/third_party/mbedtls/tests/suites/ |
D | test_suite_md.data | 96 generic HMAC-MD5 Hash File OpenSSL test #1 100 generic HMAC-MD5 Hash File OpenSSL test #2 104 generic HMAC-MD5 Hash File OpenSSL test #3 108 HMAC-MD5 Bouncy Castle test #1 112 generic HMAC-MD5 Test Vector RFC2202 #1 116 generic HMAC-MD5 Test Vector RFC2202 #2 120 generic HMAC-MD5 Test Vector RFC2202 #3 124 generic HMAC-MD5 Test Vector RFC2202 #4 128 generic HMAC-MD5 Test Vector RFC2202 #5 132 generic HMAC-MD5 Test Vector RFC2202 #6 [all …]
|
D | test_suite_psa_crypto_metadata.data | 29 MAC: HMAC-MD5 33 MAC: HMAC-RIPEMD160 37 MAC: HMAC-SHA-1 41 MAC: HMAC-SHA-224 45 MAC: HMAC-SHA-256 49 MAC: HMAC-SHA-384 53 MAC: HMAC-SHA-512 319 Key type: HMAC
|
D | test_suite_psa_crypto_driver_wrappers.data | 308 PSA MAC sign, through driver: HMAC-SHA-224 312 PSA MAC sign, fallback: HMAC-SHA-224 316 PSA MAC sign, driver reports error: RFC4231 Test case 1 - HMAC-SHA-224 332 PSA MAC verify, through driver: HMAC-SHA-224 336 PSA MAC verify, fallback: HMAC-SHA-224 340 PSA MAC verify, driver reports error: RFC4231 Test case 1 - HMAC-SHA-224
|
D | test_suite_psa_crypto.data | 356 PSA import/export HMAC key: policy forbids export 484 PSA import/export HMAC key: policy forbids export, opaque 691 PSA key policy: HMAC, sign-verify, tag length > min-length policy 695 PSA key policy: HMAC, sign-verify, tag length = min-length policy 699 PSA key policy: HMAC, sign-verify, tag length < min-length policy 715 PSA key policy: HMAC, sign-verify, default tag length > min-length policy 719 PSA key policy: HMAC, sign-verify, default tag length = min-length policy 723 PSA key policy: HMAC, sign-verify, default tag length < min-length policy 727 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg 731 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different hash base) [all …]
|
/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evpmac.txt | 162 Title = HMAC tests (from RFC2104 and others) 164 MAC = HMAC 170 MAC = HMAC 176 MAC = HMAC 184 # HMAC tests from NIST test data 186 MAC = HMAC 192 MAC = HMAC 198 MAC = HMAC 206 MAC = HMAC 212 MAC = HMAC [all …]
|
/third_party/python/Doc/library/ |
D | hmac.rst | 5 :synopsis: Keyed-Hashing for Message Authentication (HMAC) implementation 14 This module implements the HMAC algorithm as described by :rfc:`2104`. 21 *digestmod* is the digest name, digest constructor or module for the HMAC 39 function is equivalent to ``HMAC(key, msg, digest).digest()``, but 51 An HMAC object has the following methods: 53 .. method:: HMAC.update(msg) 63 .. method:: HMAC.digest() 78 .. method:: HMAC.hexdigest() 92 .. method:: HMAC.copy() 100 .. attribute:: HMAC.digest_size [all …]
|
/third_party/python/Lib/test/ |
D | test_hmac.py | 15 from _hashlib import HMAC as C_HMAC 54 h = hmac.HMAC(key, data, digestmod=hashfunc) 59 h = hmac.HMAC(key, data, digestmod=hashname) 64 h = hmac.HMAC(key, digestmod=hashname) 95 h = hmac.HMAC.__new__(hmac.HMAC) 119 h = hmac.HMAC.__new__(hmac.HMAC) 357 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash) 362 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash) 370 hmac.HMAC(key, data, digestmod=None) 374 hmac.HMAC(key, msg=data, digestmod='') [all …]
|
/third_party/grpc/src/core/lib/security/credentials/external/ |
