Home
last modified time | relevance | path

Searched refs:HMAC (Results 1 – 25 of 131) sorted by relevance

123456

/external/boringssl/src/crypto/hmac_extra/
Dhmac_tests.txt1 HMAC = MD5
3 # that HMAC_CTX and HMAC treat NULL as the empty key initially.
8 # HMAC tests from RFC2104
9 HMAC = MD5
14 HMAC = MD5
19 HMAC = MD5
24 # HMAC tests from NIST test data
26 HMAC = SHA1
31 HMAC = SHA1
36 HMAC = SHA1
[all …]
/external/rust/crates/ring/tests/
Dhmac_tests.txt1 # HMAC tests from NIST test data
3 HMAC = SHA1
8 HMAC = SHA1
13 HMAC = SHA1
18 HMAC = SHA224
23 HMAC = SHA224
28 HMAC = SHA224
33 HMAC = SHA256
38 HMAC = SHA256
43 HMAC = SHA256
[all …]
/external/libchrome/crypto/
Dhmac.cc21 HMAC::HMAC(HashAlgorithm hash_alg) : hash_alg_(hash_alg), initialized_(false) { in HMAC() function in crypto::HMAC
26 HMAC::~HMAC() { in ~HMAC()
32 size_t HMAC::DigestLength() const { in DigestLength()
44 bool HMAC::Init(const unsigned char* key, size_t key_length) { in Init()
52 bool HMAC::Init(const SymmetricKey* key) { in Init()
56 bool HMAC::Sign(base::StringPiece data, in Sign()
62 return !!::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256(), key_.data(), in Sign()
68 bool HMAC::Verify(base::StringPiece data, base::StringPiece digest) const { in Verify()
74 bool HMAC::VerifyTruncated(base::StringPiece data, in VerifyTruncated()
Dhmac_unittest.cc80 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
149 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
175 crypto::HMAC hmac(crypto::HMAC::SHA256); in TEST()
216 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
232 crypto::HMAC hmac2(crypto::HMAC::SHA256); in TEST()
241 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
255 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
289 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
Dhmac.h26 class CRYPTO_EXPORT HMAC {
34 explicit HMAC(HashAlgorithm hash_alg);
35 ~HMAC();
92 DISALLOW_COPY_AND_ASSIGN(HMAC);
/external/tcpdump/tests/
Dbabel_auth.out6 HMAC key-id 30 digest-20 AD0FA7CD8D5A1898EC5409C8EDDA68B3ACA21B80
7 HMAC key-id 50 digest-32 8239F283D985047FA4B88597FDE3246455C6E4DD917B1441C2F3A82B9F737674
8HMAC key-id 1000 digest-64 6718CB4C2BB0976C127AB3CCCBFA1105A1D158F035BC9FAD86B0610A7ACD27E5A3D5A30…
9HMAC key-id 1000 digest-48 D2A5B80FF9D006907E3B6601C0C255D7D12D6EC61815E413A334E2A0D9271C75AFBC086…
10 HMAC key-id 100 digest-20 7213CED66FE7154034EC64CD14AE4142A092DF33
11HMAC key-id 2000 digest-64 2A5D9D55393B19E440FAC49BDA521E18A7FE77F7AB4A90377009E46E2FFE49336435C7E…
12HMAC key-id 2000 digest-48 FE91AF27EEE137EF489F37FEE449100CDA8CCB3E794D0C4A225D12724A8CE2FFC85811B…
13HMAC key-id 3000 digest-64 38C4D82883A5778500D728D1E243E7579DE96FA726C9DB7F0805C52E96FEFDCE7A5FB9A…
/external/python/cryptography/tests/hazmat/primitives/
Dtest_hmac.py36 h = hmac.HMAC(b"mykey", hashes.SHA1(), backend=backend)
42 hmac.HMAC(b"key", hashes.SHA1, backend=backend)
45 h = hmac.HMAC(b"key", hashes.SHA1(), backend=backend)
58 h = hmac.HMAC(b'', hashes.SHA1(), backend=backend)
61 h = hmac.HMAC(b'', hashes.SHA1(), backend=backend)
68 h = hmac.HMAC(b'', hashes.SHA1(), backend=backend)
76 h = hmac.HMAC(b'', hashes.SHA1(), backend=backend)
82 hmac.HMAC(b"key", DummyHashAlgorithm(), backend)
86 h = hmac.HMAC(key, hashes.SHA256(), backend)
97 hmac.HMAC(b"key", hashes.SHA1(), pretend_backend)
Dtest_hmac_vectors.py123 h = hmac.HMAC(b"0" * 64, hashes.BLAKE2b(digest_size=64), backend)
132 h = hmac.HMAC(b"0" * 32, hashes.BLAKE2s(digest_size=32), backend)
/external/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/
DKDF.bz2
/external/python/cpython3/Doc/library/
Dhmac.rst5 :synopsis: Keyed-Hashing for Message Authentication (HMAC) implementation
