Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 25 of 81) sorted by relevance

1234

/external/dhcpcd-6.8.2/test/
Dtest_hmac_md5.c37 print_hmac(uint8_t *hmac) in print_hmac() argument
43 printf("%02x", *hmac++); in print_hmac()
50 uint8_t hmac[16]; in hmac_md5_test1() local
58 hmac_md5(text, 8, key, 16, hmac); in hmac_md5_test1()
59 print_hmac(hmac); in hmac_md5_test1()
66 uint8_t hmac[16]; in hmac_md5_test2() local
71 hmac_md5(text, 28, key, 4, hmac); in hmac_md5_test2()
72 print_hmac(hmac); in hmac_md5_test2()
79 uint8_t hmac[16]; in hmac_md5_test3() local
89 hmac_md5(text, 50, key, 16, hmac); in hmac_md5_test3()
[all …]
/external/libchrome/crypto/
Dhmac_unittest.cc80 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() local
81 ASSERT_TRUE(hmac.Init(kClientKey, kKeySize)); in TEST()
84 EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize)); in TEST()
149 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() local
150 ASSERT_TRUE(hmac.Init(reinterpret_cast<const unsigned char*>(cases[i].key), in TEST()
154 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); in TEST()
175 crypto::HMAC hmac(crypto::HMAC::SHA256); in TEST() local
176 ASSERT_TRUE(hmac.Init(key, sizeof(key))); in TEST()
179 EXPECT_EQ(kSHA256DigestSize, hmac.DigestLength()); in TEST()
180 EXPECT_TRUE(hmac.Sign(data, calculated_hmac, kSHA256DigestSize)); in TEST()
[all …]
/external/tcpdump/tests/
Dikev2pI2.out6 (t: #2 type=integ id=hmac-sha )
7 (t: #3 type=prf id=hmac-sha )
11 (t: #2 type=integ id=hmac-sha )
12 (t: #3 type=prf id=hmac-md5 )
16 (t: #2 type=integ id=hmac-sha )
17 (t: #3 type=prf id=hmac-sha )
21 (t: #2 type=integ id=hmac-sha )
22 (t: #3 type=prf id=hmac-md5 )
26 (t: #2 type=integ id=hmac-sha )
27 (t: #3 type=prf id=hmac-sha )
[all …]
Dikev2four.out9 (t: #5 type=prf id=hmac-sha )
10 (t: #6 type=prf id=hmac-md5 )
12 (t: #8 type=integ id=hmac-sha )
13 (t: #9 type=integ id=hmac-md5 )
33 (t: #5 type=prf id=hmac-sha )
34 (t: #6 type=prf id=hmac-md5 )
36 (t: #8 type=integ id=hmac-sha )
37 (t: #9 type=integ id=hmac-md5 )
50 (t: #2 type=prf id=hmac-sha )
51 (t: #3 type=integ id=hmac-sha )
Dikev2fourv.out9 (t: #5 type=prf id=hmac-sha )
10 (t: #6 type=prf id=hmac-md5 )
12 (t: #8 type=integ id=hmac-sha )
13 (t: #9 type=integ id=hmac-md5 )
33 (t: #5 type=prf id=hmac-sha )
34 (t: #6 type=prf id=hmac-md5 )
36 (t: #8 type=integ id=hmac-sha )
37 (t: #9 type=integ id=hmac-md5 )
50 (t: #2 type=prf id=hmac-sha )
51 (t: #3 type=integ id=hmac-sha )
Dikev2fourv4.out9 (t: #5 type=prf id=hmac-sha )
10 (t: #6 type=prf id=hmac-md5 )
12 (t: #8 type=integ id=hmac-sha )
13 (t: #9 type=integ id=hmac-md5 )
33 (t: #5 type=prf id=hmac-sha )
34 (t: #6 type=prf id=hmac-md5 )
36 (t: #8 type=integ id=hmac-sha )
37 (t: #9 type=integ id=hmac-md5 )
50 (t: #2 type=prf id=hmac-sha )
51 (t: #3 type=integ id=hmac-sha )
/external/boringssl/src/crypto/hkdf/
Dhkdf.c35 HMAC_CTX hmac; in HKDF() local
47 HMAC_CTX_init(&hmac); in HKDF()
55 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { in HKDF()
63 if (i != 0 && (!HMAC_Init_ex(&hmac, NULL, 0, NULL, NULL) || in HKDF()
64 !HMAC_Update(&hmac, previous, digest_len))) { in HKDF()
67 if (!HMAC_Update(&hmac, info, info_len) || in HKDF()
68 !HMAC_Update(&hmac, &ctr, 1) || in HKDF()
69 !HMAC_Final(&hmac, previous, NULL)) { in HKDF()
