HomeSort by relevance Sort by last modified time
    Searched defs:hmac (Results 1 - 25 of 37) sorted by null

1 2

  /external/dropbear/libtomcrypt/src/mac/hmac/
hmac_memory.c 15 HMAC support, process a block of memory, Tom St Denis/Dobes Vandermeer
21 HMAC a block of memory to produce the authentication tag
25 @param in The data to HMAC
26 @param inlen The length of the data to HMAC (octets)
36 hmac_state *hmac; local
54 /* nope, so call the hmac functions */
55 /* allocate ram for hmac state */
56 hmac = XMALLOC(sizeof(hmac_state));
57 if (hmac == NULL) {
61 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK)
    [all...]
hmac_memory_multi.c 16 HMAC support, process multiple blocks of memory, Tom St Denis/Dobes Vandermeer
22 HMAC multiple blocks of memory to produce the authentication tag
28 @param in The data to HMAC
29 @param inlen The length of the data to HMAC (octets)
30 @param ... tuples of (data,len) pairs to HMAC, terminated with a (NULL,x) (x=don't care)
39 hmac_state *hmac; local
50 /* allocate ram for hmac state */
51 hmac = XMALLOC(sizeof(hmac_state));
52 if (hmac == NULL) {
56 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK)
    [all...]
  /external/dropbear/libtomcrypt/src/misc/pkcs5/
pkcs_5_2.c 40 hmac_state *hmac; local
53 hmac = XMALLOC(sizeof(hmac_state));
54 if (hmac == NULL || buf[0] == NULL) {
55 if (hmac != NULL) {
56 XFREE(hmac);
78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) {
81 if ((err = hmac_process(hmac, salt, salt_len)) != CRYPT_OK) {
84 if ((err = hmac_process(hmac, buf[1], 4)) != CRYPT_OK) {
88 if ((err = hmac_done(hmac, buf[0], &x)) != CRYPT_OK) {
115 zeromem(hmac, sizeof(hmac_state))
    [all...]
  /external/chromium_org/remoting/tools/
register_host.py 14 import hmac namespace
64 host_secret_hash = "hmac:" + base64.b64encode(
65 hmac.new(str(host_id), pin, hashlib.sha256).digest())
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
p12_mutl.c 62 #include <openssl/hmac.h>
71 HMAC_CTX hmac; local
99 HMAC_CTX_init(&hmac);
100 if (!HMAC_Init_ex(&hmac, key, md_size, md_type, NULL)
101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data,
103 || !HMAC_Final(&hmac, mac, maclen))
105 HMAC_CTX_cleanup(&hmac);
108 HMAC_CTX_cleanup(&hmac);
  /external/openssl/crypto/pkcs12/
p12_mutl.c 62 #include <openssl/hmac.h>
71 HMAC_CTX hmac; local
99 HMAC_CTX_init(&hmac);
100 if (!HMAC_Init_ex(&hmac, key, md_size, md_type, NULL)
101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data,
103 || !HMAC_Final(&hmac, mac, maclen))
105 HMAC_CTX_cleanup(&hmac);
108 HMAC_CTX_cleanup(&hmac);
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_pep247.py 12 import hmac namespace
68 self.check_module(hmac, key='abc')
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_pep247.py 12 import hmac namespace
68 self.check_module(hmac, key='abc')
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /external/chromium_org/third_party/tlslite/tlslite/
mathtls.py 6 import hmac namespace
36 A = hmac.HMAC(secret, A, hashModule).digest()
37 output = hmac.HMAC(secret, A+seed, hashModule).digest()
109 Modified from Python HMAC by Trevor
TLSRecordLayer.py 13 from utils import hmac namespace
    [all...]
  /external/srtp/crypto/hash/
hmac.c 2 * hmac.c
4 * implementation of hmac auth_type_t
45 #include "hmac.h"
52 "hmac sha-1" /* printable name for module */
58 extern auth_type_t hmac;
82 (*a)->type = &hmac;
88 /* increment global count of all hmac uses */
89 hmac.ref_count++;
96 extern auth_type_t hmac;
105 /* decrement global count of all hmac uses *
255 hmac = { variable
    [all...]
  /external/dropbear/
packet.c 267 /* check the hmac */
318 hmac_state hmac; local
329 if (hmac_init(&hmac,
334 dropbear_exit("HMAC error");
339 if (hmac_process(&hmac, tempbuf, 4) != CRYPT_OK) {
340 dropbear_exit("HMAC error");
345 if (hmac_process(&hmac, buf_getptr(sourcebuf, len), len) != CRYPT_OK) {
346 dropbear_exit("HMAC error");
350 if (hmac_done(&hmac, tempbuf, &bufsize) != CRYPT_OK) {
351 dropbear_exit("HMAC error")
526 hmac_state hmac; local
