/external/boringssl/src/crypto/hmac_extra/ |
D | hmac_tests.txt | 1 HMAC = MD5 3 # that HMAC_CTX and HMAC treat NULL as the empty key initially. 8 # HMAC tests from RFC2104 9 HMAC = MD5 14 HMAC = MD5 19 HMAC = MD5 24 # HMAC tests from NIST test data 26 HMAC = SHA1 31 HMAC = SHA1 36 HMAC = SHA1 [all …]
|
/external/rust/crates/ring/tests/ |
D | hmac_tests.txt | 1 # HMAC tests from NIST test data 3 HMAC = SHA1 8 HMAC = SHA1 13 HMAC = SHA1 18 HMAC = SHA224 23 HMAC = SHA224 28 HMAC = SHA224 33 HMAC = SHA256 38 HMAC = SHA256 43 HMAC = SHA256 [all …]
|
/external/libchrome/crypto/ |
D | hmac.cc | 21 HMAC::HMAC(HashAlgorithm hash_alg) : hash_alg_(hash_alg), initialized_(false) { in HMAC() function in crypto::HMAC 26 HMAC::~HMAC() { in ~HMAC() 32 size_t HMAC::DigestLength() const { in DigestLength() 44 bool HMAC::Init(const unsigned char* key, size_t key_length) { in Init() 52 bool HMAC::Init(const SymmetricKey* key) { in Init() 56 bool HMAC::Sign(base::StringPiece data, in Sign() 62 return !!::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256(), key_.data(), in Sign() 68 bool HMAC::Verify(base::StringPiece data, base::StringPiece digest) const { in Verify() 74 bool HMAC::VerifyTruncated(base::StringPiece data, in VerifyTruncated()
|
D | hmac_unittest.cc | 80 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 149 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 175 crypto::HMAC hmac(crypto::HMAC::SHA256); in TEST() 216 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 232 crypto::HMAC hmac2(crypto::HMAC::SHA256); in TEST() 241 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 255 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 289 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
|
D | hmac.h | 26 class CRYPTO_EXPORT HMAC { 34 explicit HMAC(HashAlgorithm hash_alg); 35 ~HMAC(); 92 DISALLOW_COPY_AND_ASSIGN(HMAC);
|
/external/tcpdump/tests/ |
D | babel_auth.out | 6 HMAC key-id 30 digest-20 AD0FA7CD8D5A1898EC5409C8EDDA68B3ACA21B80 7 HMAC key-id 50 digest-32 8239F283D985047FA4B88597FDE3246455C6E4DD917B1441C2F3A82B9F737674 8 …HMAC key-id 1000 digest-64 6718CB4C2BB0976C127AB3CCCBFA1105A1D158F035BC9FAD86B0610A7ACD27E5A3D5A30… 9 …HMAC key-id 1000 digest-48 D2A5B80FF9D006907E3B6601C0C255D7D12D6EC61815E413A334E2A0D9271C75AFBC086… 10 HMAC key-id 100 digest-20 7213CED66FE7154034EC64CD14AE4142A092DF33 11 …HMAC key-id 2000 digest-64 2A5D9D55393B19E440FAC49BDA521E18A7FE77F7AB4A90377009E46E2FFE49336435C7E… 12 …HMAC key-id 2000 digest-48 FE91AF27EEE137EF489F37FEE449100CDA8CCB3E794D0C4A225D12724A8CE2FFC85811B… 13 …HMAC key-id 3000 digest-64 38C4D82883A5778500D728D1E243E7579DE96FA726C9DB7F0805C52E96FEFDCE7A5FB9A…
|
/external/python/cryptography/tests/hazmat/primitives/ |
D | test_hmac.py | 36 h = hmac.HMAC(b"mykey", hashes.SHA1(), backend=backend) 42 hmac.HMAC(b"key", hashes.SHA1, backend=backend) 45 h = hmac.HMAC(b"key", hashes.SHA1(), backend=backend) 58 h = hmac.HMAC(b'', hashes.SHA1(), backend=backend) 61 h = hmac.HMAC(b'', hashes.SHA1(), backend=backend) 68 h = hmac.HMAC(b'', hashes.SHA1(), backend=backend) 76 h = hmac.HMAC(b'', hashes.SHA1(), backend=backend) 82 hmac.HMAC(b"key", DummyHashAlgorithm(), backend) 86 h = hmac.HMAC(key, hashes.SHA256(), backend) 97 hmac.HMAC(b"key", hashes.SHA1(), pretend_backend)
