/system/keymaster/km_openssl/ |
D | ecdsa_operation.cpp | 94 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { in StoreData() argument 101 *input_consumed = input.available_read(); in StoreData() 128 Buffer* /* output */, size_t* input_consumed) { in Update() argument 130 return StoreData(input, input_consumed); in Update() 134 *input_consumed = input.available_read(); in Update() 197 Buffer* /* output */, size_t* input_consumed) { in Update() argument 199 return StoreData(input, input_consumed); in Update() 203 *input_consumed = input.available_read(); in Update()
|
D | rsa_operation.cpp | 148 Buffer* /* output */, size_t* input_consumed) { in Update() argument 149 assert(input_consumed); in Update() 157 return StoreData(input, input_consumed); in Update() 161 keymaster_error_t RsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { in StoreData() argument 162 assert(input_consumed); in StoreData() 173 *input_consumed = input.available_read(); in StoreData() 284 Buffer* output, size_t* input_consumed) { in Update() argument 288 input_consumed); in Update() 292 *input_consumed = input.available_read(); in Update() 407 Buffer* output, size_t* input_consumed) { in Update() argument [all …]
|
D | block_cipher_operation.cpp | 171 Buffer* output, size_t* input_consumed) { in Update() argument 175 *input_consumed = input.available_read(); in Update() 383 size_t input_consumed; in UpdateForFinish() local 384 *error = Update(additional_params, input, output_params, output, &input_consumed); in UpdateForFinish() 386 if (input_consumed != input.available_read()) { in UpdateForFinish() 466 Buffer* output, size_t* input_consumed) { in Update() argument 467 if (!output || !input_consumed) return KM_ERROR_OUTPUT_PARAMETER_NULL; in Update() 470 *input_consumed = input.available_read(); in Update()
|
D | hmac_operation.cpp | 153 Buffer* /* output */, size_t* input_consumed) { in Update() argument 156 *input_consumed = input.available_read(); in Update()
|
D | hmac_operation.h | 35 size_t* input_consumed);
|
D | block_cipher_operation.h | 80 size_t* input_consumed) override; 151 size_t* input_consumed) override;
|
/system/keymaster/tests/ |
D | android_keymaster_test.cpp | 574 size_t input_consumed; in TEST_P() local 575 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); in TEST_P() 677 size_t input_consumed; in TEST_P() local 678 ASSERT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P() 679 ASSERT_EQ(message.size(), input_consumed); in TEST_P() 729 size_t input_consumed; in TEST_P() local 730 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P() 2112 size_t input_consumed; in TEST_P() local 2113 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); in TEST_P() 2144 size_t input_consumed; in TEST_P() local [all …]
|
D | android_keymaster_test_utils.cpp | 265 size_t* input_consumed) { in UpdateOperation() argument 271 input_consumed, &out_params, &out_tmp); in UpdateOperation() 281 size_t* input_consumed) { in UpdateOperation() argument 287 input_consumed, &out_params, &out_tmp); in UpdateOperation() 893 const keymaster_blob_t* input, size_t* input_consumed, in update() argument 896 return unwrap(dev)->update(unwrap(dev), operation_handle, in_params, input, input_consumed, in update()
|
D | android_keymaster_messages_test.cpp | 290 msg.input_consumed = 99; in TEST() 314 EXPECT_EQ(0U, deserialized->input_consumed); in TEST() 317 EXPECT_EQ(99U, deserialized->input_consumed); in TEST() 321 EXPECT_EQ(99U, deserialized->input_consumed); in TEST()
|
D | android_keymaster_test_utils.h | 202 size_t* input_consumed); 205 std::string* output, size_t* input_consumed);
|
/system/keymaster/android_keymaster/ |
D | operation.cpp | 155 size_t input_consumed; in UpdateForFinish() local 159 Update(input_params, input, &output_params, &output, &input_consumed); in UpdateForFinish() 162 assert(input_consumed == input.available_read()); in UpdateForFinish()
|
D | android_keymaster_messages.cpp | 236 buf = append_uint32_to_buf(buf, end, input_consumed); in NonErrorSerialize() 245 retval = copy_uint32_from_buf(buf_ptr, end, &input_consumed); in NonErrorDeserialize()
|
D | android_keymaster.cpp | 328 &response->output, &response->input_consumed); in UpdateOperation()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | ecdsa_operation.h | 43 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed); 62 size_t* input_consumed) override; 77 size_t* input_consumed) override;
|
D | rsa_operation.h | 47 size_t* input_consumed) override; 57 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed); 101 size_t* input_consumed) override; 125 size_t* input_consumed) override;
|
/system/keymaster/legacy_support/ |
D | keymaster_passthrough_operation.h | 58 size_t* input_consumed) override { in Update() argument 63 rc = km_device_->update(km_device_, operation_handle_, &input_params, &in, input_consumed, in Update()
|
D | keymaster1_engine.cpp | 270 size_t input_consumed; in Keymaster1Finish() local 275 &input_consumed, nullptr /* out_params */, nullptr /* output */); in Keymaster1Finish()
|
/system/core/trusty/keymaster/include/trusty_keymaster/legacy/ |
D | trusty_keymaster_device.h | 76 const keymaster_blob_t* input, size_t* input_consumed, 139 const keymaster_blob_t* input, size_t* input_consumed,
|
/system/core/trusty/keymaster/legacy/ |
D | trusty_keymaster_main.cpp | 158 size_t input_consumed; in do_operation() local 159 error = device->update(op_handle, nullptr, input, &input_consumed, nullptr, nullptr); in do_operation() 164 if (input_consumed != input->data_length) { in do_operation()
|
D | trusty_keymaster_device.cpp | 475 size_t* input_consumed, in update() argument 486 if (!input_consumed) { in update() 520 *input_consumed = response.input_consumed; in update() 727 size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) { in update() argument 728 return convert_device(dev)->update(operation_handle, in_params, input, input_consumed, in update()
|
/system/keymaster/contexts/ |
D | soft_keymaster_device.cpp | 1293 const keymaster_blob_t* input, size_t* input_consumed, in update() argument 1299 if (!input_consumed) in update() 1307 return km1_dev->update(km1_dev, operation_handle, in_params, input, input_consumed, in update() 1339 *input_consumed = response.input_consumed; in update() 1357 const keymaster_blob_t* input, size_t* input_consumed, in update() argument 1367 return update(&sk_dev->km1_device_, operation_handle, in_params, input, input_consumed, in update() 1472 size_t input_consumed = 0; in finish() local 1475 &input_consumed, &update_out_params, &update_output); in finish() 1488 mutable_input.data += input_consumed; in finish() 1489 mutable_input.data_length -= input_consumed; in finish() [all …]
|
/system/keymaster/include/keymaster/ |
D | soft_keymaster_device.h | 169 const keymaster_blob_t* input, size_t* input_consumed, 226 const keymaster_blob_t* input, size_t* input_consumed,
|
D | operation.h | 114 size_t* input_consumed) = 0;
|
D | android_keymaster_messages.h | 376 : KeymasterResponse(ver), input_consumed(0) {} in KeymasterResponse() 383 size_t input_consumed; member
|
/system/core/trusty/keymaster/3.0/ |
D | TrustyKeymaster3Device.cpp | 420 resultConsumed = response.input_consumed; in update()
|