/external/openssl/crypto/pkcs12/ |
p12_mutl.c | 62 #include <openssl/hmac.h> 71 HMAC_CTX hmac; local 99 HMAC_CTX_init(&hmac); 100 if (!HMAC_Init_ex(&hmac, key, md_size, md_type, NULL) 101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data, 103 || !HMAC_Final(&hmac, mac, maclen)) 105 HMAC_CTX_cleanup(&hmac); 108 HMAC_CTX_cleanup(&hmac);
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_pep247.py | 12 import hmac namespace 68 self.check_module(hmac, key='abc')
|
test_hmac.py | 1 import hmac namespace 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_pep247.py | 12 import hmac namespace 68 self.check_module(hmac, key='abc')
|
test_hmac.py | 1 import hmac namespace 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/external/chromium_org/third_party/libsrtp/srtp/crypto/hash/ |
hmac.c | 2 * hmac.c 4 * implementation of hmac auth_type_t 45 #include "hmac.h" 52 "hmac sha-1" /* printable name for module */ 58 extern auth_type_t hmac; 82 (*a)->type = &hmac; 88 /* increment global count of all hmac uses */ 89 hmac.ref_count++; 96 extern auth_type_t hmac; 105 /* decrement global count of all hmac uses * 255 hmac = { variable [all...] |
/external/chromium_org/third_party/tlslite/tlslite/ |
mathtls.py | 12 import hmac namespace 111 return hmac.HMAC(k, digestmod=digestmod)
|
/external/srtp/crypto/hash/ |
hmac.c | 2 * hmac.c 4 * implementation of hmac auth_type_t 45 #include "hmac.h" 52 "hmac sha-1" /* printable name for module */ 58 extern auth_type_t hmac; 82 (*a)->type = &hmac; 88 /* increment global count of all hmac uses */ 89 hmac.ref_count++; 96 extern auth_type_t hmac; 105 /* decrement global count of all hmac uses * 255 hmac = { variable [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 140 * header, IV (TLS v1.1), and HMAC) 147 * This function fills in the TLS record layer header, adds HMAC, and encrypts 155 struct crypto_hash *hmac; local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 209 if (hmac == NULL) { 211 "to initialize HMAC"); 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); 217 crypto_hash_update(hmac, payload, payload_len); 222 crypto_hash_finish(hmac, NULL, NULL) 284 struct crypto_hash *hmac; local [all...] |
/external/chromium_org/third_party/tlslite/tlslite/utils/ |
cryptomath.py | 66 import hmac namespace 78 return bytearray(hmac.new(k, b, hashlib.md5).digest()) 83 return bytearray(hmac.new(k, b, hashlib.sha1).digest())
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
sctp_auth.h | 52 /* union of all supported HMAC algorithm contexts */ 81 /* hmac algos supported list */ 85 uint16_t hmac[]; member in struct:sctp_hmaclist 151 /* hmac list handling */ 166 /* keyed-HMAC functions */
|
/external/smack/src/org/xbill/DNS/ |
TSIG.java | 18 private static final String HMAC_MD5_STR = "HMAC-MD5.SIG-ALG.REG.INT."; 19 private static final String HMAC_SHA1_STR = "hmac-sha1."; 20 private static final String HMAC_SHA224_STR = "hmac-sha224."; 21 private static final String HMAC_SHA256_STR = "hmac-sha256."; 22 private static final String HMAC_SHA384_STR = "hmac-sha384."; 23 private static final String HMAC_SHA512_STR = "hmac-sha512."; 25 /** The domain name representing the HMAC-MD5 algorithm. */ 28 /** The domain name representing the HMAC-MD5 algorithm (deprecated). */ 29 public static final Name HMAC = HMAC_MD5; 31 /** The domain name representing the HMAC-SHA1 algorithm. * 218 HMAC hmac = null; local 315 HMAC hmac = new HMAC(digest, digestBlockLength, key); local 367 HMAC hmac = new HMAC(digest, digestBlockLength, key); local [all...] |
/external/chromium_org/chrome/browser/extensions/api/webrtc_audio_private/ |