84 HMAC_CTX_cleanup(&hmac); in HKDF()
/external/wpa_supplicant_8/src/tls/
Dtlsv1_record.c155 struct crypto_hash *hmac; in tlsv1_record_send() local
207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, in tlsv1_record_send()
209 if (hmac == NULL) { in tlsv1_record_send()
214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); in tlsv1_record_send()
216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); in tlsv1_record_send()
217 crypto_hash_update(hmac, payload, payload_len); in tlsv1_record_send()
222 crypto_hash_finish(hmac, NULL, NULL); in tlsv1_record_send()
226 if (crypto_hash_finish(hmac, pos, &clen) < 0) { in tlsv1_record_send()
284 struct crypto_hash *hmac; in tlsv1_record_receive() local
436 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret, in tlsv1_record_receive()
[all …]
/external/srtp/crypto/hash/
Dhmac.c58 extern auth_type_t hmac; in hmac_alloc()
82 (*a)->type = &hmac; in hmac_alloc()
89 hmac.ref_count++; in hmac_alloc()
96 extern auth_type_t hmac; in hmac_dealloc()
106 hmac.ref_count--; in hmac_dealloc()
255 hmac = { variable
/external/dhcpcd-6.8.2/
Dauth.c117 uint8_t hmac[HMAC_LENGTH]; in dhcp_auth_validate() local
184 if (dlen < sizeof(secretid) + sizeof(hmac)) { in dhcp_auth_validate()
193 if (dlen < sizeof(secretid) + sizeof(hmac)) { in dhcp_auth_validate()
197 realm_len = dlen - (sizeof(secretid) + sizeof(hmac)); in dhcp_auth_validate()
327 memset(hmac, 0, sizeof(hmac)); in dhcp_auth_validate()
330 hmac_md5(mm, mlen, t->key, t->key_len, hmac); in dhcp_auth_validate()
339 if (memcmp(d, &hmac, dlen)) { in dhcp_auth_validate()
480 uint8_t hmac[HMAC_LENGTH]; in dhcp_auth_encode() local
553 dlen += sizeof(t->secretid) + sizeof(hmac); in dhcp_auth_encode()
656 hmac_md5(m, mlen, t->key, t->key_len, hmac); in dhcp_auth_encode()
[all …]
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/db/
Dtest_password.py38 import hmac
40 return hmac.new('mysecret', msg)
56 import hmac, hashlib
100 import hmac
101 myhashfunc=lambda msg: hmac.new('mysecret', msg)
/external/jetty/src/config/etc/
Dkrb5.ini4 permitted_enctypes = aes128-cts aes256-cts arcfour-hmac-md5
5 default_tgs_enctypes = aes128-cts aes256-cts arcfour-hmac-md5
6 default_tkt_enctypes = aes128-cts aes256-cts arcfour-hmac-md5
/external/webrtc/webrtc/p2p/base/
Dstun.cc193 char hmac[kStunMessageIntegritySize]; in ValidateMessageIntegrity() local
197 hmac, sizeof(hmac)); in ValidateMessageIntegrity()
198 ASSERT(ret == sizeof(hmac)); in ValidateMessageIntegrity()
199 if (ret != sizeof(hmac)) in ValidateMessageIntegrity()
204 hmac, in ValidateMessageIntegrity()
205 sizeof(hmac)) == 0; in ValidateMessageIntegrity()
228 char hmac[kStunMessageIntegritySize]; in AddMessageIntegrity() local
232 hmac, sizeof(hmac)); in AddMessageIntegrity()
233 ASSERT(ret == sizeof(hmac)); in AddMessageIntegrity()
234 if (ret != sizeof(hmac)) { in AddMessageIntegrity()
[all …]
/external/boringssl/src/crypto/hmac/
DCMakeLists.txt4 hmac target
8 hmac.c
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/
Dauth.py38 import hmac
75 self._hmac = hmac.new(self._provider.secret_key.encode('utf-8'),
78 self._hmac_256 = hmac.new(self._provider.secret_key.encode('utf-8'),
94 return hmac.new(self._provider.secret_key.encode('utf-8'),
