/external/tpm2-tss/test/integration/ |
D | sapi-session-util.c | 174 TPM2B_MAX_BUFFER hmac_key; in compute_command_hmac() local 196 CopySizedByteBuffer((TPM2B *)&hmac_key, (TPM2B *)&session->sessionKey); in compute_command_hmac() 199 ConcatSizedByteBuffer(&hmac_key, (TPM2B *)&entity->entityAuth); in compute_command_hmac() 208 &hmac_key); in compute_command_hmac() 226 TPM2B_MAX_BUFFER hmac_key; in check_response_hmac() local 248 CopySizedByteBuffer((TPM2B *)&hmac_key, (TPM2B *)&session->sessionKey); in check_response_hmac() 251 ConcatSizedByteBuffer(&hmac_key, (TPM2B *)&entity->entityAuth); in check_response_hmac() 260 &hmac_key); in check_response_hmac()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/cipher_extra/ |
D | e_aesctrhmac.c | 48 const uint8_t hmac_key[32]) { in hmac_init() 51 OPENSSL_memcpy(block, hmac_key, hmac_key_len); in hmac_init()
|
/external/boringssl/src/crypto/cipher_extra/ |
D | e_aesctrhmac.c | 48 const uint8_t hmac_key[32]) { in hmac_init() 51 OPENSSL_memcpy(block, hmac_key, hmac_key_len); in hmac_init()
|
/external/boringssl/src/crypto/hrss/ |
D | hrss.c | 1858 uint8_t hmac_key[32]; member 1899 OPENSSL_memcpy(priv->hmac_key, in + 2 * HRSS_SAMPLE_BYTES, in HRSS_generate_key() 1900 sizeof(priv->hmac_key)); in HRSS_generate_key() 1974 OPENSSL_STATIC_ASSERT(sizeof(priv->hmac_key) <= sizeof(masked_key), in HRSS_decap() 1976 for (size_t i = 0; i < sizeof(priv->hmac_key); i++) { in HRSS_decap() 1977 masked_key[i] = priv->hmac_key[i] ^ 0x36; in HRSS_decap() 1979 OPENSSL_memset(masked_key + sizeof(priv->hmac_key), 0x36, in HRSS_decap() 1980 sizeof(masked_key) - sizeof(priv->hmac_key)); in HRSS_decap() 1989 for (size_t i = 0; i < sizeof(priv->hmac_key); i++) { in HRSS_decap() 1992 OPENSSL_memset(masked_key + sizeof(priv->hmac_key), 0x5c, in HRSS_decap() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/hrss/ |
D | hrss.c | 1858 uint8_t hmac_key[32]; member 1899 OPENSSL_memcpy(priv->hmac_key, in + 2 * HRSS_SAMPLE_BYTES, in HRSS_generate_key() 1900 sizeof(priv->hmac_key)); in HRSS_generate_key() 1974 OPENSSL_STATIC_ASSERT(sizeof(priv->hmac_key) <= sizeof(masked_key), in HRSS_decap() 1976 for (size_t i = 0; i < sizeof(priv->hmac_key); i++) { in HRSS_decap() 1977 masked_key[i] = priv->hmac_key[i] ^ 0x36; in HRSS_decap() 1979 OPENSSL_memset(masked_key + sizeof(priv->hmac_key), 0x36, in HRSS_decap() 1980 sizeof(masked_key) - sizeof(priv->hmac_key)); in HRSS_decap() 1989 for (size_t i = 0; i < sizeof(priv->hmac_key); i++) { in HRSS_decap() 1992 OPENSSL_memset(masked_key + sizeof(priv->hmac_key), 0x5c, in HRSS_decap() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 577 uint8_t hmac_key[EVP_MAX_MD_SIZE]; in pkcs12_check_mac() local 579 PKCS12_MAC_ID, iterations, EVP_MD_size(md), hmac_key, in pkcs12_check_mac() 586 if (NULL == HMAC(md, hmac_key, EVP_MD_size(md), CBS_data(authsafes), in pkcs12_check_mac() 598 OPENSSL_cleanse(hmac_key, sizeof(hmac_key)); in pkcs12_check_mac()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 608 uint8_t hmac_key[EVP_MAX_MD_SIZE]; in pkcs12_check_mac() local 610 PKCS12_MAC_ID, iterations, EVP_MD_size(md), hmac_key, in pkcs12_check_mac() 617 if (NULL == HMAC(md, hmac_key, EVP_MD_size(md), CBS_data(authsafes), in pkcs12_check_mac() 629 OPENSSL_cleanse(hmac_key, sizeof(hmac_key)); in pkcs12_check_mac()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_session.cc | 450 RAND_bytes(new_key->hmac_key, 16); in ssl_ctx_rotate_ticket_encryption_key() 509 !HMAC_Init_ex(hctx.get(), tctx->ticket_key_current->hmac_key, 16, in ssl_encrypt_ticket_with_cipher_ctx()
|
D | ssl_lib.cc | 1884 OPENSSL_memcpy(out_bytes + 16, ctx->ticket_key_current->hmac_key, 16); in SSL_CTX_get_tlsext_ticket_keys() 1903 OPENSSL_memcpy(key->hmac_key, in_bytes + 16, 16); in SSL_CTX_set_tlsext_ticket_keys()
|
D | t1_lib.cc | 3469 if (!HMAC_Init_ex(hmac_ctx.get(), key->hmac_key, sizeof(key->hmac_key), in ssl_decrypt_ticket_with_ticket_keys()
|
D | internal.h | 2250 uint8_t hmac_key[16] = {0};
|
/external/boringssl/src/ssl/ |
D | ssl_session.cc | 445 RAND_bytes(new_key->hmac_key, 16); in ssl_ctx_rotate_ticket_encryption_key() 504 !HMAC_Init_ex(hctx.get(), tctx->ticket_key_current->hmac_key, 16, in ssl_encrypt_ticket_with_cipher_ctx()
|
D | ssl_lib.cc | 1927 OPENSSL_memcpy(out_bytes + 16, ctx->ticket_key_current->hmac_key, 16); in SSL_CTX_get_tlsext_ticket_keys() 1946 OPENSSL_memcpy(key->hmac_key, in_bytes + 16, 16); in SSL_CTX_set_tlsext_ticket_keys()
|
D | t1_lib.cc | 3997 if (!HMAC_Init_ex(hmac_ctx.get(), key->hmac_key, sizeof(key->hmac_key), in ssl_decrypt_ticket_with_ticket_keys()
|
D | internal.h | 2293 uint8_t hmac_key[16] = {0};
|
/external/cpuinfo/test/dmesg/ |
D | galaxy-a8-2018.log | 5574 …orker/3:1: 1961] Trustonic TEE: e01|otp_cmd_handler :: OTP_GET_DB_HMAC_DATA : data_type = hmac_key 5597 …orker/3:1: 1961] Trustonic TEE: e01|otp_cmd_handler :: OTP_GET_DB_HMAC_DATA : data_type = hmac_key
|