/aosp12/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/tileimpl/ |
H A D | QSIconViewImpl.java | 126 if (iv instanceof SlashImageView) { in updateIcon() 130 iv.setImageDrawable(d); in updateIcon() 133 iv.setTag(R.id.qs_icon_tag, icon); in updateIcon() 135 iv.setPadding(0, padding, 0, padding); in updateIcon() 151 private boolean shouldAnimate(ImageView iv) { in shouldAnimate() argument 152 return mAnimationEnabled && iv.isShown() && iv.getDrawable() != null; in shouldAnimate() 159 iv.clearColorFilter(); in setIcon() 165 animateGrayScale(mTint, color, iv, () -> updateIcon(iv, state, allowAnimations)); in setIcon() 172 setTint(iv, color); in setIcon() 189 ((AlphaControlledSlashImageView)iv) in animateGrayScale() [all …]
|
/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/ |
H A D | AesCtrDecryptorUnittest.cpp | 45 void attemptDecryptExpectingSuccess(const Key& key, const Iv& iv, in attemptDecryptExpectingSuccess() argument 65 Iv iv = { in TEST_F() local 81 ASSERT_EQ(android::ERROR_DRM_DECRYPT, decryptor.decrypt(keyVector, iv, in TEST_F() 99 Iv iv = { in TEST_F() local 131 Iv iv = { in TEST_F() local 176 Iv iv = { in TEST_F() local 222 Iv iv = { in TEST_F() local 268 Iv iv = { in TEST_F() local 317 Iv iv = { in TEST_F() local 371 Iv iv = { in TEST_F() local [all …]
|
/aosp12/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/qs/tileimpl/ |
H A D | QSIconViewImplTest.java | 58 ImageView iv = mock(ImageView.class); in testNoFirstAnimation() local 60 when(iv.isShown()).thenReturn(true); in testNoFirstAnimation() 64 when(iv.getDrawable()).thenReturn(null); in testNoFirstAnimation() 65 mIconView.updateIcon(iv, s, true); in testNoFirstAnimation() 72 mIconView.updateIcon(iv, s, true); in testNoFirstAnimation() 86 when(iv.isShown()).thenReturn(true); in testMutateIconDrawable() 97 ImageView iv = mock(ImageView.class); in testNoFirstFade() local 101 when(iv.isShown()).thenReturn(true); in testNoFirstFade() 103 mIconView.setIcon(iv, s, true); in testNoFirstFade() 109 ImageView iv = mock(ImageView.class); in testStateSetCorrectly_toString() local [all …]
|
/aosp12/system/keymaster/km_openssl/ |
H A D | wrapped_key.cpp | 40 keymaster_error_t build_wrapped_key(const KeymasterKeyBlob& transit_key, const KeymasterBlob& iv, in build_wrapped_key() argument 50 !ASN1_OCTET_STRING_set(wrapped_key->iv, iv.data, iv.data_length) || in build_wrapped_key() 81 keymaster_error_t parse_wrapped_key(const KeymasterKeyBlob& wrapped_key, KeymasterBlob* iv, in parse_wrapped_key() argument 86 if (!iv || !transit_key || !secure_key || !tag || !auth_list || !key_format || in parse_wrapped_key() 96 *iv = KeymasterBlob(record->iv->data, record->iv->length); in parse_wrapped_key() 97 if (record->iv->data && !iv->data) { in parse_wrapped_key()
|
/aosp12/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/message/ |
H A D | IkeEncryptedPayloadBody.java | 157 byte[] iv, in IkeEncryptedPayloadBody() argument 161 mIv = iv; in IkeEncryptedPayloadBody() 171 iv, in IkeEncryptedPayloadBody() 188 iv, in IkeEncryptedPayloadBody() 197 iv, in IkeEncryptedPayloadBody() 218 byte[] iv, in generateOutboundChecksum() argument 225 + iv.length in generateOutboundChecksum() 266 byte[] iv, in normalModeEncrypt() argument 280 byte[] iv) in normalModeDecrypt() argument 296 byte[] iv, in combinedModeEncrypt() argument [all …]
|
