Searched refs:HMAC (Results 1 – 17 of 17) sorted by relevance
/external/boringssl/src/crypto/hmac/ |
D | hmac_tests.txt | 4 HMAC = MD5 6 # that HMAC_CTX and HMAC treat NULL as the empty key initially. 11 # HMAC tests from RFC2104 12 HMAC = MD5 17 HMAC = MD5 22 HMAC = MD5 27 # HMAC tests from NIST test data 29 HMAC = SHA1 34 HMAC = SHA1 39 HMAC = SHA1 [all …]
|
D | hmac_test.cc | 110 if (nullptr == HMAC(digest, bssl::vector_data(&key), key.size(), in TestHMAC()
|
D | hmac.c | 65 uint8_t *HMAC(const EVP_MD *evp_md, const void *key, size_t key_len, in HMAC() function
|
/external/tcpdump/tests/ |
D | babel_auth.out | 6 HMAC key-id 30 digest-20 AD0FA7CD8D5A1898EC5409C8EDDA68B3ACA21B80 7 HMAC key-id 50 digest-32 8239F283D985047FA4B88597FDE3246455C6E4DD917B1441C2F3A82B9F737674 8 …HMAC key-id 1000 digest-64 6718CB4C2BB0976C127AB3CCCBFA1105A1D158F035BC9FAD86B0610A7ACD27E5A3D5A30… 9 …HMAC key-id 1000 digest-48 D2A5B80FF9D006907E3B6601C0C255D7D12D6EC61815E413A334E2A0D9271C75AFBC086… 10 HMAC key-id 100 digest-20 7213CED66FE7154034EC64CD14AE4142A092DF33 11 …HMAC key-id 2000 digest-64 2A5D9D55393B19E440FAC49BDA521E18A7FE77F7AB4A90377009E46E2FFE49336435C7E… 12 …HMAC key-id 2000 digest-48 FE91AF27EEE137EF489F37FEE449100CDA8CCB3E794D0C4A225D12724A8CE2FFC85811B… 13 …HMAC key-id 3000 digest-64 38C4D82883A5778500D728D1E243E7579DE96FA726C9DB7F0805C52E96FEFDCE7A5FB9A…
|
/external/srtp/doc/ |
D | references.txt | 13 HMAC is defined in RFC2104, and HMAC-SHA1 test vectors are available
|
D | rfc3711.txt | 69 4.2.1. HMAC-SHA1. . . . . . . . . . . . . . . . . . . . 25 76 5.2. Message Authentication/Integrity: HMAC-SHA1. . . . . . . 29 1391 4.2.1. HMAC-SHA1 1393 The pre-defined authentication transform for SRTP is HMAC-SHA1 1394 [RFC2104]. With HMAC-SHA1, the SRTP_PREFIX_LENGTH (Figure 3) SHALL 1395 be 0. For SRTP (respectively SRTCP), the HMAC SHALL be applied to 1397 HMAC(k_a, M). The HMAC output SHALL then be truncated to the n_tag 1559 message integrity HMAC-SHA1 - HMAC-SHA1 1584 5.2. Message Authentication/Integrity: HMAC-SHA1 1586 HMAC-SHA1, as defined in Section 4.2.1, SHALL be the default message [all …]
|
/external/srtp/ |
D | timing | 18 plot "timing.dat" index 0 title "HMAC SHA1" with lines, "timing.dat" index 1 title "TMMH/AES" with … 36 … "timing.dat" index 6 title "TMMH/AES" with lines, "timing.dat" index 7 title "HMAC/AES" with lines
|
/external/boringssl/src/include/openssl/ |
D | hmac.h | 79 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) { in HKDF()
|
/external/mdnsresponder/mDNSCore/ |
