/external/boringssl/src/crypto/hmac_extra/ |
D | hmac_tests.txt | 1 HMAC = MD5 3 # that HMAC_CTX and HMAC treat NULL as the empty key initially. 8 # HMAC tests from RFC2104 9 HMAC = MD5 14 HMAC = MD5 19 HMAC = MD5 24 # HMAC tests from NIST test data 26 HMAC = SHA1 31 HMAC = SHA1 36 HMAC = SHA1 [all …]
|
D | hmac_test.cc | 104 ASSERT_TRUE(HMAC(digest, key.data(), key.size(), input.data(), input.size(), in TEST()
|
/external/libchrome/crypto/ |
D | hmac.cc | 21 HMAC::HMAC(HashAlgorithm hash_alg) : hash_alg_(hash_alg), initialized_(false) { in HMAC() function in crypto::HMAC 26 HMAC::~HMAC() { in ~HMAC() 32 size_t HMAC::DigestLength() const { in DigestLength() 44 bool HMAC::Init(const unsigned char* key, size_t key_length) { in Init() 52 bool HMAC::Init(const SymmetricKey* key) { in Init() 56 bool HMAC::Sign(base::StringPiece data, in Sign() 62 return !!::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256(), key_.data(), in Sign() 68 bool HMAC::Verify(base::StringPiece data, base::StringPiece digest) const { in Verify() 74 bool HMAC::VerifyTruncated(base::StringPiece data, in VerifyTruncated()
|
D | hmac_unittest.cc | 80 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 149 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 175 crypto::HMAC hmac(crypto::HMAC::SHA256); in TEST() 216 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 232 crypto::HMAC hmac2(crypto::HMAC::SHA256); in TEST() 241 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 255 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 289 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
|
D | hmac.h | 26 class CRYPTO_EXPORT HMAC { 34 explicit HMAC(HashAlgorithm hash_alg); 35 ~HMAC(); 92 DISALLOW_COPY_AND_ASSIGN(HMAC);
|
/external/tcpdump/tests/ |
D | babel_auth.out | 6 HMAC key-id 30 digest-20 AD0FA7CD8D5A1898EC5409C8EDDA68B3ACA21B80 7 HMAC key-id 50 digest-32 8239F283D985047FA4B88597FDE3246455C6E4DD917B1441C2F3A82B9F737674 8 …HMAC key-id 1000 digest-64 6718CB4C2BB0976C127AB3CCCBFA1105A1D158F035BC9FAD86B0610A7ACD27E5A3D5A30… 9 …HMAC key-id 1000 digest-48 D2A5B80FF9D006907E3B6601C0C255D7D12D6EC61815E413A334E2A0D9271C75AFBC086… 10 HMAC key-id 100 digest-20 7213CED66FE7154034EC64CD14AE4142A092DF33 11 …HMAC key-id 2000 digest-64 2A5D9D55393B19E440FAC49BDA521E18A7FE77F7AB4A90377009E46E2FFE49336435C7E… 12 …HMAC key-id 2000 digest-48 FE91AF27EEE137EF489F37FEE449100CDA8CCB3E794D0C4A225D12724A8CE2FFC85811B… 13 …HMAC key-id 3000 digest-64 38C4D82883A5778500D728D1E243E7579DE96FA726C9DB7F0805C52E96FEFDCE7A5FB9A…
|
D | ospf3_auth-vv.out | 8 Authentication Type HMAC, Length 48, SAID 1, CSN 0x00000000:52da4e0e
|
/external/python/cpython3/Doc/library/ |
D | hmac.rst | 5 :synopsis: Keyed-Hashing for Message Authentication (HMAC) implementation 14 This module implements the HMAC algorithm as described by :rfc:`2104`. 21 *digestmod* is the digest name, digest constructor or module for the HMAC 37 function is equivalent to ``HMAC(key, msg, digest).digest()``, but 49 An HMAC object has the following methods: 51 .. method:: HMAC.update(msg) 61 .. method:: HMAC.digest() 76 .. method:: HMAC.hexdigest() 90 .. method:: HMAC.copy() 98 .. attribute:: HMAC.digest_size [all …]
|
/external/python/cpython3/Lib/test/ |
D | test_hmac.py | 26 h = hmac.HMAC(key, data, digestmod=hashlib.md5) 33 h = hmac.HMAC(key, data, digestmod='md5') 81 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 88 h = hmac.HMAC(key, data, digestmod='sha1') 133 h = hmac.HMAC(key, data, digestmod=hashfunc) 139 h = hmac.HMAC(key, data, digestmod=hash_name) 297 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash) 302 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash) 310 h = hmac.HMAC(key, data) 321 h = hmac.HMAC(b"key") [all …]
|
/external/python/cpython2/Lib/test/ |
D | test_hmac.py | 15 h = hmac.HMAC(key, data) 49 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 83 h = hmac.HMAC(key, data, digestmod=hashfunc) 219 hmac.HMAC('a', 'b', digestmod=MockCrazyHash) 224 hmac.HMAC('a', 'b', digestmod=MockCrazyHash) 235 h = hmac.HMAC("key") 242 h = hmac.HMAC("key", "hash this!") 249 h = hmac.HMAC("key", "", hashlib.sha1) 258 h = hmac.HMAC("key") 265 h = hmac.HMAC("my secret key") [all …]
