/external/srtp/srtp/ |
srtp.c | 743 v128_t iv; local 745 iv.v32[0] = 0; 746 iv.v32[1] = hdr->ssrc; 748 iv.v64[1] = be64_to_cpu(make64((high32(est) << 16) | (low32(est) >> 16), 751 iv.v64[1] = be64_to_cpu(est << 16); 753 status = cipher_set_iv(stream->rtp_cipher, &iv); 756 v128_t iv; local 760 iv.v32[0] = 0; 761 iv.v32[1] = 0; 763 iv.v64[0] = 0 848 v128_t iv; local 1557 v128_t iv; local 1566 v128_t iv; local 1754 v128_t iv; local 1763 v128_t iv; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
iapp.c | 156 u8 iv[8]; member in struct:iapp_send_security_block 164 u8 iv[8]; member in struct:iapp_ack_security_block
|
/frameworks/base/core/jni/ |
android_net_LocalSocketImpl.cpp | 501 struct iovec iv; local 508 memset(&iv, 0, sizeof(iv)); 510 iv.iov_base = buf; 511 iv.iov_len = len; 513 msg.msg_iov = &iv; 605 struct iovec iv; local 606 memset(&iv, 0, sizeof(iv)); 608 iv.iov_base = buffer [all...] |
/frameworks/base/media/java/android/media/ |
MediaCodec.java | 397 iv = newIV; 420 public byte[] iv; field in class:MediaCodec.CryptoInfo 436 builder.append("], iv ["); 438 builder.append(hexdigits.charAt((iv[i] & 0xf0) >> 4)); 439 builder.append(hexdigits.charAt(iv[i] & 0x0f));
|
/packages/apps/VideoEditor/src/com/android/videoeditor/ |
ProjectPickerAdapter.java | 137 ImageView iv = (ImageView) v.findViewById(R.id.thumbnail); local 152 thumbnail = getThumbnail(project.getPath(), iv, title, duration); 157 iv.setImageBitmap(thumbnail);
|
/external/chromium_org/crypto/ |
openpgp_symmetric_encryption.cc | 150 // in ECB mode and with no IV. 462 // using |decryption_context| and assumes an IV of all zeros. 713 uint8 prefix[kBlockSize + 2], fre[kBlockSize], iv[kBlockSize]; local 714 crypto::RandBytes(iv, kBlockSize); 723 prefix[i] = iv[i] ^ fre[i]; 726 prefix[kBlockSize] = iv[kBlockSize - 2] ^ fre[0]; 727 prefix[kBlockSize + 1] = iv[kBlockSize - 1] ^ fre[1]; 737 HASH_Update(hash_context, iv, sizeof(iv)); 738 HASH_Update(hash_context, iv + kBlockSize - 2, 2) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/des/ |
des.c | 368 DES_cblock iv,iv2; local 463 memset(iv,0,sizeof(iv)); 527 (long)l,ks,ks2,&iv, 536 (long)l,&ks,&iv,do_encrypt); 537 if (l >= 8) memcpy(iv,&(obuf[l-8]),8); 602 (long)l,ks,ks2,&iv, 609 (long)l,&ks,&iv,do_encrypt); 610 if (l >= 8) memcpy(iv,&(buf[l-8]),8); 673 OPENSSL_cleanse(iv,sizeof(iv)) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
e_aes.c | 77 int iv_set; /* Set if an iv is set */ 79 unsigned char *iv; /* Temporary IV store */ member in struct:__anon15543 80 int ivlen; /* IV length */ 94 const unsigned char iv[16]); 101 int iv_set; /* Set if an iv is set */ 137 const AES_KEY *key2, const unsigned char iv[16]); 140 const AES_KEY *key2, const unsigned char iv[16]); 150 const unsigned char iv[16]); 153 const unsigned char iv[16]) [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
