/system/keymaster/ |
hmac_test.cpp | 17 #include "hmac.h" 65 HmacSha256 hmac; local 68 ASSERT_TRUE(hmac.Init(key_buffer)); 75 EXPECT_TRUE(hmac.Verify(data_buffer, digest_buffer)); 79 EXPECT_FALSE(hmac.Verify(data_buffer, digest_buffer));
|
/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 21 #include <openssl/hmac.h> 35 HMAC_CTX hmac; local 37 /* If salt is not given, HashLength zeros are used. However, HMAC does that 47 HMAC_CTX_init(&hmac); 50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) { 55 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { 63 if (i != 0 && (!HMAC_Init_ex(&hmac, NULL, 0, NULL, NULL) || 64 !HMAC_Update(&hmac, previous, digest_len))) { 67 if (!HMAC_Update(&hmac, info, info_len) || 68 !HMAC_Update(&hmac, &ctr, 1) | [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/mturk/ |
notification.py | 27 import hmac namespace 86 h = hmac.new(key=secret_key, digestmod=sha)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
xsrfutil.py | 25 import hmac namespace 65 digester = hmac.new(_force_bytes(key))
|
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/ |
securecookie.py | 13 import hmac namespace 31 A random string to be used as the HMAC secret for the cookie 101 """Generates an HMAC signature.""" 102 signature = hmac.new(self.secret_key, digestmod=hashlib.sha1)
|
security.py | 17 import hmac namespace 106 is used, hmac is used internally to salt the password. 159 salted passwords are used hmac is used. 183 h = hmac.new(webapp2._to_utf8(salt), password, method) 188 h = hmac.new(webapp2._to_utf8(pepper), h.hexdigest(), method)
|
/external/dhcpcd-6.8.2/test/ |
test_hmac_md5.c | 37 print_hmac(uint8_t *hmac) 43 printf("%02x", *hmac++); 50 uint8_t hmac[16]; local 55 printf ("HMAC MD5 Test 1:\t\t"); 58 hmac_md5(text, 8, key, 16, hmac); 59 print_hmac(hmac); 66 uint8_t hmac[16]; local 70 printf("HMAC MD5 Test 2:\t\t"); 71 hmac_md5(text, 28, key, 4, hmac); 72 print_hmac(hmac); 79 uint8_t hmac[16]; local 97 uint8_t hmac[16]; local 115 uint8_t hmac[16]; local 131 uint8_t hmac[16]; local 147 uint8_t hmac[16]; local [all...] |
/hardware/libhardware/include/hardware/ |
hw_auth_token.h | 46 uint8_t hmac[32]; member in struct:__anon30871
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test_pep247.py | 12 import hmac namespace 68 self.check_module(hmac, key='abc')
|
test_hmac.py | 1 import hmac namespace 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test_pep247.py | 12 import hmac namespace 68 self.check_module(hmac, key='abc')
|
test_hmac.py | 1 import hmac namespace 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_pep247.py | 12 import hmac namespace 68 self.check_module(hmac, key='abc')
|
test_hmac.py | 1 import hmac namespace 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_pep247.py | 12 import hmac namespace 68 self.check_module(hmac, key='abc')
|
test_hmac.py | 1 import hmac namespace 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/external/srtp/crypto/hash/ |
hmac.c | 2 * hmac.c 4 * implementation of hmac auth_type_t 45 #include "hmac.h" 52 "hmac sha-1" /* printable name for module */ 58 extern auth_type_t hmac; 82 (*a)->type = &hmac; 88 /* increment global count of all hmac uses */ 89 hmac.ref_count++; 96 extern auth_type_t hmac; 105 /* decrement global count of all hmac uses * 255 hmac = { variable [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 140 * header, IV (TLS v1.1), and HMAC) 147 * This function fills in the TLS record layer header, adds HMAC, and encrypts 155 struct crypto_hash *hmac; local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 209 if (hmac == NULL) { 211 "to initialize HMAC"); 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); 217 crypto_hash_update(hmac, payload, payload_len); 222 crypto_hash_finish(hmac, NULL, NULL) 284 struct crypto_hash *hmac; local [all...] |
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/ |
tsig.py | 18 import hmac namespace 53 default_algorithm = "HMAC-MD5.SIG-ALG.REG.INT" 63 """Return a (tsig_rdata, mac, ctx) tuple containing the HMAC TSIG rdata 64 for the input parameters, the HMAC MAC calculated by applying the 66 @rtype: (string, string, hmac.HMAC object) 73 ctx = hmac.new(secret, digestmod=digestmod) 103 ctx = hmac.new(secret) 125 @rtype: hmac.HMAC object"" [all...] |
/external/chromium-trace/catapult/third_party/Paste/paste/auth/ |
cookie.py | 44 import hmac, base64, random, six, time, warnings namespace 49 # otherwise hmac only accepts the sha module object itself 55 _signature_size = len(hmac.new(b'x', b'x', sha1).digest()) 104 It is recommended via the HMAC specification (RFC 2104) that 148 hmac.new(self.secret, content, sha1).digest() + 167 if signature == hmac.new(self.secret, content, sha1).digest():
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/db/ |
test_password.py | 38 import hmac namespace 40 return hmac.new('mysecret', msg) 56 import hmac, hashlib namespace 62 hashfunc = myhashfunc #hashlib.md5 #lambda cls,msg: hmac.new('mysecret',msg) 77 expected = myhashfunc('bar').hexdigest() #hmac.new('mysecret','bar').hexdigest() 86 #hmac.new('mysecret','bar').hexdigest()) 100 import hmac namespace 101 myhashfunc=lambda msg: hmac.new('mysecret', msg)
|
/external/dhcpcd-6.8.2/ |
auth.c | 117 uint8_t hmac[HMAC_LENGTH]; local 184 if (dlen < sizeof(secretid) + sizeof(hmac)) { 193 if (dlen < sizeof(secretid) + sizeof(hmac)) { 197 realm_len = dlen - (sizeof(secretid) + sizeof(hmac)); 327 memset(hmac, 0, sizeof(hmac)); 330 hmac_md5(mm, mlen, t->key, t->key_len, hmac); 339 if (memcmp(d, &hmac, dlen)) { 480 uint8_t hmac[HMAC_LENGTH]; local 553 dlen += sizeof(t->secretid) + sizeof(hmac); [all...] |
/external/boringssl/src/ssl/ |
t1_enc.c | 144 #include <openssl/hmac.h> 183 uint8_t hmac[EVP_MAX_MD_SIZE]; local 191 !HMAC_Final(&ctx, hmac, &len)) { 202 out[i] ^= hmac[i];
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/utils/ |
test_utils.py | 26 import hmac namespace 88 return hmac.new(b'mysecretkey', msg) 98 hmac.new(b'mysecretkey', b'foo').hexdigest()) 101 hmac_hashfunc = lambda msg: hmac.new(b'mysecretkey', msg) 106 hmac.new(b'mysecretkey', b'foo').hexdigest())
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 168 unsigned char hmac[SHA1_MAC_LEN]; local 187 /* HMAC-SHA1-128 */ 196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 198 hmac, EAP_SIM_MAC_LEN); 201 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1; 208 unsigned char hmac[SHA1_MAC_LEN]; local 217 /* HMAC-SHA1-128 */ 224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 225 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN); 244 * T1 = HMAC-SHA-256 (K, S | 0x01 363 unsigned char hmac[SHA256_MAC_LEN]; local 403 unsigned char hmac[SHA256_MAC_LEN]; local [all...] |