HomeSort by relevance Sort by last modified time
    Searched full:hmac (Results 26 - 50 of 226) sorted by null

12 3 4 5 6 7 8 910

  /external/srtp/doc/
references.txt 13 HMAC is defined in RFC2104, and HMAC-SHA1 test vectors are available
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
MD5.java 7 import org.bouncycastle.crypto.macs.HMac;
15 * MD5 HMac
22 super(new HMac(new MD5Digest()));
SHA1.java 8 import org.bouncycastle.crypto.macs.HMac;
35 * SHA1 HMac
42 super(new HMac(new SHA1Digest()));
SHA256.java 7 import org.bouncycastle.crypto.macs.HMac;
38 super(new HMac(new SHA256Digest()));
SHA384.java 7 import org.bouncycastle.crypto.macs.HMac;
38 super(new HMac(new SHA384Digest()));
SHA512.java 7 import org.bouncycastle.crypto.macs.HMac;
38 super(new HMac(new SHA512Digest()));
  /external/chromium/crypto/
hmac_win.cc 5 #include "crypto/hmac.h"
22 // Implementation of HMAC-SHA-256:
25 // Windows XP SP2, so unfortunately we have to implement HMAC-SHA-256 here.
31 // See FIPS 198: The Keyed-Hash Message Authentication Code (HMAC).
88 // For HMAC-SHA-256 only.
92 HMAC::HMAC(HashAlgorithm hash_alg)
98 bool HMAC::Init(const unsigned char* key, int key_length) {
100 // Init must not be called more than once on the same HMAC object.
154 HMAC::~HMAC()
    [all...]
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/digest/
HMAC.java 8 * HMAC.
13 public final class HMAC implements Digest
23 public HMAC(Digest md, byte[] key, int size)
  /external/openssh/
mac.c 30 #include <openssl/hmac.h>
58 { "hmac-sha1", SSH_EVP, EVP_sha1, 0, -1, -1 },
59 { "hmac-sha1-96", SSH_EVP, EVP_sha1, 96, -1, -1 },
61 { "hmac-sha2-256", SSH_EVP, EVP_sha256, 0, -1, -1 },
62 { "hmac-sha2-256-96", SSH_EVP, EVP_sha256, 96, -1, -1 },
63 { "hmac-sha2-512", SSH_EVP, EVP_sha512, 0, -1, -1 },
64 { "hmac-sha2-512-96", SSH_EVP, EVP_sha512, 96, -1, -1 },
66 { "hmac-md5", SSH_EVP, EVP_md5, 0, -1, -1 },
67 { "hmac-md5-96", SSH_EVP, EVP_md5, 96, -1, -1 },
68 { "hmac-ripemd160", SSH_EVP, EVP_ripemd160, 0, -1, -1 }
    [all...]
ssh_config 41 # MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160
  /external/openssh/regress/
ssh-com.sh 91 macs="hmac-md5"
95 macs="$macs hmac-sha1 hmac-sha1-96 hmac-md5-96"
99 macs="$macs hmac-sha1 hmac-sha1-96 hmac-md5-96"
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 140 * header, IV (TLS v1.1), and HMAC)
147 * This function fills in the TLS record layer header, adds HMAC, and encrypts
155 struct crypto_hash *hmac; local
207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret,
209 if (hmac == NULL) {
211 "to initialize HMAC");
214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN);
216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN);
217 crypto_hash_update(hmac, payload, payload_len);
222 crypto_hash_finish(hmac, NULL, NULL)
284 struct crypto_hash *hmac; local
    [all...]
  /frameworks/base/core/tests/coretests/src/android/content/pm/
MacAuthenticatedInputStreamTest.java 32 private static final SecretKey HMAC_KEY_1 = new SecretKeySpec("test_key_1".getBytes(), "HMAC");
39 * echo -n 'Hello, World!' | openssl dgst -hmac 'test_key_1' -binary -sha1 | recode ..//x1 |
70 Mac mac = Mac.getInstance("HMAC-SHA1");
81 Mac mac = Mac.getInstance("HMAC-SHA1");
92 Mac mac = Mac.getInstance("HMAC-SHA1");
103 Mac mac = Mac.getInstance("HMAC-SHA1");
  /external/wpa_supplicant_8/src/crypto/
sha256-tlsprf.c 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
md5.c 17 * hmac_md5_vector - HMAC-MD5 over data vector (RFC 2104)
18 * @key: Key for HMAC operations