14 This module implements the HMAC algorithm as described by :rfc:`2104`.
21 *digestmod* is the digest name, digest constructor or module for the HMAC
39 function is equivalent to ``HMAC(key, msg, digest).digest()``, but
51 An HMAC object has the following methods:
53 .. method:: HMAC.update(msg)
63 .. method:: HMAC.digest()
78 .. method:: HMAC.hexdigest()
92 .. method:: HMAC.copy()
100 .. attribute:: HMAC.digest_size
[all …]
/external/rust/crates/ring/src/
Dhmac_generate_serializable_tests.txt1 HMAC = SHA1
4 HMAC = SHA256
7 HMAC = SHA384
10 HMAC = SHA512
/external/python/cryptography/docs/hazmat/primitives/mac/
Dindex.rst6 While cryptography supports both the CMAC and HMAC algorithms, we strongly
7 recommend that HMAC should be used unless you have a good reason otherwise.
9 For more information on why HMAC is preferred, see `Use cases for CMAC vs.
10 HMAC?`_
12 HMAC and CMAC both use the ``MACContext`` interface:
44 .. _`Use cases for CMAC vs. HMAC?`: https://crypto.stackexchange.com/questions/15721/use-cases-for-…
Dhmac.rst3 Hash-based message authentication codes (HMAC)
15 secret key. You can use an HMAC to verify both the integrity and authenticity
18 .. class:: HMAC(key, algorithm, backend)
20 HMAC objects take a ``key`` and a
32 >>> h = hmac.HMAC(key, hashes.SHA256(), backend=default_backend())
50 >>> h = hmac.HMAC(key, hashes.SHA256(), backend=default_backend())
80 Copy this :class:`HMAC` instance, usually so that we may call
84 :return: A new instance of :class:`HMAC` that can be updated
/external/python/cpython2/Lib/test/
Dtest_hmac.py15 h = hmac.HMAC(key, data)
49 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
83 h = hmac.HMAC(key, data, digestmod=hashfunc)
219 hmac.HMAC('a', 'b', digestmod=MockCrazyHash)
224 hmac.HMAC('a', 'b', digestmod=MockCrazyHash)
235 h = hmac.HMAC("key")
242 h = hmac.HMAC("key", "hash this!")
249 h = hmac.HMAC("key", "", hashlib.sha1)
258 h = hmac.HMAC("key")
265 h = hmac.HMAC("my secret key")
[all …]
/external/python/cpython2/Doc/library/
Dhmac.rst5 :synopsis: Keyed-Hashing for Message Authentication (HMAC) implementation