|
/external/python/cpython2/Doc/library/ |
D | hmac.rst | 5 :synopsis: Keyed-Hashing for Message Authentication (HMAC) implementation 16 This module implements the HMAC algorithm as described by :rfc:`2104`. 22 is made. *digestmod* is the digest constructor or module for the HMAC object to 26 An HMAC object has the following methods: 28 .. method:: HMAC.update(msg) 35 .. method:: HMAC.digest() 49 .. method:: HMAC.hexdigest() 63 .. method:: HMAC.copy()
|
/external/scapy/test/ |
D | ipsec.uts | 600 = IPv4 / ESP - Transport - NULL - HMAC-SHA1-96 610 auth_algo='HMAC-SHA1-96', auth_key=b'secret key') 631 = IPv4 / ESP - Transport - NULL - HMAC-SHA1-96 - altered packet 641 auth_algo='HMAC-SHA1-96', auth_key=b'secret key') 870 = IPv4 / ESP - Transport - NULL - HMAC-MD5-96 880 auth_algo='HMAC-MD5-96', auth_key=b'secret key') 902 = IPv4 / ESP - Transport - NULL - HMAC-MD5-96 - altered packet 912 auth_algo='HMAC-MD5-96', auth_key=b'secret key') 1009 = IPv4 / ESP - Tunnel - NULL - HMAC-SHA1-96 1019 auth_algo='HMAC-SHA1-96', auth_key=b'secret key', [all …]
|
/external/scapy/scapy/layers/tls/crypto/ |
D | hkdf.py | 18 from cryptography.hazmat.primitives.hmac import HMAC 61 hm = HMAC(finished_key, self.hash, default_backend())
|
/external/python/cpython2/Lib/ |
D | hmac.py | 23 class HMAC: class 136 return HMAC(key, msg, digestmod)
|
/external/tensorflow/tensorflow/core/platform/s3/ |
D | aws_crypto.cc | 24 class AWSSha256HMACOpenSSLImpl : public Aws::Utils::Crypto::HMAC { 108 std::shared_ptr<Aws::Utils::Crypto::HMAC>
|
D | aws_crypto.h | 31 std::shared_ptr<Aws::Utils::Crypto::HMAC> CreateImplementation()
|
/external/scapy/scapy/layers/ |
D | ipsec.py | 465 from cryptography.hazmat.primitives.hmac import HMAC 470 HMAC = CMAC = hashes = None variable 592 if HMAC and hashes: 595 mac=HMAC, 599 mac=HMAC, 603 mac=HMAC, 607 mac=HMAC, 612 mac=HMAC,
|
/external/python/cpython3/Lib/ |
D | hmac.py | 26 class HMAC: class 153 return HMAC(key, msg, digestmod)
|
/external/boringssl/src/crypto/fipsmodule/ |
D | bcm.c | 124 if (!HMAC(EVP_sha512(), kHMACKey, sizeof(kHMACKey), start, end - start, in BORINGSSL_bcm_power_on_self_test()
|
/external/boringssl/src/include/openssl/ |
D | hmac.h | 80 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
|
/external/boringssl/src/fipstools/ |
D | cavp_hmac_test.cc | 72 if (HMAC(md, key.data(), k_len, msg.data(), msg.size(), out, &out_len) == in TestHMAC()
|
/external/nos/host/generic/nugget/proto/nugget/app/keymaster/ |
D | keymaster_defs.proto | 109 HMAC = 4; enumerator 261 // as they are used in an HMAC calculation.
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) { in HKDF_extract()
|
/external/mdnsresponder/mDNSCore/ |
D | mDNS.c | 643 if (!(authrr->resrec.RecordType & kDNSRecordTypeUniqueMask) || authrr->WakeUp.HMAC.l[0]) in PacketRRMatchesSignature() 777 if (rr->WakeUp.HMAC.l[0] && rr->resrec.rrtype == kDNSType_AAAA) in InitializeLastAPTime() 1163 if (rr->WakeUp.HMAC.l[0] && !rr->AddressProxy.type) rr->AnnounceCount = 2; in mDNS_Register_internal() 1521 if (rr->WakeUp.HMAC.l[0] || in mDNS_Deregister_internal() 1527 …rr->AnnounceCount = rr->WakeUp.HMAC.l[0] ? WakeupCount : (drt == mDNS_Dereg_rapid) ? 1 : Go… in mDNS_Deregister_internal() 1757 rr->WakeUp.HMAC = zeroEthAddr; in CompleteDeregistration() 2009 owner->u.owner.HMAC = m->PrimaryMAC; in SetupOwnerOpt() 2080 if (!rr->WakeUp.HMAC.l[0]) in SendResponses() 2096 r2->AnnounceCount-3, &r2->WakeUp.HMAC, &r2->WakeUp.IMAC, ARDisplayString(m,r2)); in SendResponses() 2101 if (--r2->AnnounceCount <= GoodbyeCount) r2->WakeUp.HMAC = zeroEthAddr; in SendResponses() [all …]
|
/external/boringssl/src/crypto/obj/ |
D | objects.txt | 14 # HMAC OIDs 15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 1162 cryptopro 10 : id-HMACGostR3411-94 : HMAC GOST 34.11-94 1281 # There is no OID that just denotes "HMAC" oddly enough... 1283 : HMAC : hmac 1288 : RC4-HMAC-MD5 : rc4-hmac-md5 1289 : AES-128-CBC-HMAC-SHA1 : aes-128-cbc-hmac-sha1 1290 : AES-192-CBC-HMAC-SHA1 : aes-192-cbc-hmac-sha1 1291 : AES-256-CBC-HMAC-SHA1 : aes-256-cbc-hmac-sha1
|