/external/tcpdump/tests/ |
D | ikev2pI2.out | 6 (t: #2 type=integ id=hmac-sha ) 7 (t: #3 type=prf id=hmac-sha ) 11 (t: #2 type=integ id=hmac-sha ) 12 (t: #3 type=prf id=hmac-md5 ) 16 (t: #2 type=integ id=hmac-sha ) 17 (t: #3 type=prf id=hmac-sha ) 21 (t: #2 type=integ id=hmac-sha ) 22 (t: #3 type=prf id=hmac-md5 ) 26 (t: #2 type=integ id=hmac-sha ) 27 (t: #3 type=prf id=hmac-sha ) [all …]
|
D | ikev2four.out | 9 (t: #5 type=prf id=hmac-sha ) 10 (t: #6 type=prf id=hmac-md5 ) 12 (t: #8 type=integ id=hmac-sha ) 13 (t: #9 type=integ id=hmac-md5 ) 33 (t: #5 type=prf id=hmac-sha ) 34 (t: #6 type=prf id=hmac-md5 ) 36 (t: #8 type=integ id=hmac-sha ) 37 (t: #9 type=integ id=hmac-md5 ) 50 (t: #2 type=prf id=hmac-sha ) 51 (t: #3 type=integ id=hmac-sha )
|
D | ikev2fourv4.out | 9 (t: #5 type=prf id=hmac-sha ) 10 (t: #6 type=prf id=hmac-md5 ) 12 (t: #8 type=integ id=hmac-sha ) 13 (t: #9 type=integ id=hmac-md5 ) 33 (t: #5 type=prf id=hmac-sha ) 34 (t: #6 type=prf id=hmac-md5 ) 36 (t: #8 type=integ id=hmac-sha ) 37 (t: #9 type=integ id=hmac-md5 ) 50 (t: #2 type=prf id=hmac-sha ) 51 (t: #3 type=integ id=hmac-sha )
|
D | ikev2fourv.out | 9 (t: #5 type=prf id=hmac-sha ) 10 (t: #6 type=prf id=hmac-md5 ) 12 (t: #8 type=integ id=hmac-sha ) 13 (t: #9 type=integ id=hmac-md5 ) 33 (t: #5 type=prf id=hmac-sha ) 34 (t: #6 type=prf id=hmac-md5 ) 36 (t: #8 type=integ id=hmac-sha ) 37 (t: #9 type=integ id=hmac-md5 ) 50 (t: #2 type=prf id=hmac-sha ) 51 (t: #3 type=integ id=hmac-sha )
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 35 HMAC_CTX hmac; in HKDF() local 47 HMAC_CTX_init(&hmac); in HKDF() 55 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { in HKDF() 63 if (i != 0 && (!HMAC_Init_ex(&hmac, NULL, 0, NULL, NULL) || in HKDF() 64 !HMAC_Update(&hmac, previous, digest_len))) { in HKDF() 67 if (!HMAC_Update(&hmac, info, info_len) || in HKDF() 68 !HMAC_Update(&hmac, &ctr, 1) || in HKDF() 69 !HMAC_Final(&hmac, previous, NULL)) { in HKDF() 84 HMAC_CTX_cleanup(&hmac); in HKDF()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_record.c | 155 struct crypto_hash *hmac; in tlsv1_record_send() local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, in tlsv1_record_send() 209 if (hmac == NULL) { in tlsv1_record_send() 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); in tlsv1_record_send() 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); in tlsv1_record_send() 217 crypto_hash_update(hmac, payload, payload_len); in tlsv1_record_send() 222 crypto_hash_finish(hmac, NULL, NULL); in tlsv1_record_send() 226 if (crypto_hash_finish(hmac, pos, &clen) < 0) { in tlsv1_record_send() 284 struct crypto_hash *hmac; in tlsv1_record_receive() local 436 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret, in tlsv1_record_receive() [all …]
|
/external/srtp/crypto/hash/ |
D | hmac.c | 58 extern auth_type_t hmac; in hmac_alloc() 82 (*a)->type = &hmac; in hmac_alloc() 89 hmac.ref_count++; in hmac_alloc() 96 extern auth_type_t hmac; in hmac_dealloc() 106 hmac.ref_count--; in hmac_dealloc() 255 hmac = { variable
|
/external/jetty/src/config/etc/ |
D | krb5.ini | 4 permitted_enctypes = aes128-cts aes256-cts arcfour-hmac-md5 5 default_tgs_enctypes = aes128-cts aes256-cts arcfour-hmac-md5 6 default_tkt_enctypes = aes128-cts aes256-cts arcfour-hmac-md5
|
/external/boringssl/src/crypto/hmac/ |
