Lines Matching refs:available_read

198     if (!data_.write(input.peek_read(), input.available_read())) {  in StoreData()
200 input.available_read() + data_.available_read(), EVP_PKEY_size(rsa_key_)); in StoreData()
204 *input_consumed = input.available_read(); in StoreData()
297 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update()
299 *input_consumed = input.available_read(); in Update()
318 assert(padded_len > src.available_read()); in zero_pad_left()
323 size_t padding_len = padded_len - src.available_read(); in zero_pad_left()
325 if (!src.read(dest->get() + padding_len, src.available_read())) return KM_ERROR_UNKNOWN_ERROR; in zero_pad_left()
342 if (data_.available_read() > key_len) { in SignUndigested()
344 } else if (data_.available_read() < key_len) { in SignUndigested()
355 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in SignUndigested()
357 data_.available_read(), EVP_PKEY_size(rsa_key_) * 8); in SignUndigested()
360 bytes_encrypted = RSA_private_encrypt(data_.available_read(), data_.peek_read(), in SignUndigested()
408 if (EVP_DigestVerifyUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update()
410 *input_consumed = input.available_read(); in Update()
435 if (data_.available_read() > key_len) return KM_ERROR_INVALID_INPUT_LENGTH; in VerifyUndigested()
436 if (key_len != signature.available_read()) return KM_ERROR_VERIFICATION_FAILED; in VerifyUndigested()
440 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in VerifyUndigested()
442 data_.available_read(), key_len * 8); in VerifyUndigested()
453 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(), in VerifyUndigested()
460 if (padding_ == KM_PAD_NONE && data_.available_read() < bytes_to_compare) { in VerifyUndigested()
464 const uint8_t* zero_end = compare_pos + bytes_to_compare - data_.available_read(); in VerifyUndigested()
467 bytes_to_compare = data_.available_read(); in VerifyUndigested()
475 if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), signature.available_read())) in VerifyDigested()
548 data_.available_read()) <= 0) in Finish()
554 size_t to_encrypt_len = data_.available_read(); in Finish()
591 data_.available_read()) <= 0) in Finish()
597 size_t to_decrypt_len = data_.available_read(); in Finish()