Home
last modified time | relevance | path

Searched refs:sharedKey (Results 1 – 5 of 5) sorted by relevance

/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securegcm/
DD2DConnectionContextV0.java31 private final SecretKey sharedKey; field in D2DConnectionContextV0
41 D2DConnectionContextV0(SecretKey sharedKey, int initialSequenceNumber) { in D2DConnectionContextV0() argument
43 this.sharedKey = sharedKey; in D2DConnectionContextV0()
49 if (sharedKey == null) { in getSessionUnique()
56 return md.digest(sharedKey.getEncoded()); in getSessionUnique()
81 return sharedKey; in getEncodeKey()
86 return sharedKey; in getDecodeKey()
109 bytes.write(sharedKey.getEncoded()); in saveSession()
DD2DSpakeEd25519Handshake.java233 private byte[] sharedKey; field in D2DSpakeEd25519Handshake
387 sharedKey = hash(pointToByteArray(Ed25519.toAffine(sharedKeyPoint))); in makeSharedKey()
407 new SecretKeySpec(sharedKey, "AES")))); in makeSharedKeyHashMessage()
421 sharedKey)); in computeOurKeyHash()
429 sharedKey)); in computeTheirKeyHash()
519 new SecretKeySpec(sharedKey, "AES"), in parseHashMessage()
605 new SecretKeySpec(sharedKey, "AES"), 1 /* initialSequenceNumber */); in toConnectionContext()
DD2DCryptoOps.java71 Payload payload, SecretKey sharedKey, PublicKey publicDhKey, int protocolVersion) in signcryptMessageAndResponderHello() argument
76 return signcryptPayload(payload, sharedKey, responderHello.build().toByteArray()); in signcryptMessageAndResponderHello()
218 SecretKey sharedKey, byte[] responderHelloAndPayload) throws SignatureException { in decryptResponderHelloMessage() argument
220 Payload payload = verifydecryptPayload(responderHelloAndPayload, sharedKey); in decryptResponderHelloMessage()
DD2DConnectionContext.java222 SecretKey sharedKey = new SecretKeySpec(Arrays.copyOfRange(savedSessionInfo, 5, 37), "AES"); in fromSavedSession() local
223 return new D2DConnectionContextV0(sharedKey, sequenceNumber); in fromSavedSession()
/external/boringssl/src/ssl/test/runner/hrss/
Dhrss.go1047 func (pub *PublicKey) Encap(rand io.Reader) (ciphertext []byte, sharedKey []byte) {
1068 sharedKey = h.Sum(nil)
1070 return ciphertext, sharedKey
1107 func (priv *PrivateKey) Decap(ciphertext []byte) (sharedKey []byte, ok bool) {
1162 sharedKey = h.Sum(nil)
1165 for i := range sharedKey {
1166 sharedKey[i] = (sharedKey[i] & ^mask) | (hmacDigest[i] & mask)
1169 return sharedKey, true