Home
last modified time | relevance | path

Searched refs:available_read (Results 1 – 25 of 29) sorted by relevance

12

/aosp12/system/keymaster/km_openssl/
H A Decies_kem.cpp77 return Encrypt(peer_public_value.peek_read(), peer_public_value.available_read(), in Encrypt()
106 z.Reinitialize(output_encrypted_key->peek_read(), output_encrypted_key->available_read()); in Encrypt()
109 Buffer actual_secret(z.available_read() + shared_secret.available_read()); in Encrypt()
110 actual_secret.write(z.peek_read(), z.available_read()); in Encrypt()
111 actual_secret.write(shared_secret.peek_read(), shared_secret.available_read()); in Encrypt()
113 if (!kdf_->Init(actual_secret.peek_read(), actual_secret.available_read(), nullptr /* salt */, in Encrypt()
130 return Decrypt(private_key, encrypted_key.peek_read(), encrypted_key.available_read(), in Decrypt()
161 z.Reinitialize(public_value.peek_read(), public_value.available_read()); in Decrypt()
164 Buffer actual_secret(z.available_read() + shared_secret.available_read()); in Decrypt()
165 actual_secret.write(z.peek_read(), z.available_read()); in Decrypt()
[all …]
H A Drsa_operation.cpp200 input.available_read() + data_.available_read(), EVP_PKEY_size(rsa_key_)); in StoreData()
204 *input_consumed = input.available_read(); in StoreData()
299 *input_consumed = input.available_read(); in Update()
318 assert(padded_len > src.available_read()); in zero_pad_left()
342 if (data_.available_read() > key_len) { in SignUndigested()
344 } else if (data_.available_read() < key_len) { in SignUndigested()
410 *input_consumed = input.available_read(); in Update()
467 bytes_to_compare = data_.available_read(); in VerifyUndigested()
548 data_.available_read()) <= 0) in Finish()
554 size_t to_encrypt_len = data_.available_read(); in Finish()
[all …]
H A Decdsa_operation.cpp97 if (!data_.write(input.peek_read(), min(data_.available_write(), input.available_read()))) in StoreData()
100 *input_consumed = input.available_read(); in StoreData()
128 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update()
130 *input_consumed = input.available_read(); in Update()
150 if (!ECDSA_sign(0 /* type -- ignored */, data_.peek_read(), data_.available_read(), in Finish()
189 if (EVP_DigestVerifyUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update()
191 *input_consumed = input.available_read(); in Update()
207 ECDSA_verify(0 /* type -- ignored */, data_.peek_read(), data_.available_read(), in Finish()
208 signature.peek_read(), signature.available_read(), ecdsa.get()); in Finish()
214 signature.available_read())) in Finish()
H A Dhmac.cpp35 return Init(key.peek_read(), key.available_read()); in Init()
50 return Sign(data.peek_read(), data.available_read(), out_digest, digest_len); in Sign()
70 return Verify(data.peek_read(), data.available_read(), digest.peek_read(), in Verify()
71 digest.available_read()); in Verify()
H A Dblock_cipher_operation.cpp174 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error)) return error; in Update()
175 *input_consumed = input.available_read(); in Update()
319 if (input.available_read()) { in HandleAad()
385 if (input.available_read() || !additional_params.empty()) { in UpdateForFinish()
389 if (input_consumed != input.available_read()) { in UpdateForFinish()
424 if (!output->reserve(input.available_read() + block_size_bytes() + tag_length_)) { in Finish()
473 *input_consumed = input.available_read(); in Update()
487 if (input.available_read() <= tag_buf_unused()) { in ProcessAllButTagLengthBytes()
488 BufferCandidateTagData(input.peek_read(), input.available_read()); in ProcessAllButTagLengthBytes()
492 const size_t data_available = tag_buf_len_ + input.available_read(); in ProcessAllButTagLengthBytes()
[all …]
H A Dhmac_operation.cpp157 if (!HMAC_Update(&ctx_, input.peek_read(), input.available_read())) in Update()
159 *input_consumed = input.available_read(); in Update()
184 size_t siglen = signature.available_read(); in Finish()
H A Decdh_operation.cpp49 EVP_PKEY* pkeyRaw = d2i_PUBKEY(nullptr, &encodedPublicKey, input.available_read()); in Finish()
H A Dnist_curve_key_exchange.cpp93 return CalculateSharedKey(peer_public_value.peek_read(), peer_public_value.available_read(), in CalculateSharedKey()
/aosp12/system/keymaster/tests/
H A Decies_kem_test.cpp59 ASSERT_EQ(kKeyLen, output_clear_key.available_read()); in TEST()
60 ASSERT_EQ(peer_public_value.available_read(), output_encrypted_key.available_read()); in TEST()
65 ASSERT_EQ(kKeyLen, decrypted_clear_key.available_read()); in TEST()
67 output_clear_key.available_read())); in TEST()
H A Dnist_curve_key_exchange_test.cpp58 EXPECT_EQ(alice_shared.available_read(), bob_shared.available_read()); in TEST()
60 alice_shared.available_read())); in TEST()
204 EXPECT_EQ(shared_secret.size(), computed_shared_secret.available_read()); in TEST()
