Lines Matching refs:input

147                                        const Buffer& input, AuthorizationSet* /* output_params */,  in Update()  argument
157 return StoreData(input, input_consumed); in Update()
161 keymaster_error_t RsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { in StoreData() argument
167 if (!data_.write(input.peek_read(), input.available_read())) { in StoreData()
169 input.available_read() + data_.available_read(), EVP_PKEY_size(rsa_key_)); in StoreData()
173 *input_consumed = input.available_read(); in StoreData()
283 const Buffer& input, AuthorizationSet* output_params, in Update() argument
287 return RsaOperation::Update(additional_params, input, output_params, output, in Update()
290 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update()
292 *input_consumed = input.available_read(); in Update()
297 const Buffer& input, const Buffer& /* signature */, in Finish() argument
301 keymaster_error_t error = UpdateForFinish(additional_params, input); in Finish()
406 const Buffer& input, AuthorizationSet* output_params, in Update() argument
410 return RsaOperation::Update(additional_params, input, output_params, output, in Update()
413 if (EVP_DigestVerifyUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) in Update()
415 *input_consumed = input.available_read(); in Update()
420 const Buffer& input, const Buffer& signature, in Finish() argument
423 keymaster_error_t error = UpdateForFinish(additional_params, input); in Finish()
525 const Buffer& input, const Buffer& /* signature */, in Finish() argument
531 keymaster_error_t error = UpdateForFinish(additional_params, input); in Finish()
578 const Buffer& input, const Buffer& /* signature */, in Finish() argument
584 keymaster_error_t error = UpdateForFinish(additional_params, input); in Finish()