/hardware/interfaces/identity/aidl/default/libeic/ |
D | EicProvisioning.c | 201 uint8_t nonce[12]; in eicProvisioningAddAccessControlProfile() local 202 if (!eicOpsRandom(nonce, 12)) { in eicProvisioningAddAccessControlProfile() 205 if (!eicOpsEncryptAes128Gcm(ctx->storageKey, nonce, NULL, 0, cborBuilder.buffer, in eicProvisioningAddAccessControlProfile() 296 uint8_t nonce[12]; in eicProvisioningAddEntryValue() local 297 if (!eicOpsRandom(nonce, 12)) { in eicProvisioningAddEntryValue() 300 if (!eicOpsEncryptAes128Gcm(ctx->storageKey, nonce, content, contentSize, additionalDataCbor, in eicProvisioningAddEntryValue() 362 uint8_t nonce[12]; in eicProvisioningFinishGetCredentialData() local 363 if (!eicOpsRandom(nonce, 12)) { in eicProvisioningFinishGetCredentialData() 368 eicOpsGetHardwareBoundKey(ctx->testCredential), nonce, cborBuf, cbor.size, in eicProvisioningFinishGetCredentialData()
|
D | EicPresentation.c | 143 uint8_t nonce[12]; in eicPresentationGenerateSigningKeyPair() local 144 if (!eicOpsRandom(nonce, 12)) { in eicPresentationGenerateSigningKeyPair() 148 if (!eicOpsEncryptAes128Gcm(ctx->storageKey, nonce, signingKeyPriv, sizeof(signingKeyPriv), in eicPresentationGenerateSigningKeyPair()
|
D | EicOps.h | 165 const uint8_t* nonce, // Must be 12 bytes
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | HmacKeySharingTest.cpp | 101 nonces.emplace_back(param.nonce.data(), param.nonce.size()); in copyNonces() 128 ASSERT_EQ(result1.params.nonce, result2.params.nonce) in TEST_P() 196 uint8_t byte_to_tweak = rand() % sizeof(params[param_to_tweak].nonce); in TEST_P() 198 params[param_to_tweak].nonce[byte_to_tweak] ^= (1 << bit_to_tweak); in TEST_P()
|
D | KeymasterHidlTest.cpp | 463 void KeymasterHidlTest::CheckAesCtrTestVector(const string& key, const string& nonce, in CheckAesCtrTestVector() argument 476 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) in CheckAesCtrTestVector()
|
D | KeymasterHidlTest.h | 172 void CheckAesCtrTestVector(const string& key, const string& nonce, const string& message,
|
D | keymaster_hidl_hal_test.cpp | 3020 const char* nonce; member 3068 const string nonce = hex2str(test.nonce); in TEST_P() local 3071 CheckAesCtrTestVector(key, nonce, plaintext, ciphertext); in TEST_P() 3448 string nonce = make_string(nonce_bytes); in TEST_P() local 3462 .Authorization(TAG_NONCE, nonce.data(), nonce.size()); in TEST_P()
|
/hardware/interfaces/security/sharedsecret/aidl/vts/functional/ |
D | SharedSecretAidlTest.cpp | 52 EXPECT_TRUE(params.nonce.size() == 32); in getSharedSecretParameters() 89 nonces.push_back(param.nonce); in copyNonces() 150 ASSERT_EQ(result1.params.nonce, result2.params.nonce) in TEST_F() 221 uint8_t byte_to_tweak = rand() % sizeof(params[param_to_tweak].nonce); in TEST_F() 223 params[param_to_tweak].nonce[byte_to_tweak] ^= (1 << bit_to_tweak); in TEST_F() 260 auto& to_tweak = params[param_to_tweak].nonce; in TEST_F()
|
/hardware/interfaces/security/sharedsecret/aidl/aidl_api/android.hardware.security.sharedsecret/1/android/hardware/security/sharedsecret/ |
D | SharedSecretParameters.aidl | 39 byte[] nonce;
|
/hardware/interfaces/security/sharedsecret/aidl/aidl_api/android.hardware.security.sharedsecret/current/android/hardware/security/sharedsecret/ |
D | SharedSecretParameters.aidl | 39 byte[] nonce;
|
/hardware/interfaces/security/sharedsecret/aidl/android/hardware/security/sharedsecret/ |
D | SharedSecretParameters.aidl | 40 byte[] nonce;
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
D | eapol.h | 110 unsigned char nonce[EAPOL_WPA_KEY_NONCE_LEN]; /* Nonce */
|
/hardware/interfaces/keymaster/4.0/support/ |
D | keymaster_utils.cpp | 41 return std::tie(a.seed, a.nonce) < std::tie(b.seed, b.nonce); in operator <()
|
/hardware/interfaces/keymaster/4.1/support/ |
D | Keymaster.cpp | 65 os << "(seed: " << params.seed << ", nonce: " << params.nonce << ')'; in operator <<()
|
/hardware/interfaces/identity/aidl/default/ |
