/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/tileimpl/ |
H A D | QSIconViewImpl.java | 89 protected void updateIcon(ImageView iv, State state) { argument 91 if (!Objects.equals(icon, iv.getTag(R.id.qs_icon_tag)) 92 || !Objects.equals(state.slash, iv.getTag(R.id.qs_slash_tag))) { 93 boolean shouldAnimate = iv.isShown() && mAnimationEnabled 94 && iv.getDrawable() != null; 104 if (iv instanceof SlashImageView) { 105 ((SlashImageView) iv).setAnimationEnabled(shouldAnimate); 106 ((SlashImageView) iv).setState(state.slash, d); 108 iv.setImageDrawable(d); 111 iv 129 setIcon(ImageView iv, QSTile.State state) argument 158 animateGrayScale(int fromColor, int toColor, ImageView iv) argument 185 setTint(ImageView iv, int color) argument [all...] |
/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/qs/tileimpl/ |
H A D | QSIconViewImplTest.java | 55 ImageView iv = mock(ImageView.class); 57 when(iv.isShown()).thenReturn(true); 61 when(iv.getDrawable()).thenReturn(null); 62 mIconView.updateIcon(iv, s); 68 when(iv.getDrawable()).thenReturn(mock(Drawable.class)); 69 mIconView.updateIcon(iv, s); 76 ImageView iv = mock(ImageView.class); 80 when(iv.isShown()).thenReturn(true); 82 mIconView.setIcon(iv, s); 83 verify(iv) [all...] |
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | CryptoHelper.java | 30 private static final String KEY_IV = "iv"; 66 byte[] iv = cipher.getIV(); 67 byte[] mac = createMac(encryptedBytes, iv); 72 encryptedBundle.putByteArray(KEY_IV, iv); 80 byte[] iv = bundle.getByteArray(KEY_IV); 83 if (!verifyMac(encryptedBytes, iv, mac)) { 88 IvParameterSpec ivSpec = new IvParameterSpec(iv); 102 private boolean verifyMac(@Nullable byte[] cipherArray, @Nullable byte[] iv, @Nullable byte[] macArray) argument 111 return constantTimeArrayEquals(macArray, createMac(cipherArray, iv)); 115 private byte[] createMac(@NonNull byte[] cipher, @NonNull byte[] iv) throw argument [all...] |
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/ |
H A D | CellTileView.java | 46 protected void updateIcon(ImageView iv, State state) { argument 48 super.updateIcon(iv, state); 50 } else if (!Objects.equals(state.icon, iv.getTag(R.id.qs_icon_tag))) { 52 iv.setImageDrawable(mSignalDrawable); 53 iv.setTag(R.id.qs_icon_tag, state.icon);
|
H A D | QSDetailItems.java | 187 final ImageView iv = (ImageView) view.findViewById(android.R.id.icon); 189 iv.setImageDrawable(item.iconDrawable.getDrawable(iv.getContext())); 191 iv.setImageResource(item.icon); 193 iv.getOverlay().clear(); 196 iv.getOverlay().add(item.overlay);
|
/frameworks/rs/tests/java_api/MathErr/src/com/example/android/rs/matherr/ |
H A D | math_err.rs | 23 int32_t iv; 32 (i) = gf_u.iv; \ 40 sf_u.iv = (i); \
|
/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/qs/ |
H A D | AlphaControlledSignalTileViewTest.java | 53 TestableSlashImageView iv = new TestableSlashImageView(mContext); 55 iv.ensureSlashDrawable(); 56 assertTrue(iv.getSlashDrawable() instanceof AlphaControlledSlashDrawable);
|
H A D | SlashImageViewTest.java | 81 SlashImageView iv = new SlashImageView(mContext); 86 iv.setImageDrawable(mockDrawable);
|
/frameworks/av/drm/mediadrm/plugins/clearkey/ |
H A D | AesCtrDecryptor.h | 34 android::status_t decrypt(const android::Vector<uint8_t>& key, const Iv iv,
|
H A D | AesCtrDecryptor.cpp | 30 const Iv iv, const uint8_t* source, 48 memcpy(opensslIv, iv, sizeof(opensslIv)); 29 decrypt(const android::Vector<uint8_t>& key, const Iv iv, const uint8_t* source, uint8_t* destination, const SubSample* subSamples, size_t numSubSamples, size_t* bytesDecryptedOut) argument
|
H A D | CryptoPlugin.cpp | 35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, argument 67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples,
|
H A D | Session.cpp | 65 const KeyId keyId, const Iv iv, const void* source, 79 key, iv, 64 decrypt( const KeyId keyId, const Iv iv, const void* source, void* destination, const SubSample* subSamples, size_t numSubSamples, size_t* bytesDecryptedOut) argument
|
H A D | CryptoPlugin.h | 46 bool secure, const KeyId keyId, const Iv iv,
|
