Home
last modified time | relevance | path

Searched refs:iv (Results 1 – 17 of 17) sorted by relevance

/system/connectivity/shill/
Dcrypto_des_cbc_unittest.cc64 EXPECT_TRUE(crypto_.iv().empty()); in TEST_F()
71 EXPECT_TRUE(crypto_.iv().empty()); in TEST_F()
76 EXPECT_EQ(kTestIV, string(crypto_.iv().begin(), crypto_.iv().end())); in TEST_F()
85 EXPECT_EQ(kIV2, string(crypto_.iv().begin(), crypto_.iv().end())); in TEST_F()
90 EXPECT_TRUE(crypto_.iv().empty()); in TEST_F()
Dcrypto_des_cbc.cc73 vector<char> iv = iv_; in Decrypt() local
75 cbc_crypt(key_.data(), data.data(), data.size(), DES_DECRYPT, iv.data()); in Decrypt()
Dcrypto_des_cbc.h54 const std::vector<char>& iv() const { return iv_; } in iv() function
/system/tpm/attestation/common/
Dcrypto_utility_impl.cc99 std::string iv; in EncryptData() local
100 if (!GetRandom(kAesBlockSize, &iv)) { in EncryptData()
105 if (!AesEncrypt(data, aes_key, iv, &raw_encrypted_data)) { in EncryptData()
111 encrypted_pb.set_iv(iv); in EncryptData()
113 encrypted_pb.set_mac(HmacSha512(iv + raw_encrypted_data, aes_key)); in EncryptData()
146 encrypted_pb.iv() + encrypted_pb.encrypted_data(), in DecryptData()
157 if (!AesDecrypt(encrypted_pb.encrypted_data(), aes_key, encrypted_pb.iv(), in DecryptData()
313 const std::string& iv, in AesEncrypt() argument
315 if (key.size() != kAesKeySize || iv.size() != kAesBlockSize) { in AesEncrypt()
326 std::string mutable_iv(iv); in AesEncrypt()
[all …]
Dcrypto_utility_impl.h71 const std::string& iv,
78 const std::string& iv,
Dcommon.proto72 optional bytes iv = 3; field
73 // MAC of (iv || encrypted_data).
Dprint_common_proto.cc146 base::HexEncode(value.iv().data(), value.iv().size()).c_str()); in GetProtoDebugStringWithIndent()
/system/bt/btif/src/
Dbtif_sock_util.c119 struct iovec iv; in sock_send_fd() local
120 memset(&iv, 0, sizeof(iv)); in sock_send_fd()
122 iv.iov_base = buffer; in sock_send_fd()
123 iv.iov_len = len; in sock_send_fd()
125 msg.msg_iov = &iv; in sock_send_fd()
/system/bt/stack/smp/
Daes.h97 unsigned char iv[N_BLOCK],
110 unsigned char iv[N_BLOCK],
Daes.c599 int n_block, unsigned char iv[N_BLOCK], const aes_context ctx[1] )
604 xor_block(iv, in);
605 if(aes_encrypt(iv, iv, ctx) != EXIT_SUCCESS)
607 memcpy(out, iv, N_BLOCK);
650 int n_block, unsigned char iv[N_BLOCK], const aes_context ctx[1] )
658 xor_block(out, iv);
659 memcpy(iv, tmp, N_BLOCK);
/system/tpm/trunks/
Dtpm_utility_impl.cc1840 unsigned char iv[MAX_AES_BLOCK_SIZE_BYTES] = {0}; in EncryptPrivateData() local
1844 unencrypted_private_data.size(), &key, iv, &iv_in, AES_ENCRYPT); in EncryptPrivateData()
Dtpm_utility_test.cc1270 unsigned char iv[MAX_AES_BLOCK_SIZE_BYTES] = {0}; in TEST_F() local
1276 private_data.size, &key, iv, &iv_in, AES_DECRYPT); in TEST_F()
/system/keymaster/
Dandroid_keymaster_test.cpp2791 string iv; in TEST_P() local
2792 string ciphertext = EncryptMessage(message, KM_MODE_CBC, KM_PAD_PKCS7, &iv); in TEST_P()
2794 string plaintext = DecryptMessage(ciphertext, KM_MODE_CBC, KM_PAD_PKCS7, iv); in TEST_P()
/system/tpm/trunks/generator/
Draw_commands_fixed.txt316 Page iv
10310 // The input iv for ECB mode should be null. All the other modes should
10311 // have an iv size same as encryption block size
28870 iv;
29139 ComputeContextProtectionKey(&out->context, &symKey, &iv);
29143 TPM_ALG_CFB, symKey.t.buffer, &iv,
29391 iv;
29491 ComputeContextProtectionKey(&in->context, &symKey, &iv);
29495 TPM_ALG_CFB, symKey.t.buffer, &iv,
Draw_commands.txt316 Page iv
10299 // The input iv for ECB mode should be null. All the other modes should
10300 // have an iv size same as encryption block size
28859 iv;
29128 ComputeContextProtectionKey(&out->context, &symKey, &iv);
29132 TPM_ALG_CFB, symKey.t.buffer, &iv,
29380 iv;
29480 ComputeContextProtectionKey(&in->context, &symKey, &iv);
29484 TPM_ALG_CFB, symKey.t.buffer, &iv,
Draw_structures_fixed.txt313 Page iv
Draw_structures.txt313 Page iv