Home
last modified time | relevance | path

Searched refs:savedSessionInfo (Results 1 – 4 of 4) sorted by relevance

/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securegcm/
DD2DConnectionContext.java206 public static D2DConnectionContext fromSavedSession(byte[] savedSessionInfo) { in fromSavedSession() argument
207 if (savedSessionInfo == null || savedSessionInfo.length == 0) { in fromSavedSession()
211 int protocolVersion = savedSessionInfo[0] & 0xff; in fromSavedSession()
217 if (savedSessionInfo.length != 37) { in fromSavedSession()
218 throw new IllegalArgumentException("Incorrect data length (" + savedSessionInfo.length in fromSavedSession()
221 int sequenceNumber = bytesToSignedInt(Arrays.copyOfRange(savedSessionInfo, 1, 5)); in fromSavedSession()
222 SecretKey sharedKey = new SecretKeySpec(Arrays.copyOfRange(savedSessionInfo, 5, 37), "AES"); in fromSavedSession()
228 if (savedSessionInfo.length != 73) { in fromSavedSession()
231 int encodeSequenceNumber = bytesToSignedInt(Arrays.copyOfRange(savedSessionInfo, 1, 5)); in fromSavedSession()
232 int decodeSequenceNumber = bytesToSignedInt(Arrays.copyOfRange(savedSessionInfo, 5, 9)); in fromSavedSession()
[all …]
/external/ukey2/src/main/cpp/test/securegcm/
Dd2d_connection_context_v1_test.cc35 explicit D2DConnectionContextV1Peer(const std::string& savedSessionInfo) { in D2DConnectionContextV1Peer() argument
36 context_ = D2DConnectionContextV1::FromSavedSession(savedSessionInfo); in D2DConnectionContextV1Peer()
/external/ukey2/src/main/cpp/src/securegcm/
Dd2d_connection_context_v1.cc205 D2DConnectionContextV1::FromSavedSession(const std::string& savedSessionInfo) { in FromSavedSession() argument
206 ByteBuffer byteBuffer = ByteBuffer(savedSessionInfo); in FromSavedSession()
/external/ukey2/src/main/cpp/include/securegcm/
Dd2d_connection_context_v1.h68 const string& savedSessionInfo);