/hardware/interfaces/gatekeeper/1.0/software/ |
D | SoftGateKeeper.h | 38 uint64_t salt; member 75 uint32_t password_length, salt_t salt) const { in ComputePasswordSignature() argument 77 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t*>(&salt), sizeof(salt), N, in ComputePasswordSignature() 126 fast_hash_t ComputeFastHash(const SizedBuffer& password, uint64_t salt) { in ComputeFastHash() argument 128 size_t digest_size = password.size() + sizeof(salt); in ComputeFastHash() 130 memcpy(digest.get(), &salt, sizeof(salt)); in ComputeFastHash() 131 memcpy(digest.get() + sizeof(salt), password.Data<uint8_t>(), password.size()); in ComputeFastHash() 135 fast_hash.salt = salt; in ComputeFastHash() 140 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt); in VerifyFast() 151 uint64_t salt; in DoVerify() local [all …]
|
/hardware/interfaces/identity/aidl/default/libeic/ |
D | EicPresentation.c | 508 uint8_t salt[EIC_SHA256_DIGEST_SIZE]; in eicPresentationCalcMacKey() local 509 eicCborFinal(&cbor, salt); in eicPresentationCalcMacKey() 513 if (!eicOpsHkdf(sharedSecret, EIC_P256_COORDINATE_SIZE, salt, sizeof(salt), info, sizeof(info), in eicPresentationCalcMacKey()
|
D | EicOps.h | 237 bool eicOpsHkdf(const uint8_t* sharedSecret, size_t sharedSecretSize, const uint8_t* salt,
|
/hardware/interfaces/identity/aidl/default/ |
D | EicOpsImpl.cc | 467 bool eicOpsHkdf(const uint8_t* sharedSecret, size_t sharedSecretSize, const uint8_t* salt, in eicOpsHkdf() argument 473 memcpy(saltVec.data(), salt, saltSize); in eicOpsHkdf()
|
/hardware/interfaces/identity/support/include/android/hardware/identity/support/ |
D | IdentityCredentialSupport.h | 255 optional<vector<uint8_t>> hkdf(const vector<uint8_t>& sharedSecret, const vector<uint8_t>& salt,
|
/hardware/interfaces/identity/support/src/ |
D | IdentityCredentialSupport.cpp | 1318 optional<vector<uint8_t>> hkdf(const vector<uint8_t>& sharedSecret, const vector<uint8_t>& salt, in hkdf() argument 1323 sharedSecret.size(), salt.data(), salt.size(), info.data(), info.size()) != 1) { in hkdf() 2118 vector<uint8_t> salt = support::sha256(sessionTranscriptBytes); in calcEMacKey() local 2120 optional<vector<uint8_t>> derivedKey = support::hkdf(sharedSecret.value(), salt, info, 32); in calcEMacKey()
|
/hardware/broadcom/wlan/bcmdhd/wifi_hal/ |
D | nan.cpp | 493 u8 salt[NAN_SECURITY_SALT_SIZE]; in passphrase_to_pmk() local 496 salt[0] = 0; /* salt_version */ in passphrase_to_pmk() 497 salt[1] = cipher_type; in passphrase_to_pmk() 499 memcpy(&salt[2], svc_hash, NAN_SVC_HASH_SIZE); in passphrase_to_pmk() 500 memcpy(&salt[2 + NAN_SVC_HASH_SIZE], peer_mac, in passphrase_to_pmk() 502 prhex("Salt", salt, NAN_SECURITY_SALT_SIZE); in passphrase_to_pmk() 516 key_info->body.passphrase_info.passphrase_len, salt, sizeof(salt), in passphrase_to_pmk()
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 999 * return ErrorCode::INCOMPATIBLE_DIGEST. The salt size must be D. 1254 * o PaddingMode::RSA_PSS. For PSS-padded signature operations, the PSS salt length must match
|