H A D | DrmPlugin.h | 180 const Vector<uint8_t>& iv, 183 input.size() == 0 || iv.size() == 0) { 194 const Vector<uint8_t>& iv, 197 input.size() == 0 || iv.size() == 0) { 176 encrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument 190 decrypt( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& input, const Vector<uint8_t>& iv, Vector<uint8_t>& output) argument
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreAuthenticatedAESCipherSpi.java | 100 byte[] iv = spec.getIV(); 101 if (iv == null) { 103 } else if (iv.length != IV_LENGTH_BYTES) { 105 + iv.length + " bytes. Only " + IV_LENGTH_BYTES 116 setIv(iv); 156 byte[] iv = getIv(); 157 if ((iv != null) && (iv.length > 0)) { 160 params.init(new GCMParameterSpec(mTagLengthBits, iv)); 333 protected void setIv(byte[] iv) { argument [all...] |
/frameworks/base/core/jni/ |
H A D | android_net_LocalSocketImpl.cpp | 188 struct iovec iv; local 195 memset(&iv, 0, sizeof(iv)); 197 iv.iov_base = buf; 198 iv.iov_len = len; 200 msg.msg_iov = &iv; 290 struct iovec iv; local 291 memset(&iv, 0, sizeof(iv)); 293 iv [all...] |
/frameworks/av/media/libmediaplayerservice/nuplayer/ |
H A D | NuPlayerDrm.h | 98 uint8_t iv[kBlockSize]; member in struct:android::NuPlayerDrm::CryptoInfo 107 uint8_t iv[kBlockSize],
|
H A D | NuPlayerDrm.cpp | 236 uint8_t iv[kBlockSize], 251 memcpy(ret->iv, iv, kBlockSize); 311 const void *iv; local 313 if (meta->findData(kKeyCryptoIV, &type, &iv, &ivsize)) { 329 (uint8_t*) iv, 233 makeCryptoInfo( int numSubSamples, uint8_t key[kBlockSize], uint8_t iv[kBlockSize], CryptoPlugin::Mode mode, size_t *clearbytes, size_t *encryptedbytes) argument
|
/frameworks/rs/tests/java_api/ImageProcessing/src/com/android/rs/image/ |
H A D | shadows.rs | 103 int H,X,ih,is,iv; 125 iv=(int)cv; 128 X = ((iv*is)/k2)*(k2- abs(6*ih- 2*(H>>1)*k2 - k2)) ; 131 X=( (X+iv*(k1 - is ))/k1 + k3 ) >> ABITS;
|
/frameworks/rs/tests/java_api/ImageProcessing2/src/com/android/rs/image/ |
H A D | shadows.rs | 103 int H,X,ih,is,iv; 125 iv=(int)cv; 128 X = ((iv*is)/k2)*(k2- abs(6*ih- 2*(H>>1)*k2 - k2)) ; 131 X=( (X+iv*(k1 - is ))/k1 + k3 ) >> ABITS;
|
/frameworks/rs/tests/java_api/ImageProcessing_jb/src/com/android/rs/image/ |
H A D | shadows.rs | 103 int H,X,ih,is,iv; 125 iv=(int)cv; 128 X = ((iv*is)/k2)*(k2- abs(6*ih- 2*(H>>1)*k2 - k2)) ; 131 X=( (X+iv*(k1 - is ))/k1 + k3 ) >> ABITS;
|
/frameworks/rs/tests/java_api/ScriptGroupTest/src/com/android/rs/sgtest/ |
H A D | shadows_f.rs | 103 int H,X,ih,is,iv; 125 iv=(int)cv; 128 X = ((iv*is)/k2)*(k2- abs(6*ih- 2*(H>>1)*k2 - k2)) ; 131 X=( (X+iv*(k1 - is ))/k1 + k3 ) >> ABITS;
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | SyntheticPasswordCrypto.java | 59 byte[] iv = Arrays.copyOfRange(blob, 0, PROFILE_KEY_IV_SIZE); 63 cipher.init(Cipher.DECRYPT_MODE, key, new GCMParameterSpec(128, iv)); 78 byte[] iv = cipher.getIV(); 79 if (iv.length != PROFILE_KEY_IV_SIZE) { 80 throw new RuntimeException("Invalid iv length: " + iv.length); 83 outputStream.write(iv);
|
/frameworks/av/drm/mediadrm/plugins/clearkey/tests/ |
H A D | AesCtrDecryptorUnittest.cpp | 33 status_t attemptDecrypt(const Key& key, const Iv& iv, const uint8_t* source, argument 40 return decryptor.decrypt(keyVector, iv, source, destination, subSamples, 45 void attemptDecryptExpectingSuccess(const Key& key, const Iv& iv, argument 52 ASSERT_EQ(android::OK, attemptDecrypt(key, iv, encrypted, outputBuffer, 65 Iv iv = { local 81 ASSERT_EQ(android::ERROR_DRM_DECRYPT, decryptor.decrypt(keyVector, iv, 99 Iv iv = { local 115 ASSERT_EQ(android::ERROR_DRM_DECRYPT, decryptor.decrypt(keyVector, iv, 131 Iv iv = { local 162 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypte 176 Iv iv = { local 222 Iv iv = { local 268 Iv iv = { local 317 Iv iv = { local 371 Iv iv = { local 426 Iv iv = { local [all...] |
/frameworks/av/drm/libmediadrm/ |
H A D | ICrypto.cpp | 99 virtual ssize_t decrypt(const uint8_t key[16], const uint8_t iv[16], argument 116 if (iv == NULL) { 117 iv = kDummy; 121 data.write(iv, 16); 321 uint8_t iv[16]; local 322 data.read(iv, sizeof(iv)); 404 result = decrypt(key, iv, mode, pattern, source, offset,
|