D | mDNS.c | 643 if (!(authrr->resrec.RecordType & kDNSRecordTypeUniqueMask) || authrr->WakeUp.HMAC.l[0]) in PacketRRMatchesSignature() 777 if (rr->WakeUp.HMAC.l[0] && rr->resrec.rrtype == kDNSType_AAAA) in InitializeLastAPTime() 1163 if (rr->WakeUp.HMAC.l[0] && !rr->AddressProxy.type) rr->AnnounceCount = 2; in mDNS_Register_internal() 1521 if (rr->WakeUp.HMAC.l[0] || in mDNS_Deregister_internal() 1527 …rr->AnnounceCount = rr->WakeUp.HMAC.l[0] ? WakeupCount : (drt == mDNS_Dereg_rapid) ? 1 : Go… in mDNS_Deregister_internal() 1757 rr->WakeUp.HMAC = zeroEthAddr; in CompleteDeregistration() 2009 owner->u.owner.HMAC = m->PrimaryMAC; in SetupOwnerOpt() 2080 if (!rr->WakeUp.HMAC.l[0]) in SendResponses() 2096 r2->AnnounceCount-3, &r2->WakeUp.HMAC, &r2->WakeUp.IMAC, ARDisplayString(m,r2)); in SendResponses() 2101 if (--r2->AnnounceCount <= GoodbyeCount) r2->WakeUp.HMAC = zeroEthAddr; in SendResponses() [all …]
|
D | mDNSEmbeddedAPI.h | 749 mDNSEthAddr HMAC; // Host's primary identifier (e.g. MAC of on-board Ethernet) member 786 (O)->opt == kDNSOpt_Owner ? DNSOpt_Owner_Space(&(O)->u.owner.HMAC, &(O)->u.owner.IMAC) : 0x10000)
|
D | DNSCommon.c | 231 length += mDNS_snprintf(buffer+length, RemSpc, " MAC %.6a", opt->u.owner.HMAC.b); in GetRRDisplayString_rdb() 1750 mDNSPlatformMemCopy(ptr, opt->u.owner.HMAC.b, 6); // 6-byte Host identifier in putRData() 2328 mDNSPlatformMemCopy(opt->u.owner.HMAC.b, ptr+2, 6); // 6-byte MAC address in GetLargeResourceRecord()
|
/external/boringssl/src/crypto/obj/ |
D | objects.txt | 14 # HMAC OIDs 15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 1162 cryptopro 10 : id-HMACGostR3411-94 : HMAC GOST 34.11-94 1281 # There is no OID that just denotes "HMAC" oddly enough... 1283 : HMAC : hmac 1288 : RC4-HMAC-MD5 : rc4-hmac-md5 1289 : AES-128-CBC-HMAC-SHA1 : aes-128-cbc-hmac-sha1 1290 : AES-192-CBC-HMAC-SHA1 : aes-192-cbc-hmac-sha1 1291 : AES-256-CBC-HMAC-SHA1 : aes-256-cbc-hmac-sha1
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8.c | 993 if (NULL == HMAC(md, hmac_key, EVP_MD_size(md), CBS_data(&authsafes), in PKCS12_get_key_and_certs()
|
/external/mdnsresponder/mDNSShared/ |
D | uds_daemon.c | 4274 if ((ar->WakeUp.HMAC.l[0] != 0) == (proxy != mDNSNULL)) in LogAuthRecords() 4282 …LogMsgNoIdent("Proxying for H-MAC %.6a I-MAC %.6a Password %.6a seq %d", &owner.HMAC, &owner.IMAC,… in LogAuthRecords() 4283 else if (!mDNSSameEthAddress(&owner.HMAC, &owner.IMAC)) in LogAuthRecords() 4284 …LogMsgNoIdent("Proxying for H-MAC %.6a I-MAC %.6a seq %d", &owner.HMAC, &owner.IMAC,… in LogAuthRecords() 4286 …LogMsgNoIdent("Proxying for %.6a seq %d", &owner.HMAC, … in LogAuthRecords()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ChangeLog | 552 - use OpenSSL HMAC implementation
|
/external/openssh/ |
D | ChangeLog | 4798 replace openssl HMAC with an implementation based on our ssh_digest_*
|