Lines Matching refs:data_

198     if (!data_.reserve(EVP_PKEY_size(rsa_key_))) return KM_ERROR_MEMORY_ALLOCATION_FAILED;  in StoreData()
200 if (!data_.write(input.peek_read(), input.available_read())) { in StoreData()
202 input.available_read() + data_.available_read(), EVP_PKEY_size(rsa_key_)); in StoreData()
342 const uint8_t* to_encrypt = data_.peek_read(); in SignUndigested()
344 if (data_.available_read() > key_len) { in SignUndigested()
346 } else if (data_.available_read() < key_len) { in SignUndigested()
347 keymaster_error_t error = zero_pad_left(&zero_padded, key_len, data_); in SignUndigested()
357 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in SignUndigested()
359 data_.available_read(), EVP_PKEY_size(rsa_key_) * 8); in SignUndigested()
362 bytes_encrypted = RSA_private_encrypt(data_.available_read(), data_.peek_read(), in SignUndigested()
437 if (data_.available_read() > key_len) return KM_ERROR_INVALID_INPUT_LENGTH; in VerifyUndigested()
442 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in VerifyUndigested()
444 data_.available_read(), key_len * 8); in VerifyUndigested()
462 if (padding_ == KM_PAD_NONE && data_.available_read() < bytes_to_compare) { in VerifyUndigested()
466 const uint8_t* zero_end = compare_pos + bytes_to_compare - data_.available_read(); in VerifyUndigested()
469 bytes_to_compare = data_.available_read(); in VerifyUndigested()
471 if (memcmp_s(compare_pos, data_.peek_read(), bytes_to_compare) != 0 || zero_check_result != 0) in VerifyUndigested()
549 if (EVP_PKEY_encrypt(ctx.get(), nullptr /* out */, &outlen, data_.peek_read(), in Finish()
550 data_.available_read()) <= 0) in Finish()
555 const uint8_t* to_encrypt = data_.peek_read(); in Finish()
556 size_t to_encrypt_len = data_.available_read(); in Finish()
559 keymaster_error_t error = zero_pad_left(&zero_padded, outlen, data_); in Finish()
592 if (EVP_PKEY_decrypt(ctx.get(), nullptr /* out */, &outlen, data_.peek_read(), in Finish()
593 data_.available_read()) <= 0) in Finish()
598 const uint8_t* to_decrypt = data_.peek_read(); in Finish()
599 size_t to_decrypt_len = data_.available_read(); in Finish()
602 keymaster_error_t error = zero_pad_left(&zero_padded, outlen, data_); in Finish()