D | aws_request_signer.cc | 54 std::string HMAC(const std::string& key, const std::string& msg) { in HMAC() function 57 HMAC(EVP_sha256(), key.c_str(), key.length(), in HMAC() 197 std::string date = HMAC("AWS4" + secret_access_key_, request_date_short); in GetSignedRequestHeaders() 198 std::string region = HMAC(date, region_); in GetSignedRequestHeaders() 199 std::string service = HMAC(region, service_name); in GetSignedRequestHeaders() 200 std::string signing = HMAC(service, "aws4_request"); in GetSignedRequestHeaders() 202 std::string signature_str = HMAC(signing, string_to_sign); in GetSignedRequestHeaders()
|
/third_party/curl/tests/data/ |
D | test1612 | 5 HMAC 19 HMAC unit tests
|
D | test1934 | 64 Authorization: XXX4-HMAC-SHA256 Credential=xxx/19700101/0/127/xxx4_request, SignedHeaders=content-t…
|
D | test1936 | 64 Authorization: XXX4-HMAC-SHA256 Credential=xxx/19700101/rrr/sss/xxx4_request, SignedHeaders=content…
|
D | test1935 | 64 Authorization: XXX4-HMAC-SHA256 Credential=xxx/19700101/rrr/127/xxx4_request, SignedHeaders=content…
|
D | test1933 | 64 Authorization: XXX4-HMAC-SHA256 Credential=xxx/19700101/0/127/xxx4_request, SignedHeaders=content-t…
|
/third_party/node/deps/npm/node_modules/oauth-sign/ |
D | README.md | 8 - HMAC-SHA1 9 - HMAC-SHA256
|
/third_party/openssl/doc/man3/ |
D | HMAC.pod | 5 HMAC, 17 - HMAC message authentication code 23 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, 52 HMAC is a MAC (message authentication code), i.e. a keyed hash 56 HMAC() computes the message authentication code of the B<n> bytes at 66 B<evp_md> is a message digest such as EVP_sha1(), EVP_ripemd160() etc. HMAC does 116 HMAC() returns a pointer to the message authentication code or NULL if
|
D | EVP_DigestSignInit.pod | 44 Poly1305, DSA, ECDSA, HMAC, RSA, SipHash, Ed25519 and Ed448. 75 =item HMAC 147 L<evp(7)>, L<HMAC(3)>, L<MD2(3)>,
|
D | EVP_aes.pod | 100 Authenticated encryption with AES in CBC mode using SHA-1 as HMAC, with keys of 111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag
|
D | EVP_rc4.pod | 38 Authenticated encryption with the RC4 stream cipher with MD5 as HMAC.
|
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-cose-sign/ |
D | CMakeLists.txt | 76 # HMAC signing, cose-mac 99 # HMAC validation, cose-mac 129 # HMAC signing, cose-mac0 152 # HMAC validation, cose-mac0
|
/third_party/python/Lib/ |
D | hmac.py | 27 class HMAC: class 184 return HMAC(key, msg, digestmod)
|
/third_party/openssl/include/openssl/ |
D | hmac.h | 39 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
/third_party/openssl/test/ |
D | hmactest.c | 96 p = pt(HMAC(EVP_md5(), in test_hmac_md5() 209 p = pt(HMAC(EVP_sha1(), NULL, 0, test[4].data, test[4].data_len, in test_hmac_single_shot()
|
/third_party/node/deps/npm/node_modules/http-signature/ |
D | CHANGES.md | 38 - Split up HMAC and Signature verification to avoid vulnerabilities where a
|
/third_party/openssl/doc/man1/ |
D | dgst.pod | 134 algorithm is HMAC (hash-based MAC), but there are other MAC algorithms 142 Following options are supported by both by B<HMAC> and B<gost-mac>: 175 Compute HMAC using a specific key for certain OpenSSL-FIPS operations.
|
/third_party/openssl/crypto/objects/ |
D | objects.txt | 14 # HMAC OIDs 15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 1249 cryptopro 10 : id-HMACGostR3411-94 : HMAC GOST 34.11-94 1342 id-tc26-mac 1 : id-tc26-hmac-gost-3411-2012-256 : HMAC GOST 34.11-2012 256 bit 1343 id-tc26-mac 2 : id-tc26-hmac-gost-3411-2012-512 : HMAC GOST 34.11-2012 512 bit 1522 # There is no OID that just denotes "HMAC" oddly enough... 1524 : HMAC : hmac 1529 : RC4-HMAC-MD5 : rc4-hmac-md5 1530 : AES-128-CBC-HMAC-SHA1 : aes-128-cbc-hmac-sha1 [all …]
|