Home
last modified time | relevance | path

Searched refs:iv (Results 1 – 25 of 57) sorted by relevance

123

/hardware/interfaces/drm/1.0/vts/functional/
Ddrm_hal_clearkey_test.cpp668 hidl_vec<uint8_t> iv = std::vector<uint8_t>(AES_BLOCK_SIZE, 0); in TEST_P() local
669 auto res = drmPlugin->encrypt(session, keyId, input, iv, in TEST_P()
682 hidl_vec<uint8_t> iv = std::vector<uint8_t>(AES_BLOCK_SIZE, 0); in TEST_P() local
683 auto res = drmPlugin->decrypt(session, keyId, input, iv, in TEST_P()
837 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in decrypt() argument
847 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt()
890 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt()
918 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_ctr_decrypt() argument
939 iv, previousEncryptedCounter, &blockOffset); in aes_ctr_decrypt()
950 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_cbc_decrypt() argument
[all …]
Ddrm_hal_vendor_test.cpp780 hidl_vec<uint8_t> keyId, input, iv; in TEST_P() local
782 session, keyId, input, iv, in TEST_P()
792 hidl_vec<uint8_t> keyId, input, iv; in TEST_P() local
794 session, keyId, input, iv, in TEST_P()
1131 const hidl_array<uint8_t, 16>& keyId, uint8_t* iv, in decrypt() argument
1137 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt()
1179 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt()
1207 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_ctr_decrypt() argument
1229 iv, previousEncryptedCounter, &blockOffset); in aes_ctr_decrypt()
1240 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_cbc_decrypt() argument
[all …]
/hardware/interfaces/drm/1.2/vts/functional/
Ddrm_hal_test.cpp303 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local
314 &iv[0], subSamples, noPattern, key.clearContentKey, StatusV1_2::OK); in TEST_P()
330 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local
341 &iv[0], subSamples, noPattern, key.clearContentKey, StatusV1_2::OK); in TEST_P()
356 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local
367 … &iv[0], subSamples, noPattern, key.clearContentKey, StatusV1_2::ERROR_DRM_FRAME_TOO_LARGE); in TEST_P()
380 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local
390 toHidlArray(key.keyId), &iv[0], subSamples, noPattern, in TEST_P()
472 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local
502 decryptWithInvalidKeys(invalidResponse, iv, noPattern, subSamples); in TEST_P()
[all …]
Ddrm_hal_common.cpp395 const hidl_array<uint8_t, 16>& keyId, uint8_t* iv, in decrypt() argument
401 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt()
444 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt()
472 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_ctr_decrypt() argument
493 iv, previousEncryptedCounter, &blockOffset); in aes_ctr_decrypt()
504 uint8_t* iv, const hidl_vec<SubSample>& subSamples, in aes_cbc_decrypt() argument
515 &decryptionKey, iv, 0 /* decrypt */); in aes_cbc_decrypt()
525 vector<uint8_t>& iv, in decryptWithInvalidKeys() argument
546 toHidlArray(key.keyId), &iv[0], subSamples, noPattern, in decryptWithInvalidKeys()
/hardware/interfaces/drm/aidl/vts/
Ddrm_hal_test.cpp295 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local
306 decrypt(Mode::UNENCRYPTED, key.isSecure, toStdArray(key.keyId), &iv[0], in TEST_P()
323 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local
333 uint32_t byteCount = decrypt(Mode::AES_CTR, key.isSecure, toStdArray(key.keyId), &iv[0], in TEST_P()
349 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local
359 decrypt(Mode::UNENCRYPTED, key.isSecure, toStdArray(key.keyId), &iv[0], subSamples, in TEST_P()
373 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local
383 decrypt(Mode::AES_CTR, key.isSecure, toStdArray(key.keyId), &iv[0], subSamples, in TEST_P()