H A Dandroid_keymaster_messages_test.cpp365 EXPECT_EQ(3U, deserialized->input.available_read()); in TEST()
395 EXPECT_EQ(3U, deserialized->output.available_read()); in TEST()
441 EXPECT_EQ(3U, deserialized->signature.available_read()); in TEST()
467 EXPECT_EQ(msg.output.available_read(), deserialized->output.available_read()); in TEST()
469 msg.output.available_read())); in TEST()
725 EXPECT_EQ(3U, deserialized->random_data.available_read()); in TEST()
834 EXPECT_EQ(id.available_read(), len) << "On " << value; in check_id()
/aosp12/system/keymaster/android_keymaster/
H A Dserializable.cpp84 memcpy(new_buffer, buffer_.get() + read_position_, available_read()); in reserve()
122 size_t Buffer::available_read() const { in available_read() function in keymaster::Buffer
140 if (available_read() < read_length) return false; in read()
162 return sizeof(uint32_t) + available_read(); in SerializedSize()
166 return append_size_and_data_to_buf(buf, end, peek_read(), available_read()); in Serialize()
H A Doperation.cpp151 if (!input_params.empty() || input.available_read()) { in UpdateForFinish()
158 assert(input_consumed == input.available_read()); in UpdateForFinish()
160 assert(output.available_read() == 0); in UpdateForFinish()
H A Dandroid_keymaster.cpp304 request.random_data.available_read()); in AddRngEntropy()
593 size_t input_num_bytes = request.input.available_read(); in UpdateOperation()
594 if (input_num_bytes + confirmation_verifier_buffer->available_read() > in UpdateOperation()
637 size_t input_num_bytes = request.input.available_read(); in FinishOperation()
638 if (input_num_bytes + confirmation_verifier_buffer->available_read() > in FinishOperation()
692 confirmation_verifier_buffer->available_read(), confirmation_token_blob.data); in FinishOperation()
/aosp12/system/keymaster/key_blob_utils/
H A Dauth_encrypted_key_blob.cpp97 if (!prk.advance_write(out_len) || !prk.available_read() || !info.available_read()) { in DeriveAesGcmKeyEncryptionKey()
105 prk.peek_read(), prk.available_read(), // in DeriveAesGcmKeyEncryptionKey()
106 info.peek_read(), info.available_read())) { in DeriveAesGcmKeyEncryptionKey()
270 if (retval.encrypted_key.nonce.available_read() != OCB_NONCE_LENGTH || in DeserializeAuthEncryptedBlob()
271 retval.encrypted_key.tag.available_read() != OCB_TAG_LENGTH) { in DeserializeAuthEncryptedBlob()
278 if (retval.encrypted_key.nonce.available_read() != kAesGcmNonceLength || in DeserializeAuthEncryptedBlob()
279 retval.encrypted_key.tag.available_read() != kAesGcmTagLength) { in DeserializeAuthEncryptedBlob()
H A Docb_utils.cpp119 if (nonce.available_read() != OCB_NONCE_LENGTH) return KM_ERROR_INVALID_ARGUMENT; in OcbEncryptKey()
151 if (nonce.available_read() != OCB_NONCE_LENGTH || tag.available_read() != OCB_TAG_LENGTH) in OcbDecryptKey()
/aosp12/system/keymaster/legacy_support/
H A Dkeymaster_passthrough_operation.cpp29 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish()
66 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish()
98 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish()
99 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish()
H A Dkeymaster_passthrough_operation.h60 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Update()
/aosp12/system/keymaster/include/keymaster/km_openssl/
H A Dhkdf.h36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), in Init()
37 salt.available_read()); in Init()
/aosp12/system/keymaster/include/keymaster/
H A Dserializable.h230 return Reinitialize(buffer.peek_read(), buffer.available_read()); in Reinitialize()
234 const uint8_t* end() const { return peek_read() + available_read(); } in end()
239 size_t available_read() const;
/aosp12/system/keymaster/ng/include/
H A DKeyMintUtils.h98 vector<uint8_t> result(buf.peek_read(), buf.peek_read() + buf.available_read()); in kmBuffer2vector()
/aosp12/system/keymaster/contexts/
H A Dsoft_keymaster_device.cpp1236 output->data_length = response.output.available_read(); in update()
1241 } else if (response.output.available_read() > 0) { in update()
1308 output->data_length = response.output.available_read(); in finish()
1313 } else if (response.output.available_read() > 0) { in finish()
1456 output->data_length = response.output.available_read(); in finish()
1461 } else if (response.output.available_read() > 0) { in finish()
H A Dpure_soft_keymaster_context.cpp458 KeymasterKeyBlob key_material = {output.peek_read(), output.available_read()}; in UnwrapKey()
540 *wrapped_key_material = {plaintext.peek_read(), plaintext.available_read()}; in UnwrapKey()
/aosp12/system/keymaster/ng/
H A DAndroidKeymaster3Device.cpp149 result.setToExternal(const_cast<unsigned char*>(buf.peek_read()), buf.available_read()); in kmBuffer2hidlVec()
/aosp12/system/core/trusty/keymaster/3.0/
H A DTrustyKeymaster3Device.cpp138 result.setToExternal(const_cast<unsigned char*>(buf.peek_read()), buf.available_read()); in kmBuffer2hidlVec()

12