Home
last modified time | relevance | path

Searched refs:nonce (Results 1 – 7 of 7) sorted by relevance

/device/google/cuttlefish/host/commands/secure_env/
Dtpm_keymaster_enforcement.cpp54 return a.seed == b.seed && !memcmp(a.nonce, b.nonce, sizeof(a.nonce)); in operator ==()
68 static_assert(sizeof(a.nonce) == sizeof(b.nonce)); in operator ()()
69 return memcmp(a.nonce, b.nonce, sizeof(a.nonce)) < 0; in operator ()()
180 auto rc = random_source.GenerateRandom(saved_params_.nonce, in GetHmacSharingParameters()
181 sizeof(saved_params_.nonce)); in GetHmacSharingParameters()
189 memcpy(params->nonce, saved_params_.nonce, sizeof(params->nonce)); in GetHmacSharingParameters()
201 memcpy(sharing_params.nonce, hmac_array.params_array[i].nonce, in ComputeSharedHmac()
202 sizeof(sharing_params.nonce)); in ComputeSharedHmac()
220 for (auto nonce_byte : hmac_sharing.nonce) { in ComputeSharedHmac()
/device/google/cuttlefish/guest/hals/keymint/remote/
Dremote_shared_secret.cpp40 params->nonce = {std::begin(response.params.nonce), in getSharedSecretParameters()
41 std::end(response.params.nonce)}; in getSharedSecretParameters()
55 if (sizeof(request.params_array.params_array[i].nonce) != in computeSharedSecret()
56 params[i].nonce.size()) { in computeSharedSecret()
59 memcpy(request.params_array.params_array[i].nonce, params[i].nonce.data(), in computeSharedSecret()
60 params[i].nonce.size()); in computeSharedSecret()
/device/google/cuttlefish/guest/hals/identity/libeic/
DEicProvisioning.c213 uint8_t nonce[12]; in eicProvisioningAddAccessControlProfile() local
214 if (!eicOpsRandom(nonce, 12)) { in eicProvisioningAddAccessControlProfile()
217 if (!eicOpsEncryptAes128Gcm(ctx->storageKey, nonce, NULL, 0, in eicProvisioningAddAccessControlProfile()
316 uint8_t nonce[12]; in eicProvisioningAddEntryValue() local
317 if (!eicOpsRandom(nonce, 12)) { in eicProvisioningAddEntryValue()
320 if (!eicOpsEncryptAes128Gcm(ctx->storageKey, nonce, content, contentSize, in eicProvisioningAddEntryValue()
387 uint8_t nonce[12]; in eicProvisioningFinishGetCredentialData() local
388 if (!eicOpsRandom(nonce, 12)) { in eicProvisioningFinishGetCredentialData()
393 nonce, cborBuf, cbor.size, in eicProvisioningFinishGetCredentialData()
DEicPresentation.c159 uint8_t nonce[12]; in eicPresentationGenerateSigningKeyPair() local
160 if (!eicOpsRandom(nonce, 12)) { in eicPresentationGenerateSigningKeyPair()
165 ctx->storageKey, nonce, signingKeyPriv, sizeof(signingKeyPriv), in eicPresentationGenerateSigningKeyPair()
DEicOpsImpl.cc124 const uint8_t* nonce, // Must be 12 bytes in eicOpsEncryptAes128Gcm() argument
148 memcpy(cppNonce.data(), nonce, 12); in eicOpsEncryptAes128Gcm()
DEicOps.h163 const uint8_t* nonce, // Must be 12 bytes
/device/google/cuttlefish/guest/hals/confirmationui/
DREADME20 uses a constant nonce.