/system/keymaster/ |
D | ecdsa_operation.cpp | 94 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { in StoreData() argument 99 if (!data_.write(input.peek_read(), input.available_read())) { in StoreData() 101 input.available_read() + data_.available_read(), EVP_PKEY_bits(ecdsa_key_)); in StoreData() 104 *input_consumed = input.available_read(); in StoreData() 125 const Buffer& input, in Update() argument 129 return StoreData(input, input_consumed); in Update() 131 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update() 133 *input_consumed = input.available_read(); in Update() 186 const Buffer& input, in Update() argument 190 return StoreData(input, input_consumed); in Update() [all …]
|
D | aes_operation.cpp | 196 const Buffer& input, in Update() argument 201 if (!HandleAad(additional_params, input, &error)) in Update() 204 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error)) in Update() 206 *input_consumed = input.available_read(); in Update() 378 bool AesEvpOperation::HandleAad(const AuthorizationSet& input_params, const Buffer& input, in HandleAad() argument 406 if (input.available_read()) { in HandleAad() 448 bool AesEvpOperation::InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output, in InternalUpdate() argument 462 if (!EVP_CipherUpdate(&ctx_, output->peek_write(), &output_written, input, input_length)) { in InternalUpdate() 545 const Buffer& input, in Update() argument 552 *input_consumed = input.available_read(); in Update() [all …]
|
D | rsa_operation.cpp | 150 const Buffer& input, AuthorizationSet* /* output_params */, in Update() argument 160 return StoreData(input, input_consumed); in Update() 164 keymaster_error_t RsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { in StoreData() argument 170 if (!data_.write(input.peek_read(), input.available_read())) { in StoreData() 172 input.available_read() + data_.available_read(), EVP_PKEY_size(rsa_key_)); in StoreData() 176 *input_consumed = input.available_read(); in StoreData() 276 const Buffer& input, AuthorizationSet* output_params, in Update() argument 280 return RsaOperation::Update(additional_params, input, output_params, output, in Update() 283 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update() 285 *input_consumed = input.available_read(); in Update() [all …]
|
D | aes_operation.h | 68 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 81 bool HandleAad(const AuthorizationSet& input_params, const Buffer& input, 86 bool InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output, 132 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 143 keymaster_error_t ProcessAllButTagLengthBytes(const Buffer& input, Buffer* output);
|
D | hmac_operation.cpp | 151 const Buffer& input, AuthorizationSet* /* output_params */, in Update() argument 153 if (!HMAC_Update(&ctx_, input.peek_read(), input.available_read())) in Update() 155 *input_consumed = input.available_read(); in Update()
|
D | ecdsa_operation.h | 40 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed); 56 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 69 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
|
D | rsa_operation.h | 44 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 56 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed); 95 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 116 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
|
D | hmac_operation.h | 34 virtual keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
|
D | soft_keymaster_device.cpp | 395 update_request.input.Reinitialize(data, data_length); in sign_data() 446 update_request.input.Reinitialize(signed_data, signed_data_length); in verify_data() 858 const keymaster_blob_t* input, size_t* input_consumed, in update() argument 861 if (!input) in update() 874 if (input) in update() 875 request.input.Reinitialize(input->data, input->data_length); in update()
|
