/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/tileimpl/ |
D | QSIconViewImpl.java | 100 protected void updateIcon(ImageView iv, State state, boolean allowAnimations) { in updateIcon() argument 102 if (!Objects.equals(icon, iv.getTag(R.id.qs_icon_tag)) in updateIcon() 103 || !Objects.equals(state.slash, iv.getTag(R.id.qs_slash_tag))) { in updateIcon() 104 boolean shouldAnimate = allowAnimations && shouldAnimate(iv); in updateIcon() 115 if (iv instanceof SlashImageView) { in updateIcon() 116 ((SlashImageView) iv).setAnimationEnabled(shouldAnimate); in updateIcon() 117 ((SlashImageView) iv).setState(null, d); in updateIcon() 119 iv.setImageDrawable(d); in updateIcon() 122 iv.setTag(R.id.qs_icon_tag, icon); in updateIcon() 123 iv.setTag(R.id.qs_slash_tag, state.slash); in updateIcon() [all …]
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/ |
D | AesCtrDecryptorUnittest.cpp | 33 status_t attemptDecrypt(const Key& key, const Iv& iv, const uint8_t* source, in attemptDecrypt() argument 40 return decryptor.decrypt(keyVector, iv, source, destination, subSamples, in attemptDecrypt() 45 void attemptDecryptExpectingSuccess(const Key& key, const Iv& iv, in attemptDecryptExpectingSuccess() argument 52 ASSERT_EQ(android::OK, attemptDecrypt(key, iv, encrypted, outputBuffer, in attemptDecryptExpectingSuccess() 65 Iv iv = { in TEST_F() local 81 ASSERT_EQ(android::ERROR_DRM_DECRYPT, decryptor.decrypt(keyVector, iv, in TEST_F() 99 Iv iv = { in TEST_F() local 115 ASSERT_EQ(android::ERROR_DRM_DECRYPT, decryptor.decrypt(keyVector, iv, in TEST_F() 131 Iv iv = { in TEST_F() local 162 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, in TEST_F() [all …]
|
/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/qs/tileimpl/ |
D | QSIconViewImplTest.java | 57 ImageView iv = mock(ImageView.class); in testNoFirstAnimation() local 59 when(iv.isShown()).thenReturn(true); in testNoFirstAnimation() 63 when(iv.getDrawable()).thenReturn(null); in testNoFirstAnimation() 64 mIconView.updateIcon(iv, s, true); in testNoFirstAnimation() 70 when(iv.getDrawable()).thenReturn(mock(Drawable.class)); in testNoFirstAnimation() 71 mIconView.updateIcon(iv, s, true); in testNoFirstAnimation() 78 ImageView iv = mock(ImageView.class); in testNoFirstFade() local 82 when(iv.isShown()).thenReturn(true); in testNoFirstFade() 84 mIconView.setIcon(iv, s, true); in testNoFirstFade() 85 verify(iv).setImageTintList(argThat(stateList -> stateList.getColors()[0] == desiredColor)); in testNoFirstFade() [all …]
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
D | CryptoHelper.java | 66 byte[] iv = cipher.getIV(); in encryptBundle() 67 byte[] mac = createMac(encryptedBytes, iv); in encryptBundle() 72 encryptedBundle.putByteArray(KEY_IV, iv); in encryptBundle() 80 byte[] iv = bundle.getByteArray(KEY_IV); in decryptBundle() 83 if (!verifyMac(encryptedBytes, iv, mac)) { in decryptBundle() 88 IvParameterSpec ivSpec = new IvParameterSpec(iv); in decryptBundle() 102 …private boolean verifyMac(@Nullable byte[] cipherArray, @Nullable byte[] iv, @Nullable byte[] macA… in verifyMac() argument 111 return constantTimeArrayEquals(macArray, createMac(cipherArray, iv)); in verifyMac() 115 …private byte[] createMac(@NonNull byte[] cipher, @NonNull byte[] iv) throws GeneralSecurityExcepti… in createMac() argument 119 mac.update(iv); in createMac()
|
/frameworks/opt/net/ike/src/java/com/android/ike/ikev2/message/ |
D | IkeEncryptedPayloadBody.java | 123 byte[] iv, in IkeEncryptedPayloadBody() argument 128 mIv = iv; in IkeEncryptedPayloadBody() 129 mEncryptedAndPaddedData = encrypt(unencryptedPayloads, encryptCipher, eKey, iv, padding); in IkeEncryptedPayloadBody() 137 + iv.length in IkeEncryptedPayloadBody() 144 + iv.length in IkeEncryptedPayloadBody() 153 + iv.length in IkeEncryptedPayloadBody() 160 authenticatedSectionBuffer.put(iv).put(mEncryptedAndPaddedData); in IkeEncryptedPayloadBody() 198 byte[] dataToEncrypt, Cipher encryptCipher, SecretKey eKey, byte[] iv, byte[] padding) { in encrypt() argument 208 encryptCipher.init(Cipher.ENCRYPT_MODE, eKey, new IvParameterSpec(iv)); in encrypt() 218 static byte[] decrypt(byte[] encryptedData, Cipher decryptCipher, SecretKey dKey, byte[] iv) in decrypt() argument [all …]