webrtc_audio_private_api.cc | 169 std::string hmac = CalculateHMACImpl(raw_id); local 173 base::Bind(&WebrtcAudioPrivateFunction::OnHMACCalculated, this, hmac)); 176 void WebrtcAudioPrivateFunction::OnHMACCalculated(const std::string& hmac) { 336 // We need to get the output device names, and calculate the HMAC 362 DVLOG(2) << "Found no matching raw sink ID for HMAC " << sink_id_;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 168 unsigned char hmac[SHA1_MAC_LEN]; local 187 /* HMAC-SHA1-128 */ 196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 198 hmac, EAP_SIM_MAC_LEN); 201 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1; 208 unsigned char hmac[SHA1_MAC_LEN]; local 217 /* HMAC-SHA1-128 */ 224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 225 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN); 244 * T1 = HMAC-SHA-256 (K, S | 0x01 363 unsigned char hmac[SHA256_MAC_LEN]; local 403 unsigned char hmac[SHA256_MAC_LEN]; local [all...] |
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 52 #define KM_HMAC_LENGTH (32) /* SHA2 will be used for HMAC */ 64 uint8_t hmac[KM_HMAC_LENGTH]; member in struct:qcom_km_key_blob
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 405 import hmac namespace 409 digest = hmac.new(authkey, message).digest() 418 import hmac namespace 423 digest = hmac.new(authkey, message).digest()
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 405 import hmac namespace 409 digest = hmac.new(authkey, message).digest() 418 import hmac namespace 423 digest = hmac.new(authkey, message).digest()
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
__init__.py | 29 import hmac namespace 710 name = 'HMAC-SHA1' 732 # HMAC object. 738 hashed = hmac.new(key, raw, sha)
|
/external/chromium_org/chromeos/network/onc/ |
onc_utils.cc | 19 #include "crypto/hmac.h" 68 std::string hmac; local 74 !root.GetString(encrypted::kHMAC, &hmac) || 127 if (!base::Base64Decode(hmac, &hmac)) { 132 crypto::HMAC hmac_verifier(crypto::HMAC::SHA1); 134 !hmac_verifier.Verify(ciphertext, hmac)) {
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 148 hmac_state hmac; member in union:crypto_hash::__anon38176 174 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) != 179 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) != 208 ctx->error = hmac_process(&ctx->u.hmac, data, len) != CRYPT_OK; 267 if (hmac_done(&ctx->u.hmac, mac, &clen) != CRYPT_OK) {
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
smtplib.py | 48 import hmac namespace 563 response = user + " " + hmac.HMAC(password, challenge).hexdigest()
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
smtplib.py | 48 import hmac namespace 563 response = user + " " + hmac.HMAC(password, challenge).hexdigest()
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
t1_enc.c | 141 #include <openssl/hmac.h> 347 uint8_t mac_key_and_key[32 /* HMAC(SHA256) */ + 32 /* AES-256 */]; 1081 EVP_MD_CTX hmac, *mac_ctx; local 1102 if (!EVP_MD_CTX_copy(&hmac,hash)) 1104 mac_ctx = &hmac; [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
stun.cc | 196 // Adjust the length parameter in stun message to calculate HMAC. 211 char hmac[kStunMessageIntegritySize]; local 215 hmac, sizeof(hmac)); 216 ASSERT(ret == sizeof(hmac)); 217 if (ret != sizeof(hmac)) 220 // Comparing the calculated HMAC with the one present in the message. 222 hmac, 223 sizeof(hmac)) == 0; 239 // Calculate the HMAC for the message 246 char hmac[kStunMessageIntegritySize]; local [all...] |
/external/openssl/ssl/ |
t1_enc.c | 144 #include <openssl/hmac.h> 559 /* Needed for "composite" AEADs, such as RC4-HMAC-MD5 */ 985 EVP_MD_CTX hmac, *mac_ctx; local 1014 if (!EVP_MD_CTX_copy(&hmac,hash)) 1016 mac_ctx = &hmac; 1074 EVP_MD_CTX_cleanup(&hmac); [all...] |