Searched refs:peek_read (Results 1 - 18 of 18) sorted by relevance

/system/keymaster/
H A Dhkdf.h36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(),
H A Decies_kem.cpp77 return Encrypt(peer_public_value.peek_read(), peer_public_value.available_read(),
106 z.Reinitialize(output_encrypted_key->peek_read(), output_encrypted_key->available_read());
110 actual_secret.write(z.peek_read(), z.available_read());
111 actual_secret.write(shared_secret.peek_read(), shared_secret.available_read());
113 if (!kdf_->Init(actual_secret.peek_read(), actual_secret.available_read(), nullptr /* salt */,
130 return Decrypt(private_key, encrypted_key.peek_read(), encrypted_key.available_read(),
161 z.Reinitialize(public_value.peek_read(), public_value.available_read());
165 actual_secret.write(z.peek_read(), z.available_read());
166 actual_secret.write(shared_secret.peek_read(), shared_secret.available_read());
168 if (!kdf_->Init(actual_secret.peek_read(), actual_secre
[all...]
H A Dhmac.cpp35 return Init(key.peek_read(), key.available_read());
51 return Sign(data.peek_read(), data.available_read(), out_digest, digest_len);
73 return Verify(data.peek_read(), data.available_read(), digest.peek_read(),
H A Decies_kem_test.cpp67 EXPECT_EQ(0, memcmp(output_clear_key.peek_read(), decrypted_clear_key.peek_read(),
H A Decdsa_operation.cpp102 if (!data_.write(input.peek_read(), min(data_.available_write(), input.available_read())))
132 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1)
157 if (!ECDSA_sign(0 /* type -- ignored */, data_.peek_read(), data_.available_read(),
197 if (EVP_DigestVerifyUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1)
217 ECDSA_verify(0 /* type -- ignored */, data_.peek_read(), data_.available_read(),
218 signature.peek_read(), signature.available_read(), ecdsa.get());
223 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(),
H A Dnist_curve_key_exchange_test.cpp61 EXPECT_EQ(0, memcmp(alice_shared.peek_read(), bob_shared.peek_read(),
205 EXPECT_EQ(0, memcmp(shared_secret.data(), computed_shared_secret.peek_read(),
H A Drsa_operation.cpp165 if (!data_.write(input.peek_read(), input.available_read())) {
286 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1)
334 const uint8_t* to_encrypt = data_.peek_read();
355 bytes_encrypted = RSA_private_encrypt(data_.available_read(), data_.peek_read(),
409 if (EVP_DigestVerifyUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1)
459 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(),
476 if (memcmp_s(compare_pos, data_.peek_read(), bytes_to_compare) != 0 || zero_check_result != 0)
482 if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), signature.available_read()))
547 if (EVP_PKEY_encrypt(ctx.get(), nullptr /* out */, &outlen, data_.peek_read(),
554 const uint8_t* to_encrypt = data_.peek_read();
[all...]
H A Dhmac_operation.cpp153 if (!HMAC_Update(&ctx_, input.peek_read(), input.available_read()))
188 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0)
H A Docb_utils.cpp140 int ae_err = ae_encrypt(ctx.get(), nonce.peek_read(), plaintext.key_material,
176 int ae_err = ae_decrypt(ctx.get(), nonce.peek_read(), ciphertext.key_material,
179 tag.peek_read(), 1 /* final */);
H A Dnist_curve_key_exchange.cpp91 return CalculateSharedKey(peer_public_value.peek_read(), peer_public_value.available_read(),
H A Daes_operation.cpp202 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error))
577 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error))
585 BufferCandidateTagData(input.peek_read(), input.available_read());
602 if (!InternalUpdate(input.peek_read(), to_process_from_input, output, &error))
605 BufferCandidateTagData(input.peek_read() + to_process_from_input,
H A Dserializable.cpp143 return append_size_and_data_to_buf(buf, end, peek_read(), available_read());
H A Dandroid_keymaster_messages_test.cpp281 EXPECT_EQ(0, memcmp(deserialized->input.peek_read(), "foo", 3));
310 EXPECT_EQ(0, memcmp(deserialized->output.peek_read(), "foo", 3));
354 EXPECT_EQ(0, memcmp(deserialized->signature.peek_read(), "bar", 3));
379 EXPECT_EQ(0, memcmp(msg.output.peek_read(), deserialized->output.peek_read(),
539 EXPECT_EQ(0, memcmp("foo", deserialized->random_data.peek_read(), 3));
H A Dsoft_keymaster_device.cpp1347 memcpy(tmp, response.output.peek_read(), output->data_length);
1423 memcpy(tmp, response.output.peek_read(), output->data_length);
1581 memcpy(tmp, response.output.peek_read(), output->data_length);
H A Dandroid_keymaster.cpp182 response->error = context_->AddRngEntropy(request.random_data.peek_read(),
H A Dattestation_record.cpp598 !ASN1_OCTET_STRING_set(key_desc->unique_id, unique_id.peek_read(),
/system/keymaster/include/keymaster/
H A Dserializable.h216 return Reinitialize(buffer.peek_read(), buffer.available_read());
219 const uint8_t* begin() const { return peek_read(); }
220 const uint8_t* end() const { return peek_read() + available_read(); }
230 const uint8_t* peek_read() const { return buffer_.get() + read_position_; } function in class:keymaster::Buffer
/system/core/trusty/keymaster/
H A Dtrusty_keymaster_device.cpp556 output->data = DuplicateBuffer(response.output.peek_read(), output->data_length);
616 output->data = DuplicateBuffer(response.output.peek_read(), output->data_length);

Completed in 133 milliseconds