/external/boringssl/src/crypto/cipher/ |
e_rc4.c | 111 uint8_t hmac_key[MD5_CBLOCK]; local 139 memset(hmac_key, 0, sizeof(hmac_key)); 140 memcpy(hmac_key, key, MD5_DIGEST_LENGTH); 141 for (i = 0; i < sizeof(hmac_key); i++) { 142 hmac_key[i] ^= 0x36; 145 MD5_Update(&rc4_ctx->head, hmac_key, sizeof(hmac_key)); 146 for (i = 0; i < sizeof(hmac_key); i++) { 147 hmac_key[i] ^= 0x36 ^ 0x5c [all...] |
e_aes.c | [all...] |
/system/keymaster/ |
integrity_assured_key_blob.cpp | 35 static const char HMAC_KEY[] = "IntegrityAssuredBlob0"; 63 if (!HMAC_Init_ex(&ctx, HMAC_KEY, sizeof(HMAC_KEY), md, NULL /* engine */))
|
hmac_key.cpp | 17 #include "hmac_key.h"
|
Android.mk | 59 hmac_key.cpp \
|
hmac_operation.cpp | 24 #include "hmac_key.h"
|
symmetric_key.cpp | 29 #include "hmac_key.h"
|
Makefile | 86 hmac_key.cpp \ 235 hmac_key.o \
|
soft_keymaster_context.cpp | 32 #include "hmac_key.h"
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 956 uint8_t hmac_key[EVP_MAX_MD_SIZE]; local 989 EVP_MD_size(md), hmac_key, md)) { 993 if (NULL == HMAC(md, hmac_key, EVP_MD_size(md), CBS_data(&authsafes), [all...] |