/aosp12/system/keymaster/km_openssl/ |
H A D | rsa_operation.cpp | 546 size_t outlen; in Finish() local 551 if (!output->Reinitialize(outlen)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in Finish() 556 if (padding_ == KM_PAD_NONE && to_encrypt_len < outlen) { in Finish() 557 keymaster_error_t error = zero_pad_left(&zero_padded, outlen, data_); in Finish() 560 to_encrypt_len = outlen; in Finish() 565 if (!output->advance_write(outlen)) return KM_ERROR_UNKNOWN_ERROR; in Finish() 589 size_t outlen; in Finish() local 599 if (padding_ == KM_PAD_NONE && to_decrypt_len < outlen) { in Finish() 600 keymaster_error_t error = zero_pad_left(&zero_padded, outlen, data_); in Finish() 603 to_decrypt_len = outlen; in Finish() [all …]
|
/aosp12/system/keymaster/cppcose/ |
H A D | cppcose.cpp | 45 int outlen; in aesGcmInitAndProcessAad() local 46 if (!aad.empty() && !EVP_CipherUpdate(ctx.get(), nullptr /* out; null means AAD */, &outlen, in aesGcmInitAndProcessAad() 415 int outlen; in aesGcmEncrypt() local 416 if (!EVP_CipherUpdate(ctx->get(), ciphertext.data(), &outlen, plaintext.data(), in aesGcmEncrypt() 420 assert(plaintext.size() == static_cast<uint64_t>(outlen)); in aesGcmEncrypt() 422 if (!EVP_CipherFinal_ex(ctx->get(), ciphertext.data() + outlen, &outlen)) { in aesGcmEncrypt() 425 assert(outlen == 0); in aesGcmEncrypt() 443 int outlen; in aesGcmDecrypt() local 448 assert(plaintext.size() == static_cast<uint64_t>(outlen)); in aesGcmDecrypt() 455 if (!EVP_CipherFinal_ex(ctx->get(), nullptr, &outlen)) { in aesGcmDecrypt() [all …]
|
/aosp12/system/vold/ |
H A D | KeyStorage.cpp | 489 int outlen; in encryptWithoutKeymaster() local 496 if (outlen != static_cast<int>(plaintext.size())) { in encryptWithoutKeymaster() 503 &outlen)) { in encryptWithoutKeymaster() 507 if (outlen != 0) { in encryptWithoutKeymaster() 508 LOG(ERROR) << "GCM EncryptFinal should be 0, was " << outlen; in encryptWithoutKeymaster() 542 int outlen; in decryptWithoutKeymaster() local 543 if (1 != EVP_DecryptUpdate(ctx.get(), reinterpret_cast<uint8_t*>(&(*plaintext)[0]), &outlen, in decryptWithoutKeymaster() 549 if (outlen != static_cast<int>(plaintext->size())) { in decryptWithoutKeymaster() 561 &outlen)) { in decryptWithoutKeymaster() 565 if (outlen != 0) { in decryptWithoutKeymaster() [all …]
|
/aosp12/system/bt/embdrv/g722/ |
H A D | g722_decode.cc | 278 uint32_t outlen; in g722_decode() local 282 outlen = 0; in g722_decode() 410 amp[outlen++] = ((int16_t) (xout1 >> 4) + 2048); in g722_decode() 411 amp[outlen++] = ((int16_t) (xout2 >> 4) + 2048); in g722_decode() 415 amp[outlen++] = xout1; in g722_decode() 416 amp[outlen++] = xout2; in g722_decode() 419 return outlen; in g722_decode()
|
/aosp12/packages/modules/adb/pairing_auth/ |
H A D | pairing_auth.cpp | 252 size_t* outlen) { in pairing_auth_encrypt() argument 256 CHECK(outlen); in pairing_auth_encrypt() 266 *outlen = out.size(); in pairing_auth_encrypt() 279 size_t* outlen) { in pairing_auth_decrypt() argument 283 CHECK(outlen); in pairing_auth_decrypt() 293 *outlen = out.size(); in pairing_auth_decrypt()
|
/aosp12/packages/modules/adb/pairing_auth/include/adb/pairing/ |
H A D | pairing_auth.h | 149 size_t* outlen) __INTRODUCED_IN(30); 182 size_t* outlen) __INTRODUCED_IN(30);
|
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/ |
H A D | KeyMintAidlTestBase.cpp | 861 size_t outlen; in LocalRsaEncryptMessage() local 862 if (EVP_PKEY_encrypt(ctx.get(), nullptr /* out */, &outlen, in LocalRsaEncryptMessage() 873 if (padding == PaddingMode::NONE && to_encrypt_len < outlen) { in LocalRsaEncryptMessage() 874 zero_padded_message.reset(new string(outlen, '\0')); in LocalRsaEncryptMessage() 875 memcpy(zero_padded_message->data() + (outlen - to_encrypt_len), message.data(), in LocalRsaEncryptMessage() 878 to_encrypt_len = outlen; in LocalRsaEncryptMessage() 882 string output(outlen, '\0'); in LocalRsaEncryptMessage() 883 if (EVP_PKEY_encrypt(ctx.get(), reinterpret_cast<uint8_t*>(output.data()), &outlen, to_encrypt, in LocalRsaEncryptMessage()
|
/aosp12/packages/modules/adb/ |
H A D | sysdeps_win32.cpp | 2239 size_t outlen; in _console_read() local 2247 outlen = strlen(seqstr); in _console_read() 2250 outlen = seqbuflen; in _console_read() 2256 outlen = seqbuflen; in _console_read() 2271 g_console_input_buffer.insert(g_console_input_buffer.end(), out, out + outlen); in _console_read()
|