/hardware/interfaces/drm/1.0/vts/functional/ |
D | drm_hal_clearkey_test.cpp | 668 hidl_vec<uint8_t> iv = std::vector<uint8_t>(AES_BLOCK_SIZE, 0); in TEST_P() local 669 auto res = drmPlugin->encrypt(session, keyId, input, iv, in TEST_P() 682 hidl_vec<uint8_t> iv = std::vector<uint8_t>(AES_BLOCK_SIZE, 0); in TEST_P() local 683 auto res = drmPlugin->decrypt(session, keyId, input, iv, in TEST_P() 837 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in decrypt() argument 847 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt() 890 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt() 918 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_ctr_decrypt() argument 939 iv, previousEncryptedCounter, &blockOffset); in aes_ctr_decrypt() 950 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_cbc_decrypt() argument [all …]
|
D | drm_hal_vendor_test.cpp | 780 hidl_vec<uint8_t> keyId, input, iv; in TEST_P() local 782 session, keyId, input, iv, in TEST_P() 792 hidl_vec<uint8_t> keyId, input, iv; in TEST_P() local 794 session, keyId, input, iv, in TEST_P() 1131 const hidl_array<uint8_t, 16>& keyId, uint8_t* iv, in decrypt() argument 1137 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt() 1179 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt() 1207 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_ctr_decrypt() argument 1229 iv, previousEncryptedCounter, &blockOffset); in aes_ctr_decrypt() 1240 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_cbc_decrypt() argument [all …]
|
/hardware/interfaces/drm/1.2/vts/functional/ |
D | drm_hal_test.cpp | 303 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 314 &iv[0], subSamples, noPattern, key.clearContentKey, StatusV1_2::OK); in TEST_P() 330 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 341 &iv[0], subSamples, noPattern, key.clearContentKey, StatusV1_2::OK); in TEST_P() 356 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 367 … &iv[0], subSamples, noPattern, key.clearContentKey, StatusV1_2::ERROR_DRM_FRAME_TOO_LARGE); in TEST_P() 380 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 390 toHidlArray(key.keyId), &iv[0], subSamples, noPattern, in TEST_P() 472 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 502 decryptWithInvalidKeys(invalidResponse, iv, noPattern, subSamples); in TEST_P() [all …]
|
D | drm_hal_common.cpp | 395 const hidl_array<uint8_t, 16>& keyId, uint8_t* iv, in decrypt() argument 401 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt() 444 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt() 472 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_ctr_decrypt() argument 493 iv, previousEncryptedCounter, &blockOffset); in aes_ctr_decrypt() 504 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_cbc_decrypt() argument 515 &decryptionKey, iv, 0 /* decrypt */); in aes_cbc_decrypt() 525 vector<uint8_t>& iv, in decryptWithInvalidKeys() argument 546 toHidlArray(key.keyId), &iv[0], subSamples, noPattern, in decryptWithInvalidKeys()
|
/hardware/interfaces/drm/aidl/vts/ |
D | drm_hal_test.cpp | 295 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 306 decrypt(Mode::UNENCRYPTED, key.isSecure, toStdArray(key.keyId), &iv[0], in TEST_P() 323 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 333 uint32_t byteCount = decrypt(Mode::AES_CTR, key.isSecure, toStdArray(key.keyId), &iv[0], in TEST_P() 349 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 359 decrypt(Mode::UNENCRYPTED, key.isSecure, toStdArray(key.keyId), &iv[0], subSamples, in TEST_P() 373 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 383 decrypt(Mode::AES_CTR, key.isSecure, toStdArray(key.keyId), &iv[0], subSamples, in TEST_P() 504 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local 532 decryptWithInvalidKeys(invalidResponse, iv, noPattern, subSamples); in TEST_P() [all …]