/aosp12/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | CryptoHelper.java | 67 byte[] iv = cipher.getIV(); in encryptBundle() 68 byte[] mac = createMac(encryptedBytes, iv); in encryptBundle() 73 encryptedBundle.putByteArray(KEY_IV, iv); in encryptBundle() 81 byte[] iv = bundle.getByteArray(KEY_IV); in decryptBundle() 84 if (!verifyMac(encryptedBytes, iv, mac)) { in decryptBundle() 89 IvParameterSpec ivSpec = new IvParameterSpec(iv); in decryptBundle() 103 …private boolean verifyMac(@Nullable byte[] cipherArray, @Nullable byte[] iv, @Nullable byte[] macA… in verifyMac() argument 112 return constantTimeArrayEquals(macArray, createMac(cipherArray, iv)); in verifyMac() 116 …private byte[] createMac(@NonNull byte[] cipher, @NonNull byte[] iv) throws GeneralSecurityExcepti… in createMac() argument 120 mac.update(iv); in createMac()
|
/aosp12/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | AesEncryptionUtil.java | 50 byte[] iv = new byte[ivSize]; in decrypt() 51 cipherStream.readFully(iv); in decrypt() 64 c.init(Cipher.DECRYPT_MODE, key, new GCMParameterSpec(128, iv)); in decrypt() 91 final byte[] iv; in encrypt() 96 iv = cipher.getIV(); in encrypt() 102 dos.writeInt(iv.length); in encrypt() 103 dos.write(iv); in encrypt()
|
H A D | ManagedProfilePasswordCache.java | 119 byte[] iv = cipher.getIV(); in storePassword() 120 byte[] block = Arrays.copyOf(iv, ciphertext.length + iv.length); in storePassword() 121 System.arraycopy(ciphertext, 0, block, iv.length, ciphertext.length); in storePassword() 148 byte[] iv = Arrays.copyOf(block, 12); in retrievePassword() 153 cipher.init(Cipher.DECRYPT_MODE, key, new GCMParameterSpec(128, iv)); in retrievePassword()
|
/aosp12/system/bt/btif/src/ |
H A D | btif_sock_util.cc | 103 struct iovec iv; in sock_send_fd() local 104 memset(&iv, 0, sizeof(iv)); in sock_send_fd() 106 iv.iov_base = buffer; in sock_send_fd() 107 iv.iov_len = len; in sock_send_fd() 109 msg.msg_iov = &iv; in sock_send_fd()
|
/aosp12/frameworks/base/keystore/java/android/security/keystore2/ |
H A D | AndroidKeyStoreAuthenticatedAESCipherSpi.java | 106 byte[] iv = spec.getIV(); in initAlgorithmSpecificParameters() 107 if (iv == null) { in initAlgorithmSpecificParameters() 109 } else if (iv.length != IV_LENGTH_BYTES) { in initAlgorithmSpecificParameters() 111 + iv.length + " bytes. Only " + IV_LENGTH_BYTES in initAlgorithmSpecificParameters() 122 setIv(iv); in initAlgorithmSpecificParameters() 162 byte[] iv = getIv(); in engineGetParameters() 163 if ((iv != null) && (iv.length > 0)) { in engineGetParameters() 166 params.init(new GCMParameterSpec(mTagLengthBits, iv)); in engineGetParameters() 356 protected void setIv(byte[] iv) { in setIv() argument 357 mIv = iv; in setIv()
|
/aosp12/system/security/keystore2/src/crypto/ |
H A D | lib.rs | 85 let iv = match iv.len() { in aes_gcm_decrypt() localVariable 86 GCM_IV_LENGTH => iv, in aes_gcm_decrypt() 87 LEGACY_IV_LENGTH => &iv[..GCM_IV_LENGTH], in aes_gcm_decrypt() 111 iv.as_ptr(), in aes_gcm_decrypt() 125 let mut iv = vec![0; GCM_IV_LENGTH]; in aes_gcm_encrypt() localVariable 127 if !unsafe { randomBytes(iv.as_mut_ptr(), GCM_IV_LENGTH) } { in aes_gcm_encrypt() 148 iv.as_ptr(), in aes_gcm_encrypt() 152 Ok((ciphertext, iv, tag)) in aes_gcm_encrypt() 483 let iv = vec![0; 12]; in test_encrypt_decrypt() localVariable 492 iv.as_ptr(), in test_encrypt_decrypt() [all …]
|
/aosp12/system/security/keystore2/src/ |
