Home
last modified time | relevance | path

Searched refs:input (Results 1 – 25 of 38) sorted by relevance

12

/system/keymaster/
Decdsa_operation.cpp94 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { in StoreData() argument
99 if (!data_.write(input.peek_read(), input.available_read())) { in StoreData()
101 input.available_read() + data_.available_read(), EVP_PKEY_bits(ecdsa_key_)); in StoreData()
104 *input_consumed = input.available_read(); in StoreData()
125 const Buffer& input, in Update() argument
129 return StoreData(input, input_consumed); in Update()
131 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update()
133 *input_consumed = input.available_read(); in Update()
186 const Buffer& input, in Update() argument
190 return StoreData(input, input_consumed); in Update()
[all …]
Daes_operation.cpp196 const Buffer& input, in Update() argument
201 if (!HandleAad(additional_params, input, &error)) in Update()
204 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error)) in Update()
206 *input_consumed = input.available_read(); in Update()
378 bool AesEvpOperation::HandleAad(const AuthorizationSet& input_params, const Buffer& input, in HandleAad() argument
406 if (input.available_read()) { in HandleAad()
448 bool AesEvpOperation::InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output, in InternalUpdate() argument
462 if (!EVP_CipherUpdate(&ctx_, output->peek_write(), &output_written, input, input_length)) { in InternalUpdate()
545 const Buffer& input, in Update() argument
552 *input_consumed = input.available_read(); in Update()
[all …]
Drsa_operation.cpp150 const Buffer& input, AuthorizationSet* /* output_params */, in Update() argument
160 return StoreData(input, input_consumed); in Update()
164 keymaster_error_t RsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { in StoreData() argument
170 if (!data_.write(input.peek_read(), input.available_read())) { in StoreData()
172 input.available_read() + data_.available_read(), EVP_PKEY_size(rsa_key_)); in StoreData()
176 *input_consumed = input.available_read(); in StoreData()
276 const Buffer& input, AuthorizationSet* output_params, in Update() argument
280 return RsaOperation::Update(additional_params, input, output_params, output, in Update()
283 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update()
285 *input_consumed = input.available_read(); in Update()
[all …]
Daes_operation.h68 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
81 bool HandleAad(const AuthorizationSet& input_params, const Buffer& input,
86 bool InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output,
132 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
143 keymaster_error_t ProcessAllButTagLengthBytes(const Buffer& input, Buffer* output);
Dhmac_operation.cpp151 const Buffer& input, AuthorizationSet* /* output_params */, in Update() argument
153 if (!HMAC_Update(&ctx_, input.peek_read(), input.available_read())) in Update()
155 *input_consumed = input.available_read(); in Update()
Decdsa_operation.h40 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed);
56 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
69 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
Drsa_operation.h44 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
56 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed);
95 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
116 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
Dhmac_operation.h34 virtual keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
Dsoft_keymaster_device.cpp395 update_request.input.Reinitialize(data, data_length); in sign_data()
446 update_request.input.Reinitialize(signed_data, signed_data_length); in verify_data()
858 const keymaster_blob_t* input, size_t* input_consumed, in update() argument
861 if (!input) in update()
874 if (input) in update()
875 request.input.Reinitialize(input->data, input->data_length); in update()
