HomeSort by relevance Sort by last modified time
    Searched refs:hmac (Results 1 - 25 of 93) sorted by null

1 2 3 4

  /external/dhcpcd-6.8.2/test/
test_hmac_md5.c 37 print_hmac(uint8_t *hmac)
43 printf("%02x", *hmac++);
50 uint8_t hmac[16]; local
55 printf ("HMAC MD5 Test 1:\t\t");
58 hmac_md5(text, 8, key, 16, hmac);
59 print_hmac(hmac);
66 uint8_t hmac[16]; local
70 printf("HMAC MD5 Test 2:\t\t");
71 hmac_md5(text, 28, key, 4, hmac);
72 print_hmac(hmac);
79 uint8_t hmac[16]; local
97 uint8_t hmac[16]; local
115 uint8_t hmac[16]; local
131 uint8_t hmac[16]; local
147 uint8_t hmac[16]; local
    [all...]
  /external/boringssl/src/crypto/hkdf/
hkdf.c 21 #include <openssl/hmac.h>
35 HMAC_CTX hmac; local
37 /* If salt is not given, HashLength zeros are used. However, HMAC does that
47 HMAC_CTX_init(&hmac);
50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) {
55 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) {
63 if (i != 0 && (!HMAC_Init_ex(&hmac, NULL, 0, NULL, NULL) ||
64 !HMAC_Update(&hmac, previous, digest_len))) {
67 if (!HMAC_Update(&hmac, info, info_len) ||
68 !HMAC_Update(&hmac, &ctr, 1) |
    [all...]
  /external/libchrome/crypto/
hmac_unittest.cc 10 #include "crypto/hmac.h"
46 // Expected HMAC result using kMessage and kClientKey.
80 crypto::HMAC hmac(crypto::HMAC::SHA1);
81 ASSERT_TRUE(hmac.Init(kClientKey, kKeySize));
84 EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize));
149 crypto::HMAC hmac(crypto::HMAC::SHA1)
    [all...]
  /hardware/libhardware/include/hardware/
hw_auth_token.h 46 uint8_t hmac[32]; member in struct:__anon31320
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
test_pep247.py 12 import hmac namespace
68 self.check_module(hmac, key='abc')
  /prebuilts/gdb/linux-x86/lib/python2.7/test/
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
test_pep247.py 12 import hmac namespace
68 self.check_module(hmac, key='abc')
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
test_pep247.py 12 import hmac namespace
68 self.check_module(hmac, key='abc')
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 140 * header, IV (TLS v1.1), and HMAC)
147 * This function fills in the TLS record layer header, adds HMAC, and encrypts
155 struct crypto_hash *hmac; local
207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret,
209 if (hmac == NULL) {
211 "to initialize HMAC");
214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN);
216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN);
217 crypto_hash_update(hmac, payload, payload_len);
222 crypto_hash_finish(hmac, NULL, NULL)
284 struct crypto_hash *hmac; local
    [all...]
  /system/keymaster/
hmac_test.cpp 17 #include "hmac.h"
65 HmacSha256 hmac; local
68 ASSERT_TRUE(hmac.Init(key_buffer));
75 EXPECT_TRUE(hmac.Verify(data_buffer, digest_buffer));
79 EXPECT_FALSE(hmac.Verify(data_buffer, digest_buffer));
hkdf.cpp 23 #include "hmac.h"
32 * Step 1. Extract: PRK = HMAC-SHA256(actual_salt, secret)
70 HmacSha256 hmac;
71 result = hmac.Init(pseudo_random_key.get(), digest_size_);
85 result = hmac.Sign(buf.get(), block_input_len, digest.get(), digest_size_);
integrity_assured_key_blob.cpp 23 #include <openssl/hmac.h>
53 const AuthorizationSet& hidden, uint8_t hmac[HMAC_SIZE]) {
75 memcpy(hmac, tmp, min(HMAC_SIZE, tmp_len));
  /external/srtp/crypto/hash/
hmac.c 2 * hmac.c
4 * implementation of hmac auth_type_t
45 #include "hmac.h"
52 "hmac sha-1" /* printable name for module */
58 extern auth_type_t hmac;
82 (*a)->type = &hmac;
88 /* increment global count of all hmac uses */
89 hmac.ref_count++;
96 extern auth_type_t hmac;
105 /* decrement global count of all hmac uses *
255 hmac = { variable
    [all...]
  /system/tpm/trunks/
password_authorization_delegate.cc 43 auth.hmac = password_;
74 if (auth_response.hmac.size != 0) {
75 LOG(ERROR) << __func__ << ": received a non zero length hmac.";
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/db/
test_password.py 38 import hmac namespace
40 return hmac.new('mysecret', msg)
56 import hmac, hashlib namespace
62 hashfunc = myhashfunc #hashlib.md5 #lambda cls,msg: hmac.new('mysecret',msg)
77 expected = myhashfunc('bar').hexdigest() #hmac.new('mysecret','bar').hexdigest()
86 #hmac.new('mysecret','bar').hexdigest())
100 import hmac namespace
101 myhashfunc=lambda msg: hmac.new('mysecret', msg)
  /external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/
security.py 17 import hmac namespace
106 is used, hmac is used internally to salt the password.
159 salted passwords are used hmac is used.
183 h = hmac.new(webapp2._to_utf8(salt), password, method)
188 h = hmac.new(webapp2._to_utf8(pepper), h.hexdigest(), method)
securecookie.py 13 import hmac namespace
31 A random string to be used as the HMAC secret for the cookie
101 """Generates an HMAC signature."""
102 signature = hmac.new(self.secret_key, digestmod=hashlib.sha1)
  /external/libweave/third_party/libuweave/src/
crypto_hmac.c 12 #include <openssl/hmac.h>
  /external/tpm2/
HMAC_Start.c 16 // TPM_RC_KEY key referenced by handle is not an HMAC key
32 // Get HMAC key object and public area pointers
36 // Make sure that the key is an HMAC key
56 = publicArea->parameters.keyedHashDetail.scheme.details.hmac.hashAlg;
67 // Create a HMAC sequence object. A TPM_RC_OBJECT_MEMORY error may be
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/mturk/
notification.py 27 import hmac namespace
86 h = hmac.new(key=secret_key, digestmod=sha)
  /external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/
xsrfutil.py 25 import hmac namespace
65 digester = hmac.new(_force_bytes(key))
  /external/dhcpcd-6.8.2/
auth.c 117 uint8_t hmac[HMAC_LENGTH]; local
184 if (dlen < sizeof(secretid) + sizeof(hmac)) {
193 if (dlen < sizeof(secretid) + sizeof(hmac)) {
197 realm_len = dlen - (sizeof(secretid) + sizeof(hmac));
327 memset(hmac, 0, sizeof(hmac));
330 hmac_md5(mm, mlen, t->key, t->key_len, hmac);
339 if (memcmp(d, &hmac, dlen)) {
480 uint8_t hmac[HMAC_LENGTH]; local
553 dlen += sizeof(t->secretid) + sizeof(hmac);
    [all...]

Completed in 1238 milliseconds

1 2 3 4