { 88 IvParameterSpec ivSpec = new IvParameterSpec(iv); 102 private boolean verifyMac(@Nullable byte[] cipherArray, @Nullable byte[] iv, @Nullable byte[] macArray) argument 111 return constantTimeArrayEquals(macArray, createMac(cipherArray, iv)); 115 private byte[] createMac(@NonNull byte[] cipher, @NonNull byte[] iv) throw argument [all...] |
/frameworks/av/drm/libmediadrm/ |
H A D | ICrypto.cpp | 99 virtual ssize_t decrypt(const uint8_t key[16], const uint8_t iv[16], argument 116 if (iv == NULL) { 117 iv = kDummy; 121 data.write(iv, 16); 321 uint8_t iv[16]; local 322 data.read(iv, sizeof(iv)); 404 result = decrypt(key, iv, mode, pattern, source, offset,
|
H A D | CryptoHal.cpp | 321 ssize_t CryptoHal::decrypt(const uint8_t keyId[16], const uint8_t iv[16], argument 392 Return<void> hResult = mPlugin->decrypt(secure, toHidlArray16(keyId), toHidlArray16(iv), hMode,
|
H A D | IDrm.cpp | 556 Vector<uint8_t> const &iv, 564 writeVector(data, iv); 578 Vector<uint8_t> const &iv, 586 writeVector(data, iv); 1065 Vector<uint8_t> sessionId, keyId, input, iv, output; local 1069 readVector(data, iv); 1070 uint32_t result = encrypt(sessionId, keyId, input, iv, output); 1079 Vector<uint8_t> sessionId, keyId, input, iv, output; local 1083 readVector(data, iv); 1084 uint32_t result = decrypt(sessionId, keyId, input, iv, outpu 553 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 575 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument [all...] |
H A D | DrmHal.cpp | 1210 Vector<uint8_t> const &iv, Vector<uint8_t> &output) { 1219 toHidlVec(keyId), toHidlVec(input), toHidlVec(iv), 1233 Vector<uint8_t> const &iv, Vector<uint8_t> &output) { 1242 toHidlVec(keyId), toHidlVec(input), toHidlVec(iv), 1208 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 1231 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/include/ |
H A D | DrmPlugin.h | 197 const Vector<uint8_t>& iv, 200 input.size() == 0 || iv.size() == 0) { 211 const Vector<uint8_t>& iv, 214 input.size() == 0 || iv.size() == 0) { 193 encrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument 207 decrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument
|
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/include/ |
H A D | DrmPlugin.h | 178 const hidl_vec<uint8_t>& iv, 181 input.size() == 0 || iv.size() == 0) { 193 const hidl_vec<uint8_t>& iv, 196 input.size() == 0 || iv.size() == 0) { 174 encrypt( const hidl_vec<uint8_t>& sessionId, const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& iv, encrypt_cb _hidl_cb) argument 189 decrypt( const hidl_vec<uint8_t>& sessionId, const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& iv, decrypt_cb _hidl_cb) argument
|
/frameworks/base/core/jni/ |
H A D | android_net_LocalSocketImpl.cpp | 188 struct iovec iv; local 195 memset(&iv, 0, sizeof(iv)); 197 iv.iov_base = buf; 198 iv.iov_len = len; 200 msg.msg_iov = &iv; 290 struct iovec iv; local 291 memset(&iv, 0, sizeof(iv)); 293 iv [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreAuthenticatedAESCipherSpi.java | 100 byte[] iv = spec.getIV(); 101 if (iv == null) { 103 } else if (iv.length != IV_LENGTH_BYTES) { 105 + iv.length + " bytes. Only " + IV_LENGTH_BYTES 116 setIv(iv); 156 byte[] iv = getIv(); 157 if ((iv != null) && (iv.length > 0)) { 160 params.init(new GCMParameterSpec(mTagLengthBits, iv)); 333 protected void setIv(byte[] iv) { argument [all...] |
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/tileimpl/ |
H A D | QSIconViewImpl.java | 91 protected void updateIcon(ImageView iv, State state) { argument 93 if (!Objects.equals(icon, iv.getTag(R.id.qs_icon_tag)) 94 || !Objects.equals(state.slash, iv.getTag(R.id.qs_slash_tag))) { 95 boolean shouldAnimate = iv.isShown() && mAnimationEnabled 96 && iv.getDrawable() != null; 106 if (iv instanceof SlashImageView) { 107 ((SlashImageView) iv).setAnimationEnabled(shouldAnimate); 108 ((SlashImageView) iv).setState(null, d); 110 iv.setImageDrawable(d); 113 iv 131 setIcon(ImageView iv, QSTile.State state) argument 162 animateGrayScale(int fromColor, int toColor, ImageView iv, final Runnable endRunnable) argument 196 setTint(ImageView iv, int color) argument [all...] |
/frameworks/av/drm/mediacas/plugins/clearkey/ |
H A D | ClearKeyCasPlugin.cpp | 224 unsigned char iv[AES_BLOCK_SIZE]; local 225 memset(iv, 0, AES_BLOCK_SIZE); 232 AES_cbc_encrypt(data, data, length, &key, iv, 0); 245 AES_cbc_encrypt(data, data, cbc_byte_count, &key, iv, 0); 268 AES_cbc_encrypt(data, data, AES_BLOCK_SIZE, &key, iv, 0);
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.cpp | 555 Vector<uint8_t> const &iv, 559 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 563 vectorToString(iv).string()); 574 // byte[] iv -> mock-iv 577 mByteArrayProperties.add(String8("mock-iv"), iv); 594 Vector<uint8_t> const &iv, 598 ALOGD("MockDrmPlugin::decrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 602 vectorToString(iv) 552 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 591 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 795 decrypt(bool secure, const uint8_t key[DECRYPT_KEY_SIZE], const uint8_t iv[DECRYPT_KEY_SIZE], Mode mode, const Pattern &pattern, const void *srcPtr, const SubSample *subSamples, size_t numSubSamples, void *dstPtr, AString * ) argument [all...] |
/frameworks/av/media/ndk/ |
H A D | NdkMediaExtractor.cpp | 386 const void *iv; local 388 if (meta->findData(kKeyCryptoIV, &type, &iv, &ivsize)) { 403 (uint8_t*) iv,
|
H A D | NdkMediaCodec.cpp | 741 uint8_t iv[16]; member in struct:AMediaCodecCryptoInfo 773 crypto->iv, 808 uint8_t iv[16], 822 memcpy(ret->iv, iv, 16); 869 memcpy(dst, ci->iv, 16); 805 AMediaCodecCryptoInfo_new( int numsubsamples, uint8_t key[16], uint8_t iv[16], cryptoinfo_mode_t mode, size_t *clearbytes, size_t *encryptedbytes) argument
|
H A D | NdkMediaDrm.cpp | 586 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 611 ivVec.appendArray(iv, kIvSize); 627 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 632 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 638 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 643 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 584 encrypt_decrypt_common(AMediaDrm *mObj, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) argument 626 AMediaDrm_encrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument 637 AMediaDrm_decrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument
|