/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
BaseCipherSpi.java | 54 private byte[] iv; field in class:BaseCipherSpi
|
/external/chromium_org/crypto/ |
encryptor_unittest.cc | 21 // The IV must be exactly as long as the cipher block size. 22 std::string iv("the iv: 16 bytes"); 23 EXPECT_EQ(16U, iv.size()); 24 EXPECT_TRUE(encryptor.Init(key.get(), crypto::Encryptor::CBC, iv)); 65 // The IV must be exactly as long as the cipher block size. 66 std::string iv("the iv: 16 bytes"); 67 EXPECT_EQ(16U, iv.size()); 68 EXPECT_TRUE(encryptor.Init(key.get(), crypto::Encryptor::CBC, iv)); 434 std::string iv = "Sweet Sixteen IV"; local 462 std::string iv = "Sweet Sixteen IV"; local 490 std::string iv = "Sweet Sixteen IV"; local 504 std::string iv = "OnlyForteen :("; local 515 std::string iv = "Sweet Sixteen IV"; local [all...] |
/external/chromium_org/net/quic/crypto/ |
aes_128_gcm_12_decrypter_test.cc | 25 // IV = 113b9785971864c83b01c787 33 // IV = 907763b19b9b4ab6bd4f0281 44 // Describes a group of test vectors that all have a given key length, IV 60 const char* iv; member in struct:__anon11301::TestVector 319 char iv[1024]; local 338 ASSERT_TRUE(DecodeHexString(test_vector[j].iv, iv, &iv_len, sizeof(iv))); 368 &decrypter, StringPiece(iv, iv_len),
|
aes_128_gcm_12_encrypter_test.cc | 25 // IV = 3c819d9a9bed087615030b65 33 // IV = ffd2b598feabc9019262d2be 44 // Describes a group of test vectors that all have a given key length, IV 59 const char* iv; member in struct:__anon11305::TestVector 271 char iv[1024]; local 290 ASSERT_TRUE(DecodeHexString(test_vector[j].iv, iv, &iv_len, sizeof(iv))); 310 &encrypter, StringPiece(iv, iv_len),
|
/external/chromium_org/third_party/WebKit/Source/modules/crypto/ |
NormalizeAlgorithm.cpp | 165 RefPtr<ArrayBufferView> iv; local 166 if (!raw.get("iv", iv) || !iv) 169 if (iv->byteLength() != 16) 172 return adoptPtr(new WebKit::WebCryptoAesCbcParams(static_cast<unsigned char*>(iv->baseAddress()), iv->byteLength()));
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
evp_test.c | 137 const unsigned char *iv,int in, 150 hexdump(stdout,"IV",iv,in); 163 if(!EVP_EncryptInit_ex(&ctx,c,NULL,key,iv)) 202 if(!EVP_DecryptInit_ex(&ctx,c,NULL,key,iv)) 245 const unsigned char *iv,int in, 256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec); 369 unsigned char *iv,*key,*plaintext,*ciphertext; local 380 iv=ustrsep(&p,":"); 392 in=convert(iv); [all...] |
e_aes_cbc_hmac_sha1.c | 112 const AES_KEY *key, unsigned char iv[16], 119 const unsigned char *iv, int enc) 185 iv = 0, /* explicit IV in TLS 1.1 and later */ local 204 iv = AES_BLOCK_SIZE; 207 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { 208 SHA1_Update(&key->md,in+iv,sha_off); 211 ctx->iv,&key->md,in+iv+sha_off) [all...] |
/external/openssl/crypto/evp/ |
evp_test.c | 137 const unsigned char *iv,int in, 150 hexdump(stdout,"IV",iv,in); 163 if(!EVP_EncryptInit_ex(&ctx,c,NULL,key,iv)) 202 if(!EVP_DecryptInit_ex(&ctx,c,NULL,key,iv)) 245 const unsigned char *iv,int in, 256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec); 369 unsigned char *iv,*key,*plaintext,*ciphertext; local 380 iv=ustrsep(&p,":"); 392 in=convert(iv); [all...] |
e_aes_cbc_hmac_sha1.c | 112 const AES_KEY *key, unsigned char iv[16], 119 const unsigned char *iv, int enc) 185 iv = 0, /* explicit IV in TLS 1.1 and later */ local 204 iv = AES_BLOCK_SIZE; 207 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { 208 SHA1_Update(&key->md,in+iv,sha_off); 211 ctx->iv,&key->md,in+iv+sha_off) [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 342 u8 *iv, *data; local 353 iv = wpabuf_put(msg, block_size); 354 if (random_get_bytes(iv, block_size) < 0) 359 if (aes_128_cbc_encrypt(wps->keywrapkey, iv, data, wpabuf_len(plain)))
|
/frameworks/av/media/libmedia/ |
ICrypto.cpp | 97 const uint8_t iv[16], 114 if (iv == NULL) { 115 iv = kDummy; 119 data.write(iv, 16); 234 uint8_t iv[16]; local 235 data.read(iv, sizeof(iv)); 261 iv,
|
/frameworks/base/tools/layoutlib/bridge/src/com/android/layoutlib/bridge/impl/binding/ |
AdapterHelper.java | 126 ImageView iv = (ImageView) view; local 133 resolvedRef, ViewAttribute.SRC, iv.getDrawable());
|
/packages/apps/Gallery2/jni/filters/ |
hsv.c | 86 int H,X,ih,is,iv; local 108 iv=(int)cv; 111 X = ((iv*is)/k2)*(k2- abs(6*ih- 2*(H>>1)*k2 - k2)) ; 114 X=( (X+iv*(k1 - is ))/k1 + k3 ) >> ABITS;
|
/packages/apps/Stk/src/com/android/stk/ |