|
D | drm_hal_common.cpp | 483 uint8_t* iv, const vector<SubSample>& subSamples, in decrypt() argument 489 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt() 519 args.iv = ivVec; in decrypt() 539 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt() 567 void DrmHalTest::aes_ctr_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv, in aes_ctr_decrypt() argument 587 &decryptionKey, iv, previousEncryptedCounter, &blockOffset); in aes_ctr_decrypt() 597 void DrmHalTest::aes_cbc_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv, in aes_cbc_decrypt() argument 608 &decryptionKey, iv, 0 /* decrypt */); in aes_cbc_decrypt() 617 vector<uint8_t>& iv, const Pattern& noPattern, in decryptWithInvalidKeys() argument 635 decrypt(Mode::AES_CTR, key.isSecure, toStdArray(key.keyId), &iv[0], subSamples, in decryptWithInvalidKeys()
|
/hardware/google/gfxstream/codegen/vulkan/vulkan-docs-next/appendices/ |
D | VK_EXT_opacity_micromap.adoc | 64 uint32_t iu, iv, iw; 71 iv = (uint32_t)fv; 74 float vf = fv - float(iv); 77 if (iv >= (1u << level)) iv = (1u << level) - 1u; 79 uint32_t iuv = iu + iv; 84 iw = ~(iu + iv); 90 uint32_t t = (iu ^ iv) & b0;
|
/hardware/interfaces/drm/1.0/vts/functional/include/android/hardware/drm/1.0/vts/ |
D | drm_hal_clearkey_test.h | 185 uint32_t decrypt(Mode mode, uint8_t* iv, const hidl_vec<SubSample>& subSamples, 187 void aes_ctr_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv, 189 void aes_cbc_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv, 192 vector<uint8_t>& iv, const Pattern& noPattern, const vector<SubSample>& subSamples);
|
D | drm_hal_vendor_test.h | 194 const hidl_array<uint8_t, 16>& keyId, uint8_t* iv, 197 void aes_ctr_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv, 199 void aes_cbc_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv,
|
/hardware/interfaces/drm/1.2/vts/functional/include/android/hardware/drm/1.2/vts/ |
D | drm_hal_common.h | 115 const hidl_array<uint8_t, 16>& keyId, uint8_t* iv, 118 void aes_ctr_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv, 120 void aes_cbc_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv, 149 vector<uint8_t>& iv, const Pattern& noPattern, const vector<SubSample>& subSamples);
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
D | eapol.h | 78 unsigned char iv[EAPOL_KEY_IV_LEN]; /* Key IV */ 111 unsigned char iv[EAPOL_WPA_KEY_IV_LEN]; /* Key IV */
|
/hardware/interfaces/drm/aidl/vts/include/ |
D | drm_hal_common.h | 120 const std::array<uint8_t, 16>& keyId, uint8_t* iv, 125 void aes_ctr_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv, 128 void aes_cbc_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv, 160 std::vector<uint8_t>& invalidResponse, std::vector<uint8_t>& iv,
|
/hardware/nxp/keymint/KM200/ |
D | JavacardKeyMintDevice.cpp | 165 std::vector<uint8_t> iv; in importWrappedKey() local 172 keymaster_error_t errorCode = parseWrappedKey(wrappedKeyData, iv, transitKey, secureKey, tag, in importWrappedKey() 188 authList, keyFormat, secureKey, tag, iv, wrappedKeyDescription, passwordSid, biometricSid); in importWrappedKey() 219 const std::vector<uint8_t>& iv, const std::vector<uint8_t>& wrappedKeyDescription, in sendFinishImportWrappedKeyCmd() argument 226 request.add(std::vector<uint8_t>(iv)); in sendFinishImportWrappedKeyCmd() 412 std::vector<uint8_t>& iv, std::vector<uint8_t>& transitKey, in parseWrappedKey() argument 434 iv = km_utils::kmBlob2vector(kmIv); in parseWrappedKey()
|
D | JavacardKeyMintDevice.h | 117 std::vector<uint8_t>& iv, std::vector<uint8_t>& transitKey, 129 const std::vector<uint8_t>& tag, const std::vector<uint8_t>& iv,
|
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/current/android/hardware/drm/ |
D | DecryptArgs.aidl | 39 byte[] iv;
|
