/aosp12/system/keymaster/km_openssl/ |
H A D | ecdsa_operation.cpp | 93 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { in StoreData() argument 100 *input_consumed = input.available_read(); in StoreData() 125 Buffer* /* output */, size_t* input_consumed) { in Update() argument 126 if (digest_ == KM_DIGEST_NONE) return StoreData(input, input_consumed); in Update() 130 *input_consumed = input.available_read(); in Update() 186 Buffer* /* output */, size_t* input_consumed) { in Update() argument 187 if (digest_ == KM_DIGEST_NONE) return StoreData(input, input_consumed); in Update() 191 *input_consumed = input.available_read(); in Update()
|
H A D | rsa_operation.cpp | 180 Buffer* /* output */, size_t* input_consumed) { in Update() argument 181 assert(input_consumed); in Update() 189 return StoreData(input, input_consumed); in Update() 194 assert(input_consumed); in StoreData() 204 *input_consumed = input.available_read(); in StoreData() 291 Buffer* output, size_t* input_consumed) { in Update() argument 295 input_consumed); in Update() 299 *input_consumed = input.available_read(); in Update() 402 Buffer* output, size_t* input_consumed) { in Update() argument 406 input_consumed); in Update() [all …]
|
H A D | block_cipher_operation.cpp | 171 Buffer* output, size_t* input_consumed) { in Update() argument 175 *input_consumed = input.available_read(); in Update() 386 size_t input_consumed; in UpdateForFinish() local 387 *error = Update(additional_params, input, output_params, output, &input_consumed); in UpdateForFinish() 389 if (input_consumed != input.available_read()) { in UpdateForFinish() 469 Buffer* output, size_t* input_consumed) { in Update() argument 470 if (!output || !input_consumed) return KM_ERROR_OUTPUT_PARAMETER_NULL; in Update() 473 *input_consumed = input.available_read(); in Update()
|
H A D | hmac_operation.cpp | 156 Buffer* /* output */, size_t* input_consumed) { in Update() argument 159 *input_consumed = input.available_read(); in Update()
|
H A D | block_cipher_operation.h | 80 size_t* input_consumed) override; 151 size_t* input_consumed) override;
|
H A D | hmac_operation.h | 35 size_t* input_consumed);
|
/aosp12/system/keymaster/tests/ |
H A D | android_keymaster_test.cpp | 513 size_t input_consumed; in TEST_P() local 595 size_t input_consumed; in TEST_P() local 635 size_t input_consumed; in TEST_P() local 1856 size_t input_consumed; in TEST_P() local 1885 size_t input_consumed; in TEST_P() local 2084 size_t input_consumed; in TEST_P() local 2101 size_t input_consumed; in TEST_P() local 2126 size_t input_consumed; in TEST_P() local 2202 size_t input_consumed; in TEST_P() local 2223 size_t input_consumed; in TEST_P() local [all …]
|
H A D | android_keymaster_test_utils.cpp | 266 size_t* input_consumed) { in UpdateOperation() argument 272 input_consumed, &out_params, &out_tmp); in UpdateOperation() 282 size_t* input_consumed) { in UpdateOperation() argument 288 input_consumed, &out_params, &out_tmp); in UpdateOperation() 924 const keymaster_blob_t* input, size_t* input_consumed, in update() argument 927 return unwrap(dev)->update(unwrap(dev), operation_handle, in_params, input, input_consumed, in update()
|
/aosp12/system/keymaster/android_keymaster/ |
H A D | operation.cpp | 152 size_t input_consumed; in UpdateForFinish() local 156 Update(input_params, input, &output_params, &output, &input_consumed); in UpdateForFinish() 158 assert(input_consumed == input.available_read()); in UpdateForFinish()
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | ecdsa_operation.h | 43 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed); 62 size_t* input_consumed) override; 77 size_t* input_consumed) override;
|
H A D | rsa_operation.h | 47 size_t* input_consumed) override; 57 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed); 101 size_t* input_consumed) override; 125 size_t* input_consumed) override;
|
H A D | ecdh_operation.h | 42 size_t* input_consumed) override;
|
/aosp12/system/keymaster/legacy_support/ |
