Home
last modified time | relevance | path

Searched refs:nonce (Results 1 – 17 of 17) sorted by relevance

/hardware/interfaces/identity/aidl/default/
DUtil.cpp63 optional<vector<uint8_t>> nonce = support::getRandom(12); in secureAccessControlProfileCalcMac() local
64 if (!nonce) { in secureAccessControlProfileCalcMac()
68 support::encryptAes128Gcm(storageKey, nonce.value(), {}, cborData); in secureAccessControlProfileCalcMac()
82 vector<uint8_t> nonce = in secureAccessControlProfileCheckMac() local
84 optional<vector<uint8_t>> mac = support::encryptAes128Gcm(storageKey, nonce, {}, cborData); in secureAccessControlProfileCheckMac()
DWritableIdentityCredential.cpp300 optional<vector<uint8_t>> nonce = support::getRandom(12); in addEntryValue() local
301 if (!nonce) { in addEntryValue()
306 support::encryptAes128Gcm(storageKey_, nonce.value(), content, entryAdditionalData_); in addEntryValue()
358 optional<vector<uint8_t>> nonce = support::getRandom(12); in generateCredentialData() local
359 if (!nonce) { in generateCredentialData()
365 hardwareBoundKey, nonce.value(), credentialKeys, docTypeAsVec); in generateCredentialData()
DIdentityCredential.cpp868 optional<vector<uint8_t>> nonce = support::getRandom(12); in generateSigningKeyPair() local
869 if (!nonce) { in generateSigningKeyPair()
875 storageKey_, nonce.value(), signingKey.value(), docTypeAsBlob); in generateSigningKeyPair()
/hardware/interfaces/keymaster/4.0/vts/functional/
DHmacKeySharingTest.cpp101 nonces.emplace_back(param.nonce.data(), param.nonce.size()); in copyNonces()
128 ASSERT_EQ(result1.params.nonce, result2.params.nonce) in TEST_P()
196 uint8_t byte_to_tweak = rand() % sizeof(params[param_to_tweak].nonce); in TEST_P()
198 params[param_to_tweak].nonce[byte_to_tweak] ^= (1 << bit_to_tweak); in TEST_P()
DKeymasterHidlTest.cpp463 void KeymasterHidlTest::CheckAesCtrTestVector(const string& key, const string& nonce, in CheckAesCtrTestVector() argument
476 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) in CheckAesCtrTestVector()
DKeymasterHidlTest.h172 void CheckAesCtrTestVector(const string& key, const string& nonce, const string& message,
Dkeymaster_hidl_hal_test.cpp2901 const char* nonce; member
2949 const string nonce = hex2str(test.nonce); in TEST_P() local
2952 CheckAesCtrTestVector(key, nonce, plaintext, ciphertext); in TEST_P()
3329 string nonce = make_string(nonce_bytes); in TEST_P() local
3343 .Authorization(TAG_NONCE, nonce.data(), nonce.size()); in TEST_P()
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
Deapol.h110 unsigned char nonce[EAPOL_WPA_KEY_NONCE_LEN]; /* Nonce */
/hardware/interfaces/keymaster/4.0/support/
Dkeymaster_utils.cpp41 return std::tie(a.seed, a.nonce) < std::tie(b.seed, b.nonce); in operator <()
/hardware/interfaces/identity/support/include/android/hardware/identity/support/
DIdentityCredentialSupport.h103 optional<vector<uint8_t>> encryptAes128Gcm(const vector<uint8_t>& key, const vector<uint8_t>& nonce,
/hardware/interfaces/identity/support/src/
DIdentityCredentialSupport.cpp373 unsigned char* nonce = (unsigned char*)encryptedData.data(); in decryptAes128Gcm() local
374 unsigned char* cipherText = nonce + kAesGcmIvSize; in decryptAes128Gcm()
396 if (EVP_DecryptInit_ex(ctx.get(), NULL, NULL, (unsigned char*)key.data(), nonce) != 1) { in decryptAes128Gcm()
446 optional<vector<uint8_t>> encryptAes128Gcm(const vector<uint8_t>& key, const vector<uint8_t>& nonce, in encryptAes128Gcm() argument
453 if (nonce.size() != kAesGcmIvSize) { in encryptAes128Gcm()
465 memcpy(noncePtr, nonce.data(), kAesGcmIvSize); in encryptAes128Gcm()
484 (unsigned char*)nonce.data()) != 1) { in encryptAes128Gcm()
/hardware/interfaces/keymaster/4.1/support/
DKeymaster.cpp65 os << "(seed: " << params.seed << ", nonce: " << params.nonce << ')'; in operator <<()
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal91 * bits or nonce lengths other than 96 bits.
231 * of the method on a given device, and the nonce must return the same value for every
278 * HmacSharingParameters is the concatenation of its two fields, i.e. seed || nonce.
310 * and a nonce. When T receives the same call, it returns an empty seed and a nonce. When
947 * o Tag::CALLER_NONCE allows the caller to specify a nonce or initialization vector (IV). If
1035 * vector or nonce is required. In most cases, callers shouldn't provide an IV or nonce and the
1036 * IKeymasterDevice implementation must generate a random IV or nonce and return it via
1038 * authorizations contain Tag::CALLER_NONCE, then the caller may provide an IV/nonce with
1039 * Tag::NONCE in inParams. If a nonce is provided when Tag::CALLER_NONCE is not authorized,
1040 * begin() must return ErrorCode::CALLER_NONCE_PROHIBITED. If a nonce is not provided when
[all …]
Dtypes.hal153 * Tag::CALLER_NONCE specifies that the caller can provide a nonce for nonce-requiring
824 * Tag::NONCE is used to provide or return a nonce or Initialization Vector (IV) for AES-GCM,
827 * Tag::CALLER_NONCE. If not provided, an appropriate nonce or IV must be randomly generated by
1271 uint8_t[32] nonce;
/hardware/interfaces/keymaster/3.0/
DIKeymasterDevice.hal262 * that require a nonce or IV, on keys that were generated with Tag::CALLER_NONCE,
268 * initialization, notably to return the IV or nonce from operations that generate
269 * an IV or nonce.
Dtypes.hal47 CALLER_NONCE = TagType:BOOL | 7, /** Allow caller to specify nonce or IV. */
/hardware/interfaces/keymaster/3.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp779 void CheckAesCtrTestVector(const string& key, const string& nonce, const string& message, in CheckAesCtrTestVector() argument
791 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) in CheckAesCtrTestVector()
3158 const char* nonce; member
3202 const string nonce = hex2str(test.nonce); in TEST_P() local
3205 CheckAesCtrTestVector(key, nonce, plaintext, ciphertext); in TEST_P()
3494 string nonce = make_string(nonce_bytes); in TEST_P() local
3508 .Authorization(TAG_NONCE, nonce.data(), nonce.size()); in TEST_P()