/aosp12/system/keymaster/km_openssl/ |
H A D | ecies_kem.cpp | 77 return Encrypt(peer_public_value.peek_read(), peer_public_value.available_read(), in Encrypt() 106 z.Reinitialize(output_encrypted_key->peek_read(), output_encrypted_key->available_read()); in Encrypt() 110 actual_secret.write(z.peek_read(), z.available_read()); in Encrypt() 111 actual_secret.write(shared_secret.peek_read(), shared_secret.available_read()); in Encrypt() 113 if (!kdf_->Init(actual_secret.peek_read(), actual_secret.available_read(), nullptr /* salt */, in Encrypt() 130 return Decrypt(private_key, encrypted_key.peek_read(), encrypted_key.available_read(), in Decrypt() 161 z.Reinitialize(public_value.peek_read(), public_value.available_read()); in Decrypt() 165 actual_secret.write(z.peek_read(), z.available_read()); in Decrypt() 166 actual_secret.write(shared_secret.peek_read(), shared_secret.available_read()); in Decrypt() 168 if (!kdf_->Init(actual_secret.peek_read(), actual_secret.available_read(), nullptr /* salt */, in Decrypt()
|
H A D | ecdsa_operation.cpp | 97 if (!data_.write(input.peek_read(), min(data_.available_write(), input.available_read()))) in StoreData() 128 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update() 150 if (!ECDSA_sign(0 /* type -- ignored */, data_.peek_read(), data_.available_read(), in Finish() 189 if (EVP_DigestVerifyUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update() 207 ECDSA_verify(0 /* type -- ignored */, data_.peek_read(), data_.available_read(), in Finish() 208 signature.peek_read(), signature.available_read(), ecdsa.get()); in Finish() 213 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), in Finish()
|
H A D | hmac.cpp | 35 return Init(key.peek_read(), key.available_read()); in Init() 50 return Sign(data.peek_read(), data.available_read(), out_digest, digest_len); in Sign() 70 return Verify(data.peek_read(), data.available_read(), digest.peek_read(), in Verify()
|
H A D | rsa_operation.cpp | 198 if (!data_.write(input.peek_read(), input.available_read())) { in StoreData() 297 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update() 340 const uint8_t* to_encrypt = data_.peek_read(); in SignUndigested() 360 bytes_encrypted = RSA_private_encrypt(data_.available_read(), data_.peek_read(), in SignUndigested() 408 if (EVP_DigestVerifyUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update() 453 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(), in VerifyUndigested() 475 if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), signature.available_read())) in VerifyDigested() 547 if (EVP_PKEY_encrypt(ctx.get(), nullptr /* out */, &outlen, data_.peek_read(), in Finish() 553 const uint8_t* to_encrypt = data_.peek_read(); in Finish() 590 if (EVP_PKEY_decrypt(ctx.get(), nullptr /* out */, &outlen, data_.peek_read(), in Finish() [all …]
|
H A D | block_cipher_operation.cpp | 174 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error)) return error; in Update() 481 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error)) return error; in Update() 488 BufferCandidateTagData(input.peek_read(), input.available_read()); in ProcessAllButTagLengthBytes() 503 if (!InternalUpdate(input.peek_read(), to_process_from_input, output, &error)) return error; in ProcessAllButTagLengthBytes() 505 BufferCandidateTagData(input.peek_read() + to_process_from_input, in ProcessAllButTagLengthBytes()
|
H A D | hmac_operation.cpp | 157 if (!HMAC_Update(&ctx_, input.peek_read(), input.available_read())) in Update() 188 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0) in Finish()
|
H A D | nist_curve_key_exchange.cpp | 93 return CalculateSharedKey(peer_public_value.peek_read(), peer_public_value.available_read(), in CalculateSharedKey()
|
/aosp12/system/keymaster/legacy_support/ |
H A D | keymaster_passthrough_operation.cpp | 29 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish() 66 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish() 98 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish() 99 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish()
|
H A D | keymaster_passthrough_operation.h | 60 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Update()
|
/aosp12/system/keymaster/key_blob_utils/ |
