Home
last modified time | relevance | path

Searched refs:HMAC (Results 1 – 25 of 36) sorted by relevance

12

/external/boringssl/src/crypto/hmac_extra/
Dhmac_tests.txt1 HMAC = MD5
3 # that HMAC_CTX and HMAC treat NULL as the empty key initially.
8 # HMAC tests from RFC2104
9 HMAC = MD5
14 HMAC = MD5
19 HMAC = MD5
24 # HMAC tests from NIST test data
26 HMAC = SHA1
31 HMAC = SHA1
36 HMAC = SHA1
[all …]
Dhmac_test.cc104 ASSERT_TRUE(HMAC(digest, key.data(), key.size(), input.data(), input.size(), in TEST()
/external/libchrome/crypto/
Dhmac_unittest.cc80 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
149 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
175 crypto::HMAC hmac(crypto::HMAC::SHA256); in TEST()
216 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
232 crypto::HMAC hmac2(crypto::HMAC::SHA256); in TEST()
241 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
255 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
289 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
Dhmac_nss.cc24 HMAC::HMAC(HashAlgorithm hash_alg) in HMAC() function in crypto::HMAC
40 HMAC::~HMAC() { in ~HMAC()
43 bool HMAC::Init(const unsigned char *key, size_t key_length) { in Init()
77 bool HMAC::Sign(const base::StringPiece& data, in Sign()
Dhmac.h26 class CRYPTO_EXPORT HMAC {
34 explicit HMAC(HashAlgorithm hash_alg);
35 ~HMAC();
91 DISALLOW_COPY_AND_ASSIGN(HMAC);
Dhmac.cc17 bool HMAC::Init(SymmetricKey* key) { in Init()
26 size_t HMAC::DigestLength() const { in DigestLength()
38 bool HMAC::Verify(const base::StringPiece& data, in Verify()
45 bool HMAC::VerifyTruncated(const base::StringPiece& data, in VerifyTruncated()
Dcrypto.gypi7 # Put all transitive dependencies for Windows HMAC here.
23 # NOTE: all transitive dependencies of HMAC on windows need
/external/tcpdump/tests/
Dbabel_auth.out6 HMAC key-id 30 digest-20 AD0FA7CD8D5A1898EC5409C8EDDA68B3ACA21B80
7 HMAC key-id 50 digest-32 8239F283D985047FA4B88597FDE3246455C6E4DD917B1441C2F3A82B9F737674
8HMAC key-id 1000 digest-64 6718CB4C2BB0976C127AB3CCCBFA1105A1D158F035BC9FAD86B0610A7ACD27E5A3D5A30…
9HMAC key-id 1000 digest-48 D2A5B80FF9D006907E3B6601C0C255D7D12D6EC61815E413A334E2A0D9271C75AFBC086…
10 HMAC key-id 100 digest-20 7213CED66FE7154034EC64CD14AE4142A092DF33
11HMAC key-id 2000 digest-64 2A5D9D55393B19E440FAC49BDA521E18A7FE77F7AB4A90377009E46E2FFE49336435C7E…
12HMAC key-id 2000 digest-48 FE91AF27EEE137EF489F37FEE449100CDA8CCB3E794D0C4A225D12724A8CE2FFC85811B…
13HMAC key-id 3000 digest-64 38C4D82883A5778500D728D1E243E7579DE96FA726C9DB7F0805C52E96FEFDCE7A5FB9A…
Dospf3_auth-vv.out8 Authentication Type HMAC, Length 48, SAID 1, CSN 0x00000000:52da4e0e
/external/python/cpython2/Lib/test/
Dtest_hmac.py15 h = hmac.HMAC(key, data)
49 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
83 h = hmac.HMAC(key, data, digestmod=hashfunc)
219 hmac.HMAC('a', 'b', digestmod=MockCrazyHash)
224 hmac.HMAC('a', 'b', digestmod=MockCrazyHash)
235 h = hmac.HMAC("key")
242 h = hmac.HMAC("key", "hash this!")
249 h = hmac.HMAC("key", "", hashlib.sha1)
258 h = hmac.HMAC("key")
265 h = hmac.HMAC("my secret key")
[all …]
/external/python/cpython2/Doc/library/
Dhmac.rst5 :synopsis: Keyed-Hashing for Message Authentication (HMAC) implementation
16 This module implements the HMAC algorithm as described by :rfc:`2104`.
