Lines Matching refs:value
118 memcpy(buf, bytes.value().data(), numBytes); in eicOpsRandom()
157 memcpy(encryptedData, cppEncryptedData.value().data(), in eicOpsEncryptAes128Gcm()
158 cppEncryptedData.value().size()); in eicOpsEncryptAes128Gcm()
198 if (decryptedDataVec.value().size() != encryptedDataSize - 28) { in eicOpsDecryptAes128Gcm()
200 decryptedDataVec.value().size(), encryptedDataSize - 28); in eicOpsDecryptAes128Gcm()
204 if (decryptedDataVec.value().size() > 0) { in eicOpsDecryptAes128Gcm()
205 memcpy(data, decryptedDataVec.value().data(), in eicOpsDecryptAes128Gcm()
206 decryptedDataVec.value().size()); in eicOpsDecryptAes128Gcm()
221 keyPair.value()); in eicOpsCreateEcKey()
226 if (privKey.value().size() != EIC_P256_PRIV_KEY_SIZE) { in eicOpsCreateEcKey()
227 eicDebug("Private key is %zd bytes, expected %zd", privKey.value().size(), in eicOpsCreateEcKey()
234 keyPair.value()); in eicOpsCreateEcKey()
241 if (pubKey.value().size() != EIC_P256_PUB_KEY_SIZE + 1) { in eicOpsCreateEcKey()
243 pubKey.value().size(), (size_t)EIC_P256_PRIV_KEY_SIZE + 1); in eicOpsCreateEcKey()
247 memcpy(privateKey, privKey.value().data(), EIC_P256_PRIV_KEY_SIZE); in eicOpsCreateEcKey()
248 memcpy(publicKey, pubKey.value().data() + 1, EIC_P256_PUB_KEY_SIZE); in eicOpsCreateEcKey()
275 ret.value().second); in eicOpsCreateCredentialKey()
287 ret.value().first); in eicOpsCreateCredentialKey()
292 if (privKey.value().size() != EIC_P256_PRIV_KEY_SIZE) { in eicOpsCreateCredentialKey()
293 eicDebug("Private key is %zd bytes, expected %zd", privKey.value().size(), in eicOpsCreateCredentialKey()
298 memcpy(privateKey, privKey.value().data(), EIC_P256_PRIV_KEY_SIZE); in eicOpsCreateCredentialKey()
335 if (*certSize < certVec.value().size()) { in eicOpsSignEcKey()
337 *certSize, certVec.value().size()); in eicOpsSignEcKey()
340 memcpy(cert, certVec.value().data(), certVec.value().size()); in eicOpsSignEcKey()
341 *certSize = certVec.value().size(); in eicOpsSignEcKey()
364 const unsigned char* p = derSignature.value().data(); in eicOpsEcDsa()
365 sig = d2i_ECDSA_SIG(nullptr, &p, derSignature.value().size()); in eicOpsEcDsa()
426 if (res.value().size() > *publicKeySize) { in eicOpsX509GetPublicKey()
428 res.value().size(), *publicKeySize); in eicOpsX509GetPublicKey()
431 *publicKeySize = res.value().size(); in eicOpsX509GetPublicKey()
432 memcpy(publicKey, res.value().data(), *publicKeySize); in eicOpsX509GetPublicKey()
488 if (shared.value().size() != EIC_P256_COORDINATE_SIZE) { in eicOpsEcdh()
489 LOG(ERROR) << "Unexpected size of shared secret " << shared.value().size() in eicOpsEcdh()
493 memcpy(sharedSecret, shared.value().data(), EIC_P256_COORDINATE_SIZE); in eicOpsEcdh()
513 if (result.value().size() != outputSize) { in eicOpsHkdf()
514 LOG(ERROR) << "Unexpected size of HKDF " << result.value().size() in eicOpsHkdf()
518 memcpy(output, result.value().data(), outputSize); in eicOpsHkdf()