HomeSort by relevance Sort by last modified time
    Searched defs:hmac (Results 1 - 25 of 48) sorted by null

1 2

  /system/keymaster/
hmac_test.cpp 17 #include "hmac.h"
65 HmacSha256 hmac; local
68 ASSERT_TRUE(hmac.Init(key_buffer));
75 EXPECT_TRUE(hmac.Verify(data_buffer, digest_buffer));
79 EXPECT_FALSE(hmac.Verify(data_buffer, digest_buffer));
  /external/boringssl/src/crypto/hkdf/
hkdf.c 21 #include <openssl/hmac.h>
35 HMAC_CTX hmac; local
37 /* If salt is not given, HashLength zeros are used. However, HMAC does that
47 HMAC_CTX_init(&hmac);
50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) {
55 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) {
63 if (i != 0 && (!HMAC_Init_ex(&hmac, NULL, 0, NULL, NULL) ||
64 !HMAC_Update(&hmac, previous, digest_len))) {
67 if (!HMAC_Update(&hmac, info, info_len) ||
68 !HMAC_Update(&hmac, &ctr, 1) |
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/mturk/
notification.py 27 import hmac namespace
86 h = hmac.new(key=secret_key, digestmod=sha)
  /external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/
xsrfutil.py 25 import hmac namespace
65 digester = hmac.new(_force_bytes(key))
  /external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/
securecookie.py 13 import hmac namespace
31 A random string to be used as the HMAC secret for the cookie
101 """Generates an HMAC signature."""
102 signature = hmac.new(self.secret_key, digestmod=hashlib.sha1)
security.py 17 import hmac namespace
106 is used, hmac is used internally to salt the password.
159 salted passwords are used hmac is used.
183 h = hmac.new(webapp2._to_utf8(salt), password, method)
188 h = hmac.new(webapp2._to_utf8(pepper), h.hexdigest(), method)
  /external/dhcpcd-6.8.2/test/
test_hmac_md5.c 37 print_hmac(uint8_t *hmac)
43 printf("%02x", *hmac++);
50 uint8_t hmac[16]; local
55 printf ("HMAC MD5 Test 1:\t\t");
58 hmac_md5(text, 8, key, 16, hmac);
59 print_hmac(hmac);
66 uint8_t hmac[16]; local
70 printf("HMAC MD5 Test 2:\t\t");
71 hmac_md5(text, 28, key, 4, hmac);
72 print_hmac(hmac);
79 uint8_t hmac[16]; local
97 uint8_t hmac[16]; local
115 uint8_t hmac[16]; local
131 uint8_t hmac[16]; local
147 uint8_t hmac[16]; local
    [all...]
  /hardware/libhardware/include/hardware/
hw_auth_token.h 46 uint8_t hmac[32]; member in struct:__anon30871
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/
test_pep247.py 12 import hmac namespace
68 self.check_module(hmac, key='abc')
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/test/
test_pep247.py 12 import hmac namespace
68 self.check_module(hmac, key='abc')
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_pep247.py 12 import hmac namespace
68 self.check_module(hmac, key='abc')
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_pep247.py 12 import hmac namespace
68 self.check_module(hmac, key='abc')
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /external/srtp/crypto/hash/
hmac.c 2 * hmac.c
4 * implementation of hmac auth_type_t
45 #include "hmac.h"
52 "hmac sha-1" /* printable name for module */
58 extern auth_type_t hmac;
82 (*a)->type = &hmac;
88 /* increment global count of all hmac uses */
89 hmac.ref_count++;
96 extern auth_type_t hmac;
105 /* decrement global count of all hmac uses *
255 hmac = { variable
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 140 * header, IV (TLS v1.1), and HMAC)
147 * This function fills in the TLS record layer header, adds HMAC, and encrypts
155 struct crypto_hash *hmac; local
207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret,
209 if (hmac == NULL) {
211 "to initialize HMAC");
214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN);
216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN);
217 crypto_hash_update(hmac, payload, payload_len);
222 crypto_hash_finish(hmac, NULL, NULL)
284 struct crypto_hash *hmac; local
    [all...]
  /external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/
tsig.py 18 import hmac namespace
53 default_algorithm = "HMAC-MD5.SIG-ALG.REG.INT"
63 """Return a (tsig_rdata, mac, ctx) tuple containing the HMAC TSIG rdata
64 for the input parameters, the HMAC MAC calculated by applying the
66 @rtype: (string, string, hmac.HMAC object)
73 ctx = hmac.new(secret, digestmod=digestmod)
103 ctx = hmac.new(secret)
125 @rtype: hmac.HMAC object""
    [all...]
  /external/chromium-trace/catapult/third_party/Paste/paste/auth/
cookie.py 44 import hmac, base64, random, six, time, warnings namespace
49 # otherwise hmac only accepts the sha module object itself
55 _signature_size = len(hmac.new(b'x', b'x', sha1).digest())
104 It is recommended via the HMAC specification (RFC 2104) that
148 hmac.new(self.secret, content, sha1).digest() +
167 if signature == hmac.new(self.secret, content, sha1).digest():
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/db/
test_password.py 38 import hmac namespace
40 return hmac.new('mysecret', msg)
56 import hmac, hashlib namespace
62 hashfunc = myhashfunc #hashlib.md5 #lambda cls,msg: hmac.new('mysecret',msg)
77 expected = myhashfunc('bar').hexdigest() #hmac.new('mysecret','bar').hexdigest()
86 #hmac.new('mysecret','bar').hexdigest())
100 import hmac namespace
101 myhashfunc=lambda msg: hmac.new('mysecret', msg)
  /external/dhcpcd-6.8.2/
auth.c 117 uint8_t hmac[HMAC_LENGTH]; local
184 if (dlen < sizeof(secretid) + sizeof(hmac)) {
193 if (dlen < sizeof(secretid) + sizeof(hmac)) {
197 realm_len = dlen - (sizeof(secretid) + sizeof(hmac));
327 memset(hmac, 0, sizeof(hmac));
330 hmac_md5(mm, mlen, t->key, t->key_len, hmac);
339 if (memcmp(d, &hmac, dlen)) {
480 uint8_t hmac[HMAC_LENGTH]; local
553 dlen += sizeof(t->secretid) + sizeof(hmac);
    [all...]
  /external/boringssl/src/ssl/
t1_enc.c 144 #include <openssl/hmac.h>
183 uint8_t hmac[EVP_MAX_MD_SIZE]; local
191 !HMAC_Final(&ctx, hmac, &len)) {
202 out[i] ^= hmac[i];
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/utils/
test_utils.py 26 import hmac namespace
88 return hmac.new(b'mysecretkey', msg)
98 hmac.new(b'mysecretkey', b'foo').hexdigest())
101 hmac_hashfunc = lambda msg: hmac.new(b'mysecretkey', msg)
106 hmac.new(b'mysecretkey', b'foo').hexdigest())
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 168 unsigned char hmac[SHA1_MAC_LEN]; local
187 /* HMAC-SHA1-128 */
196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
198 hmac, EAP_SIM_MAC_LEN);
201 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1;
208 unsigned char hmac[SHA1_MAC_LEN]; local
217 /* HMAC-SHA1-128 */
224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
225 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN);
244 * T1 = HMAC-SHA-256 (K, S | 0x01
363 unsigned char hmac[SHA256_MAC_LEN]; local
403 unsigned char hmac[SHA256_MAC_LEN]; local
    [all...]

Completed in 736 milliseconds

1 2