D | EicOpsImpl.cc | 122 const uint8_t* nonce, // Must be 12 bytes in eicOpsEncryptAes128Gcm() argument 145 memcpy(cppNonce.data(), nonce, 12); in eicOpsEncryptAes128Gcm()
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 91 * bits or nonce lengths other than 96 bits. 231 * of the method on a given device, and the nonce must return the same value for every 278 * HmacSharingParameters is the concatenation of its two fields, i.e. seed || nonce. 310 * and a nonce. When T receives the same call, it returns an empty seed and a nonce. When 947 * o Tag::CALLER_NONCE allows the caller to specify a nonce or initialization vector (IV). If 1035 * vector or nonce is required. In most cases, callers shouldn't provide an IV or nonce and the 1036 * IKeymasterDevice implementation must generate a random IV or nonce and return it via 1038 * authorizations contain Tag::CALLER_NONCE, then the caller may provide an IV/nonce with 1039 * Tag::NONCE in inParams. If a nonce is provided when Tag::CALLER_NONCE is not authorized, 1040 * begin() must return ErrorCode::CALLER_NONCE_PROHIBITED. If a nonce is not provided when [all …]
|
D | types.hal | 153 * Tag::CALLER_NONCE specifies that the caller can provide a nonce for nonce-requiring 824 * Tag::NONCE is used to provide or return a nonce or Initialization Vector (IV) for AES-GCM, 827 * Tag::CALLER_NONCE. If not provided, an appropriate nonce or IV must be randomly generated by 1271 uint8_t[32] nonce;
|
/hardware/interfaces/identity/support/src/ |
D | IdentityCredentialSupport.cpp | 190 unsigned char* nonce = (unsigned char*)encryptedData.data(); in decryptAes128Gcm() local 191 unsigned char* cipherText = nonce + kAesGcmIvSize; in decryptAes128Gcm() 213 if (EVP_DecryptInit_ex(ctx.get(), NULL, NULL, (unsigned char*)key.data(), nonce) != 1) { in decryptAes128Gcm() 263 optional<vector<uint8_t>> encryptAes128Gcm(const vector<uint8_t>& key, const vector<uint8_t>& nonce, in encryptAes128Gcm() argument 270 if (nonce.size() != kAesGcmIvSize) { in encryptAes128Gcm() 282 memcpy(noncePtr, nonce.data(), kAesGcmIvSize); in encryptAes128Gcm() 301 (unsigned char*)nonce.data()) != 1) { in encryptAes128Gcm()
|
/hardware/interfaces/identity/support/include/android/hardware/identity/support/ |
D | IdentityCredentialSupport.h | 109 optional<vector<uint8_t>> encryptAes128Gcm(const vector<uint8_t>& key, const vector<uint8_t>& nonce,
|
/hardware/interfaces/keymaster/3.0/ |
D | IKeymasterDevice.hal | 263 * that require a nonce or IV, on keys that were generated with Tag::CALLER_NONCE, 269 * initialization, notably to return the IV or nonce from operations that generate 270 * an IV or nonce.
|
D | types.hal | 47 CALLER_NONCE = TagType:BOOL | 7, /** Allow caller to specify nonce or IV. */
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 779 void CheckAesCtrTestVector(const string& key, const string& nonce, const string& message, in CheckAesCtrTestVector() argument 791 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) in CheckAesCtrTestVector() 3158 const char* nonce; member 3202 const string nonce = hex2str(test.nonce); in TEST_P() local 3205 CheckAesCtrTestVector(key, nonce, plaintext, ciphertext); in TEST_P() 3494 string nonce = make_string(nonce_bytes); in TEST_P() local 3508 .Authorization(TAG_NONCE, nonce.data(), nonce.size()); in TEST_P()
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | KeyMintAidlTestBase.h | 172 void CheckAesCtrTestVector(const string& key, const string& nonce, const string& message,
|
D | KeyMintAidlTestBase.cpp | 633 void KeyMintAidlTestBase::CheckAesCtrTestVector(const string& key, const string& nonce, in CheckAesCtrTestVector() argument 646 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) in CheckAesCtrTestVector()
|
D | KeyMintTest.cpp | 4626 const char* nonce; member 4676 const string nonce = hex2str(test.nonce); in TEST_P() local 4679 CheckAesCtrTestVector(key, nonce, plaintext, ciphertext); in TEST_P() 5065 string nonce = make_string(nonce_bytes); in TEST_P() local 5080 .Authorization(TAG_NONCE, nonce.data(), nonce.size()); in TEST_P()
|