/frameworks/av/media/libmedia/include/media/ |
H A D | DrmHal.h | 112 Vector<uint8_t> const &iv, 118 Vector<uint8_t> const &iv,
|
H A D | IDrm.h | 98 Vector<uint8_t> const &iv, 104 Vector<uint8_t> const &iv,
|
/frameworks/base/tools/layoutlib/bridge/src/com/android/layoutlib/bridge/impl/binding/ |
H A D | AdapterHelper.java | 126 ImageView iv = (ImageView) view; 133 resolvedRef, ViewAttribute.SRC, iv.getDrawable());
|
/frameworks/native/include/media/drm/ |
H A D | DrmAPI.h | 299 Vector<uint8_t> const &iv, 308 Vector<uint8_t> const &iv,
|
/frameworks/av/drm/libmediadrm/ |
H A D | Drm.cpp | 677 Vector<uint8_t> const &iv, 691 return mPlugin->encrypt(sessionId, keyId, input, iv, output); 697 Vector<uint8_t> const &iv, 711 return mPlugin->decrypt(sessionId, keyId, input, iv, output); 674 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 694 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
|
H A D | CryptoHal.cpp | 281 ssize_t CryptoHal::decrypt(const uint8_t keyId[16], const uint8_t iv[16], argument 349 Return<void> hResult = mPlugin->decrypt(secure, toHidlArray16(keyId), toHidlArray16(iv), hMode,
|
H A D | DrmHal.cpp | 828 Vector<uint8_t> const &iv, Vector<uint8_t> &output) { 840 toHidlVec(keyId), toHidlVec(input), toHidlVec(iv), 854 Vector<uint8_t> const &iv, Vector<uint8_t> &output) { 866 toHidlVec(keyId), toHidlVec(input), toHidlVec(iv), 826 encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument 852 decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output) argument
|
/frameworks/base/media/jni/ |
H A D | android_media_MediaCodec.h | 88 const uint8_t iv[16],
|
H A D | android_media_MediaCodec.cpp | 344 const uint8_t iv[16], 351 index, offset, subSamples, numSubSamples, key, iv, mode, pattern, 1343 jbyte *iv = NULL; local 1411 iv = env->GetByteArrayElements(ivObj, &isCopy); 1421 (const uint8_t *)key, (const uint8_t *)iv, 1429 if (iv != NULL) { 1430 env->ReleaseByteArrayElements(ivObj, iv, 0); 1431 iv = NULL; 1784 gFields.cryptoInfoIVID = env->GetFieldID(clazz.get(), "iv", "[B"); 338 queueSecureInputBuffer( size_t index, size_t offset, const CryptoPlugin::SubSample *subSamples, size_t numSubSamples, const uint8_t key[16], const uint8_t iv[16], CryptoPlugin::Mode mode, const CryptoPlugin::Pattern &pattern, int64_t presentationTimeUs, uint32_t flags, AString *errorDetailMsg) argument
|
/frameworks/av/media/libstagefright/httplive/ |
H A D | PlaylistFetcher.cpp | 364 // If decrypting the first block in a file, read the iv from the manifest 365 // or derive the iv from the file's sequence number. 368 AString iv; local 369 if (itemMeta->findString("cipher-iv", &iv)) { 370 if ((!iv.startsWith("0x") && !iv.startsWith("0X")) 371 || iv.size() > 16 * 2 + 2) { 372 ALOGE("malformed cipher IV '%s'.", iv.c_str()); 376 while (iv [all...] |
/frameworks/av/media/ndk/ |
H A D | NdkMediaDrm.cpp | 586 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 611 ivVec.appendArray(iv, kIvSize); 627 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 632 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 638 const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, 643 return encrypt_decrypt_common(mObj, *sessionId, cipherAlgorithm, keyId, iv, 584 encrypt_decrypt_common(AMediaDrm *mObj, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize, bool encrypt) argument 626 AMediaDrm_encrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument 637 AMediaDrm_decrypt(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize) argument