H A D | auth_encrypted_key_blob.cpp | 105 prk.peek_read(), prk.available_read(), // in DeriveAesGcmKeyEncryptionKey() 106 info.peek_read(), info.available_read())) { in DeriveAesGcmKeyEncryptionKey() 142 if (!(EVP_EncryptInit_ex(ctx.get(), EVP_aes_256_gcm(), nullptr /* engine */, kek.peek_read(), in AesGcmEncryptKey() 143 retval.nonce.peek_read()) && in AesGcmEncryptKey() 180 if (!(EVP_DecryptInit_ex(ctx.get(), EVP_aes_256_gcm(), nullptr /* engine */, kek.peek_read(), in AesGcmDecryptKey() 181 key.encrypted_key.nonce.peek_read()) && in AesGcmDecryptKey() 186 const_cast<uint8_t*>(key.encrypted_key.tag.peek_read())))) { in AesGcmDecryptKey()
|
H A D | ocb_utils.cpp | 131 int ae_err = ae_encrypt(ctx.get(), nonce.peek_read(), plaintext.key_material, in OcbEncryptKey() 163 int ae_err = ae_decrypt(ctx.get(), nonce.peek_read(), ciphertext.key_material, in OcbDecryptKey() 166 tag.peek_read(), 1 /* final */); in OcbDecryptKey()
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | hkdf.h | 36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), in Init()
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | serializable.h | 230 return Reinitialize(buffer.peek_read(), buffer.available_read()); in Reinitialize() 233 const uint8_t* begin() const { return peek_read(); } in begin() 234 const uint8_t* end() const { return peek_read() + available_read(); } in end() 245 const uint8_t* peek_read() const { return buffer_.get() + read_position_; } in peek_read() function
|
/aosp12/system/keymaster/tests/ |
H A D | ecies_kem_test.cpp | 66 EXPECT_EQ(0, memcmp(output_clear_key.peek_read(), decrypted_clear_key.peek_read(), in TEST()
|
H A D | nist_curve_key_exchange_test.cpp | 59 EXPECT_EQ(0, memcmp(alice_shared.peek_read(), bob_shared.peek_read(), in TEST() 205 EXPECT_EQ(0, memcmp(shared_secret.data(), computed_shared_secret.peek_read(), in TEST()
|
H A D | android_keymaster_messages_test.cpp | 366 EXPECT_EQ(0, memcmp(deserialized->input.peek_read(), "foo", 3)); in TEST() 396 EXPECT_EQ(0, memcmp(deserialized->output.peek_read(), "foo", 3)); in TEST() 442 EXPECT_EQ(0, memcmp(deserialized->signature.peek_read(), "bar", 3)); in TEST() 468 EXPECT_EQ(0, memcmp(msg.output.peek_read(), deserialized->output.peek_read(), in TEST() 726 EXPECT_EQ(0, memcmp("foo", deserialized->random_data.peek_read(), 3)); in TEST() 835 EXPECT_TRUE(memcmp(id.peek_read(), value, len) == 0) << "On " << value; in check_id()
|
/aosp12/system/keymaster/ng/include/ |
H A D | KeyMintUtils.h | 98 vector<uint8_t> result(buf.peek_read(), buf.peek_read() + buf.available_read()); in kmBuffer2vector()
|
/aosp12/system/keymaster/contexts/ |
H A D | pure_soft_keymaster_context.cpp | 458 KeymasterKeyBlob key_material = {output.peek_read(), output.available_read()}; in UnwrapKey() 540 *wrapped_key_material = {plaintext.peek_read(), plaintext.available_read()}; in UnwrapKey() 541 if (!wrapped_key_material->key_material && plaintext.peek_read()) { in UnwrapKey()
|
H A D | soft_keymaster_device.cpp | 1239 memcpy(tmp, response.output.peek_read(), output->data_length); in update() 1311 memcpy(tmp, response.output.peek_read(), output->data_length); in finish() 1459 memcpy(tmp, response.output.peek_read(), output->data_length); in finish()
|
/aosp12/system/keymaster/android_keymaster/ |
H A D | serializable.cpp | 166 return append_size_and_data_to_buf(buf, end, peek_read(), available_read()); in Serialize()
|
H A D | android_keymaster.cpp | 303 response->error = context_->AddRngEntropy(request.random_data.peek_read(), in AddRngEntropy() 605 confirmation_verifier_buffer->write(request.input.peek_read(), input_num_bytes); in UpdateOperation() 649 confirmation_verifier_buffer->write(request.input.peek_read(), input_num_bytes); in FinishOperation()
|
/aosp12/system/keymaster/ng/ |
H A D | AndroidKeymaster3Device.cpp | 149 result.setToExternal(const_cast<unsigned char*>(buf.peek_read()), buf.available_read()); in kmBuffer2hidlVec()
|
H A D | AndroidKeymaster4Device.cpp | 102 result.setToExternal(const_cast<unsigned char*>(buf.peek_read()), buf.available_read()); in kmBuffer2hidlVec()
|
/aosp12/system/core/trusty/keymaster/3.0/ |
H A D | TrustyKeymaster3Device.cpp | 138 result.setToExternal(const_cast<unsigned char*>(buf.peek_read()), buf.available_read()); in kmBuffer2hidlVec()
|
/aosp12/system/core/trusty/keymaster/4.0/ |
H A D | TrustyKeymaster4Device.cpp | 190 result.setToExternal(const_cast<unsigned char*>(buf.peek_read()), buf.available_read()); in kmBuffer2hidlVec()
|