Lines Matching refs:data_
164 if (!data_.reserve(EVP_PKEY_size(rsa_key_))) in StoreData()
167 if (!data_.write(input.peek_read(), input.available_read())) { in StoreData()
169 input.available_read() + data_.available_read(), EVP_PKEY_size(rsa_key_)); in StoreData()
338 const uint8_t* to_encrypt = data_.peek_read(); in SignUndigested()
340 if (data_.available_read() > key_len) { in SignUndigested()
342 } else if (data_.available_read() < key_len) { in SignUndigested()
343 keymaster_error_t error = zero_pad_left(&zero_padded, key_len, data_); in SignUndigested()
354 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in SignUndigested()
356 data_.available_read(), EVP_PKEY_size(rsa_key_) * 8); in SignUndigested()
359 bytes_encrypted = RSA_private_encrypt(data_.available_read(), data_.peek_read(), in SignUndigested()
442 if (data_.available_read() > key_len) in VerifyUndigested()
449 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in VerifyUndigested()
451 data_.available_read(), key_len * 8); in VerifyUndigested()
471 if (padding_ == KM_PAD_NONE && data_.available_read() < bytes_to_compare) { in VerifyUndigested()
475 const uint8_t* zero_end = compare_pos + bytes_to_compare - data_.available_read(); in VerifyUndigested()
478 bytes_to_compare = data_.available_read(); in VerifyUndigested()
480 if (memcmp_s(compare_pos, data_.peek_read(), bytes_to_compare) != 0 || zero_check_result != 0) in VerifyUndigested()
551 if (EVP_PKEY_encrypt(ctx.get(), nullptr /* out */, &outlen, data_.peek_read(), in Finish()
552 data_.available_read()) <= 0) in Finish()
558 const uint8_t* to_encrypt = data_.peek_read(); in Finish()
559 size_t to_encrypt_len = data_.available_read(); in Finish()
562 keymaster_error_t error = zero_pad_left(&zero_padded, outlen, data_); in Finish()
604 if (EVP_PKEY_decrypt(ctx.get(), nullptr /* out */, &outlen, data_.peek_read(), in Finish()
605 data_.available_read()) <= 0) in Finish()
611 const uint8_t* to_decrypt = data_.peek_read(); in Finish()
612 size_t to_decrypt_len = data_.available_read(); in Finish()
615 keymaster_error_t error = zero_pad_left(&zero_padded, outlen, data_); in Finish()