Home
last modified time | relevance | path

Searched refs:HMAC (Results 1 – 17 of 17) sorted by relevance

/external/boringssl/src/crypto/hmac/
Dhmac_tests.txt4 HMAC = MD5
6 # that HMAC_CTX and HMAC treat NULL as the empty key initially.
11 # HMAC tests from RFC2104
12 HMAC = MD5
17 HMAC = MD5
22 HMAC = MD5
27 # HMAC tests from NIST test data
29 HMAC = SHA1
34 HMAC = SHA1
39 HMAC = SHA1
[all …]
Dhmac_test.cc110 if (nullptr == HMAC(digest, bssl::vector_data(&key), key.size(), in TestHMAC()
Dhmac.c65 uint8_t *HMAC(const EVP_MD *evp_md, const void *key, size_t key_len, in HMAC() function
/external/tcpdump/tests/
Dbabel_auth.out6 HMAC key-id 30 digest-20 AD0FA7CD8D5A1898EC5409C8EDDA68B3ACA21B80
7 HMAC key-id 50 digest-32 8239F283D985047FA4B88597FDE3246455C6E4DD917B1441C2F3A82B9F737674
8HMAC key-id 1000 digest-64 6718CB4C2BB0976C127AB3CCCBFA1105A1D158F035BC9FAD86B0610A7ACD27E5A3D5A30…
9HMAC key-id 1000 digest-48 D2A5B80FF9D006907E3B6601C0C255D7D12D6EC61815E413A334E2A0D9271C75AFBC086…
10 HMAC key-id 100 digest-20 7213CED66FE7154034EC64CD14AE4142A092DF33
11HMAC key-id 2000 digest-64 2A5D9D55393B19E440FAC49BDA521E18A7FE77F7AB4A90377009E46E2FFE49336435C7E…
12HMAC key-id 2000 digest-48 FE91AF27EEE137EF489F37FEE449100CDA8CCB3E794D0C4A225D12724A8CE2FFC85811B…
13HMAC key-id 3000 digest-64 38C4D82883A5778500D728D1E243E7579DE96FA726C9DB7F0805C52E96FEFDCE7A5FB9A…
/external/srtp/doc/
Dreferences.txt13 HMAC is defined in RFC2104, and HMAC-SHA1 test vectors are available
Drfc3711.txt69 4.2.1. HMAC-SHA1. . . . . . . . . . . . . . . . . . . . 25
76 5.2. Message Authentication/Integrity: HMAC-SHA1. . . . . . . 29
1391 4.2.1. HMAC-SHA1
1393 The pre-defined authentication transform for SRTP is HMAC-SHA1
1394 [RFC2104]. With HMAC-SHA1, the SRTP_PREFIX_LENGTH (Figure 3) SHALL
1395 be 0. For SRTP (respectively SRTCP), the HMAC SHALL be applied to
1397 HMAC(k_a, M). The HMAC output SHALL then be truncated to the n_tag
1559 message integrity HMAC-SHA1 - HMAC-SHA1
1584 5.2. Message Authentication/Integrity: HMAC-SHA1
1586 HMAC-SHA1, as defined in Section 4.2.1, SHALL be the default message
[all …]
/external/srtp/
Dtiming18 plot "timing.dat" index 0 title "HMAC SHA1" with lines, "timing.dat" index 1 title "TMMH/AES" with …
36 … "timing.dat" index 6 title "TMMH/AES" with lines, "timing.dat" index 7 title "HMAC/AES" with lines
/external/boringssl/src/include/openssl/
Dhmac.h79 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
/external/boringssl/src/crypto/hkdf/
Dhkdf.c50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) { in HKDF()
/external/mdnsresponder/mDNSCore/
DmDNS.c643 if (!(authrr->resrec.RecordType & kDNSRecordTypeUniqueMask) || authrr->WakeUp.HMAC.l[0]) in PacketRRMatchesSignature()
