Home
last modified time | relevance | path

Searched refs:nonce (Results 1 – 25 of 25) sorted by relevance

/hardware/interfaces/identity/aidl/default/libeic/
DEicProvisioning.c201 uint8_t nonce[12]; in eicProvisioningAddAccessControlProfile() local
202 if (!eicOpsRandom(nonce, 12)) { in eicProvisioningAddAccessControlProfile()
205 if (!eicOpsEncryptAes128Gcm(ctx->storageKey, nonce, NULL, 0, cborBuilder.buffer, in eicProvisioningAddAccessControlProfile()
296 uint8_t nonce[12]; in eicProvisioningAddEntryValue() local
297 if (!eicOpsRandom(nonce, 12)) { in eicProvisioningAddEntryValue()
300 if (!eicOpsEncryptAes128Gcm(ctx->storageKey, nonce, content, contentSize, additionalDataCbor, in eicProvisioningAddEntryValue()
362 uint8_t nonce[12]; in eicProvisioningFinishGetCredentialData() local
363 if (!eicOpsRandom(nonce, 12)) { in eicProvisioningFinishGetCredentialData()
368 eicOpsGetHardwareBoundKey(ctx->testCredential), nonce, cborBuf, cbor.size, in eicProvisioningFinishGetCredentialData()
DEicPresentation.c143 uint8_t nonce[12]; in eicPresentationGenerateSigningKeyPair() local
144 if (!eicOpsRandom(nonce, 12)) { in eicPresentationGenerateSigningKeyPair()
148 if (!eicOpsEncryptAes128Gcm(ctx->storageKey, nonce, signingKeyPriv, sizeof(signingKeyPriv), in eicPresentationGenerateSigningKeyPair()
DEicOps.h165 const uint8_t* nonce, // Must be 12 bytes
/hardware/interfaces/keymaster/4.0/vts/functional/
DHmacKeySharingTest.cpp101 nonces.emplace_back(param.nonce.data(), param.nonce.size()); in copyNonces()
128 ASSERT_EQ(result1.params.nonce, result2.params.nonce) in TEST_P()
196 uint8_t byte_to_tweak = rand() % sizeof(params[param_to_tweak].nonce); in TEST_P()
198 params[param_to_tweak].nonce[byte_to_tweak] ^= (1 << bit_to_tweak); in TEST_P()
DKeymasterHidlTest.cpp463 void KeymasterHidlTest::CheckAesCtrTestVector(const string& key, const string& nonce, in CheckAesCtrTestVector() argument
476 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) in CheckAesCtrTestVector()
DKeymasterHidlTest.h172 void CheckAesCtrTestVector(const string& key, const string& nonce, const string& message,
Dkeymaster_hidl_hal_test.cpp3020 const char* nonce; member
3068 const string nonce = hex2str(test.nonce); in TEST_P() local
3071 CheckAesCtrTestVector(key, nonce, plaintext, ciphertext); in TEST_P()
3448 string nonce = make_string(nonce_bytes); in TEST_P() local
3462 .Authorization(TAG_NONCE, nonce.data(), nonce.size()); in TEST_P()
/hardware/interfaces/security/sharedsecret/aidl/vts/functional/
DSharedSecretAidlTest.cpp52 EXPECT_TRUE(params.nonce.size() == 32); in getSharedSecretParameters()
89 nonces.push_back(param.nonce); in copyNonces()
150 ASSERT_EQ(result1.params.nonce, result2.params.nonce) in TEST_F()
221 uint8_t byte_to_tweak = rand() % sizeof(params[param_to_tweak].nonce); in TEST_F()
223 params[param_to_tweak].nonce[byte_to_tweak] ^= (1 << bit_to_tweak); in TEST_F()
260 auto& to_tweak = params[param_to_tweak].nonce; in TEST_F()
/hardware/interfaces/security/sharedsecret/aidl/aidl_api/android.hardware.security.sharedsecret/1/android/hardware/security/sharedsecret/
DSharedSecretParameters.aidl39 byte[] nonce;
/hardware/interfaces/security/sharedsecret/aidl/aidl_api/android.hardware.security.sharedsecret/current/android/hardware/security/sharedsecret/
DSharedSecretParameters.aidl39 byte[] nonce;
/hardware/interfaces/security/sharedsecret/aidl/android/hardware/security/sharedsecret/
DSharedSecretParameters.aidl40 byte[] nonce;
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
Deapol.h110 unsigned char nonce[EAPOL_WPA_KEY_NONCE_LEN]; /* Nonce */
/hardware/interfaces/keymaster/4.0/support/
Dkeymaster_utils.cpp41 return std::tie(a.seed, a.nonce) < std::tie(b.seed, b.nonce); in operator <()
/hardware/interfaces/keymaster/4.1/support/
DKeymaster.cpp65 os << "(seed: " << params.seed << ", nonce: " << params.nonce << ')'; in operator <<()
/hardware/interfaces/identity/aidl/default/
DEicOpsImpl.cc122 const uint8_t* nonce, // Must be 12 bytes in eicOpsEncryptAes128Gcm() argument
145 memcpy(cppNonce.data(), nonce, 12); in eicOpsEncryptAes128Gcm()
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal91 * bits or nonce lengths other than 96 bits.