H A D | keymaster_passthrough_operation.h | 58 size_t* input_consumed) override { in Update() argument 63 rc = km_device_->update(km_device_, operation_handle_, &input_params, &in, input_consumed, in Update()
|
H A D | keymaster1_engine.cpp | 258 size_t input_consumed; in Keymaster1Finish() local 263 &input_consumed, nullptr /* out_params */, nullptr /* output */); in Keymaster1Finish()
|
/aosp12/hardware/interfaces/keymaster/4.0/vts/functional/ |
H A D | keymaster_hidl_hal_test.cpp | 2945 size_t input_consumed; in TEST_P() local 3280 size_t input_consumed; in TEST_P() local 3332 size_t input_consumed; in TEST_P() local 3564 size_t input_consumed; in TEST_P() local 3568 EXPECT_EQ(0U, input_consumed); in TEST_P() 3575 EXPECT_EQ(message.size(), input_consumed); in TEST_P() 3624 size_t input_consumed; in TEST_P() local 3628 EXPECT_EQ(0U, input_consumed); in TEST_P() 3890 size_t input_consumed; in TEST_P() local 4202 size_t input_consumed; in TEST_P() local [all …]
|
H A D | KeymasterHidlTest.h | 141 size_t* input_consumed); 142 ErrorCode Update(const string& input, string* out, size_t* input_consumed);
|
H A D | KeymasterHidlTest.cpp | 286 string* output, size_t* input_consumed) { in Update() argument 298 *input_consumed = hidl_input_consumed; in Update() 304 ErrorCode KeymasterHidlTest::Update(const string& input, string* out, size_t* input_consumed) { in Update() argument 308 out, input_consumed); in Update()
|
/aosp12/system/core/trusty/keymaster/include/trusty_keymaster/legacy/ |
H A D | trusty_keymaster_device.h | 76 const keymaster_blob_t* input, size_t* input_consumed, 139 const keymaster_blob_t* input, size_t* input_consumed,
|
/aosp12/system/keymaster/contexts/ |
H A D | soft_keymaster_device.cpp | 1192 const keymaster_blob_t* input, size_t* input_consumed, in update() argument 1197 if (!input_consumed) return KM_ERROR_OUTPUT_PARAMETER_NULL; in update() 1204 return km1_dev->update(km1_dev, operation_handle, in_params, input, input_consumed, in update() 1234 *input_consumed = response.input_consumed; in update() 1251 const keymaster_blob_t* input, size_t* input_consumed, in update() argument 1259 return update(&sk_dev->km1_device_, operation_handle, in_params, input, input_consumed, in update() 1358 size_t input_consumed = 0; in finish() local 1361 &input_consumed, &update_out_params, &update_output); in finish() 1374 mutable_input.data += input_consumed; in finish() 1375 mutable_input.data_length -= input_consumed; in finish() [all …]
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | soft_keymaster_device.h | 161 const keymaster_blob_t* input, size_t* input_consumed, 218 const keymaster_blob_t* input, size_t* input_consumed,
|
H A D | operation.h | 136 size_t* input_consumed) = 0;
|
/aosp12/hardware/interfaces/keymaster/4.0/vts/performance/ |
H A D | Benchmark.cpp | 271 size_t input_consumed = 0; in ProcessMessage() local 272 while (message.length() - input_consumed > 0) { in ProcessMessage() 275 HidlBuf(message.substr(input_consumed, HIDL_BUFFER_LIMIT)), in ProcessMessage() 283 input_consumed += hidl_input_consumed; in ProcessMessage() 294 HidlBuf(message.substr(input_consumed)), HidlBuf(signature), in ProcessMessage()
|
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | keymaster_hidl_hal_test.cpp | 614 size_t* input_consumed) { in Update() argument 635 out, input_consumed); in Update() 3084 size_t input_consumed; in TEST_P() local 3412 size_t input_consumed; in TEST_P() local 3415 EXPECT_EQ(ciphertext.size(), input_consumed); in TEST_P() 3610 size_t input_consumed; in TEST_P() local 3614 EXPECT_EQ(0U, input_consumed); in TEST_P() 3621 EXPECT_EQ(message.size(), input_consumed); in TEST_P() 3669 size_t input_consumed; in TEST_P() local 3673 EXPECT_EQ(0U, input_consumed); in TEST_P() [all …]
|
/aosp12/hardware/libhardware/include/hardware/ |
H A D | keymaster2.h | 379 const keymaster_blob_t* input, size_t* input_consumed,
|
/aosp12/system/keymaster/ng/ |
H A D | AndroidKeyMintOperation.cpp | 80 if (response.input_consumed != request.input.buffer_size()) { in update()
|