22 is made. *digestmod* is the digest constructor or module for the HMAC object to
26 An HMAC object has the following methods:
28 .. method:: HMAC.update(msg)
35 .. method:: HMAC.digest()
49 .. method:: HMAC.hexdigest()
63 .. method:: HMAC.copy()
Dhashlib.rst168 uses HMAC as pseudorandom function.
171 HMAC, e.g. 'sha1' or 'sha256'. *password* and *salt* are interpreted as
/external/python/cpython2/Lib/
Dhmac.py23 class HMAC: class
136 return HMAC(key, msg, digestmod)
Dsmtplib.py571 response = user + " " + hmac.HMAC(password, challenge).hexdigest()
/external/boringssl/src/include/openssl/
Dhmac.h80 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
/external/boringssl/src/fipstools/
Dcavp_hmac_test.cc72 if (HMAC(md, key.data(), k_len, msg.data(), msg.size(), out, &out_len) == in TestHMAC()
/external/boringssl/src/crypto/hkdf/
Dhkdf.c50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) { in HKDF_extract()
/external/mdnsresponder/mDNSCore/
DmDNS.c643 if (!(authrr->resrec.RecordType & kDNSRecordTypeUniqueMask) || authrr->WakeUp.HMAC.l[0]) in PacketRRMatchesSignature()
777 if (rr->WakeUp.HMAC.l[0] && rr->resrec.rrtype == kDNSType_AAAA) in InitializeLastAPTime()
1163 if (rr->WakeUp.HMAC.l[0] && !rr->AddressProxy.type) rr->AnnounceCount = 2; in mDNS_Register_internal()
1521 if (rr->WakeUp.HMAC.l[0] || in mDNS_Deregister_internal()
1527 …rr->AnnounceCount = rr->WakeUp.HMAC.l[0] ? WakeupCount : (drt == mDNS_Dereg_rapid) ? 1 : Go… in mDNS_Deregister_internal()
1757 rr->WakeUp.HMAC = zeroEthAddr; in CompleteDeregistration()
2009 owner->u.owner.HMAC = m->PrimaryMAC; in SetupOwnerOpt()
2080 if (!rr->WakeUp.HMAC.l[0]) in SendResponses()
2096 r2->AnnounceCount-3, &r2->WakeUp.HMAC, &r2->WakeUp.IMAC, ARDisplayString(m,r2)); in SendResponses()
2101 if (--r2->AnnounceCount <= GoodbyeCount) r2->WakeUp.HMAC = zeroEthAddr; in SendResponses()
[all …]
/external/boringssl/src/crypto/fipsmodule/hmac/
Dhmac.c68 uint8_t *HMAC(const EVP_MD *evp_md, const void *key, size_t key_len, in HMAC() function
/external/boringssl/src/crypto/obj/
Dobjects.txt14 # HMAC OIDs
15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5
16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1
1162 cryptopro 10 : id-HMACGostR3411-94 : HMAC GOST 34.11-94
1281 # There is no OID that just denotes "HMAC" oddly enough...
1283 : HMAC : hmac
1288 : RC4-HMAC-MD5 : rc4-hmac-md5
1289 : AES-128-CBC-HMAC-SHA1 : aes-128-cbc-hmac-sha1
1290 : AES-192-CBC-HMAC-SHA1 : aes-192-cbc-hmac-sha1
1291 : AES-256-CBC-HMAC-SHA1 : aes-256-cbc-hmac-sha1
/external/boringssl/src/crypto/fipsmodule/
DFIPS.md50 FIPS-140 mandates that a module calculate an HMAC of its own code in a constructor function and com…
54 …se binaries had to be post-processed in order to calculate the known-good HMAC value. We would muc…
92 1. It adds a 64-byte, read-only array outside of the module to contain the known-good HMAC value.
96 …he integrity test, a constructor function within the module calculates an HMAC from `module_start`…
Dbcm.c312 if (!HMAC(EVP_sha512(), kHMACKey, sizeof(kHMACKey), start, end - start, in BORINGSSL_bcm_power_on_self_test()
/external/tpm2/
DAndroid.bp92 "HMAC.c",
DMakefile71 SOURCES += HMAC.c
/external/boringssl/src/ssl/
Dtls13_enc.cc294 HMAC(digest, key, hash_len, context, context_len, out, &len) == NULL) { in tls13_verify_data()

12