/system/keymaster/ |
dsa_operation.cpp | 41 !data_.write(input.peek_read(), input.available_read())) 49 if (!DSA_sign(0 /* type -- ignored */, data_.peek_read(), data_.available_read(), 60 int result = DSA_verify(0 /* type -- ignored */, data_.peek_read(), data_.available_read(), 61 signature.peek_read(), signature.available_read(), dsa_key_);
|
ecdsa_operation.cpp | 41 !data_.write(input.peek_read(), input.available_read())) 49 if (!ECDSA_sign(0 /* type -- ignored */, data_.peek_read(), data_.available_read(), 57 int result = ECDSA_verify(0 /* type -- ignored */, data_.peek_read(), data_.available_read(), 58 signature.peek_read(), signature.available_read(), ecdsa_key_);
|
rsa_operation.cpp | 46 !data_.write(input.peek_read(), input.available_read())) 53 int bytes_encrypted = RSA_private_encrypt(data_.available_read(), data_.peek_read(), 70 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(), 76 if (memcmp_s(decrypted_data.get(), data_.peek_read(), data_.available_read()) == 0)
|
google_keymaster_messages_test.cpp | 210 EXPECT_EQ(0, memcmp(deserialized->input.peek_read(), "foo", 3)); 221 EXPECT_EQ(0, memcmp(deserialized->output.peek_read(), "foo", 3)); 232 EXPECT_EQ(0, memcmp(deserialized->signature.peek_read(), "bar", 3)); 243 EXPECT_EQ(0, memcmp(msg.output.peek_read(), deserialized->output.peek_read(),
|
serializable.cpp | 119 return append_size_and_data_to_buf(buf, end, peek_read(), available_read());
|
/system/keymaster/include/keymaster/ |
serializable.h | 194 return Reinitialize(buffer.peek_read(), buffer.available_read()); 205 const uint8_t* peek_read() const { return buffer_.get() + read_position_; } function in class:keymaster::Buffer
|