/external/boringssl/src/crypto/hmac_extra/ |
D | hmac_tests.txt | 1 HMAC = MD5 3 # that HMAC_CTX and HMAC treat NULL as the empty key initially. 8 # HMAC tests from RFC2104 9 HMAC = MD5 14 HMAC = MD5 19 HMAC = MD5 24 # HMAC tests from NIST test data 26 HMAC = SHA1 31 HMAC = SHA1 36 HMAC = SHA1 [all …]
|
D | hmac_test.cc | 104 ASSERT_TRUE(HMAC(digest, key.data(), key.size(), input.data(), input.size(), in TEST()
|
/external/libchrome/crypto/ |
D | hmac_unittest.cc | 80 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 149 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 175 crypto::HMAC hmac(crypto::HMAC::SHA256); in TEST() 216 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 232 crypto::HMAC hmac2(crypto::HMAC::SHA256); in TEST() 241 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 255 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST() 289 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
|
D | hmac_nss.cc | 24 HMAC::HMAC(HashAlgorithm hash_alg) in HMAC() function in crypto::HMAC 40 HMAC::~HMAC() { in ~HMAC() 43 bool HMAC::Init(const unsigned char *key, size_t key_length) { in Init() 77 bool HMAC::Sign(const base::StringPiece& data, in Sign()
|
D | hmac.h | 26 class CRYPTO_EXPORT HMAC { 34 explicit HMAC(HashAlgorithm hash_alg); 35 ~HMAC(); 91 DISALLOW_COPY_AND_ASSIGN(HMAC);
|
D | hmac.cc | 17 bool HMAC::Init(SymmetricKey* key) { in Init() 26 size_t HMAC::DigestLength() const { in DigestLength() 38 bool HMAC::Verify(const base::StringPiece& data, in Verify() 45 bool HMAC::VerifyTruncated(const base::StringPiece& data, in VerifyTruncated()
|
D | crypto.gypi | 7 # Put all transitive dependencies for Windows HMAC here. 23 # NOTE: all transitive dependencies of HMAC on windows need
|
/external/tcpdump/tests/ |
D | babel_auth.out | 6 HMAC key-id 30 digest-20 AD0FA7CD8D5A1898EC5409C8EDDA68B3ACA21B80 7 HMAC key-id 50 digest-32 8239F283D985047FA4B88597FDE3246455C6E4DD917B1441C2F3A82B9F737674 8 …HMAC key-id 1000 digest-64 6718CB4C2BB0976C127AB3CCCBFA1105A1D158F035BC9FAD86B0610A7ACD27E5A3D5A30… 9 …HMAC key-id 1000 digest-48 D2A5B80FF9D006907E3B6601C0C255D7D12D6EC61815E413A334E2A0D9271C75AFBC086… 10 HMAC key-id 100 digest-20 7213CED66FE7154034EC64CD14AE4142A092DF33 11 …HMAC key-id 2000 digest-64 2A5D9D55393B19E440FAC49BDA521E18A7FE77F7AB4A90377009E46E2FFE49336435C7E… 12 …HMAC key-id 2000 digest-48 FE91AF27EEE137EF489F37FEE449100CDA8CCB3E794D0C4A225D12724A8CE2FFC85811B… 13 …HMAC key-id 3000 digest-64 38C4D82883A5778500D728D1E243E7579DE96FA726C9DB7F0805C52E96FEFDCE7A5FB9A…
|
D | ospf3_auth-vv.out | 8 Authentication Type HMAC, Length 48, SAID 1, CSN 0x00000000:52da4e0e
|
/external/python/cpython2/Lib/test/ |
D | test_hmac.py | 15 h = hmac.HMAC(key, data) 49 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 83 h = hmac.HMAC(key, data, digestmod=hashfunc) 219 hmac.HMAC('a', 'b', digestmod=MockCrazyHash) 224 hmac.HMAC('a', 'b', digestmod=MockCrazyHash) 235 h = hmac.HMAC("key") 242 h = hmac.HMAC("key", "hash this!") 249 h = hmac.HMAC("key", "", hashlib.sha1) 258 h = hmac.HMAC("key") 265 h = hmac.HMAC("my secret key") [all …]
|
/external/python/cpython2/Doc/library/ |