|
D | test_hmac_vectors.py | 123 h = hmac.HMAC(b"0" * 64, hashes.BLAKE2b(digest_size=64), backend) 132 h = hmac.HMAC(b"0" * 32, hashes.BLAKE2s(digest_size=32), backend)
|
/external/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ |
D | KDF.bz2 |
|
/external/python/cpython3/Doc/library/ |
D | hmac.rst | 5 :synopsis: Keyed-Hashing for Message Authentication (HMAC) implementation 14 This module implements the HMAC algorithm as described by :rfc:`2104`. 21 *digestmod* is the digest name, digest constructor or module for the HMAC 39 function is equivalent to ``HMAC(key, msg, digest).digest()``, but 51 An HMAC object has the following methods: 53 .. method:: HMAC.update(msg) 63 .. method:: HMAC.digest() 78 .. method:: HMAC.hexdigest() 92 .. method:: HMAC.copy() 100 .. attribute:: HMAC.digest_size [all …]
|
/external/rust/crates/ring/src/ |
D | hmac_generate_serializable_tests.txt | 1 HMAC = SHA1 4 HMAC = SHA256 7 HMAC = SHA384 10 HMAC = SHA512
|
/external/python/cryptography/docs/hazmat/primitives/mac/ |
D | index.rst | 6 While cryptography supports both the CMAC and HMAC algorithms, we strongly 7 recommend that HMAC should be used unless you have a good reason otherwise. 9 For more information on why HMAC is preferred, see `Use cases for CMAC vs. 10 HMAC?`_ 12 HMAC and CMAC both use the ``MACContext`` interface: 44 .. _`Use cases for CMAC vs. HMAC?`: https://crypto.stackexchange.com/questions/15721/use-cases-for-…
|
D | hmac.rst | 3 Hash-based message authentication codes (HMAC) 15 secret key. You can use an HMAC to verify both the integrity and authenticity 18 .. class:: HMAC(key, algorithm, backend) 20 HMAC objects take a ``key`` and a 32 >>> h = hmac.HMAC(key, hashes.SHA256(), backend=default_backend()) 50 >>> h = hmac.HMAC(key, hashes.SHA256(), backend=default_backend()) 80 Copy this :class:`HMAC` instance, usually so that we may call 84 :return: A new instance of :class:`HMAC` that can be updated
|
/external/python/cpython2/Lib/test/ |
D | test_hmac.py | 15 h = hmac.HMAC(key, data) 49 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 83 h = hmac.HMAC(key, data, digestmod=hashfunc) 219 hmac.HMAC('a', 'b', digestmod=MockCrazyHash) 224 hmac.HMAC('a', 'b', digestmod=MockCrazyHash) 235 h = hmac.HMAC("key") 242 h = hmac.HMAC("key", "hash this!") 249 h = hmac.HMAC("key", "", hashlib.sha1) 258 h = hmac.HMAC("key") 265 h = hmac.HMAC("my secret key") [all …]
|
/external/python/cpython2/Doc/library/ |
D | hmac.rst | 5 :synopsis: Keyed-Hashing for Message Authentication (HMAC) implementation 16 This module implements the HMAC algorithm as described by :rfc:`2104`. 22 is made. *digestmod* is the digest constructor or module for the HMAC object to 26 An HMAC object has the following methods: 28 .. method:: HMAC.update(msg) 35 .. method:: HMAC.digest() 49 .. method:: HMAC.hexdigest() 63 .. method:: HMAC.copy()
|
/external/python/cpython3/Lib/test/ |
