HomeSort by relevance Sort by last modified time
    Searched refs:available_read (Results 1 - 7 of 7) sorted by null

  /system/keymaster/
rsa_operation.cpp 45 if (!data_.reserve(data_.available_read() + input.available_read()) ||
46 !data_.write(input.peek_read(), input.available_read()))
53 int bytes_encrypted = RSA_private_encrypt(data_.available_read(), data_.peek_read(),
64 if ((int)data_.available_read() != RSA_size(rsa_key_))
66 if (data_.available_read() != signature.available_read())
70 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(),
76 if (memcmp_s(decrypted_data.get(), data_.peek_read(), data_.available_read()) == 0)
dsa_operation.cpp 40 if (!data_.reserve(data_.available_read() + input.available_read()) ||
41 !data_.write(input.peek_read(), input.available_read()))
49 if (!DSA_sign(0 /* type -- ignored */, data_.peek_read(), data_.available_read(),
57 if ((int)data_.available_read() != DSA_size(dsa_key_))
60 int result = DSA_verify(0 /* type -- ignored */, data_.peek_read(), data_.available_read(),
61 signature.peek_read(), signature.available_read(), dsa_key_);
ecdsa_operation.cpp 40 if (!data_.reserve(data_.available_read() + input.available_read()) ||
41 !data_.write(input.peek_read(), input.available_read()))
49 if (!ECDSA_sign(0 /* type -- ignored */, data_.peek_read(), data_.available_read(),
57 int result = ECDSA_verify(0 /* type -- ignored */, data_.peek_read(), data_.available_read(),
58 signature.peek_read(), signature.available_read(), ecdsa_key_);
serializable.cpp 57 memcpy(new_buffer, buffer_.get() + read_position_, available_read());
94 size_t Buffer::available_read() const { function in class:keymaster::Buffer
107 if (available_read() < read_length)
115 return sizeof(uint32_t) + available_read();
119 return append_size_and_data_to_buf(buf, end, peek_read(), available_read());
google_keymaster_test.cpp 423 EXPECT_EQ(size, update_request.input.available_read());
427 EXPECT_EQ(0U, update_response.output.available_read());
433 EXPECT_GT(finish_response_.output.available_read(), 0U);
474 EXPECT_EQ(array_size(message) - 1, update_request.input.available_read());
478 EXPECT_EQ(0U, update_response.output.available_read());
485 EXPECT_GT(finish_response.output.available_read(), 0U);
506 EXPECT_EQ(48U, update_request.input.available_read());
510 EXPECT_EQ(0U, update_response.output.available_read());
517 EXPECT_GT(finish_response.output.available_read(), 0U);
538 EXPECT_EQ(48U, update_request.input.available_read());
    [all...]
google_keymaster_messages_test.cpp 209 EXPECT_EQ(3U, deserialized->input.available_read());
220 EXPECT_EQ(3U, deserialized->output.available_read());
231 EXPECT_EQ(3U, deserialized->signature.available_read());
242 EXPECT_EQ(msg.output.available_read(), deserialized->output.available_read());
244 msg.output.available_read()));
  /system/keymaster/include/keymaster/
serializable.h 194 return Reinitialize(buffer.peek_read(), buffer.available_read());
200 size_t available_read() const;

Completed in 68 milliseconds