D | hmac.rst | 5 :synopsis: Keyed-Hashing for Message Authentication (HMAC) implementation 16 This module implements the HMAC algorithm as described by :rfc:`2104`. 22 is made. *digestmod* is the digest constructor or module for the HMAC object to 26 An HMAC object has the following methods: 28 .. method:: HMAC.update(msg) 35 .. method:: HMAC.digest() 49 .. method:: HMAC.hexdigest() 63 .. method:: HMAC.copy()
|
D | hashlib.rst | 168 uses HMAC as pseudorandom function. 171 HMAC, e.g. 'sha1' or 'sha256'. *password* and *salt* are interpreted as
|
/external/python/cpython2/Lib/ |
D | hmac.py | 23 class HMAC: class 136 return HMAC(key, msg, digestmod)
|
D | smtplib.py | 571 response = user + " " + hmac.HMAC(password, challenge).hexdigest()
|
/external/boringssl/src/include/openssl/ |
D | hmac.h | 80 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
|
/external/boringssl/src/fipstools/ |
D | cavp_hmac_test.cc | 72 if (HMAC(md, key.data(), k_len, msg.data(), msg.size(), out, &out_len) == in TestHMAC()
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) { in HKDF_extract()
|
/external/mdnsresponder/mDNSCore/ |
D | mDNS.c | 643 if (!(authrr->resrec.RecordType & kDNSRecordTypeUniqueMask) || authrr->WakeUp.HMAC.l[0]) in PacketRRMatchesSignature() 777 if (rr->WakeUp.HMAC.l[0] && rr->resrec.rrtype == kDNSType_AAAA) in InitializeLastAPTime() 1163 if (rr->WakeUp.HMAC.l[0] && !rr->AddressProxy.type) rr->AnnounceCount = 2; in mDNS_Register_internal() 1521 if (rr->WakeUp.HMAC.l[0] || in mDNS_Deregister_internal() 1527 …rr->AnnounceCount = rr->WakeUp.HMAC.l[0] ? WakeupCount : (drt == mDNS_Dereg_rapid) ? 1 : Go… in mDNS_Deregister_internal() 1757 rr->WakeUp.HMAC = zeroEthAddr; in CompleteDeregistration() 2009 owner->u.owner.HMAC = m->PrimaryMAC; in SetupOwnerOpt() 2080 if (!rr->WakeUp.HMAC.l[0]) in SendResponses() 2096 r2->AnnounceCount-3, &r2->WakeUp.HMAC, &r2->WakeUp.IMAC, ARDisplayString(m,r2)); in SendResponses() 2101 if (--r2->AnnounceCount <= GoodbyeCount) r2->WakeUp.HMAC = zeroEthAddr; in SendResponses() [all …]
|
/external/boringssl/src/crypto/fipsmodule/hmac/ |
D | hmac.c | 68 uint8_t *HMAC(const EVP_MD *evp_md, const void *key, size_t key_len, in HMAC() function
|
/external/boringssl/src/crypto/obj/ |
D | objects.txt | 14 # HMAC OIDs 15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 1162 cryptopro 10 : id-HMACGostR3411-94 : HMAC GOST 34.11-94 1281 # There is no OID that just denotes "HMAC" oddly enough... 1283 : HMAC : hmac 1288 : RC4-HMAC-MD5 : rc4-hmac-md5 1289 : AES-128-CBC-HMAC-SHA1 : aes-128-cbc-hmac-sha1 1290 : AES-192-CBC-HMAC-SHA1 : aes-192-cbc-hmac-sha1 1291 : AES-256-CBC-HMAC-SHA1 : aes-256-cbc-hmac-sha1
|
/external/boringssl/src/crypto/fipsmodule/ |
D | FIPS.md | 50 FIPS-140 mandates that a module calculate an HMAC of its own code in a constructor function and com… 54 …se binaries had to be post-processed in order to calculate the known-good HMAC value. We would muc… 92 1. It adds a 64-byte, read-only array outside of the module to contain the known-good HMAC value. 96 …he integrity test, a constructor function within the module calculates an HMAC from `module_start`…
|
D | bcm.c | 312 if (!HMAC(EVP_sha512(), kHMACKey, sizeof(kHMACKey), start, end - start, in BORINGSSL_bcm_power_on_self_test()
|
/external/tpm2/ |
D | Android.bp | 92 "HMAC.c",
|
D | Makefile | 71 SOURCES += HMAC.c
|
/external/boringssl/src/ssl/ |
D | tls13_enc.cc | 294 HMAC(digest, key, hash_len, context, context_len, out, &len) == NULL) { in tls13_verify_data()
|