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 140 * header, IV (TLS v1.1), and HMAC)
147 * This function fills in the TLS record layer header, adds HMAC, and encrypts
155 struct crypto_hash *hmac; local
207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret,
209 if (hmac == NULL) {
211 "to initialize HMAC");
214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN);
216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN);
217 crypto_hash_update(hmac, payload, payload_len);
222 crypto_hash_finish(hmac, NULL, NULL)
284 struct crypto_hash *hmac; local
    [all...]
  /external/smack/src/org/xbill/DNS/
TSIG.java 18 private static final String HMAC_MD5_STR = "HMAC-MD5.SIG-ALG.REG.INT.";
19 private static final String HMAC_SHA1_STR = "hmac-sha1.";
20 private static final String HMAC_SHA224_STR = "hmac-sha224.";
21 private static final String HMAC_SHA256_STR = "hmac-sha256.";
22 private static final String HMAC_SHA384_STR = "hmac-sha384.";
23 private static final String HMAC_SHA512_STR = "hmac-sha512.";
25 /** The domain name representing the HMAC-MD5 algorithm. */
28 /** The domain name representing the HMAC-MD5 algorithm (deprecated). */
29 public static final Name HMAC = HMAC_MD5;
31 /** The domain name representing the HMAC-SHA1 algorithm. *
218 HMAC hmac = null; local
315 HMAC hmac = new HMAC(digest, digestBlockLength, key); local
367 HMAC hmac = new HMAC(digest, digestBlockLength, key); local
    [all...]
  /external/chromium_org/third_party/usrsctp/overrides/usrsctplib/netinet/
sctp_auth.h 56 /* union of all supported HMAC algorithm contexts */
87 /* hmac algos supported list */
91 uint16_t hmac[]; member in struct:sctp_hmaclist
158 /* hmac list handling */
173 /* keyed-HMAC functions */
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 168 unsigned char hmac[SHA1_MAC_LEN]; local
187 /* HMAC-SHA1-128 */
196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
198 hmac, EAP_SIM_MAC_LEN);
201 return (os_memcmp(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1;
208 unsigned char hmac[SHA1_MAC_LEN]; local
217 /* HMAC-SHA1-128 */
224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
225 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN);
244 * T1 = HMAC-SHA-256 (K, S | 0x01
363 unsigned char hmac[SHA256_MAC_LEN]; local
403 unsigned char hmac[SHA256_MAC_LEN]; local
    [all...]
  /hardware/qcom/keymaster/
keymaster_qcom.h 46 #define KM_HMAC_LENGTH (32) /* SHA2 will be used for HMAC */
58 uint8_t hmac[KM_HMAC_LENGTH]; member in struct:qcom_km_key_blob
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/
connection.py 405 import hmac namespace
409 digest = hmac.new(authkey, message).digest()
418 import hmac namespace
423 digest = hmac.new(authkey, message).digest()
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/
connection.py 405 import hmac namespace
409 digest = hmac.new(authkey, message).digest()
418 import hmac namespace
423 digest = hmac.new(authkey, message).digest()
  /external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/
__init__.py 29 import hmac namespace
710 name = 'HMAC-SHA1'
732 # HMAC object.
738 hashed = hmac.new(key, raw, sha)
  /external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/
__init__.py 29 import hmac namespace
710 name = 'HMAC-SHA1'
732 # HMAC object.
738 hashed = hmac.new(key, raw, sha)
  /external/chromium_org/chromeos/network/onc/
onc_utils.cc 19 #include "crypto/hmac.h"
66 std::string hmac; local
72 !root.GetString(encrypted::kHMAC, &hmac) ||
125 if (!base::Base64Decode(hmac, &hmac)) {
130 crypto::HMAC hmac_verifier(crypto::HMAC::SHA1);
132 !hmac_verifier.Verify(ciphertext, hmac)) {
  /external/wpa_supplicant_8/src/crypto/
crypto_libtomcrypt.c 148 hmac_state hmac; member in union:crypto_hash::__anon30586
174 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) !=
179 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) !=
208 ctx->error = hmac_process(&ctx->u.hmac, data, len) != CRYPT_OK;
267 if (hmac_done(&ctx->u.hmac, mac, &clen) != CRYPT_OK) {

Completed in 1561 milliseconds

1 2