/system/keymaster/android_keymaster/ |
H A D | operation.cpp | 141 size_t input_consumed; local 145 Update(input_params, input, &output_params, &output, &input_consumed); 148 assert(input_consumed == input.available_read());
|
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_main.cpp | 152 size_t input_consumed; local 153 error = device->update(op_handle, nullptr, input, &input_consumed, nullptr, nullptr); 158 if (input_consumed != input->data_length) {
|
H A D | trusty_keymaster_device.cpp | 510 size_t* input_consumed, 521 if (!input_consumed) { 555 *input_consumed = response.input_consumed; 735 size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) { 736 return convert_device(dev)->update(operation_handle, in_params, input, input_consumed, 507 update(keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument 732 update( const keymaster2_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
|
/system/keymaster/km_openssl/ |
H A D | ecdsa_operation.cpp | 92 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { argument 99 *input_consumed = input.available_read(); 126 Buffer* /* output */, size_t* input_consumed) { 128 return StoreData(input, input_consumed); 132 *input_consumed = input.available_read(); 195 Buffer* /* output */, size_t* input_consumed) { 197 return StoreData(input, input_consumed); 201 *input_consumed = input.available_read(); 123 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 192 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument
|
H A D | hmac_operation.cpp | 153 Buffer* /* output */, size_t* input_consumed) { 156 *input_consumed = input.available_read(); 151 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument
|
H A D | block_cipher_operation.cpp | 171 Buffer* output, size_t* input_consumed) { 175 *input_consumed = input.available_read(); 383 size_t input_consumed; local 384 *error = Update(additional_params, input, output_params, output, &input_consumed); 386 if (input_consumed != input.available_read()) { 466 Buffer* output, size_t* input_consumed) { 467 if (!output || !input_consumed) return KM_ERROR_OUTPUT_PARAMETER_NULL; 470 *input_consumed = input.available_read(); 168 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument 463 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument
|
H A D | rsa_operation.cpp | 145 Buffer* /* output */, size_t* input_consumed) { 146 assert(input_consumed); 154 return StoreData(input, input_consumed); 158 keymaster_error_t RsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { argument 159 assert(input_consumed); 170 *input_consumed = input.available_read(); 281 Buffer* output, size_t* input_consumed) { 285 input_consumed); 289 *input_consumed = input.available_read(); 404 Buffer* output, size_t* input_consumed) { 143 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 279 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument 402 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument [all...] |
/system/vold/tests/ |
H A D | CryptfsScryptHidlizationEquivalence_test.cpp | 321 size_t input_consumed; local 323 &input, &input_consumed, NULL /* out_params */, 330 if (input_consumed != to_sign_size) {
|
/system/keymaster/contexts/ |
H A D | soft_keymaster_device.cpp | 1292 const keymaster_blob_t* input, size_t* input_consumed, 1298 if (!input_consumed) 1306 return km1_dev->update(km1_dev, operation_handle, in_params, input, input_consumed, 1338 *input_consumed = response.input_consumed; 1356 const keymaster_blob_t* input, size_t* input_consumed, 1366 return update(&sk_dev->km1_device_, operation_handle, in_params, input, input_consumed, 1471 size_t input_consumed = 0; local 1474 &input_consumed, &update_out_params, &update_output); 1487 mutable_input.data += input_consumed; 1289 update(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument 1353 update(const keymaster2_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument [all...] |
/system/keymaster/include/keymaster/ |
H A D | android_keymaster_messages.h | 374 : KeymasterResponse(ver), input_consumed(0) {} 381 size_t input_consumed; member in struct:keymaster::UpdateOperationResponse
|
/system/keymaster/tests/ |
H A D | android_keymaster_test_utils.cpp | 265 size_t* input_consumed) { 271 input_consumed, &out_params, &out_tmp); 281 size_t* input_consumed) { 287 input_consumed, &out_params, &out_tmp); 893 const keymaster_blob_t* input, size_t* input_consumed, 896 return unwrap(dev)->update(unwrap(dev), operation_handle, in_params, input, input_consumed, 264 UpdateOperation(const string& message, string* output, size_t* input_consumed) argument 278 UpdateOperation(const AuthorizationSet& additional_params, const string& message, AuthorizationSet* output_params, string* output, size_t* input_consumed) argument 890 update(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
|
H A D | android_keymaster_test.cpp | 574 size_t input_consumed; local 575 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); 677 size_t input_consumed; local 678 ASSERT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); 679 ASSERT_EQ(message.size(), input_consumed); 729 size_t input_consumed; local 730 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); 2112 size_t input_consumed; local 2113 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); 2144 size_t input_consumed; local 2290 size_t input_consumed; local 2310 size_t input_consumed; local 2338 size_t input_consumed; local 2426 size_t input_consumed; local 2450 size_t input_consumed; local 2604 size_t input_consumed; local 2653 size_t input_consumed; local 2871 size_t input_consumed; local 2936 size_t input_consumed; local 3002 size_t input_consumed; local 3043 size_t input_consumed; local 3101 size_t input_consumed; local 3142 size_t input_consumed; local 3214 size_t input_consumed; local 3268 size_t input_consumed; local 3312 size_t input_consumed; local 3354 size_t input_consumed; local 3479 size_t input_consumed; local 3826 size_t input_consumed; local 3847 size_t input_consumed; local [all...] |