Searched refs:input_consumed (Results 1 - 24 of 24) sorted by relevance

/system/keymaster/
H A Decdsa_operation.cpp98 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { argument
105 *input_consumed = input.available_read();
128 Buffer* /* output */, size_t* input_consumed) {
130 return StoreData(input, input_consumed);
134 *input_consumed = input.available_read();
193 Buffer* /* output */, size_t* input_consumed) {
195 return StoreData(input, input_consumed);
199 *input_consumed = input.available_read();
125 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument
190 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument
H A Doperation.cpp146 size_t input_consumed; local
150 Update(input_params, input, &output_params, &output, &input_consumed);
153 assert(input_consumed == input.available_read());
H A Decdsa_operation.h40 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed);
58 size_t* input_consumed) override;
72 size_t* input_consumed) override;
H A Drsa_operation.cpp146 Buffer* /* output */, size_t* input_consumed) {
147 assert(input_consumed);
155 return StoreData(input, input_consumed);
159 keymaster_error_t RsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { argument
160 assert(input_consumed);
171 *input_consumed = input.available_read();
280 Buffer* output, size_t* input_consumed) {
284 input_consumed);
288 *input_consumed = input.available_read();
403 Buffer* output, size_t* input_consumed) {
144 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument
278 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument
401 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument
[all...]
H A Dhmac_operation.h36 size_t* input_consumed);
H A Dandroid_keymaster_test.cpp623 size_t input_consumed; local
624 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed));
726 size_t input_consumed; local
727 ASSERT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed));
728 ASSERT_EQ(message.size(), input_consumed);
778 size_t input_consumed; local
779 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed));
1909 size_t input_consumed; local
1910 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed));
1941 size_t input_consumed; local
2087 size_t input_consumed; local
2107 size_t input_consumed; local
2135 size_t input_consumed; local
2223 size_t input_consumed; local
2247 size_t input_consumed; local
2401 size_t input_consumed; local
2450 size_t input_consumed; local
2668 size_t input_consumed; local
2733 size_t input_consumed; local
2799 size_t input_consumed; local
2840 size_t input_consumed; local
2898 size_t input_consumed; local
2939 size_t input_consumed; local
3011 size_t input_consumed; local
3065 size_t input_consumed; local
3109 size_t input_consumed; local
3151 size_t input_consumed; local
[all...]
H A Daes_operation.cpp196 size_t* input_consumed) {
204 *input_consumed = input.available_read();
472 size_t input_consumed; local
473 *error = Update(additional_params, input, output_params, output, &input_consumed);
476 if (input_consumed != input.available_read()) {
563 Buffer* output, size_t* input_consumed) {
564 if (!output || !input_consumed)
568 *input_consumed = input.available_read();
193 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument
560 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument
H A Daes_operation.h70 size_t* input_consumed) override;
138 size_t* input_consumed) override;
H A Dhmac_operation.cpp152 Buffer* /* output */, size_t* input_consumed) {
155 *input_consumed = input.available_read();
150 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument
H A Drsa_operation.h46 size_t* input_consumed) override;
56 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed);
97 size_t* input_consumed) override;
119 size_t* input_consumed) override;
H A Doperation.h108 size_t* input_consumed) = 0;
H A Dsoft_keymaster_device.cpp1295 const keymaster_blob_t* input, size_t* input_consumed,
1301 if (!input_consumed)
1309 return km1_dev->update(km1_dev, operation_handle, in_params, input, input_consumed,
1341 *input_consumed = response.input_consumed;
1359 const keymaster_blob_t* input, size_t* input_consumed,
1369 return update(&sk_dev->km1_device_, operation_handle, in_params, input, input_consumed,
1474 size_t input_consumed = 0; local
1477 &input_consumed, &update_out_params, &update_output);
1490 mutable_input.data += input_consumed;
1292 update(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
1356 update(const keymaster2_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
[all...]
H A Dandroid_keymaster_test_utils.cpp265 size_t* input_consumed) {
271 input_consumed, &out_params, &out_tmp);
281 size_t* input_consumed) {
287 input_consumed, &out_params, &out_tmp);
864 const keymaster_blob_t* input, size_t* input_consumed,
867 return unwrap(dev)->update(unwrap(dev), operation_handle, in_params, input, input_consumed,
264 UpdateOperation(const string& message, string* output, size_t* input_consumed) argument
278 UpdateOperation(const AuthorizationSet& additional_params, const string& message, AuthorizationSet* output_params, string* output, size_t* input_consumed) argument
861 update(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
H A Dkeymaster1_engine.cpp271 size_t input_consumed;
276 &input_consumed, nullptr /* out_params */, nullptr /* output */);
H A Dandroid_keymaster_messages_test.cpp290 msg.input_consumed = 99;
314 EXPECT_EQ(0U, deserialized->input_consumed);
317 EXPECT_EQ(99U, deserialized->input_consumed);
321 EXPECT_EQ(99U, deserialized->input_consumed);
H A Dandroid_keymaster_messages.cpp218 buf = append_uint32_to_buf(buf, end, input_consumed);
227 retval = copy_uint32_from_buf(buf_ptr, end, &input_consumed);
H A Dandroid_keymaster_test_utils.h202 size_t* input_consumed);
205 std::string* output, size_t* input_consumed);
H A Dandroid_keymaster.cpp311 &response->output, &response->input_consumed);
/system/core/trusty/keymaster/
H A Dtrusty_keymaster_device.h75 const keymaster_blob_t* input, size_t* input_consumed,
136 const keymaster_blob_t* input, size_t* input_consumed,
H A Dtrusty_keymaster_device.cpp508 size_t* input_consumed,
519 if (!input_consumed) {
553 *input_consumed = response.input_consumed;
731 size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) {
732 return convert_device(dev)->update(operation_handle, in_params, input, input_consumed,
505 update(keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
728 update( const keymaster2_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
H A Dtrusty_keymaster_main.cpp152 size_t input_consumed; local
153 error = device->update(op_handle, nullptr, input, &input_consumed, nullptr, nullptr);
158 if (input_consumed != input->data_length) {
/system/vold/tests/
H A DCryptfsScryptHidlizationEquivalence_test.cpp321 size_t input_consumed; local
323 &input, &input_consumed, NULL /* out_params */,
330 if (input_consumed != to_sign_size) {
/system/keymaster/include/keymaster/
H A Dsoft_keymaster_device.h170 const keymaster_blob_t* input, size_t* input_consumed,
227 const keymaster_blob_t* input, size_t* input_consumed,
H A Dandroid_keymaster_messages.h367 : KeymasterResponse(ver), input_consumed(0) {}
374 size_t input_consumed; member in struct:keymaster::UpdateOperationResponse

Completed in 2027 milliseconds