313 sig = hmac.new(key, msg.encode('utf-8'), sha256).hexdigest()
315 sig = hmac.new(key, msg.encode('utf-8'), sha256).digest()
852 hmac = self._get_hmac()
854 hmac.update(s.encode('utf-8'))
862 return (qs, base64.b64encode(hmac.digest()))
880 hmac = self._get_hmac()
[all …]
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/
Dsecurity.py17 import hmac
183 h = hmac.new(webapp2._to_utf8(salt), password, method)
188 h = hmac.new(webapp2._to_utf8(pepper), h.hexdigest(), method)
Dsecurecookie.py13 import hmac
102 signature = hmac.new(self.secret_key, digestmod=hashlib.sha1)
/external/openssh/
Dssh_config41 # MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160
/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.c168 unsigned char hmac[SHA1_MAC_LEN]; in eap_sim_verify_mac() local
196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_verify_mac()
198 hmac, EAP_SIM_MAC_LEN); in eap_sim_verify_mac()
201 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1; in eap_sim_verify_mac()
208 unsigned char hmac[SHA1_MAC_LEN]; in eap_sim_add_mac() local
224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_add_mac()
225 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN); in eap_sim_add_mac()
363 unsigned char hmac[SHA256_MAC_LEN]; in eap_sim_verify_mac_sha256() local
391 hmac_sha256_vector(k_aut, EAP_AKA_PRIME_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_verify_mac_sha256()
393 hmac, EAP_SIM_MAC_LEN); in eap_sim_verify_mac_sha256()
[all …]
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/utils/
Dtest_utils.py26 import hmac
88 return hmac.new(b'mysecretkey', msg)
98 hmac.new(b'mysecretkey', b'foo').hexdigest())
101 hmac_hashfunc = lambda msg: hmac.new(b'mysecretkey', msg)
106 hmac.new(b'mysecretkey', b'foo').hexdigest())
/external/chromium-trace/catapult/third_party/Paste/paste/auth/
Dcookie.py44 import hmac, base64, random, six, time, warnings
55 _signature_size = len(hmac.new(b'x', b'x', sha1).digest())
148 hmac.new(self.secret, content, sha1).digest() +
167 if signature == hmac.new(self.secret, content, sha1).digest():
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/
Dxsrfutil.py25 import hmac
65 digester = hmac.new(_force_bytes(key))
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/mturk/
Dnotification.py27 import hmac
86 h = hmac.new(key=secret_key, digestmod=sha)
/external/tpm2/
DSessionProcess.c559 TPM2B_DIGEST *hmac // OUT: authorization HMAC in ComputeCommandHMAC() argument
638 hmac->t.size = 0; in ComputeCommandHMAC()
642 hmac->t.size = CryptStartHMAC2B(session->authHashAlg, &key.b, &hmacState); in ComputeCommandHMAC()
662 CryptCompleteHMAC2B(&hmacState, &hmac->b); in ComputeCommandHMAC()
686 TPM2B_DIGEST hmac; // authHMAC for comparing in CheckSessionHMAC() local
688 ComputeCommandHMAC(sessionIndex, cpHash, &hmac); in CheckSessionHMAC()
690 if(!Memory2BEqual(&s_inputAuthValues[sessionIndex].b, &hmac.b)) in CheckSessionHMAC()
1680 TPM2B_DIGEST *hmac // OUT: authHMAC in ComputeResponseHMAC() argument
1717 hmac->t.size = 0; in ComputeResponseHMAC()
1721 hmac->t.size = CryptStartHMAC2B(session->authHashAlg, &key.b, &hmacState); in ComputeResponseHMAC()
[all …]
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/
Dtsig.py18 import hmac
73 ctx = hmac.new(secret, digestmod=digestmod)
103 ctx = hmac.new(secret)

1234