|
/frameworks/base/keystore/java/android/security/keystore/ |
D | AndroidKeyStoreAuthenticatedAESCipherSpi.java | 100 byte[] iv = spec.getIV(); in initAlgorithmSpecificParameters() 101 if (iv == null) { in initAlgorithmSpecificParameters() 103 } else if (iv.length != IV_LENGTH_BYTES) { in initAlgorithmSpecificParameters() 105 + iv.length + " bytes. Only " + IV_LENGTH_BYTES in initAlgorithmSpecificParameters() 116 setIv(iv); in initAlgorithmSpecificParameters() 156 byte[] iv = getIv(); in engineGetParameters() 157 if ((iv != null) && (iv.length > 0)) { in engineGetParameters() 160 params.init(new GCMParameterSpec(mTagLengthBits, iv)); in engineGetParameters() 333 protected void setIv(byte[] iv) { in setIv() argument 334 mIv = iv; in setIv()
|
/frameworks/compile/libbcc/tests/libbcc/ |
D | tbaa-through-alloca.ll | 28 %indvars.iv = phi i64 [ 0, %0 ], [ %indvars.iv.next, %1 ] 29 %2 = getelementptr inbounds %struct.int5.0, %struct.int5.0* %in, i64 0, i32 0, i64 %indvars.iv 34 %indvars.iv.next = add nuw nsw i64 %indvars.iv, 1 35 %exitcond = icmp eq i64 %indvars.iv.next, 5
|
D | test_reduce_general_metadata.ll | 258 %indvars.iv = phi i64 [ 0, %0 ], [ %indvars.iv.next, %2 ] 259 %3 = getelementptr inbounds [256 x i32], [256 x i32]* %addend, i64 0, i64 %indvars.iv 261 %5 = getelementptr inbounds [256 x i32], [256 x i32]* %accum, i64 0, i64 %indvars.iv 265 %indvars.iv.next = add nuw nsw i64 %indvars.iv, 1 266 %exitcond = icmp eq i64 %indvars.iv.next, 256 286 %indvars.iv = phi i64 [ 1, %0 ], [ %indvars.iv.next, %8 ] 288 %9 = getelementptr inbounds [256 x i32], [256 x i32]* %h, i64 0, i64 %indvars.iv 294 %15 = trunc i64 %indvars.iv to i32 296 %indvars.iv.next = add nuw nsw i64 %indvars.iv, 1 297 %exitcond = icmp eq i64 %indvars.iv.next, 256
|
/frameworks/rs/tests/java_api/MathErr/src/com/example/android/rs/matherr/ |
D | math_err.rs | 23 int32_t iv; 32 (i) = gf_u.iv; \ 40 sf_u.iv = (i); \
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/phone/ |
D | NotificationIconAreaController.java | 411 final StatusBarIconView iv = (StatusBarIconView) mNotificationIcons.getChildAt(i); in applyNotificationIconsTint() local 412 if (iv.getWidth() != 0) { in applyNotificationIconsTint() 413 updateTintForIcon(iv, mIconTint); in applyNotificationIconsTint() 415 iv.executeOnLayout(() -> updateTintForIcon(iv, mIconTint)); in applyNotificationIconsTint() 420 final StatusBarIconView iv = (StatusBarIconView) mCenteredIcon.getChildAt(i); in applyNotificationIconsTint() local 421 if (iv.getWidth() != 0) { in applyNotificationIconsTint() 422 updateTintForIcon(iv, mCenteredIconTint); in applyNotificationIconsTint() 424 iv.executeOnLayout(() -> updateTintForIcon(iv, mCenteredIconTint)); in applyNotificationIconsTint()
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
D | SyntheticPasswordCrypto.java | 61 byte[] iv = Arrays.copyOfRange(blob, 0, PROFILE_KEY_IV_SIZE); in decrypt() 65 cipher.init(Cipher.DECRYPT_MODE, key, new GCMParameterSpec(DEFAULT_TAG_LENGTH_BITS, iv)); in decrypt() 81 byte[] iv = cipher.getIV(); in encrypt() 82 if (iv.length != PROFILE_KEY_IV_SIZE) { in encrypt() 83 throw new RuntimeException("Invalid iv length: " + iv.length); in encrypt() 91 outputStream.write(iv); in encrypt()
|
/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/qs/ |
D | AlphaControlledSignalTileViewTest.java | 53 TestableSlashImageView iv = new TestableSlashImageView(mContext); in testSlashImageView_createsAlphaControlledSlashDrawable() local 55 iv.ensureSlashDrawable(); in testSlashImageView_createsAlphaControlledSlashDrawable() 56 assertTrue(iv.getSlashDrawable() instanceof AlphaControlledSlashDrawable); in testSlashImageView_createsAlphaControlledSlashDrawable()