H A D | ec_crypto.rs | 97 let (ciphertext, iv, tag) = aes_gcm_encrypt(message, &aes_key) in encrypt_message() 99 Ok((sender_public_key, salt, iv, ciphertext, tag)) in encrypt_message() 107 iv: &[u8], in decrypt_message() 115 aes_gcm_decrypt(ciphertext, iv, tag, &aes_key) in decrypt_message() 128 let (sender_public_key, salt, iv, ciphertext, tag) = in test_crypto_roundtrip() 132 recipient.decrypt_message(&sender_public_key, &salt, &iv, &ciphertext, &tag)?; in test_crypto_roundtrip()
|
H A D | super_key.rs | 165 aes_gcm_decrypt(data, iv, tag, &self.key) in aes_gcm_decrypt() 459 (Some(iv), Some(tag)) => key in unwrap_key_with_key() 460 .aes_gcm_decrypt(blob, iv, tag) in unwrap_key_with_key() 467 iv.is_some(), in unwrap_key_with_key() 488 iv.is_some(), in unwrap_key_with_key() 621 metadata.iv(), in extract_super_key_from_key_entry() 634 (enc_by, salt, iv, tag) => { in extract_super_key_from_key_entry() 642 iv.is_some(), in extract_super_key_from_key_entry() 673 metadata.add(BlobMetaEntry::Iv(iv)); in encrypt_with_password() 718 metadata.add(BlobMetaEntry::Iv(iv)); in encrypt_with_aes_super_key() [all …]
|
/aosp12/system/keymaster/tests/ |
H A D | wrapped_key_test.cpp | 70 KeymasterBlob iv = {reinterpret_cast<const uint8_t*>(test_iv.c_str()), test_iv.size()}; in TEST() local 79 build_wrapped_key(tk, iv, KM_KEY_FORMAT_RAW, secure_key, tag, authorization_list, &asn1), in TEST() 112 KeymasterBlob iv; in TEST() local 117 EXPECT_EQ(parse_wrapped_key(wrapped_key, &iv, &transit_key, &secure_key, &tag, &auth_list, in TEST() 122 EXPECT_EQ(blob2string(iv), test_iv); in TEST()
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | wrapped_key.h | 41 ASN1_OCTET_STRING* iv; member 50 ASN1_SIMPLE(KM_WRAPPED_KEY, iv, ASN1_OCTET_STRING), 58 const KeymasterBlob& iv, keymaster_key_format_t key_format, 63 keymaster_error_t parse_wrapped_key(const KeymasterKeyBlob& wrapped_key, KeymasterBlob* iv,
|
/aosp12/hardware/interfaces/drm/1.0/vts/functional/ |
H A D | drm_hal_clearkey_test.cpp | 837 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in decrypt() argument 847 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt() 890 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt() 918 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_ctr_decrypt() argument 961 &decryptionKey, iv, 0 /* decrypt */); in aes_cbc_decrypt() 982 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 1004 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 1026 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 1046 vector<uint8_t>& iv, in decryptWithInvalidKeys() argument 1072 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local [all …]
|
/aosp12/packages/apps/Car/Dialer/src/com/android/car/dialer/storage/ |
H A D | CipherConverter.java | 83 byte[] iv = new byte[ivLength]; in decrypt() 84 byteArrayInputStream.read(iv, 0, ivLength); in decrypt() 89 cipher.init(Cipher.DECRYPT_MODE, decryptionKey, new GCMParameterSpec(128, iv)); in decrypt() 132 byte[] iv = cipher.getIV(); in encrypt() 134 outputStream.write(iv.length); in encrypt() 135 outputStream.write(iv); in encrypt()
|
/aosp12/bionic/libc/kernel/uapi/linux/ |
H A D | tls.h | 65 unsigned char iv[TLS_CIPHER_AES_GCM_128_IV_SIZE]; member 72 unsigned char iv[TLS_CIPHER_AES_GCM_256_IV_SIZE]; member 79 unsigned char iv[TLS_CIPHER_AES_CCM_128_IV_SIZE]; member 86 unsigned char iv[TLS_CIPHER_CHACHA20_POLY1305_IV_SIZE]; member
|
/aosp12/frameworks/compile/libbcc/tests/libbcc/ |
H A D | tbaa-through-alloca.ll | 28 %indvars.iv = phi i64 [ 0, %0 ], [ %indvars.iv.next, %1 ] 29 %2 = getelementptr inbounds %struct.int5.0, %struct.int5.0* %in, i64 0, i32 0, i64 %indvars.iv 34 %indvars.iv.next = add nuw nsw i64 %indvars.iv, 1 35 %exitcond = icmp eq i64 %indvars.iv.next, 5
