/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeMacPrf.java | 105 public byte[] signBytes(byte[] keyBytes, byte[] dataToSign) { in signBytes() argument 109 return new AesXCbcImpl().mac(keyBytes, dataToSign, false /*needTruncation*/); in signBytes() 117 return super.signBytes(keyBytes, dataToSign); in signBytes() 194 ByteBuffer dataToSign = in generateRekeyedSKeySeed() local 196 dataToSign.put(sharedDhKey).put(nonceInit).put(nonceResp); in generateRekeyedSKeySeed() 198 return signBytes(skD, dataToSign.array()); in generateRekeyedSKeySeed() 215 public byte[] generateKeyMat(byte[] keyBytes, byte[] dataToSign, int keyMaterialLen) { in generateKeyMat() argument 216 return KeyGenerationUtils.prfPlus(this, keyBytes, dataToSign, keyMaterialLen); in generateKeyMat()
|
D | AesXCbcImpl.java | 57 public byte[] mac(byte[] keyBytes, byte[] dataToSign, boolean needTruncation) { in mac() argument 60 boolean isPaddingNeeded = dataToSign.length % blockSize != 0; in mac() 62 byte[] paddedData = dataToSign; in mac() 64 paddedData = padData(dataToSign, blockSize); in mac() 127 private static byte[] padData(byte[] dataToSign, int blockSize) { in padData() argument 128 int dataLen = dataToSign.length; in padData() 135 paddedData.put(dataToSign).put(padding); in padData()
|
D | IkeMacIntegrity.java | 133 public byte[] signBytes(byte[] keyBytes, byte[] dataToSign) { in signBytes() argument 136 return new AesXCbcImpl().mac(keyBytes, dataToSign, true /*needTruncation*/); in signBytes() 141 return super.signBytes(keyBytes, dataToSign); in signBytes()
|
D | IkeMac.java | 66 public byte[] signBytes(byte[] keyBytes, byte[] dataToSign) { in signBytes() argument 70 ByteBuffer inputBuffer = ByteBuffer.wrap(dataToSign); in signBytes()
|
/packages/modules/IPsec/src/java/com/android/internal/net/eap/statemachine/ |
D | EapAkaPrimeMethodStateMachine.java | 266 ByteBuffer dataToSign = ByteBuffer.allocate(dataToSignLen); in generateAndPersistEapAkaKeys() local 267 dataToSign.put(MK_DATA_PREFIX.getBytes(StandardCharsets.US_ASCII)); in generateAndPersistEapAkaKeys() 268 dataToSign.put(mIdentity); in generateAndPersistEapAkaKeys() 275 dataToSign.array(), in generateAndPersistEapAkaKeys() 320 ByteBuffer dataToSign = ByteBuffer.allocate(sLength); in deriveCkIkPrime() local 321 dataToSign.put((byte) FC); in deriveCkIkPrime() 322 dataToSign.put(atKdfInput.networkName); in deriveCkIkPrime() 323 dataToSign.putShort((short) atKdfInput.networkName.length); in deriveCkIkPrime() 324 dataToSign.put(sqnXorAk); in deriveCkIkPrime() 325 dataToSign.putShort((short) SQN_XOR_AK_LEN); in deriveCkIkPrime() [all …]
|
/packages/modules/IPsec/src/java/com/android/internal/net/crypto/ |
D | KeyGenerationUtils.java | 42 ByteSigner byteSigner, byte[] keyBytes, byte[] dataToSign, int keyMaterialLen) { in prfPlus() argument 51 ByteBuffer.allocate(previousMac.length + dataToSign.length + padLen); in prfPlus() 52 dataToSignBuffer.put(previousMac).put(dataToSign).put(padValue); in prfPlus() 79 byte[] signBytes(byte[] keyBytes, byte[] dataToSign); in signBytes() argument
|
/packages/modules/IPsec/src/java/com/android/internal/net/eap/crypto/ |
D | HmacSha256ByteSigner.java | 47 public byte[] signBytes(byte[] keyBytes, byte[] dataToSign) { in signBytes() argument 51 return mac.doFinal(dataToSign); in signBytes()
|
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/testmode/ |
D | DeterministicSecureRandom.java | 74 public byte[] signBytes(byte[] keyBytes, byte[] dataToSign) { in signBytes() argument 75 mByteSignerMac.update(dataToSign); in signBytes()
|
/packages/modules/Connectivity/nearby/tests/unit/src/com/android/server/nearby/presence/ |
D | ExtendedAdvertisementTest.java | 373 byte[] dataToSign = ArrayUtils.concatByteArrays( in getExtendedAdvertisementByteArray() 379 byte[] mic = cryptor.sign(dataToSign, AUTHENTICITY_KEY); in getExtendedAdvertisementByteArray()
|