Home
last modified time | relevance | path

Searched refs:input_consumed (Results 1 – 25 of 28) sorted by relevance

12

/system/keymaster/km_openssl/
Decdsa_operation.cpp94 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { in StoreData() argument
101 *input_consumed = input.available_read(); in StoreData()
128 Buffer* /* output */, size_t* input_consumed) { in Update() argument
130 return StoreData(input, input_consumed); in Update()
134 *input_consumed = input.available_read(); in Update()
197 Buffer* /* output */, size_t* input_consumed) { in Update() argument
199 return StoreData(input, input_consumed); in Update()
203 *input_consumed = input.available_read(); in Update()
Drsa_operation.cpp148 Buffer* /* output */, size_t* input_consumed) { in Update() argument
149 assert(input_consumed); in Update()
157 return StoreData(input, input_consumed); in Update()
161 keymaster_error_t RsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { in StoreData() argument
162 assert(input_consumed); in StoreData()
173 *input_consumed = input.available_read(); in StoreData()
284 Buffer* output, size_t* input_consumed) { in Update() argument
288 input_consumed); in Update()
292 *input_consumed = input.available_read(); in Update()
407 Buffer* output, size_t* input_consumed) { in Update() argument
[all …]
Dblock_cipher_operation.cpp171 Buffer* output, size_t* input_consumed) { in Update() argument
175 *input_consumed = input.available_read(); in Update()
383 size_t input_consumed; in UpdateForFinish() local
384 *error = Update(additional_params, input, output_params, output, &input_consumed); in UpdateForFinish()
386 if (input_consumed != input.available_read()) { in UpdateForFinish()
466 Buffer* output, size_t* input_consumed) { in Update() argument
467 if (!output || !input_consumed) return KM_ERROR_OUTPUT_PARAMETER_NULL; in Update()
470 *input_consumed = input.available_read(); in Update()
Dhmac_operation.cpp153 Buffer* /* output */, size_t* input_consumed) { in Update() argument
156 *input_consumed = input.available_read(); in Update()
Dhmac_operation.h35 size_t* input_consumed);
Dblock_cipher_operation.h80 size_t* input_consumed) override;
151 size_t* input_consumed) override;
/system/keymaster/tests/
Dandroid_keymaster_test.cpp574 size_t input_consumed; in TEST_P() local
575 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
677 size_t input_consumed; in TEST_P() local
678 ASSERT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
679 ASSERT_EQ(message.size(), input_consumed); in TEST_P()
729 size_t input_consumed; in TEST_P() local
730 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
2112 size_t input_consumed; in TEST_P() local
2113 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
2144 size_t input_consumed; in TEST_P() local
[all …]
Dandroid_keymaster_test_utils.cpp265 size_t* input_consumed) { in UpdateOperation() argument
271 input_consumed, &out_params, &out_tmp); in UpdateOperation()
281 size_t* input_consumed) { in UpdateOperation() argument
287 input_consumed, &out_params, &out_tmp); in UpdateOperation()
893 const keymaster_blob_t* input, size_t* input_consumed, in update() argument
896 return unwrap(dev)->update(unwrap(dev), operation_handle, in_params, input, input_consumed, in update()
Dandroid_keymaster_messages_test.cpp290 msg.input_consumed = 99; in TEST()
314 EXPECT_EQ(0U, deserialized->input_consumed); in TEST()
317 EXPECT_EQ(99U, deserialized->input_consumed); in TEST()
321 EXPECT_EQ(99U, deserialized->input_consumed); in TEST()
Dandroid_keymaster_test_utils.h202 size_t* input_consumed);
205 std::string* output, size_t* input_consumed);
/system/keymaster/android_keymaster/
Doperation.cpp155 size_t input_consumed; in UpdateForFinish() local
159 Update(input_params, input, &output_params, &output, &input_consumed); in UpdateForFinish()
162 assert(input_consumed == input.available_read()); in UpdateForFinish()
Dandroid_keymaster_messages.cpp236 buf = append_uint32_to_buf(buf, end, input_consumed); in NonErrorSerialize()
245 retval = copy_uint32_from_buf(buf_ptr, end, &input_consumed); in NonErrorDeserialize()
Dandroid_keymaster.cpp328 &response->output, &response->input_consumed); in UpdateOperation()
/system/keymaster/include/keymaster/km_openssl/
Decdsa_operation.h43 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed);
62 size_t* input_consumed) override;
77 size_t* input_consumed) override;
Drsa_operation.h47 size_t* input_consumed) override;
57 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed);
101 size_t* input_consumed) override;
125 size_t* input_consumed) override;
/system/keymaster/legacy_support/
Dkeymaster_passthrough_operation.h58 size_t* input_consumed) override { in Update() argument
63 rc = km_device_->update(km_device_, operation_handle_, &input_params, &in, input_consumed, in Update()
Dkeymaster1_engine.cpp270 size_t input_consumed; in Keymaster1Finish() local
275 &input_consumed, nullptr /* out_params */, nullptr /* output */); in Keymaster1Finish()
/system/core/trusty/keymaster/include/trusty_keymaster/legacy/
Dtrusty_keymaster_device.h76 const keymaster_blob_t* input, size_t* input_consumed,
139 const keymaster_blob_t* input, size_t* input_consumed,
/system/core/trusty/keymaster/legacy/
Dtrusty_keymaster_main.cpp158 size_t input_consumed; in do_operation() local
159 error = device->update(op_handle, nullptr, input, &input_consumed, nullptr, nullptr); in do_operation()
164 if (input_consumed != input->data_length) { in do_operation()
Dtrusty_keymaster_device.cpp475 size_t* input_consumed, in update() argument
486 if (!input_consumed) { in update()
520 *input_consumed = response.input_consumed; in update()
727 size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) { in update() argument
728 return convert_device(dev)->update(operation_handle, in_params, input, input_consumed, in update()
/system/keymaster/contexts/
Dsoft_keymaster_device.cpp1293 const keymaster_blob_t* input, size_t* input_consumed, in update() argument
1299 if (!input_consumed) in update()
1307 return km1_dev->update(km1_dev, operation_handle, in_params, input, input_consumed, in update()
1339 *input_consumed = response.input_consumed; in update()
1357 const keymaster_blob_t* input, size_t* input_consumed, in update() argument
1367 return update(&sk_dev->km1_device_, operation_handle, in_params, input, input_consumed, in update()
1472 size_t input_consumed = 0; in finish() local
1475 &input_consumed, &update_out_params, &update_output); in finish()
1488 mutable_input.data += input_consumed; in finish()
1489 mutable_input.data_length -= input_consumed; in finish()
[all …]
/system/keymaster/include/keymaster/
Dsoft_keymaster_device.h169 const keymaster_blob_t* input, size_t* input_consumed,
226 const keymaster_blob_t* input, size_t* input_consumed,
Doperation.h114 size_t* input_consumed) = 0;
Dandroid_keymaster_messages.h376 : KeymasterResponse(ver), input_consumed(0) {} in KeymasterResponse()
383 size_t input_consumed; member
/system/core/trusty/keymaster/3.0/
DTrustyKeymaster3Device.cpp420 resultConsumed = response.input_consumed; in update()

12