/external/srtp/doc/ |
references.txt | 13 HMAC is defined in RFC2104, and HMAC-SHA1 test vectors are available
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
MD5.java | 7 import org.bouncycastle.crypto.macs.HMac; 15 * MD5 HMac 22 super(new HMac(new MD5Digest()));
|
SHA1.java | 8 import org.bouncycastle.crypto.macs.HMac; 35 * SHA1 HMac 42 super(new HMac(new SHA1Digest()));
|
SHA256.java | 7 import org.bouncycastle.crypto.macs.HMac; 38 super(new HMac(new SHA256Digest()));
|
SHA384.java | 7 import org.bouncycastle.crypto.macs.HMac; 38 super(new HMac(new SHA384Digest()));
|
SHA512.java | 7 import org.bouncycastle.crypto.macs.HMac; 38 super(new HMac(new SHA512Digest()));
|
/external/chromium/crypto/ |
hmac_win.cc | 5 #include "crypto/hmac.h" 22 // Implementation of HMAC-SHA-256: 25 // Windows XP SP2, so unfortunately we have to implement HMAC-SHA-256 here. 31 // See FIPS 198: The Keyed-Hash Message Authentication Code (HMAC). 88 // For HMAC-SHA-256 only. 92 HMAC::HMAC(HashAlgorithm hash_alg) 98 bool HMAC::Init(const unsigned char* key, int key_length) { 100 // Init must not be called more than once on the same HMAC object. 154 HMAC::~HMAC() [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/digest/ |
HMAC.java | 8 * HMAC. 13 public final class HMAC implements Digest 23 public HMAC(Digest md, byte[] key, int size)
|
/external/openssh/ |
mac.c | 30 #include <openssl/hmac.h> 58 { "hmac-sha1", SSH_EVP, EVP_sha1, 0, -1, -1 }, 59 { "hmac-sha1-96", SSH_EVP, EVP_sha1, 96, -1, -1 }, 61 { "hmac-sha2-256", SSH_EVP, EVP_sha256, 0, -1, -1 }, 62 { "hmac-sha2-256-96", SSH_EVP, EVP_sha256, 96, -1, -1 }, 63 { "hmac-sha2-512", SSH_EVP, EVP_sha512, 0, -1, -1 }, 64 { "hmac-sha2-512-96", SSH_EVP, EVP_sha512, 96, -1, -1 }, 66 { "hmac-md5", SSH_EVP, EVP_md5, 0, -1, -1 }, 67 { "hmac-md5-96", SSH_EVP, EVP_md5, 96, -1, -1 }, 68 { "hmac-ripemd160", SSH_EVP, EVP_ripemd160, 0, -1, -1 } [all...] |
ssh_config | 41 # MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160
|
/external/openssh/regress/ |
ssh-com.sh | 91 macs="hmac-md5" 95 macs="$macs hmac-sha1 hmac-sha1-96 hmac-md5-96" 99 macs="$macs hmac-sha1 hmac-sha1-96 hmac-md5-96"
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 140 * header, IV (TLS v1.1), and HMAC) 147 * This function fills in the TLS record layer header, adds HMAC, and encrypts 155 struct crypto_hash *hmac; local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 209 if (hmac == NULL) { 211 "to initialize HMAC"); 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); 217 crypto_hash_update(hmac, payload, payload_len); 222 crypto_hash_finish(hmac, NULL, NULL) 284 struct crypto_hash *hmac; local [all...] |
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
MacAuthenticatedInputStreamTest.java | 32 private static final SecretKey HMAC_KEY_1 = new SecretKeySpec("test_key_1".getBytes(), "HMAC"); 39 * echo -n 'Hello, World!' | openssl dgst -hmac 'test_key_1' -binary -sha1 | recode ..//x1 | 70 Mac mac = Mac.getInstance("HMAC-SHA1"); 81 Mac mac = Mac.getInstance("HMAC-SHA1"); 92 Mac mac = Mac.getInstance("HMAC-SHA1"); 103 Mac mac = Mac.getInstance("HMAC-SHA1");
|
/external/wpa_supplicant_8/src/crypto/ |
sha256-tlsprf.c | 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
|
md5.c | 17 * hmac_md5_vector - HMAC-MD5 over data vector (RFC 2104) 18 * @key: Key for HMAC operations 93 * hmac_md5 - HMAC-MD5 over data buffer (RFC 2104) 94 * @key: Key for HMAC operations
