Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 7 of 7) sorted by relevance

/hardware/interfaces/gatekeeper/1.0/software/
DSoftGateKeeper.h38 uint64_t salt; member
75 uint32_t password_length, salt_t salt) const { in ComputePasswordSignature() argument
77 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t*>(&salt), sizeof(salt), N, in ComputePasswordSignature()
126 fast_hash_t ComputeFastHash(const SizedBuffer& password, uint64_t salt) { in ComputeFastHash() argument
128 size_t digest_size = password.size() + sizeof(salt); in ComputeFastHash()
130 memcpy(digest.get(), &salt, sizeof(salt)); in ComputeFastHash()
131 memcpy(digest.get() + sizeof(salt), password.Data<uint8_t>(), password.size()); in ComputeFastHash()
135 fast_hash.salt = salt; in ComputeFastHash()
140 fast_hash_t computed = ComputeFastHash(password, fast_hash.salt); in VerifyFast()
151 uint64_t salt; in DoVerify() local
[all …]
/hardware/interfaces/identity/support/include/android/hardware/identity/support/
DIdentityCredentialSupport.h235 optional<vector<uint8_t>> hkdf(const vector<uint8_t>& sharedSecret, const vector<uint8_t>& salt,
/hardware/interfaces/identity/aidl/vts/
DVtsHalIdentityEndToEndTest.cpp461 vector<uint8_t> salt = {0x00}; in TEST_P() local
464 support::hkdf(sharedSecretWithSessionTranscriptBytes, salt, info, 32); in TEST_P()
/hardware/interfaces/identity/aidl/default/
DIdentityCredential.cpp813 vector<uint8_t> salt = {0x00}; in finishRetrieval() local
816 support::hkdf(sharedSecretWithSessionTranscriptBytes, salt, info, 32); in finishRetrieval()
/hardware/broadcom/wlan/bcmdhd/wifi_hal/
Dnan.cpp525 u8 salt[NAN_SECURITY_SALT_SIZE]; in passphrase_to_pmk() local
528 salt[0] = 0; /* salt_version */ in passphrase_to_pmk()
529 salt[1] = cipher_type; in passphrase_to_pmk()
531 memcpy(&salt[2], svc_hash, NAN_SVC_HASH_SIZE); in passphrase_to_pmk()
532 memcpy(&salt[2 + NAN_SVC_HASH_SIZE], peer_mac, in passphrase_to_pmk()
534 prhex("Salt", salt, NAN_SECURITY_SALT_SIZE); in passphrase_to_pmk()
548 key_info->body.passphrase_info.passphrase_len, salt, sizeof(salt), in passphrase_to_pmk()
/hardware/interfaces/identity/support/src/
DIdentityCredentialSupport.cpp1493 optional<vector<uint8_t>> hkdf(const vector<uint8_t>& sharedSecret, const vector<uint8_t>& salt, in hkdf() argument
1498 sharedSecret.size(), salt.data(), salt.size(), info.data(), info.size()) != 1) { in hkdf()
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal999 * return ErrorCode::INCOMPATIBLE_DIGEST. The salt size must be D.
1254 * o PaddingMode::RSA_PSS. For PSS-padded signature operations, the PSS salt length must match