/device/google/cuttlefish/host/commands/secure_env/ |
D | tpm_keymaster_enforcement.cpp | 143 memset(comparison_token.hmac, 0, sizeof(comparison_token.hmac)); in ValidateTokenSignature() 162 static_assert(offsetof(hw_auth_token_t, hmac) == hashable_length, in ValidateTokenSignature() 166 comparison_token.hmac, sizeof(comparison_token.hmac), auth_token_key, in ValidateTokenSignature() 170 static_assert(sizeof(token.hmac) == sizeof(comparison_token.hmac)); in ValidateTokenSignature() 172 return memcmp(token.hmac, comparison_token.hmac, sizeof(token.hmac)) == 0; in ValidateTokenSignature() 227 auto hmac = TpmHmacWithContext(resource_manager_, in ComputeSharedHmac() local 230 if (!hmac) { in ComputeSharedHmac() 234 *sharingCheck = KeymasterBlob(hmac->buffer, hmac->size); in ComputeSharedHmac() 258 auto hmac = TpmHmacWithContext(resource_manager_, "verify_authorization", in VerifyAuthorization() local 261 if (!hmac) { in VerifyAuthorization() [all …]
|
D | confui_sign_server.cpp | 71 auto hmac = TpmHmacWithContext(tpm_resource_manager_, "confirmation_token", in MainLoop() local 73 if (!hmac) { in MainLoop() 78 CHECK(hmac->size == keymaster::kConfirmationTokenSize) in MainLoop() 83 std::vector<std::uint8_t> hmac_buffer(hmac->buffer, in MainLoop() 84 hmac->buffer + hmac->size); in MainLoop()
|
D | tpm_ffi.cpp | 35 auto hmac = in tpm_hmac() local 37 if (!hmac) { in tpm_hmac() 40 } else if (hmac->size != tag_len) { in tpm_hmac() 41 LOG(ERROR) << "HMAC size of " << hmac->size in tpm_hmac() 45 memcpy(tag, hmac->buffer, tag_len); in tpm_hmac()
|
D | tpm_remote_provisioning_context.cpp | 212 cppcose::HmacSha256 hmac; in GenerateHmacSha256() local 213 if (tpm_digest->size != hmac.size()) { in GenerateHmacSha256() 215 << tpm_digest->size << " expected " << hmac.size() << " bytes"; in GenerateHmacSha256() 220 hmac.begin()); in GenerateHmacSha256() 221 return hmac; in GenerateHmacSha256()
|
D | tpm_keymaster_context.cpp | 579 auto hmac = TpmHmacWithContext(resource_manager_, "confirmation_token", in CheckConfirmationToken() local 581 if (!hmac) { in CheckConfirmationToken() 586 CHECK(hmac->size == keymaster::kConfirmationTokenSize) in CheckConfirmationToken() 590 std::vector<std::uint8_t> hmac_buffer(hmac->buffer, in CheckConfirmationToken() 591 hmac->buffer + hmac->size); in CheckConfirmationToken()
|
D | primary_key_builder.cpp | 35 .details.hmac.hashAlg = TPM2_ALG_SHA256, in SigningKey()
|
/device/google/cuttlefish/host/commands/secure_env/rust/ |
D | tpm.rs | 85 fn hmac(&self, _imp: &dyn crypto::Hmac, data: &[u8]) -> Result<Vec<u8>, Error> { in hmac() method 108 fn root_kek(&self, _context: &[u8]) -> Result<crypto::OpaqueOr<crypto::hmac::Key>, Error> { in root_kek() 120 fn hmac_key_agreed(&self, _key: &crypto::hmac::Key) -> Option<Box<dyn DeviceHmac>> { in hmac_key_agreed() 130 fn unique_id_hbk(&self, _ckdf: &dyn crypto::Ckdf) -> Result<crypto::hmac::Key, Error> { in unique_id_hbk() 134 Ok(crypto::hmac::Key(k)) in unique_id_hbk() 166 ) -> Result<crypto::OpaqueOr<crypto::hmac::Key>, Error> { in extract() 173 prk: &crypto::OpaqueOr<crypto::hmac::Key>, in expand()
|
D | tests.rs | 12 let hmac = kmr_crypto_boring::hmac::BoringHmac; in test_rkp_soft_trait() localVariable 17 kmr_tests::test_retrieve_rpc_artifacts(soft_rpc, &hmac, &hmac); in test_rkp_soft_trait()
|
D | lib.rs | 23 hmac::BoringHmac, rng::BoringRng, rsa::BoringRsa, sha256::BoringSha256, 112 hmac: Box::new(BoringHmac), in ta_main()
|
/device/google/cuttlefish/guest/hals/gatekeeper/remote/ |
D | remote_gatekeeper.cpp | 64 aidlToken->mac.insert(aidlToken->mac.begin(), std::begin(authToken->hmac), in sizedBuffer2AidlHWToken() 65 std::end(authToken->hmac)); in sizedBuffer2AidlHWToken()
|
/device/linaro/dragonboard-kernel/android-5.4/ |
D | modules.builtin | 96 crypto/hmac.ko
|
/device/linaro/hikey-kernel/hikey960/5.10/ |
D | modules.builtin | 103 kernel/crypto/hmac.ko
|
/device/linaro/dragonboard-kernel/android-5.10/ |
D | modules.builtin | 103 kernel/crypto/hmac.ko
|
/device/google/cuttlefish_prebuilts/kernel/mainline-arm/ |
D | System.map | 28940 c091858c t hmac
|
/device/google/comet-kernels/6.1/24Q3-12157876/ |
D | System.map | 34666 ffffffc008957430 t hmac
|
/device/google/caimito-kernels/6.1/24Q3-12157876/ |
D | System.map | 34666 ffffffc008957430 t hmac
|
/device/google/caimito-kernels/6.1/24Q3-12157876/debug_kmemleak/ |
D | System.map | 34719 ffffffc008959fb0 t hmac
|
/device/google/comet-kernels/6.1/24Q3-12157876/debug_kmemleak/ |
D | System.map | 34719 ffffffc008959fb0 t hmac
|
/device/google/cuttlefish_prebuilts/kernel/6.1-i686/ |
D | System.map | 34554 c1874e80 t hmac
|
/device/google/caimito-kernels/6.1/24Q3-12157876/debug_memory/ |
D | System.map | 35660 ffffffc0089ace44 t hmac
|
/device/google/comet-kernels/6.1/24Q3-12157876/debug_memory/ |
D | System.map | 35660 ffffffc0089ace44 t hmac
|
/device/google/comet-kernels/6.1/24Q3-12157876/kasan/ |
D | System.map | 34971 ffffffc008f6296c t hmac
|
/device/google/cuttlefish_prebuilts/kernel/6.1-arm64-rockpi/ |
D | System.map | 34909 ffffffc0089653ec t hmac
|
/device/google/comet-kernels/6.1/24Q3-12157876/debug_memory_accounting/ |
D | System.map | 34696 ffffffc008957430 t hmac
|
/device/google/comet-kernels/6.1/24Q3-12157876/debug_api/ |
D | System.map | 34762 ffffffc00896968c t hmac
|