/hardware/interfaces/security/keymint/aidl/default/ta/ |
D | soft.rs | 23 use kmr_crypto_boring::{hmac::BoringHmac, rng::BoringRng}; 30 fn root_kek(&self, _context: &[u8]) -> Result<crypto::OpaqueOr<crypto::hmac::Key>, Error> { in root_kek() 32 Ok(crypto::hmac::Key::new([0; 16].to_vec()).into()) in root_kek() 39 fn unique_id_hbk(&self, _ckdf: &dyn crypto::Ckdf) -> Result<crypto::hmac::Key, Error> { in unique_id_hbk() 41 crypto::hmac::Key::new_from(b"MustBeRandomBits") in unique_id_hbk()
|
D | lib.rs | 26 hmac::BoringHmac, rng::BoringRng, rsa::BoringRsa, sha256::BoringSha256, 54 hmac: Box::new(BoringHmac), in boringssl_crypto_impls()
|
D | rpc.rs | 21 use kmr_crypto_boring::{ec::BoringEc, hmac::BoringHmac, rng::BoringRng};
|
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/1.0/generic/ |
D | GenericOperation.h | 133 auto hmac = HMacer::hmac256(testKey, "\0", bytes_cast(secureInputToken.challenge), in deliverSecureInputEvent() local 138 if (!hmac.isOk()) return ResponseCode::Unexpected; in deliverSecureInputEvent() 139 if (hmac.value() == secureInputToken.mac) { in deliverSecureInputEvent()
|
/hardware/libhardware/include_all/hardware/ |
D | hw_auth_token.h | 46 uint8_t hmac[32]; member
|
/hardware/libhardware/include/hardware/ |
D | hw_auth_token.h | 46 uint8_t hmac[32]; member
|
/hardware/interfaces/confirmationui/1.0/vts/functional/ |
D | VtsHalConfirmationUIV1_0TargetTest.cpp | 82 auto hmac = HMacer::hmac256(testKey, data...); in testHMAC() local 83 if (!hmac.isOk()) { in testHMAC() 87 hidl_vec<uint8_t> result(hmac.value().size()); in testHMAC() 88 copy(hmac.value().data(), hmac.value().data() + hmac.value().size(), result.data()); in testHMAC()
|
/hardware/interfaces/confirmationui/aidl/vts/functional/ |
D | VtsHalConfirmationUITargetTest.cpp | 89 auto hmac = HMacer::hmac256(testKey, data...); in testHMAC() local 90 if (!hmac.isOk()) { in testHMAC() 94 vector<uint8_t> result(hmac.value().size()); in testHMAC() 95 std::copy(hmac.value().data(), hmac.value().data() + hmac.value().size(), result.data()); in testHMAC()
|
/hardware/interfaces/gatekeeper/aidl/software/ |
D | GateKeeper.cpp | 55 aidlToken->mac.insert(aidlToken->mac.begin(), std::begin(authToken->hmac), in sizedBuffer2AidlHWToken() 56 std::end(authToken->hmac)); in sizedBuffer2AidlHWToken()
|
/hardware/qcom/keymaster/ |
D | keymaster_qcom.h | 64 uint8_t hmac[KM_HMAC_LENGTH]; member
|
/hardware/interfaces/identity/support/tests/ |
D | IdentityCredentialSupportTest.cpp | 297 optional<vector<uint8_t>> hmac = support::hmacSha256(key, data); in TEST() local 298 ASSERT_TRUE(hmac); in TEST() 299 ASSERT_EQ(expected, hmac.value()); in TEST()
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | AuthTest.cpp | 223 authToken.mac.assign(&hwAuthToken->hmac[0], &hwAuthToken->hmac[32]); in doVerify()
|
/hardware/interfaces/identity/support/src/ |
D | IdentityCredentialSupport.cpp | 815 vector<uint8_t> hmac; in hmacSha256() local 816 hmac.resize(32); in hmacSha256() 818 if (HMAC_Final(&ctx, hmac.data(), &size) != 1) { in hmacSha256() 826 return hmac; in hmacSha256()
|
/hardware/interfaces/keymaster/3.0/ |
D | types.hal | 414 uint8_t[32] hmac; // HMAC is computed over 0 || challenge || user_id ||
|