/system/connectivity/shill/ |
D | crypto_des_cbc_unittest.cc | 64 EXPECT_TRUE(crypto_.iv().empty()); in TEST_F() 71 EXPECT_TRUE(crypto_.iv().empty()); in TEST_F() 76 EXPECT_EQ(kTestIV, string(crypto_.iv().begin(), crypto_.iv().end())); in TEST_F() 85 EXPECT_EQ(kIV2, string(crypto_.iv().begin(), crypto_.iv().end())); in TEST_F() 90 EXPECT_TRUE(crypto_.iv().empty()); in TEST_F()
|
D | crypto_des_cbc.cc | 73 vector<char> iv = iv_; in Decrypt() local 75 cbc_crypt(key_.data(), data.data(), data.size(), DES_DECRYPT, iv.data()); in Decrypt()
|
D | crypto_des_cbc.h | 54 const std::vector<char>& iv() const { return iv_; } in iv() function
|
/system/tpm/attestation/common/ |
D | crypto_utility_impl.cc | 99 std::string iv; in EncryptData() local 100 if (!GetRandom(kAesBlockSize, &iv)) { in EncryptData() 105 if (!AesEncrypt(data, aes_key, iv, &raw_encrypted_data)) { in EncryptData() 111 encrypted_pb.set_iv(iv); in EncryptData() 113 encrypted_pb.set_mac(HmacSha512(iv + raw_encrypted_data, aes_key)); in EncryptData() 146 encrypted_pb.iv() + encrypted_pb.encrypted_data(), in DecryptData() 157 if (!AesDecrypt(encrypted_pb.encrypted_data(), aes_key, encrypted_pb.iv(), in DecryptData() 313 const std::string& iv, in AesEncrypt() argument 315 if (key.size() != kAesKeySize || iv.size() != kAesBlockSize) { in AesEncrypt() 326 std::string mutable_iv(iv); in AesEncrypt() [all …]
|
D | crypto_utility_impl.h | 71 const std::string& iv, 78 const std::string& iv,
|
D | common.proto | 72 optional bytes iv = 3; field 73 // MAC of (iv || encrypted_data).
|
D | print_common_proto.cc | 146 base::HexEncode(value.iv().data(), value.iv().size()).c_str()); in GetProtoDebugStringWithIndent()
|
/system/bt/btif/src/ |
D | btif_sock_util.c | 119 struct iovec iv; in sock_send_fd() local 120 memset(&iv, 0, sizeof(iv)); in sock_send_fd() 122 iv.iov_base = buffer; in sock_send_fd() 123 iv.iov_len = len; in sock_send_fd() 125 msg.msg_iov = &iv; in sock_send_fd()
|
/system/bt/stack/smp/ |
D | aes.h | 97 unsigned char iv[N_BLOCK], 110 unsigned char iv[N_BLOCK],
|
D | aes.c | 599 int n_block, unsigned char iv[N_BLOCK], const aes_context ctx[1] ) 604 xor_block(iv, in); 605 if(aes_encrypt(iv, iv, ctx) != EXIT_SUCCESS) 607 memcpy(out, iv, N_BLOCK); 650 int n_block, unsigned char iv[N_BLOCK], const aes_context ctx[1] ) 658 xor_block(out, iv); 659 memcpy(iv, tmp, N_BLOCK);
|
/system/tpm/trunks/ |
D | tpm_utility_impl.cc | 1840 unsigned char iv[MAX_AES_BLOCK_SIZE_BYTES] = {0}; in EncryptPrivateData() local 1844 unencrypted_private_data.size(), &key, iv, &iv_in, AES_ENCRYPT); in EncryptPrivateData()
|
D | tpm_utility_test.cc | 1270 unsigned char iv[MAX_AES_BLOCK_SIZE_BYTES] = {0}; in TEST_F() local 1276 private_data.size, &key, iv, &iv_in, AES_DECRYPT); in TEST_F()
|
/system/keymaster/ |
D | android_keymaster_test.cpp | 2791 string iv; in TEST_P() local 2792 string ciphertext = EncryptMessage(message, KM_MODE_CBC, KM_PAD_PKCS7, &iv); in TEST_P() 2794 string plaintext = DecryptMessage(ciphertext, KM_MODE_CBC, KM_PAD_PKCS7, iv); in TEST_P()
|
/system/tpm/trunks/generator/ |
D | raw_commands_fixed.txt | 316 Page iv 10310 // The input iv for ECB mode should be null. All the other modes should 10311 // have an iv size same as encryption block size 28870 iv; 29139 ComputeContextProtectionKey(&out->context, &symKey, &iv); 29143 TPM_ALG_CFB, symKey.t.buffer, &iv, 29391 iv; 29491 ComputeContextProtectionKey(&in->context, &symKey, &iv); 29495 TPM_ALG_CFB, symKey.t.buffer, &iv,
|
D | raw_commands.txt | 316 Page iv 10299 // The input iv for ECB mode should be null. All the other modes should 10300 // have an iv size same as encryption block size 28859 iv; 29128 ComputeContextProtectionKey(&out->context, &symKey, &iv); 29132 TPM_ALG_CFB, symKey.t.buffer, &iv, 29380 iv; 29480 ComputeContextProtectionKey(&in->context, &symKey, &iv); 29484 TPM_ALG_CFB, symKey.t.buffer, &iv,
|
D | raw_structures_fixed.txt | 313 Page iv
|
D | raw_structures.txt | 313 Page iv
|