/external/dhcpcd-6.8.2/test/ |
test_hmac_md5.c | 37 print_hmac(uint8_t *hmac) 43 printf("%02x", *hmac++); 50 uint8_t hmac[16]; local 55 printf ("HMAC MD5 Test 1:\t\t"); 58 hmac_md5(text, 8, key, 16, hmac); 59 print_hmac(hmac); 66 uint8_t hmac[16]; local 70 printf("HMAC MD5 Test 2:\t\t"); 71 hmac_md5(text, 28, key, 4, hmac); 72 print_hmac(hmac); 79 uint8_t hmac[16]; local 97 uint8_t hmac[16]; local 115 uint8_t hmac[16]; local 131 uint8_t hmac[16]; local 147 uint8_t hmac[16]; local [all...] |
/external/python/cpython2/Lib/test/ |
test_hmac.py | 3 import hmac 12 # Test the HMAC module against test vectors from the RFC. 15 h = hmac.HMAC(key, data) 49 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 83 h = hmac.HMAC(key, data, digestmod=hashfunc) 178 'd by the HMAC algorithm.', 219 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/external/boringssl/src/ssl/test/runner/ |
hkdf.go | 18 "crypto/hmac" 27 hmac := hmac.New(hash, salt) 28 hmac.Write(ikm) 29 return hmac.Sum(nil) 44 hmac := hmac.New(hash, prk) 46 hmac.Reset() 48 hmac.Write(lastBlock) 49 hmac.Write(info [all...] |
/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 21 #include <openssl/hmac.h> 47 // If salt is not given, HashLength zeros are used. However, HMAC does that 50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) { 68 HMAC_CTX hmac; local 77 HMAC_CTX_init(&hmac); 78 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { 86 if (i != 0 && (!HMAC_Init_ex(&hmac, NULL, 0, NULL, NULL) || 87 !HMAC_Update(&hmac, previous, digest_len))) { 90 if (!HMAC_Update(&hmac, info, info_len) || 91 !HMAC_Update(&hmac, &ctr, 1) | [all...] |
/external/python/cpython3/Lib/test/ |
test_hmac.py | 2 import hmac 21 # Test the HMAC module against test vectors from the RFC. 24 h = hmac.HMAC(key, data, digestmod=hashlib.md5) 26 self.assertEqual(h.name, "hmac-md5") 30 h = hmac.HMAC(key, data, digestmod='md5') 32 self.assertEqual(h.name, "hmac-md5") 68 h = hmac.HMAC(key, data, digestmod=hashlib.sha1 [all...] |
/external/libchrome/crypto/ |
hmac_unittest.cc | 10 #include "crypto/hmac.h" 46 // Expected HMAC result using kMessage and kClientKey. 80 crypto::HMAC hmac(crypto::HMAC::SHA1); 81 ASSERT_TRUE(hmac.Init(kClientKey, kKeySize)); 84 EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize)); 149 crypto::HMAC hmac(crypto::HMAC::SHA1) [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
PasswordRecipient.java | 21 private final String hmac; field in class:PasswordRecipient.PRF 24 private PRF(String hmac, AlgorithmIdentifier prfAlgID) 26 this.hmac = hmac; 32 return hmac;
|
/bionic/libc/kernel/uapi/linux/ |
seg6_hmac.h | 29 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member in struct:sr6_tlv_hmac
|
/external/iproute2/include/uapi/linux/ |
seg6_hmac.h | 15 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member in struct:sr6_tlv_hmac
|
/external/kernel-headers/original/uapi/linux/ |
seg6_hmac.h | 15 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member in struct:sr6_tlv_hmac
|
/hardware/libhardware/include/hardware/ |
hw_auth_token.h | 46 uint8_t hmac[32]; member in struct:__anon48237
|
/external/syslinux/gpxe/src/crypto/ |
hmac.c | 30 #include <gpxe/hmac.h> 33 * Reduce HMAC key length 51 * Initialise HMAC 85 * Finalise HMAC 91 * @v hmac HMAC digest to fill in 99 void *key, size_t *key_len, void *hmac ) { 115 digest_final ( digest, digest_ctx, hmac ); 120 digest_update ( digest, digest_ctx, hmac, digest->digestsize ); 121 digest_final ( digest, digest_ctx, hmac ); [all...] |
