Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 8 of 8) sorted by relevance

/hardware/interfaces/gatekeeper/1.0/software/
DSoftGateKeeper.h38 uint64_t salt; member
75 uint32_t password_length, salt_t salt) const { in ComputePasswordSignature() argument
77 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t*>(&salt), sizeof(salt), N, in ComputePasswordSignature()
126 fast_hash_t ComputeFastHash(const SizedBuffer& password, uint64_t salt) { in ComputeFastHash() argument
128 size_t digest_size = password.size() + sizeof(salt); in ComputeFastHash()
130 memcpy(digest.get(), &salt, sizeof(salt)); in ComputeFastHash()
131 memcpy(digest.get() + sizeof(salt), password.Data<uint8_t>(), password.size()); in ComputeFastHash()
135 fast_hash.salt = salt; in ComputeFastHash()
140 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt); in VerifyFast()
151 uint64_t salt; in DoVerify() local
[all …]
/hardware/interfaces/identity/aidl/default/libeic/
DEicPresentation.c508 uint8_t salt[EIC_SHA256_DIGEST_SIZE]; in eicPresentationCalcMacKey() local
509 eicCborFinal(&cbor, salt); in eicPresentationCalcMacKey()
513 if (!eicOpsHkdf(sharedSecret, EIC_P256_COORDINATE_SIZE, salt, sizeof(salt), info, sizeof(info), in eicPresentationCalcMacKey()
DEicOps.h237 bool eicOpsHkdf(const uint8_t* sharedSecret, size_t sharedSecretSize, const uint8_t* salt,
/hardware/interfaces/identity/aidl/default/
DEicOpsImpl.cc467 bool eicOpsHkdf(const uint8_t* sharedSecret, size_t sharedSecretSize, const uint8_t* salt, in eicOpsHkdf() argument
473 memcpy(saltVec.data(), salt, saltSize); in eicOpsHkdf()
/hardware/interfaces/identity/support/include/android/hardware/identity/support/
DIdentityCredentialSupport.h255 optional<vector<uint8_t>> hkdf(const vector<uint8_t>& sharedSecret, const vector<uint8_t>& salt,
/hardware/interfaces/identity/support/src/
DIdentityCredentialSupport.cpp1318 optional<vector<uint8_t>> hkdf(const vector<uint8_t>& sharedSecret, const vector<uint8_t>& salt, in hkdf() argument
1323 sharedSecret.size(), salt.data(), salt.size(), info.data(), info.size()) != 1) { in hkdf()
2118 vector<uint8_t> salt = support::sha256(sessionTranscriptBytes); in calcEMacKey() local
2120 optional<vector<uint8_t>> derivedKey = support::hkdf(sharedSecret.value(), salt, info, 32); in calcEMacKey()
/hardware/broadcom/wlan/bcmdhd/wifi_hal/
Dnan.cpp493 u8 salt[NAN_SECURITY_SALT_SIZE]; in passphrase_to_pmk() local
496 salt[0] = 0; /* salt_version */ in passphrase_to_pmk()
497 salt[1] = cipher_type; in passphrase_to_pmk()
499 memcpy(&salt[2], svc_hash, NAN_SVC_HASH_SIZE); in passphrase_to_pmk()
500 memcpy(&salt[2 + NAN_SVC_HASH_SIZE], peer_mac, in passphrase_to_pmk()
502 prhex("Salt", salt, NAN_SECURITY_SALT_SIZE); in passphrase_to_pmk()
516 key_info->body.passphrase_info.passphrase_len, salt, sizeof(salt), in passphrase_to_pmk()
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal999 * return ErrorCode::INCOMPATIBLE_DIGEST. The salt size must be D.
1254 * o PaddingMode::RSA_PSS. For PSS-padded signature operations, the PSS salt length must match