504 vector<uint8_t> iv(AES_BLOCK_SIZE, 0); in TEST_P() local
532 decryptWithInvalidKeys(invalidResponse, iv, noPattern, subSamples); in TEST_P()
[all …]
Ddrm_hal_common.cpp483 uint8_t* iv, const vector<SubSample>& subSamples, in decrypt() argument
489 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt()
519 args.iv = ivVec; in decrypt()
539 memcpy(localIv, iv, AES_BLOCK_SIZE); in decrypt()
567 void DrmHalTest::aes_ctr_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv, in aes_ctr_decrypt() argument
587 &decryptionKey, iv, previousEncryptedCounter, &blockOffset); in aes_ctr_decrypt()
597 void DrmHalTest::aes_cbc_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv, in aes_cbc_decrypt() argument
608 &decryptionKey, iv, 0 /* decrypt */); in aes_cbc_decrypt()
617 vector<uint8_t>& iv, const Pattern& noPattern, in decryptWithInvalidKeys() argument
635 decrypt(Mode::AES_CTR, key.isSecure, toStdArray(key.keyId), &iv[0], subSamples, in decryptWithInvalidKeys()
/hardware/google/gfxstream/codegen/vulkan/vulkan-docs-next/appendices/
DVK_EXT_opacity_micromap.adoc64 uint32_t iu, iv, iw;
71 iv = (uint32_t)fv;
74 float vf = fv - float(iv);
77 if (iv >= (1u << level)) iv = (1u << level) - 1u;
79 uint32_t iuv = iu + iv;
84 iw = ~(iu + iv);
90 uint32_t t = (iu ^ iv) & b0;
/hardware/interfaces/drm/1.0/vts/functional/include/android/hardware/drm/1.0/vts/
Ddrm_hal_clearkey_test.h185 uint32_t decrypt(Mode mode, uint8_t* iv, const hidl_vec<SubSample>& subSamples,
187 void aes_ctr_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv,
189 void aes_cbc_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv,
192 vector<uint8_t>& iv, const Pattern& noPattern, const vector<SubSample>& subSamples);
Ddrm_hal_vendor_test.h194 const hidl_array<uint8_t, 16>& keyId, uint8_t* iv,
197 void aes_ctr_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv,
199 void aes_cbc_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv,
/hardware/interfaces/drm/1.2/vts/functional/include/android/hardware/drm/1.2/vts/
Ddrm_hal_common.h115 const hidl_array<uint8_t, 16>& keyId, uint8_t* iv,
118 void aes_ctr_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv,
120 void aes_cbc_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv,
149 vector<uint8_t>& iv, const Pattern& noPattern, const vector<SubSample>& subSamples);
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
Deapol.h78 unsigned char iv[EAPOL_KEY_IV_LEN]; /* Key IV */
111 unsigned char iv[EAPOL_WPA_KEY_IV_LEN]; /* Key IV */
/hardware/interfaces/drm/aidl/vts/include/
Ddrm_hal_common.h120 const std::array<uint8_t, 16>& keyId, uint8_t* iv,
125 void aes_ctr_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv,
128 void aes_cbc_decrypt(uint8_t* dest, uint8_t* src, uint8_t* iv,
160 std::vector<uint8_t>& invalidResponse, std::vector<uint8_t>& iv,
/hardware/nxp/keymint/KM200/
DJavacardKeyMintDevice.cpp165 std::vector<uint8_t> iv; in importWrappedKey() local
172 keymaster_error_t errorCode = parseWrappedKey(wrappedKeyData, iv, transitKey, secureKey, tag, in importWrappedKey()
188 authList, keyFormat, secureKey, tag, iv, wrappedKeyDescription, passwordSid, biometricSid); in importWrappedKey()
219 const std::vector<uint8_t>& iv, const std::vector<uint8_t>& wrappedKeyDescription, in sendFinishImportWrappedKeyCmd() argument
226 request.add(std::vector<uint8_t>(iv)); in sendFinishImportWrappedKeyCmd()
412 std::vector<uint8_t>& iv, std::vector<uint8_t>& transitKey, in parseWrappedKey() argument
434 iv = km_utils::kmBlob2vector(kmIv); in parseWrappedKey()
DJavacardKeyMintDevice.h117 std::vector<uint8_t>& iv, std::vector<uint8_t>& transitKey,
129 const std::vector<uint8_t>& tag, const std::vector<uint8_t>& iv,
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/current/android/hardware/drm/
DDecryptArgs.aidl39 byte[] iv;
