Lines Matching refs:data_
161 if (!data_.reserve(EVP_PKEY_size(rsa_key_))) in StoreData()
164 if (!data_.write(input.peek_read(), input.available_read())) { in StoreData()
166 input.available_read() + data_.available_read(), EVP_PKEY_size(rsa_key_)); in StoreData()
335 const uint8_t* to_encrypt = data_.peek_read(); in SignUndigested()
337 if (data_.available_read() > key_len) { in SignUndigested()
339 } else if (data_.available_read() < key_len) { in SignUndigested()
340 keymaster_error_t error = zero_pad_left(&zero_padded, key_len, data_); in SignUndigested()
351 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in SignUndigested()
353 data_.available_read(), EVP_PKEY_size(rsa_key_) * 8); in SignUndigested()
356 bytes_encrypted = RSA_private_encrypt(data_.available_read(), data_.peek_read(), in SignUndigested()
439 if (data_.available_read() > key_len) in VerifyUndigested()
446 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in VerifyUndigested()
448 data_.available_read(), key_len * 8); in VerifyUndigested()
468 if (padding_ == KM_PAD_NONE && data_.available_read() < bytes_to_compare) { in VerifyUndigested()
472 const uint8_t* zero_end = compare_pos + bytes_to_compare - data_.available_read(); in VerifyUndigested()
475 bytes_to_compare = data_.available_read(); in VerifyUndigested()
477 if (memcmp_s(compare_pos, data_.peek_read(), bytes_to_compare) != 0 || zero_check_result != 0) in VerifyUndigested()
548 if (EVP_PKEY_encrypt(ctx.get(), nullptr /* out */, &outlen, data_.peek_read(), in Finish()
549 data_.available_read()) <= 0) in Finish()
555 const uint8_t* to_encrypt = data_.peek_read(); in Finish()
556 size_t to_encrypt_len = data_.available_read(); in Finish()
559 keymaster_error_t error = zero_pad_left(&zero_padded, outlen, data_); in Finish()
601 if (EVP_PKEY_decrypt(ctx.get(), nullptr /* out */, &outlen, data_.peek_read(), in Finish()
602 data_.available_read()) <= 0) in Finish()
608 const uint8_t* to_decrypt = data_.peek_read(); in Finish()
609 size_t to_decrypt_len = data_.available_read(); in Finish()
612 keymaster_error_t error = zero_pad_left(&zero_padded, outlen, data_); in Finish()