D | android_keymaster_messages.cpp | 174 return sizeof(op_handle) + input.SerializedSize(); in SerializedSize() 176 return sizeof(op_handle) + input.SerializedSize() + additional_params.SerializedSize(); in SerializedSize() 181 buf = input.Serialize(buf, end); in Serialize() 188 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle) && input.Deserialize(buf_ptr, end); in Deserialize()
|
D | operation.h | 105 virtual keymaster_error_t Update(const AuthorizationSet& input_params, const Buffer& input,
|
/system/core/libsparse/ |
D | append2simg.c | 56 int input; in main() local 91 input = open(input_path, O_RDONLY | O_BINARY); in main() 92 if (input < 0) { in main() 97 input_len = lseek64(input, 0, SEEK_END); in main() 105 lseek64(input, 0, SEEK_SET); in main() 108 if (sparse_file_add_fd(sparse_output, input, 0, input_len, output_block) < 0) { in main() 129 close(input); in main()
|
/system/core/rootdir/ |
D | ueventd.rc | 43 /dev/input/* 0660 root input 93 /sys/devices/virtual/input/input* enable 0660 root input 94 /sys/devices/virtual/input/input* poll_delay 0660 root input
|
/system/core/libpixelflinger/tests/gglmul/ |
D | gglmul_test.cpp | 38 GGLfixed input; member 61 test->input, test->output); in gglClampx_test() 62 if(gglClampx(test->input) == test->output) in gglClampx_test() 72 GGLfixed input; member 91 printf("Test input=0x%08x output=%2d :", test->input, test->output); in gglClz_test() 92 if(gglClz(test->input) == test->output) in gglClz_test()
|
/system/bt/stack/smp/ |
D | smp_cmac.c | 95 static void leftshift_onebit(UINT8 *input, UINT8 *output) in leftshift_onebit() argument 102 next_overflow = (input[i] & 0x80) ? 1:0; in leftshift_onebit() 103 output[i] = (input[i] << 1) | overflow; in leftshift_onebit() 294 BOOLEAN aes_cipher_msg_auth_code(BT_OCTET16 key, UINT8 *input, UINT16 length, in aes_cipher_msg_auth_code() argument 315 if (input != NULL && length > 0) in aes_cipher_msg_auth_code() 317 memcpy(&cmac_cb.text[diff] , input, (int)length); in aes_cipher_msg_auth_code()
|
/system/extras/slideshow/ |
D | slideshow.cpp | 85 int input = false; in main() local 125 input = true; in main() 134 if (input) { in main()
|
/system/core/adb/ |
D | adb_io_test.cpp | 85 const char input[] = "Foobar"; in TEST() local 89 ASSERT_TRUE(android::base::WriteStringToFd(input, tf.fd)) << strerror(errno); in TEST() 93 char buf[sizeof(input) - 1] = {}; in TEST() 96 std::string expected(input); in TEST()
|
/system/core/toolbox/ |
D | Android.mk | 95 $(LOCAL_PATH)/getevent.c: $(intermediates)/input.h-labels.h 97 INPUT_H_LABELS_H := $(intermediates)/input.h-labels.h 99 $(INPUT_H_LABELS_H): PRIVATE_CUSTOM_TOOL = $(PRIVATE_LOCAL_PATH)/generate-input.h-labels.py > $@ 100 $(INPUT_H_LABELS_H): $(LOCAL_PATH)/Android.mk $(LOCAL_PATH)/generate-input.h-labels.py
|
/system/extras/perfprofd/quipper/ |
D | perf_utils.h | 59 uint64_t Md5Prefix(const string& input); 60 uint64_t Md5Prefix(const std::vector<char>& input);
|
/system/extras/tests/workloads/ |
D | defs.sh | 382 vout ${ADB}input swipe $* 383 ${ADB}input swipe $* 387 vout ${ADB}input tap $* 388 ${ADB}input tap $*
|
D | capture.sh | 55 echo Capturing input for $DEVICE...
|
/system/extras/verity/ |
D | Utils.java | 259 static boolean verify(PublicKey key, byte[] input, byte[] signature, in verify() argument 269 verifier.update(input); in verify() 274 static byte[] sign(PrivateKey privateKey, byte[] input) throws Exception { in sign() argument 277 signer.update(input); in sign()
|
D | KeystoreSigner.java | 124 public void parse(byte[] input) throws Exception { in parse() argument 125 ASN1InputStream stream = new ASN1InputStream(input); in parse()
|
/system/core/libmincrypt/tools/ |
D | DumpPublicKey.java | 239 FileInputStream input = new FileInputStream(args[i]); in main() local 241 X509Certificate cert = (X509Certificate) cf.generateCertificate(input); in main()
|
/system/bt/btif/co/ |
D | bta_hh_co.c | 231 ev.u.input.size = len; in bta_hh_co_write() 232 if(len > sizeof(ev.u.input.data)){ in bta_hh_co_write() 237 memcpy(ev.u.input.data, rpt, len); in bta_hh_co_write()
|