DIDrmPlugin.aidl38 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument
39 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/1/android/hardware/drm/
DDecryptArgs.aidl39 byte[] iv;
DIDrmPlugin.aidl38 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument
39 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument
/hardware/interfaces/keymaster/4.0/vts/functional/
DKeymasterHidlTest.cpp507 auto iv = output_params.GetTagValue(TAG_NONCE); in CheckAesIncrementalEncryptOperation() local
512 ASSERT_TRUE(iv.isOk()) << "No IV for block mode " << block_mode; in CheckAesIncrementalEncryptOperation()
513 EXPECT_EQ(block_mode == BlockMode::GCM ? 12U : 16U, iv.value().size()); in CheckAesIncrementalEncryptOperation()
514 params.push_back(TAG_NONCE, iv.value()); in CheckAesIncrementalEncryptOperation()
518 EXPECT_FALSE(iv.isOk()) << "ECB mode should not generate IV"; in CheckAesIncrementalEncryptOperation()
581 const string& iv, const string& input, in CheckTripleDesTestVector() argument
588 if (iv.size()) authset.Authorization(TAG_CALLER_NONCE); in CheckTripleDesTestVector()
591 if (iv.size()) begin_params.Authorization(TAG_NONCE, iv.data(), iv.size()); in CheckTripleDesTestVector()
714 PaddingMode padding_mode, const HidlBuf& iv) { in DecryptMessage() argument
719 .Authorization(TAG_NONCE, iv); in DecryptMessage()
/hardware/google/gfxstream/guest/mesa/src/util/format/
Du_format_fxt1.c515 float b, iv[MAX_COMP]; /* interpolation vector */ in fxt1_quantize_ALPHA1() local
612 MAKEIVEC(n_vect, n_comp, iv, b, vec[0], vec[1]); in fxt1_quantize_ALPHA1()
619 CALCCDOT(texel, n_vect, n_comp, iv, b, input[k]); in fxt1_quantize_ALPHA1()
632 MAKEIVEC(n_vect, n_comp, iv, b, vec[2], vec[1]); in fxt1_quantize_ALPHA1()
639 CALCCDOT(texel, n_vect, n_comp, iv, b, input[k]); in fxt1_quantize_ALPHA1()
673 float iv[MAX_COMP]; /* interpolation vector */ in fxt1_quantize_HI() local
717 MAKEIVEC(n_vect, n_comp, iv, b, reord[minCol], reord[maxCol]); in fxt1_quantize_HI()
729 CALCCDOT(texel, n_vect, n_comp, iv, b, input[k]); in fxt1_quantize_HI()
748 float b, iv[MAX_COMP]; /* interpolation vector */ in fxt1_quantize_MIXED1() local
815 MAKEIVEC(n_vect, n_comp, iv, b, vec[0], vec[1]); in fxt1_quantize_MIXED1()
[all …]
/hardware/interfaces/drm/aidl/android/hardware/drm/
DDecryptArgs.aidl50 byte[] iv;
DIDrmPlugin.aidl76 byte[] decrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in decrypt() argument
95 byte[] encrypt(in byte[] sessionId, in byte[] keyId, in byte[] input, in byte[] iv); in encrypt() argument
/hardware/nxp/keymint/KM300/
DJavacardKeyMintDevice.cpp188 std::vector<uint8_t> iv; in importWrappedKey() local
195 keymaster_error_t errorCode = parseWrappedKey(wrappedKeyData, iv, transitKey, secureKey, tag, in importWrappedKey()
211 authList, keyFormat, secureKey, tag, iv, wrappedKeyDescription, passwordSid, biometricSid); in importWrappedKey()
246 const std::vector<uint8_t>& iv, const std::vector<uint8_t>& wrappedKeyDescription, in sendFinishImportWrappedKeyCmd() argument
253 request.add(std::vector<uint8_t>(iv)); in sendFinishImportWrappedKeyCmd()
433 std::vector<uint8_t>& iv, std::vector<uint8_t>& transitKey, in parseWrappedKey() argument
455 iv = km_utils::kmBlob2vector(kmIv); in parseWrappedKey()
DJavacardKeyMintDevice.h122 std::vector<uint8_t>& iv, std::vector<uint8_t>& transitKey,
134 const std::vector<uint8_t>& tag, const std::vector<uint8_t>& iv,
/hardware/qcom/bt/msm8992/libbt-vendor/src/
Dhw_ar3k.c1193 struct iovec iv[3]; in hci_send_cmd() local
1199 iv[0].iov_base = &type; in hci_send_cmd()
1200 iv[0].iov_len = 1; in hci_send_cmd()
1201 iv[1].iov_base = &hc; in hci_send_cmd()
1202 iv[1].iov_len = HCI_COMMAND_HDR_SIZE; in hci_send_cmd()
1206 iv[2].iov_base = param; in hci_send_cmd()
1207 iv[2].iov_len = plen; in hci_send_cmd()
1211 while (writev(dd, iv, ivn) < 0) { in hci_send_cmd()

123