Searched refs:sharedKey (Results 1 – 5 of 5) sorted by relevance
/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securegcm/ |
D | D2DConnectionContextV0.java | 31 private final SecretKey sharedKey; field in D2DConnectionContextV0 41 D2DConnectionContextV0(SecretKey sharedKey, int initialSequenceNumber) { in D2DConnectionContextV0() argument 43 this.sharedKey = sharedKey; in D2DConnectionContextV0() 49 if (sharedKey == null) { in getSessionUnique() 56 return md.digest(sharedKey.getEncoded()); in getSessionUnique() 81 return sharedKey; in getEncodeKey() 86 return sharedKey; in getDecodeKey() 109 bytes.write(sharedKey.getEncoded()); in saveSession()
|
D | D2DSpakeEd25519Handshake.java | 233 private byte[] sharedKey; field in D2DSpakeEd25519Handshake 387 sharedKey = hash(pointToByteArray(Ed25519.toAffine(sharedKeyPoint))); in makeSharedKey() 407 new SecretKeySpec(sharedKey, "AES")))); in makeSharedKeyHashMessage() 421 sharedKey)); in computeOurKeyHash() 429 sharedKey)); in computeTheirKeyHash() 519 new SecretKeySpec(sharedKey, "AES"), in parseHashMessage() 605 new SecretKeySpec(sharedKey, "AES"), 1 /* initialSequenceNumber */); in toConnectionContext()
|
D | D2DCryptoOps.java | 71 Payload payload, SecretKey sharedKey, PublicKey publicDhKey, int protocolVersion) in signcryptMessageAndResponderHello() argument 76 return signcryptPayload(payload, sharedKey, responderHello.build().toByteArray()); in signcryptMessageAndResponderHello() 218 SecretKey sharedKey, byte[] responderHelloAndPayload) throws SignatureException { in decryptResponderHelloMessage() argument 220 Payload payload = verifydecryptPayload(responderHelloAndPayload, sharedKey); in decryptResponderHelloMessage()
|
D | D2DConnectionContext.java | 222 SecretKey sharedKey = new SecretKeySpec(Arrays.copyOfRange(savedSessionInfo, 5, 37), "AES"); in fromSavedSession() local 223 return new D2DConnectionContextV0(sharedKey, sequenceNumber); in fromSavedSession()
|
/external/boringssl/src/ssl/test/runner/hrss/ |
D | hrss.go | 1047 func (pub *PublicKey) Encap(rand io.Reader) (ciphertext []byte, sharedKey []byte) { 1068 sharedKey = h.Sum(nil) 1070 return ciphertext, sharedKey 1107 func (priv *PrivateKey) Decap(ciphertext []byte) (sharedKey []byte, ok bool) { 1162 sharedKey = h.Sum(nil) 1165 for i := range sharedKey { 1166 sharedKey[i] = (sharedKey[i] & ^mask) | (hmacDigest[i] & mask) 1169 return sharedKey, true
|