Searched refs:derivedKey (Results 1 – 4 of 4) sorted by relevance
/aosp12/frameworks/base/packages/BackupEncryption/src/com/android/server/backup/encryption/chunking/cdc/ |
H A D | FingerprintMixer.java | 65 byte[] derivedKey = in FingerprintMixer() 67 ByteBuffer buffer = ByteBuffer.wrap(derivedKey); in FingerprintMixer()
|
/aosp12/hardware/interfaces/identity/aidl/default/libeic/ |
H A D | EicPresentation.c | 512 uint8_t derivedKey[32]; in eicPresentationCalcMacKey() local 514 derivedKey, sizeof(derivedKey))) { in eicPresentationCalcMacKey() 519 eicCborInitHmacSha256(&ctx->cbor, NULL, 0, derivedKey, sizeof(derivedKey)); in eicPresentationCalcMacKey()
|
/aosp12/frameworks/base/identity/java/android/security/identity/ |
H A D | CredstoreIdentityCredential.java | 149 byte[] derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info, 32); in setReaderEphemeralPublicKey() 150 mSecretKey = new SecretKeySpec(derivedKey, "AES"); in setReaderEphemeralPublicKey() 153 derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info, 32); in setReaderEphemeralPublicKey() 154 mReaderSecretKey = new SecretKeySpec(derivedKey, "AES"); in setReaderEphemeralPublicKey()
|
/aosp12/hardware/interfaces/identity/support/src/ |
H A D | IdentityCredentialSupport.cpp | 1320 vector<uint8_t> derivedKey; in hkdf() local 1321 derivedKey.resize(size); in hkdf() 1322 if (HKDF(derivedKey.data(), derivedKey.size(), EVP_sha256(), sharedSecret.data(), in hkdf() 1327 return derivedKey; in hkdf() 2120 optional<vector<uint8_t>> derivedKey = support::hkdf(sharedSecret.value(), salt, info, 32); in calcEMacKey() local 2121 if (!derivedKey) { in calcEMacKey() 2125 return derivedKey.value(); in calcEMacKey()
|