|
/frameworks/base/tests/ActivityTests/src/com/google/android/test/activity/ |
H A D | ActivityTestMain.java | 123 ImageView iv = new ImageView(this); 125 iv.setImageBitmap(bm); 127 iv.setBackgroundResource(android.R.drawable.gallery_thumb); 130 container.addView(iv, new LinearLayout.LayoutParams(w, h)); 132 iv.setOnClickListener(new View.OnClickListener() { 147 iv.setOnLongClickListener(new View.OnLongClickListener() {
|
/frameworks/av/media/libstagefright/ |
H A D | ACodecBufferChannel.cpp | 104 const uint8_t *iv, CryptoPlugin::Mode mode, CryptoPlugin::Pattern pattern, 138 result = mCrypto->decrypt(key, iv, mode, pattern,
|
H A D | MediaCodec.cpp | 1030 const uint8_t iv[16], 1046 msg->setPointer("iv", (void *)iv); 2724 const uint8_t *iv; local 2740 iv = NULL; 2754 CHECK(msg->findPointer("iv", (void **)&iv)); 2804 iv, 1024 queueSecureInputBuffer( size_t index, size_t offset, const CryptoPlugin::SubSample *subSamples, size_t numSubSamples, const uint8_t key[16], const uint8_t iv[16], CryptoPlugin::Mode mode, const CryptoPlugin::Pattern &pattern, int64_t presentationTimeUs, uint32_t flags, AString *errorDetailMsg) argument
|
/frameworks/av/include/media/stagefright/ |
H A D | CodecBase.h | 288 const uint8_t *iv,
|
H A D | MediaCodec.h | 145 const uint8_t iv[16],
|
/frameworks/av/media/libstagefright/foundation/include/ |
H A D | CodecBase.h | 288 const uint8_t *iv,
|
/frameworks/av/media/libstagefright/include/ |
H A D | CodecBase.h | 288 const uint8_t *iv,
|
/frameworks/base/media/java/android/media/ |
H A D | MediaCodec.java | 2384 public byte[] iv; field in class:MediaCodec.CryptoInfo 2463 iv = newIV; 2485 builder.append("], iv ["); 2487 builder.append(hexdigits.charAt((iv[i] & 0xf0) >> 4)); 2488 builder.append(hexdigits.charAt(iv[i] & 0x0f));
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ProcessStatsService.java | 320 for (int iv=0; iv<NVERS; iv++) { 321 Slog.w(TAG, " Vers: " + vers.keyAt(iv)); 322 ProcessStats.PackageState pkgState = vers.valueAt(iv);
|
/frameworks/rs/driver/runtime/ |
H A D | rs_cl.c | 1240 int32_t iv; member in union:__anon1995 1249 (i) = gf_u.iv; \ 1257 sf_u.iv = (i); \ 1265 int32_t iv = (int)v; local 1266 int32_t x = iv + (iv >> 31); // ~floor(v) 1279 int2 iv = convert_int2(v); local 1280 int2 x = iv + (iv >> (int2)31);//floor(v); 1294 int4 iv local [all...] |
/frameworks/rs/tests/java_api/RSTest_CompatLib/src/com/android/rs/test/ |
H A D | UT_math_agree.java | 129 int[] iv = new int[dim]; 131 iv[i] = rand.nextInt(); 132 return iv;
|
/frameworks/rs/tests/java_api/RSTest_CompatLibLegacy/src/com/android/rs/test/ |
H A D | UT_math_agree.java | 129 int[] iv = new int[dim]; 131 iv[i] = rand.nextInt(); 132 return iv;
|
/frameworks/rs/tests/java_api/RsTest/src/com/android/rs/test/ |
H A D | UT_math_agree.java | 159 int[] iv = new int[dim]; 161 iv[i] = rand.nextInt(); 162 return iv;
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | LockSettingsService.java | 891 byte[] iv = Arrays.copyOfRange(storedData, 0, PROFILE_KEY_IV_SIZE); 903 cipher.init(Cipher.DECRYPT_MODE, decryptionKey, new GCMParameterSpec(128, iv)); 1186 byte[] iv; 1218 iv = cipher.getIV(); 1230 if (iv.length != PROFILE_KEY_IV_SIZE) { 1231 throw new RuntimeException("Invalid iv length: " + iv.length); 1233 outputStream.write(iv);
|