/system/keymaster/ |
H A D | ecdsa_operation.cpp | 94 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { argument 104 *input_consumed = input.available_read(); 127 Buffer* /* output */, size_t* input_consumed) { 129 return StoreData(input, input_consumed); 133 *input_consumed = input.available_read(); 188 Buffer* /* output */, size_t* input_consumed) { 190 return StoreData(input, input_consumed); 194 *input_consumed = input.available_read(); 124 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 185 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument
|
H A D | hmac_operation.cpp | 152 Buffer* /* output */, size_t* input_consumed) { 155 *input_consumed = input.available_read(); 150 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument
|
H A D | rsa_operation.cpp | 151 Buffer* /* output */, size_t* input_consumed) { 152 assert(input_consumed); 160 return StoreData(input, input_consumed); 164 keymaster_error_t RsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { argument 165 assert(input_consumed); 176 *input_consumed = input.available_read(); 277 Buffer* output, size_t* input_consumed) { 281 input_consumed); 285 *input_consumed = input.available_read(); 396 Buffer* output, size_t* input_consumed) { 149 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 275 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument 394 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument [all...] |
H A D | aes_operation.cpp | 198 size_t* input_consumed) { 206 *input_consumed = input.available_read(); 547 Buffer* output, size_t* input_consumed) { 548 if (!output || !input_consumed) 552 *input_consumed = input.available_read(); 195 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument 544 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument
|
H A D | android_keymaster_test_utils.cpp | 238 size_t* input_consumed) { 244 input_consumed, &out_params, &out_tmp); 254 size_t* input_consumed) { 260 input_consumed, &out_params, &out_tmp); 312 size_t input_consumed; local 313 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); 314 EXPECT_EQ(message.size(), input_consumed); 326 size_t input_consumed; local 328 &result, &input_consumed)); 329 EXPECT_EQ(message.size(), input_consumed); 237 UpdateOperation(const string& message, string* output, size_t* input_consumed) argument 251 UpdateOperation(const AuthorizationSet& additional_params, const string& message, AuthorizationSet* output_params, string* output, size_t* input_consumed) argument 341 size_t input_consumed; local 354 size_t input_consumed; local [all...] |
H A D | soft_keymaster_device.cpp | 858 const keymaster_blob_t* input, size_t* input_consumed, 864 if (!input_consumed || !output || !out_params) 887 *input_consumed = response.input_consumed; 855 update(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
|
H A D | android_keymaster_test.cpp | 599 size_t input_consumed; local 600 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); 636 size_t input_consumed; local 637 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); 758 size_t input_consumed; local 759 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); 1207 size_t input_consumed; local 1208 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); 1209 EXPECT_EQ(message.size(), input_consumed); 1233 size_t input_consumed; local 1272 size_t input_consumed; local 1298 size_t input_consumed; local 1441 size_t input_consumed; local 1484 size_t input_consumed; local 1548 size_t input_consumed; local 1914 size_t input_consumed; local 1946 size_t input_consumed; local 2046 size_t input_consumed; local 2066 size_t input_consumed; local 2094 size_t input_consumed; local 2143 size_t input_consumed; local 2184 size_t input_consumed; local 2280 size_t input_consumed; local 2341 size_t input_consumed; local 2390 size_t input_consumed; local 2608 size_t input_consumed; local 2673 size_t input_consumed; local 2739 size_t input_consumed; local 2780 size_t input_consumed; local 2838 size_t input_consumed; local 2879 size_t input_consumed; local 2951 size_t input_consumed; local 3005 size_t input_consumed; local 3049 size_t input_consumed; local 3091 size_t input_consumed; local [all...] |
/system/keymaster/include/keymaster/ |
H A D | android_keymaster_messages.h | 320 : KeymasterResponse(ver), input_consumed(0) {} 327 size_t input_consumed; member in struct:keymaster::UpdateOperationResponse
|
/system/vold/ |
H A D | cryptfs.c | 361 size_t input_consumed; local 363 &input, &input_consumed, NULL /* out_params */, 370 if (input_consumed != to_sign_size) {
|