Home
last modified time | relevance | path

Searched refs:HMAC (Results 1 – 25 of 79) sorted by relevance

1234

/third_party/mbedtls/tests/suites/
Dtest_suite_md.data96 generic HMAC-MD5 Hash File OpenSSL test #1
100 generic HMAC-MD5 Hash File OpenSSL test #2
104 generic HMAC-MD5 Hash File OpenSSL test #3
108 HMAC-MD5 Bouncy Castle test #1
112 generic HMAC-MD5 Test Vector RFC2202 #1
116 generic HMAC-MD5 Test Vector RFC2202 #2
120 generic HMAC-MD5 Test Vector RFC2202 #3
124 generic HMAC-MD5 Test Vector RFC2202 #4
128 generic HMAC-MD5 Test Vector RFC2202 #5
132 generic HMAC-MD5 Test Vector RFC2202 #6
[all …]
Dtest_suite_psa_crypto_metadata.data29 MAC: HMAC-MD5
33 MAC: HMAC-RIPEMD160
37 MAC: HMAC-SHA-1
41 MAC: HMAC-SHA-224
45 MAC: HMAC-SHA-256
49 MAC: HMAC-SHA-384
53 MAC: HMAC-SHA-512
319 Key type: HMAC
Dtest_suite_psa_crypto_driver_wrappers.data308 PSA MAC sign, through driver: HMAC-SHA-224
312 PSA MAC sign, fallback: HMAC-SHA-224
316 PSA MAC sign, driver reports error: RFC4231 Test case 1 - HMAC-SHA-224
332 PSA MAC verify, through driver: HMAC-SHA-224
336 PSA MAC verify, fallback: HMAC-SHA-224
340 PSA MAC verify, driver reports error: RFC4231 Test case 1 - HMAC-SHA-224
Dtest_suite_psa_crypto.data356 PSA import/export HMAC key: policy forbids export
484 PSA import/export HMAC key: policy forbids export, opaque
691 PSA key policy: HMAC, sign-verify, tag length > min-length policy
695 PSA key policy: HMAC, sign-verify, tag length = min-length policy
699 PSA key policy: HMAC, sign-verify, tag length < min-length policy
715 PSA key policy: HMAC, sign-verify, default tag length > min-length policy
719 PSA key policy: HMAC, sign-verify, default tag length = min-length policy
723 PSA key policy: HMAC, sign-verify, default tag length < min-length policy
727 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg
731 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different hash base)
[all …]
/third_party/openssl/test/recipes/30-test_evp_data/
Devpmac.txt162 Title = HMAC tests (from RFC2104 and others)
164 MAC = HMAC
170 MAC = HMAC
176 MAC = HMAC
184 # HMAC tests from NIST test data
186 MAC = HMAC
192 MAC = HMAC
198 MAC = HMAC
206 MAC = HMAC
212 MAC = HMAC
[all …]
/third_party/python/Doc/library/
Dhmac.rst5 :synopsis: Keyed-Hashing for Message Authentication (HMAC) implementation
14 This module implements the HMAC algorithm as described by :rfc:`2104`.
21 *digestmod* is the digest name, digest constructor or module for the HMAC
39 function is equivalent to ``HMAC(key, msg, digest).digest()``, but
51 An HMAC object has the following methods:
53 .. method:: HMAC.update(msg)
63 .. method:: HMAC.digest()
78 .. method:: HMAC.hexdigest()
92 .. method:: HMAC.copy()
100 .. attribute:: HMAC.digest_size
[all …]
/third_party/python/Lib/test/
Dtest_hmac.py15 from _hashlib import HMAC as C_HMAC
54 h = hmac.HMAC(key, data, digestmod=hashfunc)
59 h = hmac.HMAC(key, data, digestmod=hashname)
64 h = hmac.HMAC(key, digestmod=hashname)
95 h = hmac.HMAC.__new__(hmac.HMAC)
119 h = hmac.HMAC.__new__(hmac.HMAC)
357 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
362 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
370 hmac.HMAC(key, data, digestmod=None)
374 hmac.HMAC(key, msg=data, digestmod='')
[all …]
/third_party/grpc/src/core/lib/security/credentials/external/
Daws_request_signer.cc54 std::string HMAC(const std::string& key, const std::string& msg) { in HMAC() function
57 HMAC(EVP_sha256(), key.c_str(), key.length(), in HMAC()
