/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ |
D | CryptHash.c | 224 hOut->hmacKey = hIn->hmacKey; in CryptHashCopyState() 261 memcpy(&outBuf[offsetof(HMAC_STATE, hmacKey)], &from->hmacKey, in CryptHashExportState() 262 sizeof(from->hmacKey)); in CryptHashExportState() 303 memcpy(&to->hmacKey, &inBuf[offsetof(HMAC_STATE, hmacKey)], in CryptHashImportState() 304 sizeof(to->hmacKey)); in CryptHashImportState() 536 state->hmacKey.t.size = CryptHashBlock(hashAlg, keySize, key, in CryptHmacStart() 538 state->hmacKey.t.buffer); in CryptHmacStart() 542 memcpy(state->hmacKey.t.buffer, key, keySize); in CryptHmacStart() 543 state->hmacKey.t.size = keySize; in CryptHmacStart() 546 pb = state->hmacKey.t.buffer; in CryptHmacStart() [all …]
|
/external/tpm2-tss/src/tss2-esys/ |
D | esys_crypto.c | 162 uint8_t * hmacKey, size_t hmacKeySize, in iesys_crypto_authHmac() argument 172 if (hmacKey == NULL || pHash == NULL || nonceNewer == NULL || in iesys_crypto_authHmac() 184 iesys_crypto_hmac_start(&cryptoContext, alg, hmacKey, hmacKeySize); in iesys_crypto_authHmac() 246 uint8_t * hmacKey, in iesys_crypto_KDFaHmac() argument 255 if (hmacKey == NULL || contextU == NULL || contextV == NULL) { in iesys_crypto_KDFaHmac() 266 iesys_crypto_hmac_start(&cryptoContext, alg, hmacKey, hmacKeySize); in iesys_crypto_KDFaHmac() 327 uint8_t * hmacKey, in iesys_crypto_KDFa() argument 341 LOGBLOB_DEBUG(hmacKey, hmacKeySize, "IESYS KDFa hmac key"); in iesys_crypto_KDFa() 364 r = iesys_crypto_KDFaHmac(hashAlg, hmacKey, in iesys_crypto_KDFa()
|
D | esys_crypto.h | 52 uint8_t *hmacKey, 65 uint8_t *hmacKey, 77 uint8_t *hmacKey,
|
/external/tpm2-tss/test/integration/ |
D | sapi-session-util.c | 110 TPM2B_MAX_BUFFER *hmacKey) in compute_session_auth() argument 133 LOGBLOB_DEBUG(hmacKey->buffer, hmacKey->size, "hmacKey="); in compute_session_auth() 150 rval = hmac(session->authHash, hmacKey->buffer, in compute_session_auth() 151 hmacKey->size, buffer_list, in compute_session_auth()
|
/external/ukey2/src/main/javatest/com/google/security/cryptauth/lib/securemessage/ |
D | SecureMessageTest.java | 91 private SecretKey hmacKey; field in SecureMessageTest 112 hmacKey = makeAesKey(); in setUp() 419 hmacKey = aesEncryptionKey; // Re-use the same key for both in testEncryptedAndMACedWithSameKey() 709 return hmacKey; in getSigningKeyFor()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/command/Object/ |
D | Object_spt.c | 183 TPM2B_DIGEST hmacKey; in ComputeOuterIntegrity() local 190 hmacKey.t.size = CryptHashGetDigestSize(hashAlg); in ComputeOuterIntegrity() 194 hmacKey.t.size * 8, hmacKey.t.buffer, NULL, FALSE); in ComputeOuterIntegrity() 196 integrity->t.size = CryptHmacStart2B(&hmacState, hashAlg, &hmacKey.b); in ComputeOuterIntegrity()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/include/ |
D | CryptHash.h | 318 TPM2B_HASH_BLOCK hmacKey; // the HMAC key member
|
/external/boringssl/src/ssl/test/runner/hrss/ |
D | hrss.go | 1096 hmacKey [32]byte member 1153 hmacHash := hmac.New(sha256.New, priv.hmacKey[:])
|
/external/tpm2-tss/doc/ |
D | doxygen.dox | 1036 …\fn TSS2_RC iesys_crypto_authHmac( TPM2_ALG_ID alg, uint8_t *hmacKey, size_t hmacKeySize, const ui… 1039 …\fn TSS2_RC iesys_crypto_KDFaHmac( TPM2_ALG_ID alg, uint8_t *hmacKey, size_t hmacKeySize, uint32_t… 1040 …\fn TSS2_RC iesys_crypto_KDFa( TPM2_ALG_ID hashAlg, uint8_t *hmacKey, size_t hmacKeySize, const ch…
|