|
sha1.c | 17 * hmac_sha1_vector - HMAC-SHA1 over data vector (RFC 2104) 18 * @key: Key for HMAC operations 92 * hmac_sha1 - HMAC-SHA1 over data buffer (RFC 2104) 93 * @key: Key for HMAC operations
|
sha256.c | 17 * hmac_sha256_vector - HMAC-SHA256 over data vector (RFC 2104) 18 * @key: Key for HMAC operations 92 * hmac_sha256 - HMAC-SHA256 over data buffer (RFC 2104) 93 * @key: Key for HMAC operations
|
/external/dropbear/libtomcrypt/testprof/ |
mac_test.c | 1 /* test pmac/omac/hmac */
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
srtpfilter.h | 46 // Cipher suite to use for SRTP. Typically a 80-bit HMAC will be used, except 48 // A 80-bit HMAC is always used for SRTCP. 50 // 128-bit AES with 80-bit SHA-1 HMAC. 52 // 128-bit AES with 32-bit SHA-1 HMAC. 71 // If an HMAC is used, this will increase the packet size. 75 // If an HMAC is used, this will decrease the packet size. 119 // If an HMAC is used, this will increase the packet size. 123 // If an HMAC is used, this will decrease the packet size.
|
/external/openssl/crypto/hmac/ |
hm_ameth.c | 65 /* HMAC "ASN1" method. This is just here to indicate the 66 * maximum HMAC output length and to free up an HMAC 102 * HMAC key with "HMAC PRIVATE KEY" in the headers. When enabled the 103 * genpkey utility can be used to "generate" HMAC keys. 147 "HMAC", 148 "OpenSSL HMAC method",
|
/external/srtp/ |
timing | 18 # timing.plt
#
# gnuplot script file for plotting the output generated by srtp_driver -t
#
# David A. McGrew
# Cisco Systems, Inc.
#
set xrange [0:2500]
set term pict "Times-Roman" 9
#
# plot authentication-only data
#
set title "Authentication Only"
set ylabel "Megabits per second"
set xlabel "Octets in packet"
set yrange [0:2000]
set output "plot-auth.pict"
plot "timing.dat" index 0 title "HMAC SHA1" with lines, "timing.dat" index 1 title "TMMH/AES" with lines, "timing.dat" index 2 title "TMMH/SEAL" with lines
#
# plot encryption-only data
#
set title "Encryption Only"
set ylabel "Megabits per second"
set xlabel "Octets in packet"
set output "plot-enc.pict"
set yrange [0:1200]
plot "timing.dat" index 3 title "SEAL" with lines, "timing.dat" index 4 title "AES ICM" with lines
#
# plot encryption and authentication data
#
set title "Encryption and Authentication"
set ylabel "Megabits per second"
set xlabel "Octets in packet"
set yrange [0:1000]
set output "plot-enc-auth.pict"
plot "timing.dat" index 5 title "TMMH/SEAL" with lines, "timing.dat" index 6 title "TMMH/AES" with lines, "timing.dat" index 7 title "HMAC/AES" with line
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
HMac.java | 13 * HMAC implementation based on RFC2104 17 public class HMac 87 public HMac( 93 private HMac( 108 return digest.getAlgorithmName() + "/HMAC";
|
/external/dropbear/ |
packet.c | 267 /* check the hmac */ 318 hmac_state hmac; local 329 if (hmac_init(&hmac, 334 dropbear_exit("HMAC error"); 339 if (hmac_process(&hmac, tempbuf, 4) != CRYPT_OK) { 340 dropbear_exit("HMAC error"); 345 if (hmac_process(&hmac, buf_getptr(sourcebuf, len), len) != CRYPT_OK) { 346 dropbear_exit("HMAC error"); 350 if (hmac_done(&hmac, tempbuf, &bufsize) != CRYPT_OK) { 351 dropbear_exit("HMAC error") 526 hmac_state hmac; local [all...] |
/external/openssl/crypto/err/ |
openssl.ec | 35 L HMAC crypto/hmac/hmac.h crypto/hmac/hmac_err.c
|
/external/srtp/crypto/include/ |
crypto.h | 32 * authentication function type, e.g. HMAC-SHA1. A NULL_AUTH is
|