|
/aosp12/hardware/interfaces/drm/1.2/vts/functional/ |
H A D | drm_hal_test.cpp | 303 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 314 &iv[0], subSamples, noPattern, key.clearContentKey, StatusV1_2::OK); in TEST_P() 330 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 341 &iv[0], subSamples, noPattern, key.clearContentKey, StatusV1_2::OK); in TEST_P() 356 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 380 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 390 toHidlArray(key.keyId), &iv[0], subSamples, noPattern, in TEST_P() 472 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 502 decryptWithInvalidKeys(invalidResponse, iv, noPattern, subSamples); in TEST_P() 509 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local [all …]
|
/aosp12/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/events/ |
H A D | StatusEvent.kt | 57 val iv = ImageView(context) regex 58 iv.setImageDrawable(ThemedBatteryDrawable(context, Color.WHITE)) 59 iv.setBackgroundDrawable(ColorDrawable(Color.GREEN)) 60 iv
|
/aosp12/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/phone/ |
H A D | NotificationIconAreaController.java | 528 if (iv.getWidth() != 0) { in applyNotificationIconsTint() 529 updateTintForIcon(iv, mIconTint); in applyNotificationIconsTint() 531 iv.executeOnLayout(() -> updateTintForIcon(iv, mIconTint)); in applyNotificationIconsTint() 536 final StatusBarIconView iv = (StatusBarIconView) mCenteredIcon.getChildAt(i); in applyNotificationIconsTint() local 537 if (iv.getWidth() != 0) { in applyNotificationIconsTint() 538 updateTintForIcon(iv, mCenteredIconTint); in applyNotificationIconsTint() 540 iv.executeOnLayout(() -> updateTintForIcon(iv, mCenteredIconTint)); in applyNotificationIconsTint() 651 final StatusBarIconView iv = (StatusBarIconView) mAodIcons.getChildAt(i); in updateAodIconColors() local 652 if (iv.getWidth() != 0) { in updateAodIconColors() 653 updateTintForIcon(iv, mAodIconTint); in updateAodIconColors() [all …]
|
/aosp12/packages/modules/Wifi/service/java/com/android/server/wifi/util/ |
H A D | EncryptedData.java | 31 public EncryptedData(byte[] encryptedData, byte[] iv) { in EncryptedData() argument 33 Preconditions.checkNotNull(iv); in EncryptedData() 35 mIv = iv; in EncryptedData()
|
/aosp12/frameworks/av/media/libmediaplayerservice/nuplayer/ |
H A D | NuPlayerDrm.cpp | 192 uint8_t iv[kBlockSize], in makeCryptoInfo() 213 memcpy(ret->iv, iv, kBlockSize); in makeCryptoInfo() 268 const void *iv; in getSampleCryptoInfo() local 270 if (meta.findData(kKeyCryptoIV, &type, &iv, &ivsize)) { in getSampleCryptoInfo() 286 (uint8_t*) iv, in getSampleCryptoInfo()
|
/aosp12/frameworks/base/identity/java/android/security/identity/ |
H A D | CredstoreIdentityCredential.java | 168 ByteBuffer iv = ByteBuffer.allocate(12); in encryptMessageToReader() local 169 iv.putInt(0, 0x00000000); in encryptMessageToReader() 170 iv.putInt(4, 0x00000001); in encryptMessageToReader() 171 iv.putInt(8, mEphemeralCounter); in encryptMessageToReader() 173 GCMParameterSpec encryptionParameterSpec = new GCMParameterSpec(128, iv.array()); in encryptMessageToReader() 191 ByteBuffer iv = ByteBuffer.allocate(12); in decryptMessageFromReader() local 192 iv.putInt(0, 0x00000000); in decryptMessageFromReader() 193 iv.putInt(4, 0x00000000); in decryptMessageFromReader() 194 iv.putInt(8, mReadersExpectedEphemeralCounter); in decryptMessageFromReader() 199 new GCMParameterSpec(128, iv.array())); in decryptMessageFromReader()
|