/hardware/interfaces/security/rkp/aidl/android/hardware/security/keymint/ |
D | MacedPublicKey.cddl | 2 protected: bstr .cbor { 1 : 5}, ; Algorithm : HMAC-256 5 tag : bstr ; HMAC-256(K_mac, MAC_structure)
|
D | generateCertificateRequest.cddl | 77 1 : 5, ; Algorithm : HMAC-256 87 protected : bstr .cbor { 1 : 5 }, ; Algorithm : HMAC-256
|
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/current/android/hardware/security/keymint/ |
D | Algorithm.aidl | 42 HMAC = 128, enumConstant
|
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/2/android/hardware/security/keymint/ |
D | Algorithm.aidl | 42 HMAC = 128, enumConstant
|
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/3/android/hardware/security/keymint/ |
D | Algorithm.aidl | 42 HMAC = 128, enumConstant
|
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/1/android/hardware/security/keymint/ |
D | Algorithm.aidl | 42 HMAC = 128, enumConstant
|
/hardware/interfaces/security/keymint/aidl/android/hardware/security/keymint/ |
D | Algorithm.aidl | 36 HMAC = 128, enumConstant
|
/hardware/interfaces/security/ |
D | README.md | 35 authentication result (a *hardware auth token*) is signed with a per-boot shared HMAC key known only 40 use a local, vendor-specific, method to communicate the shared HMAC key. 47 describes an N-party shared key agreement protocol for per-boot derivation of the shared HMAC key, 49 – whether KeyMint instance or authenticator – that needs access to the shared HMAC key. 95 validated using the shared HMAC key described above. 105 using the shared HMAC key described above. 108 Confirmation tokens produced by this HAL are consumed by KeyMint, validated using the shared HMAC
|
/hardware/interfaces/confirmationui/1.0/ |
D | types.hal | 81 * To that end, the caller passes an auth token that has an HMAC keyed with the test key 82 * (see TestKeyBits in types.hal). Implementations first check the HMAC against test key. 83 * If the test key produces a matching HMAC, the implementation evaluates the challenge field
|
D | IConfirmationResultCallback.hal | 52 * @param confirmationToken a 32-byte HMAC-SHA256 value, computed over 56 * formattedMessage argument. The HMAC is keyed with a 256-bit secret
|
/hardware/interfaces/keymaster/4.0/support/fuzzer/ |
D | keymaster4_common.h | 53 HMAC, enumerator 122 case HMAC: { in createAuthorizationSet()
|
/hardware/interfaces/security/keymint/support/fuzzer/ |
D | keymint_common.h | 73 HMAC, enumerator 202 case HMAC: { in createAuthorizationSet()
|
/hardware/interfaces/keymaster/3.0/ |
D | types.hal | 166 HMAC = 128, 259 SIGN = 2, /* Usable with RSA, EC and HMAC keys. */ 260 VERIFY = 3, /* Usable with RSA, EC and HMAC keys. */ 414 uint8_t[32] hmac; // HMAC is computed over 0 || challenge || user_id ||
|
/hardware/interfaces/keymaster/4.0/ |
D | types.hal | 112 * and verification operations. This tag is relevant to RSA, ECDSA and HMAC keys. Possible 167 * with this key for HMAC keys and AES keys that support GCM mode. 169 * This value is the minimum MAC length, in bits. It must be a multiple of 8 bits. For HMAC 626 * HMAC_SHA256 is the HMAC function, with SHA-2-256 as the hash. 628 * The output of the HMAC function must be truncated to 128 bits. 859 * confirmed a signing request. The content is a full-length HMAC-SHA256 value. See the 881 HMAC = 128, 988 SIGN = 2, /* Usable with RSA, EC and HMAC keys. */ 989 VERIFY = 3, /* Usable with RSA, EC and HMAC keys. */ 1253 * HmacSharingParameters holds the data used in the process of establishing a shared HMAC key [all …]
|
D | IKeymasterDevice.hal | 106 * o HMAC 215 * Start the creation of an HMAC key, shared with another IKeymasterDevice implementation. Any 217 * must be a TEE Keymaster as well. The HMAC key used to MAC and verify authentication tokens 218 * (HardwareAuthToken, VerificationToken and ConfirmationToken all use this HMAC key) must be 224 * @return error ErrorCode::OK on success, ErrorCode::UNIMPLEMENTED if HMAC agreement is not 225 * implemented (note that all 4.0::IKeymasterDevice HALS must implement HMAC agreement, 237 * Complete the creation of an HMAC key, shared with another IKeymasterDevice implementation. 239 * there must be a TEE IKeymasterDevice as well. The HMAC key used to MAC and verify 250 * This method computes the shared 32-byte HMAC ``H'' as follows (all IKeymasterDevice instances 322 * computed the same shared HMAC key. The sharingCheck value is computed as follows: [all …]
|
/hardware/interfaces/security/keymint/support/ |
D | authorization_set.cpp | 147 Authorization(TAG_ALGORITHM, Algorithm::HMAC); in HmacKey()
|
/hardware/interfaces/security/keymint/aidl/vts/performance/ |
D | KeyMintBenchmark.cpp | 115 return Algorithm::HMAC; in getAlgorithm() 245 if (algorithm == Algorithm::HMAC) { in GenerateKey() 576 case Algorithm::HMAC: in isValidSBKeySize()
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | authorization_set.h | 345 Authorization(TAG_ALGORITHM, Algorithm::HMAC); in HmacKey()
|
D | keymaster_tags.h | 364 case Algorithm::HMAC:
|
D | keymaster_hidl_hal_test.cpp | 1261 EXPECT_TRUE(teeEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P() 1266 EXPECT_TRUE(teeEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P() 1270 EXPECT_TRUE(teeEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC) || in TEST_P() 1271 softwareEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P() 1277 EXPECT_TRUE(softwareEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P() 2222 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P() 2230 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P() 2518 CheckKm1CryptoParam(TAG_ALGORITHM, Algorithm::HMAC); in TEST_P()
|
/hardware/interfaces/keymaster/4.0/support/ |
D | authorization_set.cpp | 486 Authorization(TAG_ALGORITHM, Algorithm::HMAC); in HmacKey()
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | KeyMintTest.cpp | 2657 EXPECT_TRUE(crypto_params.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P() 2694 EXPECT_TRUE(crypto_params.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P() 2725 EXPECT_TRUE(crypto_params.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P() 3863 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P() 3872 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P() 3908 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P() 3917 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P() 4696 CheckCryptoParam(TAG_ALGORITHM, Algorithm::HMAC); in TEST_P() 4718 vector<Algorithm> algorithms = {Algorithm::RSA, Algorithm::EC, Algorithm::HMAC, Algorithm::AES, in TEST_P() 4738 case Algorithm::HMAC: in TEST_P()
|
/hardware/interfaces/keymaster/4.0/vts/performance/ |
D | Benchmark.cpp | 362 return Algorithm::HMAC; in getAlgorithm()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 831 EXPECT_TRUE(hardwareEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P() 835 EXPECT_TRUE(softwareEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P() 1844 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P() 1852 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P() 2225 CheckCryptoParam(TAG_ALGORITHM, Algorithm::HMAC); in TEST_P()
|
/hardware/interfaces/security/rkp/ |
D | README.md | 109 * HMAC with a supported message digest for all MACing; and
|