Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 14 of 14) sorted by relevance

/hardware/interfaces/security/keymint/aidl/default/ta/
Dsoft.rs23 use kmr_crypto_boring::{hmac::BoringHmac, rng::BoringRng};
30 fn root_kek(&self, _context: &[u8]) -> Result<crypto::OpaqueOr<crypto::hmac::Key>, Error> { in root_kek()
32 Ok(crypto::hmac::Key::new([0; 16].to_vec()).into()) in root_kek()
39 fn unique_id_hbk(&self, _ckdf: &dyn crypto::Ckdf) -> Result<crypto::hmac::Key, Error> { in unique_id_hbk()
41 crypto::hmac::Key::new_from(b"MustBeRandomBits") in unique_id_hbk()
Dlib.rs26 hmac::BoringHmac, rng::BoringRng, rsa::BoringRsa, sha256::BoringSha256,
54 hmac: Box::new(BoringHmac), in boringssl_crypto_impls()
Drpc.rs21 use kmr_crypto_boring::{ec::BoringEc, hmac::BoringHmac, rng::BoringRng};
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/1.0/generic/
DGenericOperation.h133 auto hmac = HMacer::hmac256(testKey, "\0", bytes_cast(secureInputToken.challenge), in deliverSecureInputEvent() local
138 if (!hmac.isOk()) return ResponseCode::Unexpected; in deliverSecureInputEvent()
139 if (hmac.value() == secureInputToken.mac) { in deliverSecureInputEvent()
/hardware/libhardware/include_all/hardware/
Dhw_auth_token.h46 uint8_t hmac[32]; member
/hardware/libhardware/include/hardware/
Dhw_auth_token.h46 uint8_t hmac[32]; member
/hardware/interfaces/confirmationui/1.0/vts/functional/
DVtsHalConfirmationUIV1_0TargetTest.cpp82 auto hmac = HMacer::hmac256(testKey, data...); in testHMAC() local
83 if (!hmac.isOk()) { in testHMAC()
87 hidl_vec<uint8_t> result(hmac.value().size()); in testHMAC()
88 copy(hmac.value().data(), hmac.value().data() + hmac.value().size(), result.data()); in testHMAC()
/hardware/interfaces/confirmationui/aidl/vts/functional/
DVtsHalConfirmationUITargetTest.cpp89 auto hmac = HMacer::hmac256(testKey, data...); in testHMAC() local
90 if (!hmac.isOk()) { in testHMAC()
94 vector<uint8_t> result(hmac.value().size()); in testHMAC()
95 std::copy(hmac.value().data(), hmac.value().data() + hmac.value().size(), result.data()); in testHMAC()
/hardware/interfaces/gatekeeper/aidl/software/
DGateKeeper.cpp55 aidlToken->mac.insert(aidlToken->mac.begin(), std::begin(authToken->hmac), in sizedBuffer2AidlHWToken()
56 std::end(authToken->hmac)); in sizedBuffer2AidlHWToken()
/hardware/qcom/keymaster/
Dkeymaster_qcom.h64 uint8_t hmac[KM_HMAC_LENGTH]; member
/hardware/interfaces/identity/support/tests/
DIdentityCredentialSupportTest.cpp297 optional<vector<uint8_t>> hmac = support::hmacSha256(key, data); in TEST() local
298 ASSERT_TRUE(hmac); in TEST()
299 ASSERT_EQ(expected, hmac.value()); in TEST()
/hardware/interfaces/security/keymint/aidl/vts/functional/
DAuthTest.cpp223 authToken.mac.assign(&hwAuthToken->hmac[0], &hwAuthToken->hmac[32]); in doVerify()
/hardware/interfaces/identity/support/src/
DIdentityCredentialSupport.cpp815 vector<uint8_t> hmac; in hmacSha256() local
816 hmac.resize(32); in hmacSha256()
818 if (HMAC_Final(&ctx, hmac.data(), &size) != 1) { in hmacSha256()
826 return hmac; in hmacSha256()
/hardware/interfaces/keymaster/3.0/
Dtypes.hal414 uint8_t[32] hmac; // HMAC is computed over 0 || challenge || user_id ||