t1_enc.c | 328 unsigned char *ms,*key,*iv; local 459 /* If GCM mode only part of IV comes from PRF */ 469 iv= &(p[ n]); n+=k+k; 479 iv= &(p[ n]); n+=k; 506 /* In here I set both the read and write key/iv to the 528 iv=iv1; 530 iv= &(iv1[k]); 538 printf("EVP_CipherInit_ex(dd,c,key=,iv=,which)\n"); 541 printf("\t iv= "); for (i=0; i<c->iv_len; i++) printf("%02x", iv[i]) [all...] |
/external/ipsec-tools/src/racoon/ |
eaytest.c | 600 vchar_t *buf, *iv, *res1, *res2; local 601 iv = vmalloc(iv_length); 615 memcpy(iv->v, iv0->v, iv_length); 616 res1 = (encrypt)(buf, key, iv); 624 memcpy(iv->v, iv0->v, iv_length); 625 res2 = (decrypt)(res1, key, iv); 642 vfree(iv);
|
/external/openssh/ |
monitor_wrap.c | 496 enc->iv = buffer_get_string(&b, &len); 556 packet_get_keyiv(mode, enc->iv, enc->block_size); 557 buffer_put_string(&b, enc->iv, enc->block_size); 607 u_char iv[24]; local 615 debug3("%s: Sending ssh1 KEY+IV", __func__); 624 packet_get_keyiv(MODE_OUT, iv, ivlen); 625 buffer_put_string(&m, iv, ivlen); 627 packet_get_keyiv(MODE_IN, iv, ivlen); 628 buffer_put_string(&m, iv, ivlen); [all...] |
/external/openssl/crypto/des/ |
des.c | 368 DES_cblock iv,iv2; local 463 memset(iv,0,sizeof(iv)); 527 (long)l,ks,ks2,&iv, 536 (long)l,&ks,&iv,do_encrypt); 537 if (l >= 8) memcpy(iv,&(obuf[l-8]),8); 602 (long)l,ks,ks2,&iv, 609 (long)l,&ks,&iv,do_encrypt); 610 if (l >= 8) memcpy(iv,&(buf[l-8]),8); 673 OPENSSL_cleanse(iv,sizeof(iv)) [all...] |
/external/openssl/crypto/evp/ |
e_aes.c | 77 int iv_set; /* Set if an iv is set */ 79 unsigned char *iv; /* Temporary IV store */ member in struct:__anon25991 80 int ivlen; /* IV length */ 94 const unsigned char iv[16]); 101 int iv_set; /* Set if an iv is set */ 137 const AES_KEY *key2, const unsigned char iv[16]); 140 const AES_KEY *key2, const unsigned char iv[16]); 150 const unsigned char iv[16]); 153 const unsigned char iv[16]) [all...] |
/external/openssl/ssl/ |
t1_enc.c | 328 unsigned char *ms,*key,*iv; local 459 /* If GCM mode only part of IV comes from PRF */ 469 iv= &(p[ n]); n+=k+k; 479 iv= &(p[ n]); n+=k; 506 /* In here I set both the read and write key/iv to the 528 iv=iv1; 530 iv= &(iv1[k]); 538 printf("EVP_CipherInit_ex(dd,c,key=,iv=,which)\n"); 541 printf("\t iv= "); for (i=0; i<c->iv_len; i++) printf("%02x", iv[i]) [all...] |
/external/oprofile/gui/ |
oprof_start.cpp | 176 QIntValidator * iv; local 177 iv = new QIntValidator(OP_MIN_BUF_SIZE, OP_MAX_BUF_SIZE, buffer_size_edit); 178 buffer_size_edit->setValidator(iv); 179 iv = new QIntValidator(OP_MIN_NOTE_TABLE_SIZE, OP_MAX_NOTE_TABLE_SIZE, note_table_size_edit); 180 note_table_size_edit->setValidator(iv); 181 iv = new QIntValidator(0, INT_MAX, callgraph_depth_edit); 182 callgraph_depth_edit->setValidator(iv); 183 iv = new QIntValidator(0, INT_MAX, buffer_watershed_edit); 184 buffer_watershed_edit->setValidator(iv); 185 iv = new QIntValidator(0, OP_MAX_CPU_BUF_SIZE, cpu_buffer_size_edit) [all...] |
/external/tcpdump/ |
print-802_11.c | 143 u_int32_t iv; local 147 iv = EXTRACT_LE_32BITS(p); 149 printf("Data IV:%3x Pad %x KeyID %x", IV_IV(iv), IV_PAD(iv), 150 IV_KEYID(iv));
|
/frameworks/av/media/libmedia/ |
