/external/boringssl/src/crypto/hmac/ |
D | hmac_tests.txt | 1 HMAC = MD5 3 # that HMAC_CTX and HMAC treat NULL as the empty key initially. 8 # HMAC tests from RFC2104 9 HMAC = MD5 14 HMAC = MD5 19 HMAC = MD5 24 # HMAC tests from NIST test data 26 HMAC = SHA1 31 HMAC = SHA1 36 HMAC = SHA1 [all …]
|
D | hmac_test.cc | 109 if (nullptr == HMAC(digest, key.data(), key.size(), input.data(), in TestHMAC()
|
D | hmac.c | 65 uint8_t *HMAC(const EVP_MD *evp_md, const void *key, size_t key_len, in HMAC() function
|
/external/libchrome/crypto/ |
D | hmac_unittest.cc | 80 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 149 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 175 crypto::HMAC hmac(crypto::HMAC::SHA256); in TEST() 216 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 232 crypto::HMAC hmac2(crypto::HMAC::SHA256); in TEST() 241 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 255 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 289 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
|
D | hmac_openssl.cc | 24 HMAC::HMAC(HashAlgorithm hash_alg) : hash_alg_(hash_alg) { in HMAC() function in crypto::HMAC 29 bool HMAC::Init(const unsigned char* key, size_t key_length) { in Init() 37 HMAC::~HMAC() { in ~HMAC() 45 bool HMAC::Sign(const base::StringPiece& data, in Sign() 51 return !!::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256(), in Sign()
|
D | hmac_nss.cc | 24 HMAC::HMAC(HashAlgorithm hash_alg) in HMAC() function in crypto::HMAC 40 HMAC::~HMAC() { in ~HMAC() 43 bool HMAC::Init(const unsigned char *key, size_t key_length) { in Init() 77 bool HMAC::Sign(const base::StringPiece& data, in Sign()
|
D | hmac.h | 25 class CRYPTO_EXPORT HMAC { 33 explicit HMAC(HashAlgorithm hash_alg); 34 ~HMAC(); 90 DISALLOW_COPY_AND_ASSIGN(HMAC);
|
D | hmac.cc | 17 bool HMAC::Init(SymmetricKey* key) { in Init() 26 size_t HMAC::DigestLength() const { in DigestLength() 38 bool HMAC::Verify(const base::StringPiece& data, in Verify() 45 bool HMAC::VerifyTruncated(const base::StringPiece& data, in VerifyTruncated()
|
D | hmac_win.cc | 107 HMAC::HMAC(HashAlgorithm hash_alg) in HMAC() function in crypto::HMAC 113 bool HMAC::Init(const unsigned char* key, size_t key_length) { in Init() 167 HMAC::~HMAC() { in ~HMAC() 170 bool HMAC::Sign(const base::StringPiece& data, in Sign()
|
D | crypto.gypi | 7 # Put all transitive dependencies for Windows HMAC here. 27 # NOTE: all transitive dependencies of HMAC on windows need
|
/external/tcpdump/tests/ |
D | babel_auth.out | 6 HMAC key-id 30 digest-20 AD0FA7CD8D5A1898EC5409C8EDDA68B3ACA21B80 7 HMAC key-id 50 digest-32 8239F283D985047FA4B88597FDE3246455C6E4DD917B1441C2F3A82B9F737674 8 …HMAC key-id 1000 digest-64 6718CB4C2BB0976C127AB3CCCBFA1105A1D158F035BC9FAD86B0610A7ACD27E5A3D5A30… 9 …HMAC key-id 1000 digest-48 D2A5B80FF9D006907E3B6601C0C255D7D12D6EC61815E413A334E2A0D9271C75AFBC086… 10 HMAC key-id 100 digest-20 7213CED66FE7154034EC64CD14AE4142A092DF33 11 …HMAC key-id 2000 digest-64 2A5D9D55393B19E440FAC49BDA521E18A7FE77F7AB4A90377009E46E2FFE49336435C7E… 12 …HMAC key-id 2000 digest-48 FE91AF27EEE137EF489F37FEE449100CDA8CCB3E794D0C4A225D12724A8CE2FFC85811B… 13 …HMAC key-id 3000 digest-64 38C4D82883A5778500D728D1E243E7579DE96FA726C9DB7F0805C52E96FEFDCE7A5FB9A…
|
D | ospf3_auth-vv.out | 8 Authentication Type HMAC, Length 48, SAID 1, CSN 0x00000000:52da4e0e
|
/external/srtp/doc/ |
D | references.txt | 13 HMAC is defined in RFC2104, and HMAC-SHA1 test vectors are available
|
D | rfc3711.txt | 69 4.2.1. HMAC-SHA1. . . . . . . . . . . . . . . . . . . . 25 76 5.2. Message Authentication/Integrity: HMAC-SHA1. . . . . . . 29 1391 4.2.1. HMAC-SHA1 1393 The pre-defined authentication transform for SRTP is HMAC-SHA1 1394 [RFC2104]. With HMAC-SHA1, the SRTP_PREFIX_LENGTH (Figure 3) SHALL 1395 be 0. For SRTP (respectively SRTCP), the HMAC SHALL be applied to 1397 HMAC(k_a, M). The HMAC output SHALL then be truncated to the n_tag 1559 message integrity HMAC-SHA1 - HMAC-SHA1 1584 5.2. Message Authentication/Integrity: HMAC-SHA1 1586 HMAC-SHA1, as defined in Section 4.2.1, SHALL be the default message [all …]
|
/external/srtp/ |
D | timing | 18 plot "timing.dat" index 0 title "HMAC SHA1" with lines, "timing.dat" index 1 title "TMMH/AES" with … 36 … "timing.dat" index 6 title "TMMH/AES" with lines, "timing.dat" index 7 title "HMAC/AES" with lines
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/ |