Dandroid_keymaster_messages.cpp174 return sizeof(op_handle) + input.SerializedSize(); in SerializedSize()
176 return sizeof(op_handle) + input.SerializedSize() + additional_params.SerializedSize(); in SerializedSize()
181 buf = input.Serialize(buf, end); in Serialize()
188 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle) && input.Deserialize(buf_ptr, end); in Deserialize()
Doperation.h105 virtual keymaster_error_t Update(const AuthorizationSet& input_params, const Buffer& input,
/system/core/libsparse/
Dappend2simg.c56 int input; in main() local
91 input = open(input_path, O_RDONLY | O_BINARY); in main()
92 if (input < 0) { in main()
97 input_len = lseek64(input, 0, SEEK_END); in main()
105 lseek64(input, 0, SEEK_SET); in main()
108 if (sparse_file_add_fd(sparse_output, input, 0, input_len, output_block) < 0) { in main()
129 close(input); in main()
/system/core/rootdir/
Dueventd.rc43 /dev/input/* 0660 root input
93 /sys/devices/virtual/input/input* enable 0660 root input
94 /sys/devices/virtual/input/input* poll_delay 0660 root input
/system/core/libpixelflinger/tests/gglmul/
Dgglmul_test.cpp38 GGLfixed input; member
61 test->input, test->output); in gglClampx_test()
62 if(gglClampx(test->input) == test->output) in gglClampx_test()
72 GGLfixed input; member
91 printf("Test input=0x%08x output=%2d :", test->input, test->output); in gglClz_test()
92 if(gglClz(test->input) == test->output) in gglClz_test()
/system/bt/stack/smp/
Dsmp_cmac.c95 static void leftshift_onebit(UINT8 *input, UINT8 *output) in leftshift_onebit() argument
102 next_overflow = (input[i] & 0x80) ? 1:0; in leftshift_onebit()
103 output[i] = (input[i] << 1) | overflow; in leftshift_onebit()
294 BOOLEAN aes_cipher_msg_auth_code(BT_OCTET16 key, UINT8 *input, UINT16 length, in aes_cipher_msg_auth_code() argument
315 if (input != NULL && length > 0) in aes_cipher_msg_auth_code()
317 memcpy(&cmac_cb.text[diff] , input, (int)length); in aes_cipher_msg_auth_code()
/system/extras/slideshow/
Dslideshow.cpp85 int input = false; in main() local
125 input = true; in main()
134 if (input) { in main()
/system/core/adb/
Dadb_io_test.cpp85 const char input[] = "Foobar"; in TEST() local
89 ASSERT_TRUE(android::base::WriteStringToFd(input, tf.fd)) << strerror(errno); in TEST()
93 char buf[sizeof(input) - 1] = {}; in TEST()
96 std::string expected(input); in TEST()
/system/core/toolbox/
DAndroid.mk95 $(LOCAL_PATH)/getevent.c: $(intermediates)/input.h-labels.h
97 INPUT_H_LABELS_H := $(intermediates)/input.h-labels.h
99 $(INPUT_H_LABELS_H): PRIVATE_CUSTOM_TOOL = $(PRIVATE_LOCAL_PATH)/generate-input.h-labels.py > $@
100 $(INPUT_H_LABELS_H): $(LOCAL_PATH)/Android.mk $(LOCAL_PATH)/generate-input.h-labels.py
/system/extras/perfprofd/quipper/
Dperf_utils.h59 uint64_t Md5Prefix(const string& input);
60 uint64_t Md5Prefix(const std::vector<char>& input);
/system/extras/tests/workloads/
Ddefs.sh382 vout ${ADB}input swipe $*
383 ${ADB}input swipe $*
387 vout ${ADB}input tap $*
388 ${ADB}input tap $*
Dcapture.sh55 echo Capturing input for $DEVICE...
/system/extras/verity/
DUtils.java259 static boolean verify(PublicKey key, byte[] input, byte[] signature, in verify() argument
269 verifier.update(input); in verify()
274 static byte[] sign(PrivateKey privateKey, byte[] input) throws Exception { in sign() argument
277 signer.update(input); in sign()
DKeystoreSigner.java124 public void parse(byte[] input) throws Exception { in parse() argument
125 ASN1InputStream stream = new ASN1InputStream(input); in parse()
/system/core/libmincrypt/tools/
DDumpPublicKey.java239 FileInputStream input = new FileInputStream(args[i]); in main() local
241 X509Certificate cert = (X509Certificate) cf.generateCertificate(input); in main()
/system/bt/btif/co/
Dbta_hh_co.c231 ev.u.input.size = len; in bta_hh_co_write()
232 if(len > sizeof(ev.u.input.data)){ in bta_hh_co_write()
237 memcpy(ev.u.input.data, rpt, len); in bta_hh_co_write()

12