ToneDialog.java | 78 ImageView iv = (ImageView) findViewById(R.id.icon); local 83 iv.setImageResource(com.android.internal.R.drawable.ic_volume); 85 iv.setImageBitmap(toneMsg.icon);
|
/packages/apps/Camera2/src/com/android/camera/ui/ |
ModuleSwitcher.java | 300 RotateImageView iv = (RotateImageView) content.getChildAt(i); local 301 iv.setOrientation(degree, animate);
|
/cts/tests/tests/widget/src/android/widget/cts/ |
ImageSwitcherTest.java | 58 ImageView iv = new ImageView(getContext()); local 59 imageSwitcher.addView(iv); 63 assertSame(iv, imageSwitcher.getCurrentView()); 74 assertSame(iv, imageSwitcher.getCurrentView()); 88 ImageView iv = new ImageView(getContext()); local 89 imageSwitcher.addView(iv); 100 assertSame(iv, imageSwitcher.getCurrentView()); 115 assertSame(iv, imageSwitcher.getCurrentView()); 130 ImageView iv = new ImageView(getContext()); local 131 imageSwitcher.addView(iv); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
BaseBlockCipher.java | 422 // a note on iv's - if ivLength is zero the IV gets ignored (we don't use it). 442 IvParameterSpec iv = (IvParameterSpec)params; local 444 param = new ParametersWithIV(param, iv.getIV()); 474 throw new InvalidAlgorithmParameterException("IV must be " + ivLength + " bytes long."); 492 throw new InvalidAlgorithmParameterException("ECB mode does not use an IV"); 573 byte[] iv = new byte[ivLength]; 575 ivRandom.nextBytes(iv); 576 param = new ParametersWithIV(param, iv); 581 throw new InvalidAlgorithmParameterException("no IV set when one expected") [all...] |
BaseWrapCipher.java | 66 private byte[] iv; field in class:BaseWrapCipher 93 return (byte[])iv.clone(); 160 IvParameterSpec iv = (IvParameterSpec) params; local 161 param = new ParametersWithIV(param, iv.getIV()); 166 iv = new byte[ivSize]; 167 random.nextBytes(iv); 168 param = new ParametersWithIV(param, iv);
|
/external/chromium_org/net/third_party/nss/ssl/ |
preenc.h | 29 unsigned char iv[24]; member in struct:PEFortezzaHeaderStr 36 unsigned char iv[24]; member in struct:PEFortezzaGeneratedHeaderStr
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
enc.c | 111 unsigned char key[EVP_MAX_KEY_LENGTH],iv[EVP_MAX_IV_LENGTH]; local 275 else if (strcmp(*argv,"-iv") == 0) 310 BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv"); 311 BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]"); 557 strlen(str),1,key,iv); 567 if ((hiv != NULL) && !set_hex(hiv,iv,sizeof iv)) 569 BIO_printf(bio_err,"invalid hex iv value\n"); 575 /* No IV was explicitly set and no IV was generate [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
pem_lib.c | 343 unsigned char iv[EVP_MAX_IV_LENGTH]; local 392 OPENSSL_assert(enc->iv_len <= (int)sizeof(iv)); 393 if (RAND_pseudo_bytes(iv,enc->iv_len) < 0) /* Generate a salt */ 395 /* The 'iv' is used as the iv and as a salt. It is 397 if (!EVP_BytesToKey(enc,EVP_md5(),iv,kstr,klen,1,key,NULL)) 406 PEM_dek_info(buf,objstr,enc->iv_len,(char *)iv); 411 if (!EVP_EncryptInit_ex(&ctx,enc,NULL,key,iv) 429 OPENSSL_cleanse(iv,sizeof(iv)); [all...] |
/external/chromium_org/third_party/re2/util/ |
sparse_array.h | 113 inline const IndexValue& iv(int i) const; 260 SparseArray<Value>::iv(int i) const { function in class:re2::SparseArray
|
/external/dropbear/libtomcrypt/demos/ |
tv_gen.c | 703 unsigned char tweak[16], key[16], iv[16], buf[1024]; local 709 tweak[x] = key[x] = iv[x] = x; 714 if ((err = lrw_start(find_cipher("aes"), iv, key, 16, tweak, 0, &lrw)) != CRYPT_OK) { 736 /* reset IV */ 737 if ((err = lrw_setiv(iv, 16, &lrw)) != CRYPT_OK) { 738 fprintf(stderr, "Error setting IV: %s\n", error_to_string(err)); 742 /* copy new tweak, iv and key */ 745 iv[y] = buf[(y+16)%x];
|
/external/opencv/cv/src/ |
cvgeometry.cpp | 243 CvPoint iv; local 251 CV_READ_SEQ_ELEM( iv, reader ); 252 v = cvPointTo32f( iv ); 267 CV_READ_SEQ_ELEM( iv, reader ); 268 v = cvPointTo32f( iv ); 304 CV_READ_SEQ_ELEM( iv, reader ); 305 v = cvPointTo32f( iv );
|
/external/openssl/apps/ |
enc.c | 111 unsigned char key[EVP_MAX_KEY_LENGTH],iv[EVP_MAX_IV_LENGTH]; local 275 else if (strcmp(*argv,"-iv") == 0) 310 BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv"); 311 BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]"); 557 strlen(str),1,key,iv); 567 if ((hiv != NULL) && !set_hex(hiv,iv,sizeof iv)) 569 BIO_printf(bio_err,"invalid hex iv value\n"); 575 /* No IV was explicitly set and no IV was generate [all...] |