Home
last modified time | relevance | path

Searched refs:HMAC (Results 1 – 25 of 28) sorted by relevance

12

/hardware/interfaces/security/rkp/aidl/android/hardware/security/keymint/
DMacedPublicKey.cddl2 protected: bstr .cbor { 1 : 5}, ; Algorithm : HMAC-256
5 tag : bstr ; HMAC-256(K_mac, MAC_structure)
DgenerateCertificateRequest.cddl77 1 : 5, ; Algorithm : HMAC-256
87 protected : bstr .cbor { 1 : 5 }, ; Algorithm : HMAC-256
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/current/android/hardware/security/keymint/
DAlgorithm.aidl42 HMAC = 128, enumConstant
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/2/android/hardware/security/keymint/
DAlgorithm.aidl42 HMAC = 128, enumConstant
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/3/android/hardware/security/keymint/
DAlgorithm.aidl42 HMAC = 128, enumConstant
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/1/android/hardware/security/keymint/
DAlgorithm.aidl42 HMAC = 128, enumConstant
/hardware/interfaces/security/keymint/aidl/android/hardware/security/keymint/
DAlgorithm.aidl36 HMAC = 128, enumConstant
/hardware/interfaces/security/
DREADME.md35 authentication result (a *hardware auth token*) is signed with a per-boot shared HMAC key known only
40 use a local, vendor-specific, method to communicate the shared HMAC key.
47 describes an N-party shared key agreement protocol for per-boot derivation of the shared HMAC key,
49 – whether KeyMint instance or authenticator – that needs access to the shared HMAC key.
95 validated using the shared HMAC key described above.
105 using the shared HMAC key described above.
108 Confirmation tokens produced by this HAL are consumed by KeyMint, validated using the shared HMAC
/hardware/interfaces/confirmationui/1.0/
Dtypes.hal81 * To that end, the caller passes an auth token that has an HMAC keyed with the test key
82 * (see TestKeyBits in types.hal). Implementations first check the HMAC against test key.
83 * If the test key produces a matching HMAC, the implementation evaluates the challenge field
DIConfirmationResultCallback.hal52 * @param confirmationToken a 32-byte HMAC-SHA256 value, computed over
56 * formattedMessage argument. The HMAC is keyed with a 256-bit secret
/hardware/interfaces/keymaster/4.0/support/fuzzer/
Dkeymaster4_common.h53 HMAC, enumerator
122 case HMAC: { in createAuthorizationSet()
/hardware/interfaces/security/keymint/support/fuzzer/
Dkeymint_common.h73 HMAC, enumerator
202 case HMAC: { in createAuthorizationSet()
/hardware/interfaces/keymaster/3.0/
Dtypes.hal166 HMAC = 128,
259 SIGN = 2, /* Usable with RSA, EC and HMAC keys. */
260 VERIFY = 3, /* Usable with RSA, EC and HMAC keys. */
414 uint8_t[32] hmac; // HMAC is computed over 0 || challenge || user_id ||
/hardware/interfaces/keymaster/4.0/
Dtypes.hal112 * and verification operations. This tag is relevant to RSA, ECDSA and HMAC keys. Possible
167 * with this key for HMAC keys and AES keys that support GCM mode.
169 * This value is the minimum MAC length, in bits. It must be a multiple of 8 bits. For HMAC
626 * HMAC_SHA256 is the HMAC function, with SHA-2-256 as the hash.
628 * The output of the HMAC function must be truncated to 128 bits.
859 * confirmed a signing request. The content is a full-length HMAC-SHA256 value. See the
881 HMAC = 128,
988 SIGN = 2, /* Usable with RSA, EC and HMAC keys. */
989 VERIFY = 3, /* Usable with RSA, EC and HMAC keys. */
1253 * HmacSharingParameters holds the data used in the process of establishing a shared HMAC key
[all …]
DIKeymasterDevice.hal106 * o HMAC
215 * Start the creation of an HMAC key, shared with another IKeymasterDevice implementation. Any
217 * must be a TEE Keymaster as well. The HMAC key used to MAC and verify authentication tokens
218 * (HardwareAuthToken, VerificationToken and ConfirmationToken all use this HMAC key) must be
224 * @return error ErrorCode::OK on success, ErrorCode::UNIMPLEMENTED if HMAC agreement is not
225 * implemented (note that all 4.0::IKeymasterDevice HALS must implement HMAC agreement,
237 * Complete the creation of an HMAC key, shared with another IKeymasterDevice implementation.
239 * there must be a TEE IKeymasterDevice as well. The HMAC key used to MAC and verify
250 * This method computes the shared 32-byte HMAC ``H'' as follows (all IKeymasterDevice instances
322 * computed the same shared HMAC key. The sharingCheck value is computed as follows:
[all …]
/hardware/interfaces/security/keymint/support/
Dauthorization_set.cpp147 Authorization(TAG_ALGORITHM, Algorithm::HMAC); in HmacKey()
/hardware/interfaces/security/keymint/aidl/vts/performance/
DKeyMintBenchmark.cpp115 return Algorithm::HMAC; in getAlgorithm()
245 if (algorithm == Algorithm::HMAC) { in GenerateKey()
576 case Algorithm::HMAC: in isValidSBKeySize()
/hardware/interfaces/keymaster/3.0/vts/functional/
Dauthorization_set.h345 Authorization(TAG_ALGORITHM, Algorithm::HMAC); in HmacKey()
Dkeymaster_tags.h364 case Algorithm::HMAC:
Dkeymaster_hidl_hal_test.cpp1261 EXPECT_TRUE(teeEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P()
1266 EXPECT_TRUE(teeEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P()
1270 EXPECT_TRUE(teeEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC) || in TEST_P()
1271 softwareEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P()
1277 EXPECT_TRUE(softwareEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P()
2222 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P()
2230 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P()
2518 CheckKm1CryptoParam(TAG_ALGORITHM, Algorithm::HMAC); in TEST_P()
/hardware/interfaces/keymaster/4.0/support/
Dauthorization_set.cpp486 Authorization(TAG_ALGORITHM, Algorithm::HMAC); in HmacKey()
/hardware/interfaces/security/keymint/aidl/vts/functional/
DKeyMintTest.cpp2657 EXPECT_TRUE(crypto_params.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P()
2694 EXPECT_TRUE(crypto_params.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P()
2725 EXPECT_TRUE(crypto_params.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P()
3863 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P()
3872 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P()
3908 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P()
3917 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P()
4696 CheckCryptoParam(TAG_ALGORITHM, Algorithm::HMAC); in TEST_P()
4718 vector<Algorithm> algorithms = {Algorithm::RSA, Algorithm::EC, Algorithm::HMAC, Algorithm::AES, in TEST_P()
4738 case Algorithm::HMAC: in TEST_P()
/hardware/interfaces/keymaster/4.0/vts/performance/
DBenchmark.cpp362 return Algorithm::HMAC; in getAlgorithm()
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp831 EXPECT_TRUE(hardwareEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P()
835 EXPECT_TRUE(softwareEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P()
1844 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P()
1852 .Authorization(TAG_ALGORITHM, Algorithm::HMAC) in TEST_P()
2225 CheckCryptoParam(TAG_ALGORITHM, Algorithm::HMAC); in TEST_P()
/hardware/interfaces/security/rkp/
DREADME.md109 * HMAC with a supported message digest for all MACing; and

12