777 if (rr->WakeUp.HMAC.l[0] && rr->resrec.rrtype == kDNSType_AAAA) in InitializeLastAPTime()
1163 if (rr->WakeUp.HMAC.l[0] && !rr->AddressProxy.type) rr->AnnounceCount = 2; in mDNS_Register_internal()
1521 if (rr->WakeUp.HMAC.l[0] || in mDNS_Deregister_internal()
1527 …rr->AnnounceCount = rr->WakeUp.HMAC.l[0] ? WakeupCount : (drt == mDNS_Dereg_rapid) ? 1 : Go… in mDNS_Deregister_internal()
1757 rr->WakeUp.HMAC = zeroEthAddr; in CompleteDeregistration()
2009 owner->u.owner.HMAC = m->PrimaryMAC; in SetupOwnerOpt()
2080 if (!rr->WakeUp.HMAC.l[0]) in SendResponses()
2096 r2->AnnounceCount-3, &r2->WakeUp.HMAC, &r2->WakeUp.IMAC, ARDisplayString(m,r2)); in SendResponses()
2101 if (--r2->AnnounceCount <= GoodbyeCount) r2->WakeUp.HMAC = zeroEthAddr; in SendResponses()
[all …]
DmDNSEmbeddedAPI.h749 mDNSEthAddr HMAC; // Host's primary identifier (e.g. MAC of on-board Ethernet) member
786 (O)->opt == kDNSOpt_Owner ? DNSOpt_Owner_Space(&(O)->u.owner.HMAC, &(O)->u.owner.IMAC) : 0x10000)
DDNSCommon.c231 length += mDNS_snprintf(buffer+length, RemSpc, " MAC %.6a", opt->u.owner.HMAC.b); in GetRRDisplayString_rdb()
1750 mDNSPlatformMemCopy(ptr, opt->u.owner.HMAC.b, 6); // 6-byte Host identifier in putRData()
2328 mDNSPlatformMemCopy(opt->u.owner.HMAC.b, ptr+2, 6); // 6-byte MAC address in GetLargeResourceRecord()
/external/boringssl/src/crypto/obj/
Dobjects.txt14 # HMAC OIDs
15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5
16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1
1162 cryptopro 10 : id-HMACGostR3411-94 : HMAC GOST 34.11-94
1281 # There is no OID that just denotes "HMAC" oddly enough...
1283 : HMAC : hmac
1288 : RC4-HMAC-MD5 : rc4-hmac-md5
1289 : AES-128-CBC-HMAC-SHA1 : aes-128-cbc-hmac-sha1
1290 : AES-192-CBC-HMAC-SHA1 : aes-192-cbc-hmac-sha1
1291 : AES-256-CBC-HMAC-SHA1 : aes-256-cbc-hmac-sha1
/external/boringssl/src/crypto/pkcs8/
Dpkcs8.c993 if (NULL == HMAC(md, hmac_key, EVP_MD_size(md), CBS_data(&authsafes), in PKCS12_get_key_and_certs()
/external/mdnsresponder/mDNSShared/
Duds_daemon.c4274 if ((ar->WakeUp.HMAC.l[0] != 0) == (proxy != mDNSNULL)) in LogAuthRecords()
4282 …LogMsgNoIdent("Proxying for H-MAC %.6a I-MAC %.6a Password %.6a seq %d", &owner.HMAC, &owner.IMAC,… in LogAuthRecords()
4283 else if (!mDNSSameEthAddress(&owner.HMAC, &owner.IMAC)) in LogAuthRecords()
4284 …LogMsgNoIdent("Proxying for H-MAC %.6a I-MAC %.6a seq %d", &owner.HMAC, &owner.IMAC,… in LogAuthRecords()
4286 …LogMsgNoIdent("Proxying for %.6a seq %d", &owner.HMAC, … in LogAuthRecords()
/external/wpa_supplicant_8/wpa_supplicant/
DChangeLog552 - use OpenSSL HMAC implementation
/external/openssh/
DChangeLog4798 replace openssl HMAC with an implementation based on our ssh_digest_*