/system/keymaster/ |
H A D | ecdsa_operation.cpp | 98 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { argument 105 *input_consumed = input.available_read(); 128 Buffer* /* output */, size_t* input_consumed) { 130 return StoreData(input, input_consumed); 134 *input_consumed = input.available_read(); 193 Buffer* /* output */, size_t* input_consumed) { 195 return StoreData(input, input_consumed); 199 *input_consumed = input.available_read(); 125 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 190 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument
|
H A D | operation.cpp | 146 size_t input_consumed; local 150 Update(input_params, input, &output_params, &output, &input_consumed); 153 assert(input_consumed == input.available_read());
|
H A D | ecdsa_operation.h | 40 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed); 58 size_t* input_consumed) override; 72 size_t* input_consumed) override;
|
H A D | rsa_operation.cpp | 146 Buffer* /* output */, size_t* input_consumed) { 147 assert(input_consumed); 155 return StoreData(input, input_consumed); 159 keymaster_error_t RsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { argument 160 assert(input_consumed); 171 *input_consumed = input.available_read(); 280 Buffer* output, size_t* input_consumed) { 284 input_consumed); 288 *input_consumed = input.available_read(); 403 Buffer* output, size_t* input_consumed) { 144 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 278 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument 401 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument [all...] |
H A D | hmac_operation.h | 36 size_t* input_consumed);
|
H A D | android_keymaster_test.cpp | 623 size_t input_consumed; local 624 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); 726 size_t input_consumed; local 727 ASSERT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); 728 ASSERT_EQ(message.size(), input_consumed); 778 size_t input_consumed; local 779 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); 1909 size_t input_consumed; local 1910 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); 1941 size_t input_consumed; local 2087 size_t input_consumed; local 2107 size_t input_consumed; local 2135 size_t input_consumed; local 2223 size_t input_consumed; local 2247 size_t input_consumed; local 2401 size_t input_consumed; local 2450 size_t input_consumed; local 2668 size_t input_consumed; local 2733 size_t input_consumed; local 2799 size_t input_consumed; local 2840 size_t input_consumed; local 2898 size_t input_consumed; local 2939 size_t input_consumed; local 3011 size_t input_consumed; local 3065 size_t input_consumed; local 3109 size_t input_consumed; local 3151 size_t input_consumed; local [all...] |
H A D | aes_operation.cpp | 196 size_t* input_consumed) { 204 *input_consumed = input.available_read(); 472 size_t input_consumed; local 473 *error = Update(additional_params, input, output_params, output, &input_consumed); 476 if (input_consumed != input.available_read()) { 563 Buffer* output, size_t* input_consumed) { 564 if (!output || !input_consumed) 568 *input_consumed = input.available_read(); 193 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument 560 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument
|
H A D | aes_operation.h | 70 size_t* input_consumed) override; 138 size_t* input_consumed) override;
|
H A D | hmac_operation.cpp | 152 Buffer* /* output */, size_t* input_consumed) { 155 *input_consumed = input.available_read(); 150 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument
|
H A D | rsa_operation.h | 46 size_t* input_consumed) override; 56 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed); 97 size_t* input_consumed) override; 119 size_t* input_consumed) override;
|
H A D | operation.h | 108 size_t* input_consumed) = 0;
|
H A D | soft_keymaster_device.cpp | 1295 const keymaster_blob_t* input, size_t* input_consumed, 1301 if (!input_consumed) 1309 return km1_dev->update(km1_dev, operation_handle, in_params, input, input_consumed, 1341 *input_consumed = response.input_consumed; 1359 const keymaster_blob_t* input, size_t* input_consumed, 1369 return update(&sk_dev->km1_device_, operation_handle, in_params, input, input_consumed, 1474 size_t input_consumed = 0; local 1477 &input_consumed, &update_out_params, &update_output); 1490 mutable_input.data += input_consumed; 1292 update(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument 1356 update(const keymaster2_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument [all...] |
H A D | android_keymaster_test_utils.cpp | 265 size_t* input_consumed) { 271 input_consumed, &out_params, &out_tmp); 281 size_t* input_consumed) { 287 input_consumed, &out_params, &out_tmp); 864 const keymaster_blob_t* input, size_t* input_consumed, 867 return unwrap(dev)->update(unwrap(dev), operation_handle, in_params, input, input_consumed, 264 UpdateOperation(const string& message, string* output, size_t* input_consumed) argument 278 UpdateOperation(const AuthorizationSet& additional_params, const string& message, AuthorizationSet* output_params, string* output, size_t* input_consumed) argument 861 update(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
|
H A D | keymaster1_engine.cpp | 271 size_t input_consumed; 276 &input_consumed, nullptr /* out_params */, nullptr /* output */);
|
H A D | android_keymaster_messages_test.cpp | 290 msg.input_consumed = 99; 314 EXPECT_EQ(0U, deserialized->input_consumed); 317 EXPECT_EQ(99U, deserialized->input_consumed); 321 EXPECT_EQ(99U, deserialized->input_consumed);
|
H A D | android_keymaster_messages.cpp | 218 buf = append_uint32_to_buf(buf, end, input_consumed); 227 retval = copy_uint32_from_buf(buf_ptr, end, &input_consumed);
|
H A D | android_keymaster_test_utils.h | 202 size_t* input_consumed); 205 std::string* output, size_t* input_consumed);
|
H A D | android_keymaster.cpp | 311 &response->output, &response->input_consumed);
|
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_device.h | 75 const keymaster_blob_t* input, size_t* input_consumed, 136 const keymaster_blob_t* input, size_t* input_consumed,
|
H A D | trusty_keymaster_device.cpp | 508 size_t* input_consumed, 519 if (!input_consumed) { 553 *input_consumed = response.input_consumed; 731 size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) { 732 return convert_device(dev)->update(operation_handle, in_params, input, input_consumed, 505 update(keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument 728 update( const keymaster2_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
|
H A D | trusty_keymaster_main.cpp | 152 size_t input_consumed; local 153 error = device->update(op_handle, nullptr, input, &input_consumed, nullptr, nullptr); 158 if (input_consumed != input->data_length) {
|
/system/vold/tests/ |
H A D | CryptfsScryptHidlizationEquivalence_test.cpp | 321 size_t input_consumed; local 323 &input, &input_consumed, NULL /* out_params */, 330 if (input_consumed != to_sign_size) {
|
/system/keymaster/include/keymaster/ |
H A D | soft_keymaster_device.h | 170 const keymaster_blob_t* input, size_t* input_consumed, 227 const keymaster_blob_t* input, size_t* input_consumed,
|
H A D | android_keymaster_messages.h | 367 : KeymasterResponse(ver), input_consumed(0) {} 374 size_t input_consumed; member in struct:keymaster::UpdateOperationResponse
|