Home
last modified time | relevance | path

Searched refs:derivedKey (Results 1 – 4 of 4) sorted by relevance

/aosp12/frameworks/base/packages/BackupEncryption/src/com/android/server/backup/encryption/chunking/cdc/
H A DFingerprintMixer.java65 byte[] derivedKey = in FingerprintMixer()
67 ByteBuffer buffer = ByteBuffer.wrap(derivedKey); in FingerprintMixer()
/aosp12/hardware/interfaces/identity/aidl/default/libeic/
H A DEicPresentation.c512 uint8_t derivedKey[32]; in eicPresentationCalcMacKey() local
514 derivedKey, sizeof(derivedKey))) { in eicPresentationCalcMacKey()
519 eicCborInitHmacSha256(&ctx->cbor, NULL, 0, derivedKey, sizeof(derivedKey)); in eicPresentationCalcMacKey()
/aosp12/frameworks/base/identity/java/android/security/identity/
H A DCredstoreIdentityCredential.java149 byte[] derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info, 32); in setReaderEphemeralPublicKey()
150 mSecretKey = new SecretKeySpec(derivedKey, "AES"); in setReaderEphemeralPublicKey()
153 derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info, 32); in setReaderEphemeralPublicKey()
154 mReaderSecretKey = new SecretKeySpec(derivedKey, "AES"); in setReaderEphemeralPublicKey()
/aosp12/hardware/interfaces/identity/support/src/
H A DIdentityCredentialSupport.cpp1320 vector<uint8_t> derivedKey; in hkdf() local
1321 derivedKey.resize(size); in hkdf()
1322 if (HKDF(derivedKey.data(), derivedKey.size(), EVP_sha256(), sharedSecret.data(), in hkdf()
1327 return derivedKey; in hkdf()
2120 optional<vector<uint8_t>> derivedKey = support::hkdf(sharedSecret.value(), salt, info, 32); in calcEMacKey() local
2121 if (!derivedKey) { in calcEMacKey()
2125 return derivedKey.value(); in calcEMacKey()