D | cred_types.py | 21 HMAC = "HMAC" variable in CredTypes
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/commands/ |
D | config.py | 838 elif cred_type == CredTypes.HMAC: 946 if cred_type == CredTypes.HMAC: api_version = 1 1005 cred_type = CredTypes.HMAC
|
/external/boringssl/src/include/openssl/ |
D | hmac.h | 79 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) { in HKDF()
|
/external/mdnsresponder/mDNSCore/ |
D | mDNS.c | 643 if (!(authrr->resrec.RecordType & kDNSRecordTypeUniqueMask) || authrr->WakeUp.HMAC.l[0]) in PacketRRMatchesSignature() 777 if (rr->WakeUp.HMAC.l[0] && rr->resrec.rrtype == kDNSType_AAAA) in InitializeLastAPTime() 1163 if (rr->WakeUp.HMAC.l[0] && !rr->AddressProxy.type) rr->AnnounceCount = 2; in mDNS_Register_internal() 1521 if (rr->WakeUp.HMAC.l[0] || in mDNS_Deregister_internal() 1527 …rr->AnnounceCount = rr->WakeUp.HMAC.l[0] ? WakeupCount : (drt == mDNS_Dereg_rapid) ? 1 : Go… in mDNS_Deregister_internal() 1757 rr->WakeUp.HMAC = zeroEthAddr; in CompleteDeregistration() 2009 owner->u.owner.HMAC = m->PrimaryMAC; in SetupOwnerOpt() 2080 if (!rr->WakeUp.HMAC.l[0]) in SendResponses() 2096 r2->AnnounceCount-3, &r2->WakeUp.HMAC, &r2->WakeUp.IMAC, ARDisplayString(m,r2)); in SendResponses() 2101 if (--r2->AnnounceCount <= GoodbyeCount) r2->WakeUp.HMAC = zeroEthAddr; in SendResponses() [all …]
|
/external/boringssl/src/crypto/obj/ |
D | objects.txt | 14 # HMAC OIDs 15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 1162 cryptopro 10 : id-HMACGostR3411-94 : HMAC GOST 34.11-94 1281 # There is no OID that just denotes "HMAC" oddly enough... 1283 : HMAC : hmac 1288 : RC4-HMAC-MD5 : rc4-hmac-md5 1289 : AES-128-CBC-HMAC-SHA1 : aes-128-cbc-hmac-sha1 1290 : AES-192-CBC-HMAC-SHA1 : aes-192-cbc-hmac-sha1 1291 : AES-256-CBC-HMAC-SHA1 : aes-256-cbc-hmac-sha1
|
/external/tpm2/ |
D | part4.txt | 108 …5.8.3.3 Hash and HMAC State Structures ....................................................… 626 …10.2.4 Hash/HMAC Functions .......................................................................… 831 …B.8.5. HMAC Functions .......................................................................… 1621 5.8.3.3 Hash and HMAC State Structures 1633 or HMAC_STATE_SEQUENCE then state is followed by the HMAC key in oPad format. 1649 An HMAC_STATE structure contains an opaque HMAC stack state. A caller would use this structure 1650 … when performing incremental HMAC operations. This structure contains a hash state and an HMAC key 1651 and allows slightly better stack optimization than adding an HMAC key to each hash state. 1656 37 TPM2B_HASH_BLOCK hmacKey; // the HMAC key 1681 hash, HMAC, or event. [all …]
|
D | Android.mk | 91 HMAC.c \
|
/external/tpm2/generator/ |
D | raw_commands_fixed.txt | 236 Hash/HMAC/Event Sequences .........................................................................… 1318 1) If the session handle is not a handle for an HMAC session, a handle for a policy session, or, 1324 If the HMAC and policy session contexts use the same memory, the type of the context must 1398 c) If the object or NV Index is subject to DA protection, and the authorization is with an HMAC or 1407 An HMAC or password is required in a policy 1464 if the authorization is an HMAC session or a password; 1519 7) if the authorization uses an HMAC, then the HMAC is properly constructed using the authValue 1699 appropriate, generate an HMAC. 2005 If use of a handle requires authorization, the Password, HMAC, or Policy session associated with the 3705 indicates the type of the session; simple HMAC or policy [all …]
|
D | raw_commands.txt | 236 Hash/HMAC/Event Sequences .........................................................................… 1318 1) If the session handle is not a handle for an HMAC session, a handle for a policy session, or, 1324 If the HMAC and policy session contexts use the same memory, the type of the context must 1398 c) If the object or NV Index is subject to DA protection, and the authorization is with an HMAC or 1407 An HMAC or password is required in a policy 1464 if the authorization is an HMAC session or a password; 1519 7) if the authorization uses an HMAC, then the HMAC is properly constructed using the authValue 1699 appropriate, generate an HMAC. 2005 If use of a handle requires authorization, the Password, HMAC, or Policy session associated with the 3703 indicates the type of the session; simple HMAC or policy [all …]
|