/hardware/interfaces/identity/aidl/default/ |
D | Util.cpp | 63 optional<vector<uint8_t>> nonce = support::getRandom(12); in secureAccessControlProfileCalcMac() local 64 if (!nonce) { in secureAccessControlProfileCalcMac() 68 support::encryptAes128Gcm(storageKey, nonce.value(), {}, cborData); in secureAccessControlProfileCalcMac() 82 vector<uint8_t> nonce = in secureAccessControlProfileCheckMac() local 84 optional<vector<uint8_t>> mac = support::encryptAes128Gcm(storageKey, nonce, {}, cborData); in secureAccessControlProfileCheckMac()
|
D | WritableIdentityCredential.cpp | 300 optional<vector<uint8_t>> nonce = support::getRandom(12); in addEntryValue() local 301 if (!nonce) { in addEntryValue() 306 support::encryptAes128Gcm(storageKey_, nonce.value(), content, entryAdditionalData_); in addEntryValue() 358 optional<vector<uint8_t>> nonce = support::getRandom(12); in generateCredentialData() local 359 if (!nonce) { in generateCredentialData() 365 hardwareBoundKey, nonce.value(), credentialKeys, docTypeAsVec); in generateCredentialData()
|
D | IdentityCredential.cpp | 868 optional<vector<uint8_t>> nonce = support::getRandom(12); in generateSigningKeyPair() local 869 if (!nonce) { in generateSigningKeyPair() 875 storageKey_, nonce.value(), signingKey.value(), docTypeAsBlob); in generateSigningKeyPair()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | HmacKeySharingTest.cpp | 101 nonces.emplace_back(param.nonce.data(), param.nonce.size()); in copyNonces() 128 ASSERT_EQ(result1.params.nonce, result2.params.nonce) in TEST_P() 196 uint8_t byte_to_tweak = rand() % sizeof(params[param_to_tweak].nonce); in TEST_P() 198 params[param_to_tweak].nonce[byte_to_tweak] ^= (1 << bit_to_tweak); in TEST_P()
|
D | KeymasterHidlTest.cpp | 463 void KeymasterHidlTest::CheckAesCtrTestVector(const string& key, const string& nonce, in CheckAesCtrTestVector() argument 476 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) in CheckAesCtrTestVector()
|
D | KeymasterHidlTest.h | 172 void CheckAesCtrTestVector(const string& key, const string& nonce, const string& message,
|
D | keymaster_hidl_hal_test.cpp | 2901 const char* nonce; member 2949 const string nonce = hex2str(test.nonce); in TEST_P() local 2952 CheckAesCtrTestVector(key, nonce, plaintext, ciphertext); in TEST_P() 3329 string nonce = make_string(nonce_bytes); in TEST_P() local 3343 .Authorization(TAG_NONCE, nonce.data(), nonce.size()); in TEST_P()
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
D | eapol.h | 110 unsigned char nonce[EAPOL_WPA_KEY_NONCE_LEN]; /* Nonce */
|
/hardware/interfaces/keymaster/4.0/support/ |
D | keymaster_utils.cpp | 41 return std::tie(a.seed, a.nonce) < std::tie(b.seed, b.nonce); in operator <()
|
/hardware/interfaces/identity/support/include/android/hardware/identity/support/ |
D | IdentityCredentialSupport.h | 103 optional<vector<uint8_t>> encryptAes128Gcm(const vector<uint8_t>& key, const vector<uint8_t>& nonce,
|
/hardware/interfaces/identity/support/src/ |
D | IdentityCredentialSupport.cpp | 373 unsigned char* nonce = (unsigned char*)encryptedData.data(); in decryptAes128Gcm() local 374 unsigned char* cipherText = nonce + kAesGcmIvSize; in decryptAes128Gcm() 396 if (EVP_DecryptInit_ex(ctx.get(), NULL, NULL, (unsigned char*)key.data(), nonce) != 1) { in decryptAes128Gcm() 446 optional<vector<uint8_t>> encryptAes128Gcm(const vector<uint8_t>& key, const vector<uint8_t>& nonce, in encryptAes128Gcm() argument 453 if (nonce.size() != kAesGcmIvSize) { in encryptAes128Gcm() 465 memcpy(noncePtr, nonce.data(), kAesGcmIvSize); in encryptAes128Gcm() 484 (unsigned char*)nonce.data()) != 1) { in encryptAes128Gcm()
|
/hardware/interfaces/keymaster/4.1/support/ |
D | Keymaster.cpp | 65 os << "(seed: " << params.seed << ", nonce: " << params.nonce << ')'; in operator <<()
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 91 * bits or nonce lengths other than 96 bits. 231 * of the method on a given device, and the nonce must return the same value for every 278 * HmacSharingParameters is the concatenation of its two fields, i.e. seed || nonce. 310 * and a nonce. When T receives the same call, it returns an empty seed and a nonce. When 947 * o Tag::CALLER_NONCE allows the caller to specify a nonce or initialization vector (IV). If 1035 * vector or nonce is required. In most cases, callers shouldn't provide an IV or nonce and the 1036 * IKeymasterDevice implementation must generate a random IV or nonce and return it via 1038 * authorizations contain Tag::CALLER_NONCE, then the caller may provide an IV/nonce with 1039 * Tag::NONCE in inParams. If a nonce is provided when Tag::CALLER_NONCE is not authorized, 1040 * begin() must return ErrorCode::CALLER_NONCE_PROHIBITED. If a nonce is not provided when [all …]
|
D | types.hal | 153 * Tag::CALLER_NONCE specifies that the caller can provide a nonce for nonce-requiring 824 * Tag::NONCE is used to provide or return a nonce or Initialization Vector (IV) for AES-GCM, 827 * Tag::CALLER_NONCE. If not provided, an appropriate nonce or IV must be randomly generated by 1271 uint8_t[32] nonce;
|
/hardware/interfaces/keymaster/3.0/ |
D | IKeymasterDevice.hal | 262 * that require a nonce or IV, on keys that were generated with Tag::CALLER_NONCE, 268 * initialization, notably to return the IV or nonce from operations that generate 269 * an IV or nonce.
|
D | types.hal | 47 CALLER_NONCE = TagType:BOOL | 7, /** Allow caller to specify nonce or IV. */
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 779 void CheckAesCtrTestVector(const string& key, const string& nonce, const string& message, in CheckAesCtrTestVector() argument 791 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) in CheckAesCtrTestVector() 3158 const char* nonce; member 3202 const string nonce = hex2str(test.nonce); in TEST_P() local 3205 CheckAesCtrTestVector(key, nonce, plaintext, ciphertext); in TEST_P() 3494 string nonce = make_string(nonce_bytes); in TEST_P() local 3508 .Authorization(TAG_NONCE, nonce.data(), nonce.size()); in TEST_P()
|