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/ |
D | EncryptedData.java | 31 public EncryptedData(byte[] encryptedData, byte[] iv, String keyAlias) { in EncryptedData() argument 33 mIv = iv; in EncryptedData()
|
/frameworks/av/media/libmediaplayerservice/nuplayer/ |
D | NuPlayerDrm.cpp | 240 uint8_t iv[kBlockSize], in makeCryptoInfo() 261 memcpy(ret->iv, iv, kBlockSize); in makeCryptoInfo() 316 const void *iv; in getSampleCryptoInfo() local 318 if (meta.findData(kKeyCryptoIV, &type, &iv, &ivsize)) { in getSampleCryptoInfo() 334 (uint8_t*) iv, in getSampleCryptoInfo()
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/ |
D | QSDetailItems.java | 188 final ImageView iv = (ImageView) view.findViewById(android.R.id.icon); in getView() local 190 iv.setImageDrawable(item.icon.getDrawable(iv.getContext())); in getView() 192 iv.setImageResource(item.iconResId); in getView() 194 iv.getOverlay().clear(); in getView() 197 iv.getOverlay().add(item.overlay); in getView()
|
/frameworks/av/drm/libmediadrm/ |
D | ICrypto.cpp | 99 virtual ssize_t decrypt(const uint8_t key[16], const uint8_t iv[16], in decrypt() 116 if (iv == NULL) { in decrypt() 117 iv = kDummy; in decrypt() 121 data.write(iv, 16); in decrypt() 334 uint8_t iv[16]; in onTransact() local 335 data.read(iv, sizeof(iv)); in onTransact() 417 result = decrypt(key, iv, mode, pattern, source, offset, in onTransact()
|
/frameworks/rs/tests/java_api/ImageProcessing/src/com/android/rs/image/ |
D | shadows.rs | 103 int H,X,ih,is,iv; 125 iv=(int)cv; 128 X = ((iv*is)/k2)*(k2- abs(6*ih- 2*(H>>1)*k2 - k2)) ; 131 X=( (X+iv*(k1 - is ))/k1 + k3 ) >> ABITS;
|
/frameworks/rs/tests/java_api/ImageProcessing_jb/src/com/android/rs/image/ |
D | shadows.rs | 103 int H,X,ih,is,iv; 125 iv=(int)cv; 128 X = ((iv*is)/k2)*(k2- abs(6*ih- 2*(H>>1)*k2 - k2)) ; 131 X=( (X+iv*(k1 - is ))/k1 + k3 ) >> ABITS;
|
/frameworks/rs/tests/java_api/ScriptGroupTest/src/com/android/rs/sgtest/ |
D | shadows_f.rs | 103 int H,X,ih,is,iv; 125 iv=(int)cv; 128 X = ((iv*is)/k2)*(k2- abs(6*ih- 2*(H>>1)*k2 - k2)) ; 131 X=( (X+iv*(k1 - is ))/k1 + k3 ) >> ABITS;
|
/frameworks/rs/tests/java_api/ImageProcessing2/src/com/android/rs/image/ |
D | shadows.rs | 103 int H,X,ih,is,iv; 125 iv=(int)cv; 128 X = ((iv*is)/k2)*(k2- abs(6*ih- 2*(H>>1)*k2 - k2)) ; 131 X=( (X+iv*(k1 - is ))/k1 + k3 ) >> ABITS;
|
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/ |
D | CryptoPlugin.cpp | 48 const hidl_array<uint8_t, 16>& iv, in decrypt() argument 62 secure, keyId, iv, mode, pattern, subSamples, source, offset, destination, in decrypt() 81 const hidl_array<uint8_t, KEY_IV_SIZE>& iv, in decrypt_1_2() argument 197 Status_V1_2 res = mSession->decrypt(keyId.data(), iv.data(), srcPtr, in decrypt_1_2()
|
D | AesCtrDecryptor.cpp | 39 const Iv iv, const uint8_t* source, in decrypt() argument 57 memcpy(opensslIv, iv, sizeof(opensslIv)); in decrypt()
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/ |
D | AesCtrDecryptor.cpp | 30 const Iv iv, const uint8_t* source, in decrypt() argument 48 memcpy(opensslIv, iv, sizeof(opensslIv)); in decrypt()
|
D | CryptoPlugin.cpp | 35 ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv, in decrypt() argument 67 status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples, in decrypt()
|
/frameworks/base/core/java/com/android/internal/app/procstats/ |
D | ProcessStats.java | 273 for (int iv=0; iv<versions.size(); iv++) { in add() 274 final long vers = versions.keyAt(iv); in add() 275 final PackageState otherState = versions.valueAt(iv); in add() 494 for (int iv=vpkgs.size()-1; iv>=0; iv--) { in resetSafely() 495 final PackageState pkgState = vpkgs.valueAt(iv); in resetSafely() 525 vpkgs.removeAt(iv); in resetSafely() 827 for (int iv=0; iv<NVERS; iv++) { in writeToParcel() 828 PackageState pkgState = vpkgs.valueAt(iv); in writeToParcel() 902 for (int iv=0; iv<NVERS; iv++) { in writeToParcel() 903 out.writeLong(vpkgs.keyAt(iv)); in writeToParcel() [all …]
|