IDrm.cpp | 319 Vector<uint8_t> const &iv, 327 writeVector(data, iv); 338 Vector<uint8_t> const &iv, 346 writeVector(data, iv); 675 Vector<uint8_t> sessionId, keyId, input, iv, output; local 679 readVector(data, iv); 680 uint32_t result = encrypt(sessionId, keyId, input, iv, output); 689 Vector<uint8_t> sessionId, keyId, input, iv, output; local 693 readVector(data, iv); 694 uint32_t result = decrypt(sessionId, keyId, input, iv, output) [all...] |
/frameworks/av/media/libstagefright/ |
MediaCodec.cpp | 250 const uint8_t iv[16], 265 msg->setPointer("iv", (void *)iv); 1554 const uint8_t *iv; local [all...] |
/frameworks/av/media/libstagefright/httplive/ |
PlaylistFetcher.cpp | 223 AString iv; local 224 if (itemMeta->findString("cipher-iv", &iv)) { 225 if ((!iv.startsWith("0x") && !iv.startsWith("0X")) 226 || iv.size() != 16 * 2 + 2) { 227 ALOGE("malformed cipher IV '%s'.", iv.c_str()); 233 char c1 = tolower(iv.c_str()[2 + 2 * i]); 234 char c2 = tolower(iv.c_str()[3 + 2 * i]) [all...] |
/frameworks/base/media/jni/ |
android_media_MediaCodec.cpp | 166 const uint8_t iv[16], 172 index, offset, subSamples, numSubSamples, key, iv, mode, 600 jbyte *iv = NULL; local 664 iv = env->GetByteArrayElements(ivObj, &isCopy); 674 (const uint8_t *)key, (const uint8_t *)iv, 681 if (iv != NULL) { 682 env->ReleaseByteArrayElements(ivObj, iv, 0); 683 iv = NULL; 909 gFields.cryptoInfoIVID = env->GetFieldID(clazz.get(), "iv", "[B");
|
/frameworks/rs/driver/runtime/ |
rs_cl.c | 1029 int32_t iv; member in union:__anon32453 1054 int32_t iv = (int)v; local 1068 int2 iv = convert_int2(v); local 1083 int4 iv = convert_int4(v); local [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
eapol.h | 78 unsigned char iv[EAPOL_KEY_IV_LEN]; /* Key IV */ member in struct:__anon32662 111 unsigned char iv[EAPOL_WPA_KEY_IV_LEN]; /* Key IV */ member in struct:__anon32663
|
/libcore/crypto/src/main/java/org/conscrypt/ |
OpenSSLCipher.java | 87 * The Initial Vector (IV) used for the current cipher. 89 private byte[] iv; field in class:OpenSSLCipher 218 return iv; 223 if (iv != null && iv.length > 0) { 226 params.init(iv); 237 private void engineInitInternal(int opmode, Key key, byte[] iv, SecureRandom random) 266 if (iv == null && ivLength != 0) { 267 iv = new byte[ivLength]; 272 random.nextBytes(iv); 284 NativeCrypto.EVP_CipherInit_ex(cipherCtx.getContext(), 0, encodedKey, iv, encrypting); local 286 NativeCrypto.EVP_CipherInit_ex(cipherCtx.getContext(), cipherType, encodedKey, iv, local [all...] |
/packages/apps/Music/src/com/android/music/ |
QueryBrowserActivity.java | 381 ImageView iv = (ImageView) view.findViewById(R.id.icon); local 382 ViewGroup.LayoutParams p = iv.getLayoutParams(); 398 iv.setImageResource(R.drawable.ic_mp_artist_list); 418 iv.setImageResource(R.drawable.albumart_mp_unknown_list); 438 iv.setImageResource(R.drawable.ic_mp_song_list);
|
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3ext.c | 983 unsigned char iv[AES_BLOCK_SIZE]; local 1000 /* Get IV and encryption keys */ 1001 ivItem.data = iv; 1002 ivItem.len = sizeof(iv); 1003 rv = PK11_GenerateRandom(iv, sizeof(iv)); [all...] |