D | CMakeLists.txt | 4 hmac target 8 hmac.c
|
/external/openssh/ |
D | ssh_config | 41 # MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160
|
D | sshd_config.0 | 512 hmac-md5 513 hmac-md5-96 514 hmac-ripemd160 515 hmac-sha1 516 hmac-sha1-96 517 hmac-sha2-256 518 hmac-sha2-512 521 hmac-md5-etm@openssh.com 522 hmac-md5-96-etm@openssh.com 523 hmac-ripemd160-etm@openssh.com [all …]
|
/external/chromium-trace/trace-viewer/third_party/webapp2/webapp2_extras/ |
D | security.py | 17 import hmac 183 h = hmac.new(webapp2._to_utf8(salt), password, method) 188 h = hmac.new(webapp2._to_utf8(pepper), h.hexdigest(), method)
|
D | securecookie.py | 13 import hmac 102 signature = hmac.new(self.secret_key, digestmod=hashlib.sha1)
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.c | 168 unsigned char hmac[SHA1_MAC_LEN]; in eap_sim_verify_mac() local 196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_verify_mac() 198 hmac, EAP_SIM_MAC_LEN); in eap_sim_verify_mac() 201 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1; in eap_sim_verify_mac() 208 unsigned char hmac[SHA1_MAC_LEN]; in eap_sim_add_mac() local 224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_add_mac() 225 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN); in eap_sim_add_mac() 363 unsigned char hmac[SHA256_MAC_LEN]; in eap_sim_verify_mac_sha256() local 391 hmac_sha256_vector(k_aut, EAP_AKA_PRIME_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_verify_mac_sha256() 393 hmac, EAP_SIM_MAC_LEN); in eap_sim_verify_mac_sha256() [all …]
|
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/ |
D | cookie.py | 44 import hmac, base64, random, six, time, warnings 55 _signature_size = len(hmac.new(b'x', b'x', sha1).digest()) 148 hmac.new(self.secret, content, sha1).digest() + 167 if signature == hmac.new(self.secret, content, sha1).digest():
|
/external/boringssl/src/ssl/test/runner/ |
D | cipher_suites.go | 162 return tls10MAC{hmac.New(sha1.New, key)} 174 return tls10MAC{hmac.New(md5.New, key)} 186 return tls10MAC{hmac.New(sha256.New, key)} 198 return tls10MAC{hmac.New(sha512.New384, key)}
|
D | ticket.go | 187 mac := hmac.New(sha256.New, c.config.SessionTicketKey[16:32]) 202 mac := hmac.New(sha256.New, c.config.SessionTicketKey[16:32])
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_libtomcrypt.c | 148 hmac_state hmac; member 174 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) != in crypto_hash_init() 179 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) != in crypto_hash_init() 208 ctx->error = hmac_process(&ctx->u.hmac, data, len) != CRYPT_OK; in crypto_hash_update() 267 if (hmac_done(&ctx->u.hmac, mac, &clen) != CRYPT_OK) { in crypto_hash_finish()
|
/external/chromium-trace/trace-viewer/third_party/WebOb/webob/ |
D | util.py | 135 from hmac import compare_digest
|
/external/boringssl/src/crypto/ |
D | CMakeLists.txt | 128 add_subdirectory(hmac) 192 $<TARGET_OBJECTS:hmac>
|
/external/srtp/ |
D | Android.mk | 16 crypto/hash/hmac.c \
|
/external/srtp/crypto/kernel/ |
D | crypto_kernel.c | 80 extern auth_type_t hmac; 165 status = crypto_kernel_load_auth_type(&hmac, HMAC_SHA1); in crypto_kernel_init()
|
/external/boringssl/src/util/ |
D | doc.config | 36 "include/openssl/hmac.h",
|
/external/srtp/crypto/ |
D | Makefile.in | 74 hash/hmac.o hash/auth.o
|
D | Makefile | 74 hash/hmac.o hash/auth.o
|