93 * hmac_md5 - HMAC-MD5 over data buffer (RFC 2104)
94 * @key: Key for HMAC operations
sha1.c 17 * hmac_sha1_vector - HMAC-SHA1 over data vector (RFC 2104)
18 * @key: Key for HMAC operations
92 * hmac_sha1 - HMAC-SHA1 over data buffer (RFC 2104)
93 * @key: Key for HMAC operations
sha256.c 17 * hmac_sha256_vector - HMAC-SHA256 over data vector (RFC 2104)
18 * @key: Key for HMAC operations
92 * hmac_sha256 - HMAC-SHA256 over data buffer (RFC 2104)
93 * @key: Key for HMAC operations
  /external/dropbear/libtomcrypt/testprof/
mac_test.c 1 /* test pmac/omac/hmac */
  /external/chromium/third_party/libjingle/source/talk/session/phone/
srtpfilter.h 46 // Cipher suite to use for SRTP. Typically a 80-bit HMAC will be used, except
48 // A 80-bit HMAC is always used for SRTCP.
50 // 128-bit AES with 80-bit SHA-1 HMAC.
52 // 128-bit AES with 32-bit SHA-1 HMAC.
71 // If an HMAC is used, this will increase the packet size.
75 // If an HMAC is used, this will decrease the packet size.
119 // If an HMAC is used, this will increase the packet size.
123 // If an HMAC is used, this will decrease the packet size.
  /external/openssl/crypto/hmac/
hm_ameth.c 65 /* HMAC "ASN1" method. This is just here to indicate the
66 * maximum HMAC output length and to free up an HMAC
102 * HMAC key with "HMAC PRIVATE KEY" in the headers. When enabled the
103 * genpkey utility can be used to "generate" HMAC keys.
147 "HMAC",
148 "OpenSSL HMAC method",
  /external/srtp/
timing 18 # timing.plt # # gnuplot script file for plotting the output generated by srtp_driver -t # # David A. McGrew # Cisco Systems, Inc. # set xrange [0:2500] set term pict "Times-Roman" 9 # # plot authentication-only data # set title "Authentication Only" set ylabel "Megabits per second" set xlabel "Octets in packet" set yrange [0:2000] set output "plot-auth.pict" plot "timing.dat" index 0 title "HMAC SHA1" with lines, "timing.dat" index 1 title "TMMH/AES" with lines, "timing.dat" index 2 title "TMMH/SEAL" with lines # # plot encryption-only data # set title "Encryption Only" set ylabel "Megabits per second" set xlabel "Octets in packet" set output "plot-enc.pict" set yrange [0:1200] plot "timing.dat" index 3 title "SEAL" with lines, "timing.dat" index 4 title "AES ICM" with lines # # plot encryption and authentication data # set title "Encryption and Authentication" set ylabel "Megabits per second" set xlabel "Octets in packet" set yrange [0:1000] set output "plot-enc-auth.pict" plot "timing.dat" index 5 title "TMMH/SEAL" with lines, "timing.dat" index 6 title "TMMH/AES" with lines, "timing.dat" index 7 title "HMAC/AES" with line
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/
HMac.java 13 * HMAC implementation based on RFC2104
17 public class HMac
87 public HMac(
93 private HMac(
108 return digest.getAlgorithmName() + "/HMAC";
  /external/dropbear/
packet.c 267 /* check the hmac */
318 hmac_state hmac; local
329 if (hmac_init(&hmac,
334 dropbear_exit("HMAC error");
339 if (hmac_process(&hmac, tempbuf, 4) != CRYPT_OK) {
340 dropbear_exit("HMAC error");
345 if (hmac_process(&hmac, buf_getptr(sourcebuf, len), len) != CRYPT_OK) {
346 dropbear_exit("HMAC error");
350 if (hmac_done(&hmac, tempbuf, &bufsize) != CRYPT_OK) {
351 dropbear_exit("HMAC error")
526 hmac_state hmac; local
    [all...]
  /external/openssl/crypto/err/
openssl.ec 35 L HMAC crypto/hmac/hmac.h crypto/hmac/hmac_err.c
  /external/srtp/crypto/include/
crypto.h 32 * authentication function type, e.g. HMAC-SHA1. A NULL_AUTH is

Completed in 1370 milliseconds

12 3 4 5 6 7 8 910