Searched refs:hmac (Results 1 - 19 of 19) sorted by relevance

/system/keymaster/
H A Dhmac_test.cpp17 #include "hmac.h"
65 HmacSha256 hmac; local
68 ASSERT_TRUE(hmac.Init(key_buffer));
75 EXPECT_TRUE(hmac.Verify(data_buffer, digest_buffer));
79 EXPECT_FALSE(hmac.Verify(data_buffer, digest_buffer));
H A Dhkdf.cpp23 #include "hmac.h"
70 HmacSha256 hmac;
71 result = hmac.Init(pseudo_random_key.get(), digest_size_);
85 result = hmac.Sign(buf.get(), block_input_len, digest.get(), digest_size_);
H A Dintegrity_assured_key_blob.cpp23 #include <openssl/hmac.h>
53 const AuthorizationSet& hidden, uint8_t hmac[HMAC_SIZE]) {
75 memcpy(hmac, tmp, min(HMAC_SIZE, tmp_len));
52 ComputeHmac(const uint8_t* serialized_data, size_t serialized_data_size, const AuthorizationSet& hidden, uint8_t hmac[HMAC_SIZE]) argument
H A Dhmac_operation.h22 #include <openssl/hmac.h>
H A Dhmac.cpp17 #include "hmac.h"
22 #include <openssl/hmac.h>
H A DMakefile90 hmac.cpp \
208 hmac.o \
219 hmac.o \
272 hmac.o \
H A Dhmac_operation.cpp22 #include <openssl/hmac.h>
H A Dsoft_keymaster_context.cpp24 #include <openssl/hmac.h>
/system/hwservicemanager/
H A DTokenManager.cpp8 #include <openssl/hmac.h>
110 std::array<uint8_t, EVP_MAX_MD_SIZE> hmac; local
116 hmac.data(), &hmacSize);
119 hmacOut != hmac.data()) {
125 const hidl_vec<uint8_t> &token = TokenManager::getToken(id, hmac.data(), hmacSize);
157 hidl_vec<uint8_t> TokenManager::getToken(const uint64_t id, const uint8_t *hmac, uint64_t hmacSize) { argument
166 token[i + ID_SIZE] = hmac[i];
H A DTokenManager.h42 static hidl_vec<uint8_t> getToken(const uint64_t id, const uint8_t *hmac, uint64_t hmacSize);
49 hidl_vec<uint8_t> token; // First eight bytes are tokenId. Remaining bytes are hmac.
/system/tpm/trunks/
H A Dpassword_authorization_delegate.cc43 auth.hmac = password_;
74 if (auth_response.hmac.size != 0) {
75 LOG(ERROR) << __func__ << ": received a non zero length hmac.";
H A Dhmac_authorization_delegate.cc23 #include <openssl/hmac.h>
99 auth.hmac = Make_TPM2B_DIGEST(digest);
124 if (auth_response.hmac.size != kHashDigestSize) {
125 LOG(ERROR) << "TPM auth hmac was incorrect size.";
161 CHECK_EQ(digest.size(), auth_response.hmac.size);
162 if (!crypto::SecureMemEqual(digest.data(), auth_response.hmac.buffer,
H A Dhmac_authorization_delegate_test.cc175 EXPECT_EQ(kHashDigestSize, auth_command.hmac.size);
183 auth_response.hmac.size = kHashDigestSize;
189 memcpy(auth_response.hmac.buffer, hmac_buffer, kHashDigestSize);
H A Dtpm_generated.h1249 TPM2B_AUTH hmac; member in struct:trunks::TPMS_AUTH_COMMAND
1255 TPM2B_AUTH hmac; member in struct:trunks::TPMS_AUTH_RESPONSE
1321 TPMS_SCHEME_HMAC hmac; member in union:trunks::TPMU_SCHEME_KEYEDHASH
1342 TPMS_SCHEME_HMAC hmac; member in union:trunks::TPMU_SIG_SCHEME
1481 TPMT_HA hmac; member in union:trunks::TPMU_SIGNATURE
H A Dtpm_generated.cc4584 result = Serialize_TPM2B_AUTH(value.hmac, buffer);
4613 result = Parse_TPM2B_AUTH(buffer, &value->hmac, value_bytes);
4635 result = Serialize_TPM2B_AUTH(value.hmac, buffer);
4658 result = Parse_TPM2B_AUTH(buffer, &value->hmac, value_bytes);
5194 result = Serialize_TPMS_SCHEME_HMAC(value.hmac, buffer);
5221 result = Parse_TPMS_SCHEME_HMAC(buffer, &value->hmac, value_bytes);
5314 result = Serialize_TPMS_SCHEME_HMAC(value.hmac, buffer);
5376 result = Parse_TPMS_SCHEME_HMAC(buffer, &value->hmac, value_bytes);
6533 result = Serialize_TPMT_HA(value.hmac, buffer);
6595 result = Parse_TPMT_HA(buffer, &value->hmac, value_byte
[all...]
/system/security/keystore/include/keystore/
H A Dkeystore_hidl_support.h102 std::is_same<decltype(token.hmac), ::android::hardware::hidl_array<uint8_t, 32>>::value,
119 pos = std::copy(token.hmac.data(), token.hmac.data() + token.hmac.size(), pos);
/system/gatekeeper/
H A Dgatekeeper.cpp241 uint32_t hash_len = (uint32_t)((uint8_t *)&token->hmac - (uint8_t *)token);
242 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len,
246 memset(token->hmac, 0, sizeof(token->hmac));
/system/security/keystore/
H A Dkey_store_service.cpp1368 std::is_same<decltype(hidlAuthToken->hmac),
1369 ::android::hardware::hidl_array<uint8_t, sizeof(authToken.hmac)>>::value,
1371 std::copy(authToken.hmac, authToken.hmac + sizeof(authToken.hmac), hidlAuthToken->hmac.data());
/system/tpm/attestation/common/
H A Dcrypto_utility_impl.cc31 #include <openssl/hmac.h>

Completed in 341 milliseconds