D | test_hmac.py | 14 from _hashlib import HMAC as C_HMAC 38 h = hmac.HMAC(key, data, digestmod=hashfunc) 45 h = hmac.HMAC(key, data, digestmod=hashname) 52 h = hmac.HMAC(key, digestmod=hashname) 340 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash) 345 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash) 353 hmac.HMAC(key, data, digestmod=None) 357 hmac.HMAC(key, msg=data, digestmod='') 370 hmac.HMAC(b"key", digestmod='sha256') 379 h = hmac.HMAC("key", digestmod='sha256') [all …]
|
/external/rust/crates/grpcio-sys/grpc/src/core/lib/security/credentials/external/ |
D | aws_request_signer.cc | 54 std::string HMAC(const std::string& key, const std::string& msg) { in HMAC() function 57 HMAC(EVP_sha256(), key.c_str(), key.length(), in HMAC() 197 std::string date = HMAC("AWS4" + secret_access_key_, request_date_short); in GetSignedRequestHeaders() 198 std::string region = HMAC(date, region_); in GetSignedRequestHeaders() 199 std::string service = HMAC(region, service_name); in GetSignedRequestHeaders() 200 std::string signing = HMAC(service, "aws4_request"); in GetSignedRequestHeaders() 202 std::string signature_str = HMAC(signing, string_to_sign); in GetSignedRequestHeaders()
|
/external/rust/crates/quiche/deps/boringssl/src/util/fipstools/acvp/modulewrapper/ |
D | modulewrapper.cc | 174 "algorithm": "HMAC-SHA-1", in GetConfig() 184 "algorithm": "HMAC-SHA2-224", in GetConfig() 194 "algorithm": "HMAC-SHA2-256", in GetConfig() 204 "algorithm": "HMAC-SHA2-384", in GetConfig() 214 "algorithm": "HMAC-SHA2-512", in GetConfig() 359 static bool HMAC(const Span<const uint8_t> args[]) { in HMAC() function 363 if (::HMAC(md, args[1].data(), args[1].size(), args[0].data(), args[0].size(), in HMAC() 584 {"HMAC-SHA-1", 2, HMAC<EVP_sha1>}, 585 {"HMAC-SHA2-224", 2, HMAC<EVP_sha224>}, 586 {"HMAC-SHA2-256", 2, HMAC<EVP_sha256>}, [all …]
|
/external/curl/tests/data/ |
D | test1612 | 5 HMAC 19 HMAC unit tests
|
/external/python/cryptography/src/cryptography/hazmat/primitives/ |
D | hmac.py | 17 class HMAC(object): class 47 return HMAC(
|
/external/python/cryptography/src/cryptography/ |
D | fernet.py | 20 from cryptography.hazmat.primitives.hmac import HMAC 68 h = HMAC(self._signing_key, hashes.SHA256(), backend=self._backend) 101 h = HMAC(self._signing_key, hashes.SHA256(), backend=self._backend)
|
/external/scapy/scapy/layers/tls/crypto/ |
D | hkdf.py | 18 from cryptography.hazmat.primitives.hmac import HMAC 61 hm = HMAC(finished_key, self.hash, default_backend())
|
/external/python/cpython2/Lib/ |
D | hmac.py | 23 class HMAC: class 136 return HMAC(key, msg, digestmod)
|
/external/libsrtp2/ |
D | timing | 18 plot "timing.dat" index 0 title "HMAC SHA1" with lines, "timing.dat" index 1 title "TMMH/AES" with … 36 … "timing.dat" index 6 title "TMMH/AES" with lines, "timing.dat" index 7 title "HMAC/AES" with lines
|
/external/scapy/test/ |
D | ipsec.uts | 600 = IPv4 / ESP - Transport - NULL - HMAC-SHA1-96 610 auth_algo='HMAC-SHA1-96', auth_key=b'secret key') 631 = IPv4 / ESP - Transport - NULL - HMAC-SHA1-96 - altered packet 641 auth_algo='HMAC-SHA1-96', auth_key=b'secret key') 870 = IPv4 / ESP - Transport - NULL - HMAC-MD5-96 880 auth_algo='HMAC-MD5-96', auth_key=b'secret key') 902 = IPv4 / ESP - Transport - NULL - HMAC-MD5-96 - altered packet 912 auth_algo='HMAC-MD5-96', auth_key=b'secret key') 1009 = IPv4 / ESP - Tunnel - NULL - HMAC-SHA1-96 1019 auth_algo='HMAC-SHA1-96', auth_key=b'secret key', [all …]
|