197 std::string date = HMAC("AWS4" + secret_access_key_, request_date_short); in GetSignedRequestHeaders()
198 std::string region = HMAC(date, region_); in GetSignedRequestHeaders()
199 std::string service = HMAC(region, service_name); in GetSignedRequestHeaders()
200 std::string signing = HMAC(service, "aws4_request"); in GetSignedRequestHeaders()
202 std::string signature_str = HMAC(signing, string_to_sign); in GetSignedRequestHeaders()
/third_party/curl/tests/data/
Dtest16125 HMAC
19 HMAC unit tests
Dtest193464 Authorization: XXX4-HMAC-SHA256 Credential=xxx/19700101/0/127/xxx4_request, SignedHeaders=content-t…
Dtest193664 Authorization: XXX4-HMAC-SHA256 Credential=xxx/19700101/rrr/sss/xxx4_request, SignedHeaders=content…
Dtest193564 Authorization: XXX4-HMAC-SHA256 Credential=xxx/19700101/rrr/127/xxx4_request, SignedHeaders=content…
Dtest193364 Authorization: XXX4-HMAC-SHA256 Credential=xxx/19700101/0/127/xxx4_request, SignedHeaders=content-t…
/third_party/node/deps/npm/node_modules/oauth-sign/
DREADME.md8 - HMAC-SHA1
9 - HMAC-SHA256
/third_party/openssl/doc/man3/
DHMAC.pod5 HMAC,
17 - HMAC message authentication code
23 unsigned char *HMAC(const EVP_MD *evp_md, const void *key,
52 HMAC is a MAC (message authentication code), i.e. a keyed hash
56 HMAC() computes the message authentication code of the B<n> bytes at
66 B<evp_md> is a message digest such as EVP_sha1(), EVP_ripemd160() etc. HMAC does
116 HMAC() returns a pointer to the message authentication code or NULL if
DEVP_DigestSignInit.pod44 Poly1305, DSA, ECDSA, HMAC, RSA, SipHash, Ed25519 and Ed448.
75 =item HMAC
147 L<evp(7)>, L<HMAC(3)>, L<MD2(3)>,
DEVP_aes.pod100 Authenticated encryption with AES in CBC mode using SHA-1 as HMAC, with keys of
111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag
DEVP_rc4.pod38 Authenticated encryption with the RC4 stream cipher with MD5 as HMAC.
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-cose-sign/
DCMakeLists.txt76 # HMAC signing, cose-mac
99 # HMAC validation, cose-mac
129 # HMAC signing, cose-mac0
152 # HMAC validation, cose-mac0
/third_party/python/Lib/
Dhmac.py27 class HMAC: class
184 return HMAC(key, msg, digestmod)
/third_party/openssl/include/openssl/
Dhmac.h39 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
/third_party/openssl/test/
Dhmactest.c96 p = pt(HMAC(EVP_md5(), in test_hmac_md5()
209 p = pt(HMAC(EVP_sha1(), NULL, 0, test[4].data, test[4].data_len, in test_hmac_single_shot()
/third_party/node/deps/npm/node_modules/http-signature/
DCHANGES.md38 - Split up HMAC and Signature verification to avoid vulnerabilities where a
/third_party/openssl/doc/man1/
Ddgst.pod134 algorithm is HMAC (hash-based MAC), but there are other MAC algorithms
142 Following options are supported by both by B<HMAC> and B<gost-mac>:
175 Compute HMAC using a specific key for certain OpenSSL-FIPS operations.
/third_party/openssl/crypto/objects/
Dobjects.txt14 # HMAC OIDs
15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5
16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1
1249 cryptopro 10 : id-HMACGostR3411-94 : HMAC GOST 34.11-94
1342 id-tc26-mac 1 : id-tc26-hmac-gost-3411-2012-256 : HMAC GOST 34.11-2012 256 bit
1343 id-tc26-mac 2 : id-tc26-hmac-gost-3411-2012-512 : HMAC GOST 34.11-2012 512 bit
1522 # There is no OID that just denotes "HMAC" oddly enough...
1524 : HMAC : hmac
1529 : RC4-HMAC-MD5 : rc4-hmac-md5
1530 : AES-128-CBC-HMAC-SHA1 : aes-128-cbc-hmac-sha1
[all …]

1234