D | IDrmPlugin.aidl | 38 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument 39 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument
|
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/1/android/hardware/drm/ |
D | DecryptArgs.aidl | 39 byte[] iv;
|
D | IDrmPlugin.aidl | 38 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument 39 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | KeymasterHidlTest.cpp | 507 auto iv = output_params.GetTagValue(TAG_NONCE); in CheckAesIncrementalEncryptOperation() local 512 ASSERT_TRUE(iv.isOk()) << "No IV for block mode " << block_mode; in CheckAesIncrementalEncryptOperation() 513 EXPECT_EQ(block_mode == BlockMode::GCM ? 12U : 16U, iv.value().size()); in CheckAesIncrementalEncryptOperation() 514 params.push_back(TAG_NONCE, iv.value()); in CheckAesIncrementalEncryptOperation() 518 EXPECT_FALSE(iv.isOk()) << "ECB mode should not generate IV"; in CheckAesIncrementalEncryptOperation() 581 const string& iv, const string& input, in CheckTripleDesTestVector() argument 588 if (iv.size()) authset.Authorization(TAG_CALLER_NONCE); in CheckTripleDesTestVector() 591 if (iv.size()) begin_params.Authorization(TAG_NONCE, iv.data(), iv.size()); in CheckTripleDesTestVector() 714 PaddingMode padding_mode, const HidlBuf& iv) { in DecryptMessage() argument 719 .Authorization(TAG_NONCE, iv); in DecryptMessage()
|
/hardware/google/gfxstream/guest/mesa/src/util/format/ |
D | u_format_fxt1.c | 515 float b, iv[MAX_COMP]; /* interpolation vector */ in fxt1_quantize_ALPHA1() local 612 MAKEIVEC(n_vect, n_comp, iv, b, vec[0], vec[1]); in fxt1_quantize_ALPHA1() 619 CALCCDOT(texel, n_vect, n_comp, iv, b, input[k]); in fxt1_quantize_ALPHA1() 632 MAKEIVEC(n_vect, n_comp, iv, b, vec[2], vec[1]); in fxt1_quantize_ALPHA1() 639 CALCCDOT(texel, n_vect, n_comp, iv, b, input[k]); in fxt1_quantize_ALPHA1() 673 float iv[MAX_COMP]; /* interpolation vector */ in fxt1_quantize_HI() local 717 MAKEIVEC(n_vect, n_comp, iv, b, reord[minCol], reord[maxCol]); in fxt1_quantize_HI() 729 CALCCDOT(texel, n_vect, n_comp, iv, b, input[k]); in fxt1_quantize_HI() 748 float b, iv[MAX_COMP]; /* interpolation vector */ in fxt1_quantize_MIXED1() local 815 MAKEIVEC(n_vect, n_comp, iv, b, vec[0], vec[1]); in fxt1_quantize_MIXED1() [all …]
|
/hardware/interfaces/drm/aidl/android/hardware/drm/ |
D | DecryptArgs.aidl | 50 byte[] iv;
|
D | IDrmPlugin.aidl | 76 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument 95 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument
|
/hardware/nxp/keymint/KM300/ |
D | JavacardKeyMintDevice.cpp | 188 std::vector<uint8_t> iv; in importWrappedKey() local 195 keymaster_error_t errorCode = parseWrappedKey(wrappedKeyData, iv, transitKey, secureKey, tag, in importWrappedKey() 211 authList, keyFormat, secureKey, tag, iv, wrappedKeyDescription, passwordSid, biometricSid); in importWrappedKey() 246 const std::vector<uint8_t>& iv, const std::vector<uint8_t>& wrappedKeyDescription, in sendFinishImportWrappedKeyCmd() argument 253 request.add(std::vector<uint8_t>(iv)); in sendFinishImportWrappedKeyCmd() 433 std::vector<uint8_t>& iv, std::vector<uint8_t>& transitKey, in parseWrappedKey() argument 455 iv = km_utils::kmBlob2vector(kmIv); in parseWrappedKey()
|
D | JavacardKeyMintDevice.h | 122 std::vector<uint8_t>& iv, std::vector<uint8_t>& transitKey, 134 const std::vector<uint8_t>& tag, const std::vector<uint8_t>& iv,
|
/hardware/qcom/bt/msm8992/libbt-vendor/src/ |
D | hw_ar3k.c | 1193 struct iovec iv[3]; in hci_send_cmd() local 1199 iv[0].iov_base = &type; in hci_send_cmd() 1200 iv[0].iov_len = 1; in hci_send_cmd() 1201 iv[1].iov_base = &hc; in hci_send_cmd() 1202 iv[1].iov_len = HCI_COMMAND_HDR_SIZE; in hci_send_cmd() 1206 iv[2].iov_base = param; in hci_send_cmd() 1207 iv[2].iov_len = plen; in hci_send_cmd() 1211 while (writev(dd, iv, ivn) < 0) { in hci_send_cmd()
|