/system/keymaster/ |
H A D | hmac_test.cpp | 17 #include "hmac.h" 65 HmacSha256 hmac; local 68 ASSERT_TRUE(hmac.Init(key_buffer)); 75 EXPECT_TRUE(hmac.Verify(data_buffer, digest_buffer)); 79 EXPECT_FALSE(hmac.Verify(data_buffer, digest_buffer));
|
H A D | hkdf.cpp | 23 #include "hmac.h" 70 HmacSha256 hmac; 71 result = hmac.Init(pseudo_random_key.get(), digest_size_); 85 result = hmac.Sign(buf.get(), block_input_len, digest.get(), digest_size_);
|
H A D | integrity_assured_key_blob.cpp | 23 #include <openssl/hmac.h> 53 const AuthorizationSet& hidden, uint8_t hmac[HMAC_SIZE]) { 75 memcpy(hmac, tmp, min(HMAC_SIZE, tmp_len)); 52 ComputeHmac(const uint8_t* serialized_data, size_t serialized_data_size, const AuthorizationSet& hidden, uint8_t hmac[HMAC_SIZE]) argument
|
H A D | hmac_operation.h | 22 #include <openssl/hmac.h>
|
H A D | hmac.cpp | 17 #include "hmac.h" 22 #include <openssl/hmac.h>
|
H A D | Makefile | 90 hmac.cpp \ 208 hmac.o \ 219 hmac.o \ 272 hmac.o \
|
H A D | hmac_operation.cpp | 22 #include <openssl/hmac.h>
|
H A D | soft_keymaster_context.cpp | 24 #include <openssl/hmac.h>
|
/system/hwservicemanager/ |
H A D | TokenManager.cpp | 8 #include <openssl/hmac.h> 110 std::array<uint8_t, EVP_MAX_MD_SIZE> hmac; local 116 hmac.data(), &hmacSize); 119 hmacOut != hmac.data()) { 125 const hidl_vec<uint8_t> &token = TokenManager::getToken(id, hmac.data(), hmacSize); 157 hidl_vec<uint8_t> TokenManager::getToken(const uint64_t id, const uint8_t *hmac, uint64_t hmacSize) { argument 166 token[i + ID_SIZE] = hmac[i];
|
H A D | TokenManager.h | 42 static hidl_vec<uint8_t> getToken(const uint64_t id, const uint8_t *hmac, uint64_t hmacSize); 49 hidl_vec<uint8_t> token; // First eight bytes are tokenId. Remaining bytes are hmac.
|
/system/tpm/trunks/ |
H A D | password_authorization_delegate.cc | 43 auth.hmac = password_; 74 if (auth_response.hmac.size != 0) { 75 LOG(ERROR) << __func__ << ": received a non zero length hmac.";
|
H A D | hmac_authorization_delegate.cc | 23 #include <openssl/hmac.h> 99 auth.hmac = Make_TPM2B_DIGEST(digest); 124 if (auth_response.hmac.size != kHashDigestSize) { 125 LOG(ERROR) << "TPM auth hmac was incorrect size."; 161 CHECK_EQ(digest.size(), auth_response.hmac.size); 162 if (!crypto::SecureMemEqual(digest.data(), auth_response.hmac.buffer,
|
H A D | hmac_authorization_delegate_test.cc | 175 EXPECT_EQ(kHashDigestSize, auth_command.hmac.size); 183 auth_response.hmac.size = kHashDigestSize; 189 memcpy(auth_response.hmac.buffer, hmac_buffer, kHashDigestSize);
|
H A D | tpm_generated.h | 1249 TPM2B_AUTH hmac; member in struct:trunks::TPMS_AUTH_COMMAND 1255 TPM2B_AUTH hmac; member in struct:trunks::TPMS_AUTH_RESPONSE 1321 TPMS_SCHEME_HMAC hmac; member in union:trunks::TPMU_SCHEME_KEYEDHASH 1342 TPMS_SCHEME_HMAC hmac; member in union:trunks::TPMU_SIG_SCHEME 1481 TPMT_HA hmac; member in union:trunks::TPMU_SIGNATURE
|
H A D | tpm_generated.cc | 4584 result = Serialize_TPM2B_AUTH(value.hmac, buffer); 4613 result = Parse_TPM2B_AUTH(buffer, &value->hmac, value_bytes); 4635 result = Serialize_TPM2B_AUTH(value.hmac, buffer); 4658 result = Parse_TPM2B_AUTH(buffer, &value->hmac, value_bytes); 5194 result = Serialize_TPMS_SCHEME_HMAC(value.hmac, buffer); 5221 result = Parse_TPMS_SCHEME_HMAC(buffer, &value->hmac, value_bytes); 5314 result = Serialize_TPMS_SCHEME_HMAC(value.hmac, buffer); 5376 result = Parse_TPMS_SCHEME_HMAC(buffer, &value->hmac, value_bytes); 6533 result = Serialize_TPMT_HA(value.hmac, buffer); 6595 result = Parse_TPMT_HA(buffer, &value->hmac, value_byte [all...] |
/system/security/keystore/include/keystore/ |
H A D | keystore_hidl_support.h | 102 std::is_same<decltype(token.hmac), ::android::hardware::hidl_array<uint8_t, 32>>::value, 119 pos = std::copy(token.hmac.data(), token.hmac.data() + token.hmac.size(), pos);
|
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 241 uint32_t hash_len = (uint32_t)((uint8_t *)&token->hmac - (uint8_t *)token); 242 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len, 246 memset(token->hmac, 0, sizeof(token->hmac));
|
/system/security/keystore/ |
H A D | key_store_service.cpp | 1368 std::is_same<decltype(hidlAuthToken->hmac), 1369 ::android::hardware::hidl_array<uint8_t, sizeof(authToken.hmac)>>::value, 1371 std::copy(authToken.hmac, authToken.hmac + sizeof(authToken.hmac), hidlAuthToken->hmac.data());
|
/system/tpm/attestation/common/ |
H A D | crypto_utility_impl.cc | 31 #include <openssl/hmac.h>
|