231 * of the method on a given device, and the nonce must return the same value for every
278 * HmacSharingParameters is the concatenation of its two fields, i.e. seed || nonce.
310 * and a nonce. When T receives the same call, it returns an empty seed and a nonce. When
947 * o Tag::CALLER_NONCE allows the caller to specify a nonce or initialization vector (IV). If
1035 * vector or nonce is required. In most cases, callers shouldn't provide an IV or nonce and the
1036 * IKeymasterDevice implementation must generate a random IV or nonce and return it via
1038 * authorizations contain Tag::CALLER_NONCE, then the caller may provide an IV/nonce with
1039 * Tag::NONCE in inParams. If a nonce is provided when Tag::CALLER_NONCE is not authorized,
1040 * begin() must return ErrorCode::CALLER_NONCE_PROHIBITED. If a nonce is not provided when
[all …]
Dtypes.hal153 * Tag::CALLER_NONCE specifies that the caller can provide a nonce for nonce-requiring
824 * Tag::NONCE is used to provide or return a nonce or Initialization Vector (IV) for AES-GCM,
827 * Tag::CALLER_NONCE. If not provided, an appropriate nonce or IV must be randomly generated by
1271 uint8_t[32] nonce;
/hardware/interfaces/identity/support/src/
DIdentityCredentialSupport.cpp190 unsigned char* nonce = (unsigned char*)encryptedData.data(); in decryptAes128Gcm() local
191 unsigned char* cipherText = nonce + kAesGcmIvSize; in decryptAes128Gcm()
213 if (EVP_DecryptInit_ex(ctx.get(), NULL, NULL, (unsigned char*)key.data(), nonce) != 1) { in decryptAes128Gcm()
263 optional<vector<uint8_t>> encryptAes128Gcm(const vector<uint8_t>& key, const vector<uint8_t>& nonce, in encryptAes128Gcm() argument
270 if (nonce.size() != kAesGcmIvSize) { in encryptAes128Gcm()
282 memcpy(noncePtr, nonce.data(), kAesGcmIvSize); in encryptAes128Gcm()
301 (unsigned char*)nonce.data()) != 1) { in encryptAes128Gcm()
/hardware/interfaces/identity/support/include/android/hardware/identity/support/
DIdentityCredentialSupport.h109 optional<vector<uint8_t>> encryptAes128Gcm(const vector<uint8_t>& key, const vector<uint8_t>& nonce,
/hardware/interfaces/keymaster/3.0/
DIKeymasterDevice.hal263 * that require a nonce or IV, on keys that were generated with Tag::CALLER_NONCE,
269 * initialization, notably to return the IV or nonce from operations that generate
270 * an IV or nonce.
Dtypes.hal47 CALLER_NONCE = TagType:BOOL | 7, /** Allow caller to specify nonce or IV. */
/hardware/interfaces/keymaster/3.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp779 void CheckAesCtrTestVector(const string& key, const string& nonce, const string& message, in CheckAesCtrTestVector() argument
791 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) in CheckAesCtrTestVector()
3158 const char* nonce; member
3202 const string nonce = hex2str(test.nonce); in TEST_P() local
3205 CheckAesCtrTestVector(key, nonce, plaintext, ciphertext); in TEST_P()
3494 string nonce = make_string(nonce_bytes); in TEST_P() local
3508 .Authorization(TAG_NONCE, nonce.data(), nonce.size()); in TEST_P()
/hardware/interfaces/security/keymint/aidl/vts/functional/
DKeyMintAidlTestBase.h172 void CheckAesCtrTestVector(const string& key, const string& nonce, const string& message,
DKeyMintAidlTestBase.cpp633 void KeyMintAidlTestBase::CheckAesCtrTestVector(const string& key, const string& nonce, in CheckAesCtrTestVector() argument
646 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) in CheckAesCtrTestVector()
DKeyMintTest.cpp4626 const char* nonce; member
4676 const string nonce = hex2str(test.nonce); in TEST_P() local
4679 CheckAesCtrTestVector(key, nonce, plaintext, ciphertext); in TEST_P()
5065 string nonce = make_string(nonce_bytes); in TEST_P() local
5080 .Authorization(TAG_NONCE, nonce.data(), nonce.size()); in TEST_P()