16 This module implements the HMAC algorithm as described by :rfc:`2104`.
22 is made. *digestmod* is the digest constructor or module for the HMAC object to
26 An HMAC object has the following methods:
28 .. method:: HMAC.update(msg)
35 .. method:: HMAC.digest()
49 .. method:: HMAC.hexdigest()
63 .. method:: HMAC.copy()
/external/python/cpython3/Lib/test/
Dtest_hmac.py14 from _hashlib import HMAC as C_HMAC
38 h = hmac.HMAC(key, data, digestmod=hashfunc)
45 h = hmac.HMAC(key, data, digestmod=hashname)
52 h = hmac.HMAC(key, digestmod=hashname)
340 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
345 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
353 hmac.HMAC(key, data, digestmod=None)
357 hmac.HMAC(key, msg=data, digestmod='')
370 hmac.HMAC(b"key", digestmod='sha256')
379 h = hmac.HMAC("key", digestmod='sha256')
[all …]
/external/rust/crates/grpcio-sys/grpc/src/core/lib/security/credentials/external/
Daws_request_signer.cc54 std::string HMAC(const std::string& key, const std::string& msg) { in HMAC() function
57 HMAC(EVP_sha256(), key.c_str(), key.length(), in HMAC()
197 std::string date = HMAC("AWS4" + secret_access_key_, request_date_short); in GetSignedRequestHeaders()
198 std::string region = HMAC(date, region_); in GetSignedRequestHeaders()
199 std::string service = HMAC(region, service_name); in GetSignedRequestHeaders()
200 std::string signing = HMAC(service, "aws4_request"); in GetSignedRequestHeaders()
202 std::string signature_str = HMAC(signing, string_to_sign); in GetSignedRequestHeaders()
/external/rust/crates/quiche/deps/boringssl/src/util/fipstools/acvp/modulewrapper/
Dmodulewrapper.cc174 "algorithm": "HMAC-SHA-1", in GetConfig()
184 "algorithm": "HMAC-SHA2-224", in GetConfig()
194 "algorithm": "HMAC-SHA2-256", in GetConfig()
204 "algorithm": "HMAC-SHA2-384", in GetConfig()
214 "algorithm": "HMAC-SHA2-512", in GetConfig()
359 static bool HMAC(const Span<const uint8_t> args[]) { in HMAC() function
363 if (::HMAC(md, args[1].data(), args[1].size(), args[0].data(), args[0].size(), in HMAC()
584 {"HMAC-SHA-1", 2, HMAC<EVP_sha1>},
585 {"HMAC-SHA2-224", 2, HMAC<EVP_sha224>},
586 {"HMAC-SHA2-256", 2, HMAC<EVP_sha256>},
[all …]
/external/curl/tests/data/
Dtest16125 HMAC
19 HMAC unit tests
/external/python/cryptography/src/cryptography/hazmat/primitives/
Dhmac.py17 class HMAC(object): class
47 return HMAC(
/external/python/cryptography/src/cryptography/
Dfernet.py20 from cryptography.hazmat.primitives.hmac import HMAC
68 h = HMAC(self._signing_key, hashes.SHA256(), backend=self._backend)
101 h = HMAC(self._signing_key, hashes.SHA256(), backend=self._backend)
/external/scapy/scapy/layers/tls/crypto/
Dhkdf.py18 from cryptography.hazmat.primitives.hmac import HMAC
61 hm = HMAC(finished_key, self.hash, default_backend())
/external/python/cpython2/Lib/
Dhmac.py23 class HMAC: class
136 return HMAC(key, msg, digestmod)
/external/libsrtp2/
Dtiming18 plot "timing.dat" index 0 title "HMAC SHA1" with lines, "timing.dat" index 1 title "TMMH/AES" with …
36 … "timing.dat" index 6 title "TMMH/AES" with lines, "timing.dat" index 7 title "HMAC/AES" with lines
/external/scapy/test/
Dipsec.uts600 = IPv4 / ESP - Transport - NULL - HMAC-SHA1-96
610 auth_algo='HMAC-SHA1-96', auth_key=b'secret key')
631 = IPv4 / ESP - Transport - NULL - HMAC-SHA1-96 - altered packet
641 auth_algo='HMAC-SHA1-96', auth_key=b'secret key')
870 = IPv4 / ESP - Transport - NULL - HMAC-MD5-96
880 auth_algo='HMAC-MD5-96', auth_key=b'secret key')
902 = IPv4 / ESP - Transport - NULL - HMAC-MD5-96 - altered packet
912 auth_algo='HMAC-MD5-96', auth_key=b'secret key')
1009 = IPv4 / ESP - Tunnel - NULL - HMAC-SHA1-96
1019 auth_algo='HMAC-SHA1-96', auth_key=b'secret key',
[all …]

123456