/system/security/keystore2/src/crypto/ |
D | crypto.cpp | 91 int out_len; in AES_gcm_encrypt() local 93 EVP_EncryptUpdate(ctx.get(), out_pos, &out_len, in, len); in AES_gcm_encrypt() 94 out_pos += out_len; in AES_gcm_encrypt() 95 EVP_EncryptFinal_ex(ctx.get(), out_pos, &out_len); in AES_gcm_encrypt() 96 out_pos += out_len; in AES_gcm_encrypt() 129 int out_len; in AES_gcm_decrypt() local 131 EVP_DecryptUpdate(ctx.get(), out_pos, &out_len, in, len); in AES_gcm_decrypt() 132 out_pos += out_len; in AES_gcm_decrypt() 133 if (!EVP_DecryptFinal_ex(ctx.get(), out_pos, &out_len)) { in AES_gcm_decrypt() 137 out_pos += out_len; in AES_gcm_decrypt() [all …]
|
D | lib.rs | 226 let mut out_len = 0; in hkdf_extract() localVariable 232 &mut out_len, in hkdf_extract() 243 if out_len > max_size { in hkdf_extract() 248 buf.reduce_len(out_len); in hkdf_extract() 253 pub fn hkdf_expand(out_len: usize, prk: &[u8], info: &[u8]) -> Result<ZVec, Error> { in hkdf_expand() 254 let mut buf = ZVec::new(out_len)?; in hkdf_expand() 258 HKDFExpand(buf.as_mut_ptr(), out_len, prk.as_ptr(), prk.len(), info.as_ptr(), info.len()) in hkdf_expand() 326 let out_len = result.try_into().unwrap(); in ecdh_compute_key() localVariable 328 if out_len > buf.len() { in ecdh_compute_key() 333 buf.reduce_len(out_len); in ecdh_compute_key() [all …]
|
D | crypto.hpp | 43 bool HKDFExtract(uint8_t *out_key, size_t *out_len, 47 bool HKDFExpand(uint8_t *out_key, size_t out_len,
|
/system/bt/common/ |
D | address_obfuscator.cc | 50 unsigned int out_len = 0; in Obfuscate() local 53 &out_len) != nullptr); in Obfuscate() 54 CHECK_EQ(out_len, static_cast<unsigned int>(kOctet32Length)); in Obfuscate() 55 return std::string(reinterpret_cast<const char*>(result.data()), out_len); in Obfuscate()
|
/system/keymaster/km_openssl/ |
D | ckdf.cpp | 105 size_t out_len; in DEFINE_OPENSSL_OBJECT_POINTER() local 107 if (!CMAC_Final(ctx.get(), output_pos, &out_len)) return TranslateLastOpenSslError(); in DEFINE_OPENSSL_OBJECT_POINTER() 108 output_pos += out_len; in DEFINE_OPENSSL_OBJECT_POINTER() 111 if (!CMAC_Final(ctx.get(), cmac, &out_len)) return TranslateLastOpenSslError(); in DEFINE_OPENSSL_OBJECT_POINTER()
|
/system/libufdt/ |
D | ufdt_node.c | 115 char *ufdt_node_get_fdt_prop_data(const struct ufdt_node *node, int *out_len) { in ufdt_node_get_fdt_prop_data() argument 120 if (out_len != NULL) { in ufdt_node_get_fdt_prop_data() 121 *out_len = fdt32_to_cpu(prop->len); in ufdt_node_get_fdt_prop_data() 128 int *out_len) { in ufdt_node_get_fdt_prop_data_by_name_len() argument 130 ufdt_node_get_property_by_name_len(node, name, len), out_len); in ufdt_node_get_fdt_prop_data_by_name_len() 134 const char *name, int *out_len) { in ufdt_node_get_fdt_prop_data_by_name() argument 136 out_len); in ufdt_node_get_fdt_prop_data_by_name()
|
/system/libufdt/include/ |
D | libufdt.h | 78 char *ufdt_node_get_fdt_prop_data(const struct ufdt_node *node, int *out_len); 93 int *out_len); 95 const char *name, int *out_len);
|
/system/keymaster/legacy_support/ |
D | keymaster1_engine.cpp | 271 int Keymaster1Engine::rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, in rsa_sign_raw() argument 288 *out_len = std::min(output.data_length, max_out); in rsa_sign_raw() 289 memcpy(out, output.data, *out_len); in rsa_sign_raw() 294 int Keymaster1Engine::rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, in rsa_decrypt() argument 311 *out_len = std::min(output.data_length, max_out); in rsa_decrypt() 312 memcpy(out, output.data, *out_len); in rsa_decrypt()
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster1_engine.h | 103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, 105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
|
/system/nfc/src/nfc/ndef/ |
D | ndef_utils.cc | 1325 uint32_t out_len, max_out_len; in NDEF_MsgCopyAndDechunk() local 1341 NDEF_MsgInit(p_dest, max_out_len, &out_len); in NDEF_MsgCopyAndDechunk() 1355 status = NDEF_MsgAppendPayload(p_dest, max_out_len, &out_len, in NDEF_MsgCopyAndDechunk() 1359 p_prev_rec = p_dest + out_len; in NDEF_MsgCopyAndDechunk() 1361 status = NDEF_MsgAddRec(p_dest, max_out_len, &out_len, tnf, p_type, in NDEF_MsgCopyAndDechunk() 1368 *p_out_len = out_len; in NDEF_MsgCopyAndDechunk()
|
/system/keymaster/key_blob_utils/ |
D | auth_encrypted_key_blob.cpp | 87 size_t out_len = EVP_MAX_MD_SIZE; in DeriveAesGcmKeyEncryptionKey() local 88 if (!HKDF_extract(prk.peek_write(), &out_len, EVP_sha256(), master_key.key_material, in DeriveAesGcmKeyEncryptionKey() 97 if (!prk.advance_write(out_len) || !prk.available_read() || !info.available_read()) { in DeriveAesGcmKeyEncryptionKey()
|
/system/security/keystore2/src/ |
D | boot_level_keys.rs | 221 out_len: usize, in expand_key() 226 .map(|k| hkdf_expand(out_len, k, info)) in expand_key()
|