/external/dhcpcd-6.8.2/test/ |
test_hmac_md5.c | 37 print_hmac(uint8_t *hmac) 43 printf("%02x", *hmac++); 50 uint8_t hmac[16]; local 55 printf ("HMAC MD5 Test 1:\t\t"); 58 hmac_md5(text, 8, key, 16, hmac); 59 print_hmac(hmac); 66 uint8_t hmac[16]; local 70 printf("HMAC MD5 Test 2:\t\t"); 71 hmac_md5(text, 28, key, 4, hmac); 72 print_hmac(hmac); 79 uint8_t hmac[16]; local 97 uint8_t hmac[16]; local 115 uint8_t hmac[16]; local 131 uint8_t hmac[16]; local 147 uint8_t hmac[16]; local [all...] |
/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 21 #include <openssl/hmac.h> 35 HMAC_CTX hmac; local 37 /* If salt is not given, HashLength zeros are used. However, HMAC does that 47 HMAC_CTX_init(&hmac); 50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) { 55 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { 63 if (i != 0 && (!HMAC_Init_ex(&hmac, NULL, 0, NULL, NULL) || 64 !HMAC_Update(&hmac, previous, digest_len))) { 67 if (!HMAC_Update(&hmac, info, info_len) || 68 !HMAC_Update(&hmac, &ctr, 1) | [all...] |
/external/libchrome/crypto/ |
hmac_unittest.cc | 10 #include "crypto/hmac.h" 46 // Expected HMAC result using kMessage and kClientKey. 80 crypto::HMAC hmac(crypto::HMAC::SHA1); 81 ASSERT_TRUE(hmac.Init(kClientKey, kKeySize)); 84 EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize)); 149 crypto::HMAC hmac(crypto::HMAC::SHA1) [all...] |
/hardware/libhardware/include/hardware/ |
hw_auth_token.h | 46 uint8_t hmac[32]; member in struct:__anon31320
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test_hmac.py | 1 import hmac namespace 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
test_pep247.py | 12 import hmac namespace 68 self.check_module(hmac, key='abc')
|
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test_hmac.py | 1 import hmac namespace 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
test_pep247.py | 12 import hmac namespace 68 self.check_module(hmac, key='abc')
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_hmac.py | 1 import hmac namespace 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
test_pep247.py | 12 import hmac namespace 68 self.check_module(hmac, key='abc')
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_hmac.py | 1 import hmac namespace 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 140 * header, IV (TLS v1.1), and HMAC) 147 * This function fills in the TLS record layer header, adds HMAC, and encrypts 155 struct crypto_hash *hmac; local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 209 if (hmac == NULL) { 211 "to initialize HMAC"); 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); 217 crypto_hash_update(hmac, payload, payload_len); 222 crypto_hash_finish(hmac, NULL, NULL) 284 struct crypto_hash *hmac; local [all...] |
/system/keymaster/ |
hmac_test.cpp | 17 #include "hmac.h" 65 HmacSha256 hmac; local 68 ASSERT_TRUE(hmac.Init(key_buffer)); 75 EXPECT_TRUE(hmac.Verify(data_buffer, digest_buffer)); 79 EXPECT_FALSE(hmac.Verify(data_buffer, digest_buffer));
|
hkdf.cpp | 23 #include "hmac.h" 32 * Step 1. Extract: PRK = HMAC-SHA256(actual_salt, secret) 70 HmacSha256 hmac; 71 result = hmac.Init(pseudo_random_key.get(), digest_size_); 85 result = hmac.Sign(buf.get(), block_input_len, digest.get(), digest_size_);
|
integrity_assured_key_blob.cpp | 23 #include <openssl/hmac.h> 53 const AuthorizationSet& hidden, uint8_t hmac[HMAC_SIZE]) { 75 memcpy(hmac, tmp, min(HMAC_SIZE, tmp_len));
|
/external/srtp/crypto/hash/ |
hmac.c | 2 * hmac.c 4 * implementation of hmac auth_type_t 45 #include "hmac.h" 52 "hmac sha-1" /* printable name for module */ 58 extern auth_type_t hmac; 82 (*a)->type = &hmac; 88 /* increment global count of all hmac uses */ 89 hmac.ref_count++; 96 extern auth_type_t hmac; 105 /* decrement global count of all hmac uses * 255 hmac = { variable [all...] |
/system/tpm/trunks/ |
password_authorization_delegate.cc | 43 auth.hmac = password_; 74 if (auth_response.hmac.size != 0) { 75 LOG(ERROR) << __func__ << ": received a non zero length hmac.";
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/db/ |
test_password.py | 38 import hmac namespace 40 return hmac.new('mysecret', msg) 56 import hmac, hashlib namespace 62 hashfunc = myhashfunc #hashlib.md5 #lambda cls,msg: hmac.new('mysecret',msg) 77 expected = myhashfunc('bar').hexdigest() #hmac.new('mysecret','bar').hexdigest() 86 #hmac.new('mysecret','bar').hexdigest()) 100 import hmac namespace 101 myhashfunc=lambda msg: hmac.new('mysecret', msg)
|
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/ |
security.py | 17 import hmac namespace 106 is used, hmac is used internally to salt the password. 159 salted passwords are used hmac is used. 183 h = hmac.new(webapp2._to_utf8(salt), password, method) 188 h = hmac.new(webapp2._to_utf8(pepper), h.hexdigest(), method)
|
securecookie.py | 13 import hmac namespace 31 A random string to be used as the HMAC secret for the cookie 101 """Generates an HMAC signature.""" 102 signature = hmac.new(self.secret_key, digestmod=hashlib.sha1)
|
/external/libweave/third_party/libuweave/src/ |
crypto_hmac.c | 12 #include <openssl/hmac.h>
|
/external/tpm2/ |
HMAC_Start.c | 16 // TPM_RC_KEY key referenced by handle is not an HMAC key 32 // Get HMAC key object and public area pointers 36 // Make sure that the key is an HMAC key 56 = publicArea->parameters.keyedHashDetail.scheme.details.hmac.hashAlg; 67 // Create a HMAC sequence object. A TPM_RC_OBJECT_MEMORY error may be
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/mturk/ |
notification.py | 27 import hmac namespace 86 h = hmac.new(key=secret_key, digestmod=sha)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
xsrfutil.py | 25 import hmac namespace 65 digester = hmac.new(_force_bytes(key))
|
/external/dhcpcd-6.8.2/ |
auth.c | 117 uint8_t hmac[HMAC_LENGTH]; local 184 if (dlen < sizeof(secretid) + sizeof(hmac)) { 193 if (dlen < sizeof(secretid) + sizeof(hmac)) { 197 realm_len = dlen - (sizeof(secretid) + sizeof(hmac)); 327 memset(hmac, 0, sizeof(hmac)); 330 hmac_md5(mm, mlen, t->key, t->key_len, hmac); 339 if (memcmp(d, &hmac, dlen)) { 480 uint8_t hmac[HMAC_LENGTH]; local 553 dlen += sizeof(t->secretid) + sizeof(hmac); [all...] |