/system/keymaster/tests/ |
hmac_test.cpp | 17 #include <keymaster/km_openssl/hmac.h> 65 HmacSha256 hmac; local 68 ASSERT_TRUE(hmac.Init(key_buffer)); 75 EXPECT_TRUE(hmac.Verify(data_buffer, digest_buffer)); 79 EXPECT_FALSE(hmac.Verify(data_buffer, digest_buffer));
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
test_hmac.py | 1 import hmac
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash) [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test_hmac.py | 1 import hmac 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test_hmac.py | 1 import hmac 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_hmac.py | 1 import hmac 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_hmac.py | 1 import hmac 10 # Test the HMAC module against test vectors from the RFC. 13 h = hmac.HMAC(key, data) 47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 81 h = hmac.HMAC(key, data, digestmod=hashfunc) 176 'd by the HMAC algorithm.', 217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash [all...] |
/prebuilts/go/darwin-x86/src/crypto/hmac/ |
hmac.go | 6 Package hmac implements the Keyed-Hash Message Authentication Code (HMAC) as 8 An HMAC is a cryptographic hash that uses a key to sign a message. 14 // CheckMAC reports whether messageMAC is a valid HMAC tag for message. 16 mac := hmac.New(sha256.New, key) 19 return hmac.Equal(messageMAC, expectedMAC) 22 package hmac package 35 // hmac = H([key ^ opad] H([key ^ ipad] text)) 37 type hmac struct { type 44 func (h *hmac) Sum(in []byte) []byte [all...] |
/prebuilts/go/linux-x86/src/crypto/hmac/ |
hmac.go | 6 Package hmac implements the Keyed-Hash Message Authentication Code (HMAC) as 8 An HMAC is a cryptographic hash that uses a key to sign a message. 14 // CheckMAC reports whether messageMAC is a valid HMAC tag for message. 16 mac := hmac.New(sha256.New, key) 19 return hmac.Equal(messageMAC, expectedMAC) 22 package hmac package 35 // hmac = H([key ^ opad] H([key ^ ipad] text)) 37 type hmac struct { type 44 func (h *hmac) Sum(in []byte) []byte [all...] |
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/ |
CryptPkcs5Pbkdf2Null.c | 18 #include <openssl/hmac.h>
|
/external/syslinux/gpxe/src/include/gpxe/ |
hmac.h | 14 * Update HMAC 30 void *key, size_t *key_len, void *hmac );
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 140 * header, IV (TLS v1.1), and HMAC) 147 * This function fills in the TLS record layer header, adds HMAC, and encrypts 155 struct crypto_hash *hmac; local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 209 if (hmac == NULL) { 211 "to initialize HMAC"); 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); 217 crypto_hash_update(hmac, payload, payload_len); 222 crypto_hash_finish(hmac, NULL, NULL) 284 struct crypto_hash *hmac; local [all...] |
/system/hwservicemanager/ |
TokenManager.cpp | 8 #include <openssl/hmac.h> 110 std::array<uint8_t, EVP_MAX_MD_SIZE> hmac; local 113 uint8_t *hmacOut = HMAC(EVP_sha256(), 116 hmac.data(), &hmacSize); 119 hmacOut != hmac.data()) { 124 // only care about the first HMAC_SIZE bytes of the HMAC 125 const hidl_vec<uint8_t> &token = TokenManager::getToken(id, hmac.data(), hmacSize); 157 hidl_vec<uint8_t> TokenManager::getToken(const uint64_t id, const uint8_t *hmac, uint64_t hmacSize) { 166 token[i + ID_SIZE] = hmac[i];
|
/external/boringssl/src/crypto/fipsmodule/tls/ |
kdf.c | 55 #include <openssl/hmac.h> 93 uint8_t hmac[EVP_MAX_MD_SIZE]; local 101 !HMAC_Final(&ctx, hmac, &len)) { 111 out[i] ^= hmac[i];
|