HomeSort by relevance Sort by last modified time
    Searched refs:hmac (Results 1 - 25 of 176) sorted by null

1 2 3 4 5 6 7 8

  /external/dhcpcd-6.8.2/test/
test_hmac_md5.c 37 print_hmac(uint8_t *hmac)
43 printf("%02x", *hmac++);
50 uint8_t hmac[16]; local
55 printf ("HMAC MD5 Test 1:\t\t");
58 hmac_md5(text, 8, key, 16, hmac);
59 print_hmac(hmac);
66 uint8_t hmac[16]; local
70 printf("HMAC MD5 Test 2:\t\t");
71 hmac_md5(text, 28, key, 4, hmac);
72 print_hmac(hmac);
79 uint8_t hmac[16]; local
97 uint8_t hmac[16]; local
115 uint8_t hmac[16]; local
131 uint8_t hmac[16]; local
147 uint8_t hmac[16]; local
    [all...]
  /external/python/cpython2/Lib/test/
test_hmac.py 3 import hmac
12 # Test the HMAC module against test vectors from the RFC.
15 h = hmac.HMAC(key, data)
49 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
83 h = hmac.HMAC(key, data, digestmod=hashfunc)
178 'd by the HMAC algorithm.',
219 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /external/boringssl/src/ssl/test/runner/
hkdf.go 18 "crypto/hmac"
27 hmac := hmac.New(hash, salt)
28 hmac.Write(ikm)
29 return hmac.Sum(nil)
44 hmac := hmac.New(hash, prk)
46 hmac.Reset()
48 hmac.Write(lastBlock)
49 hmac.Write(info
    [all...]
  /external/boringssl/src/crypto/hkdf/
hkdf.c 21 #include <openssl/hmac.h>
47 // If salt is not given, HashLength zeros are used. However, HMAC does that
50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) {
68 HMAC_CTX hmac; local
77 HMAC_CTX_init(&hmac);
78 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) {
86 if (i != 0 && (!HMAC_Init_ex(&hmac, NULL, 0, NULL, NULL) ||
87 !HMAC_Update(&hmac, previous, digest_len))) {
90 if (!HMAC_Update(&hmac, info, info_len) ||
91 !HMAC_Update(&hmac, &ctr, 1) |
    [all...]
  /external/python/cpython3/Lib/test/
test_hmac.py 2 import hmac
21 # Test the HMAC module against test vectors from the RFC.
24 h = hmac.HMAC(key, data, digestmod=hashlib.md5)
26 self.assertEqual(h.name, "hmac-md5")
30 h = hmac.HMAC(key, data, digestmod='md5')
32 self.assertEqual(h.name, "hmac-md5")
68 h = hmac.HMAC(key, data, digestmod=hashlib.sha1
    [all...]
  /external/libchrome/crypto/
hmac_unittest.cc 10 #include "crypto/hmac.h"
46 // Expected HMAC result using kMessage and kClientKey.
80 crypto::HMAC hmac(crypto::HMAC::SHA1);
81 ASSERT_TRUE(hmac.Init(kClientKey, kKeySize));
84 EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize));
149 crypto::HMAC hmac(crypto::HMAC::SHA1)
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
PasswordRecipient.java 21 private final String hmac; field in class:PasswordRecipient.PRF
24 private PRF(String hmac, AlgorithmIdentifier prfAlgID)
26 this.hmac = hmac;
32 return hmac;
  /bionic/libc/kernel/uapi/linux/
seg6_hmac.h 29 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member in struct:sr6_tlv_hmac
  /external/iproute2/include/uapi/linux/
seg6_hmac.h 15 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member in struct:sr6_tlv_hmac
  /external/kernel-headers/original/uapi/linux/
seg6_hmac.h 15 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member in struct:sr6_tlv_hmac
  /hardware/libhardware/include/hardware/
hw_auth_token.h 46 uint8_t hmac[32]; member in struct:__anon48237
  /external/syslinux/gpxe/src/crypto/
hmac.c 30 #include <gpxe/hmac.h>
33 * Reduce HMAC key length
51 * Initialise HMAC
85 * Finalise HMAC
91 * @v hmac HMAC digest to fill in
99 void *key, size_t *key_len, void *hmac ) {
115 digest_final ( digest, digest_ctx, hmac );
120 digest_update ( digest, digest_ctx, hmac, digest->digestsize );
121 digest_final ( digest, digest_ctx, hmac );
    [all...]
  /system/keymaster/tests/
hmac_test.cpp 17 #include <keymaster/km_openssl/hmac.h>
65 HmacSha256 hmac; local
68 ASSERT_TRUE(hmac.Init(key_buffer));
75 EXPECT_TRUE(hmac.Verify(data_buffer, digest_buffer));
79 EXPECT_FALSE(hmac.Verify(data_buffer, digest_buffer));
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/
test_hmac.py 1 import hmac
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash)
    [all...]
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/
test_hmac.py 1 import hmac
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/test/
test_hmac.py 1 import hmac
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_hmac.py 1 import hmac
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_hmac.py 1 import hmac
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/hmac/
hmac.go 6 Package hmac implements the Keyed-Hash Message Authentication Code (HMAC) as
8 An HMAC is a cryptographic hash that uses a key to sign a message.
14 // CheckMAC reports whether messageMAC is a valid HMAC tag for message.
16 mac := hmac.New(sha256.New, key)
19 return hmac.Equal(messageMAC, expectedMAC)
22 package hmac package
35 // hmac = H([key ^ opad] H([key ^ ipad] text))
37 type hmac struct { type
44 func (h *hmac) Sum(in []byte) []byte
    [all...]
  /prebuilts/go/linux-x86/src/crypto/hmac/
hmac.go 6 Package hmac implements the Keyed-Hash Message Authentication Code (HMAC) as
8 An HMAC is a cryptographic hash that uses a key to sign a message.
14 // CheckMAC reports whether messageMAC is a valid HMAC tag for message.
16 mac := hmac.New(sha256.New, key)
19 return hmac.Equal(messageMAC, expectedMAC)
22 package hmac package
35 // hmac = H([key ^ opad] H([key ^ ipad] text))
37 type hmac struct { type
44 func (h *hmac) Sum(in []byte) []byte
    [all...]
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/
CryptPkcs5Pbkdf2Null.c 18 #include <openssl/hmac.h>
  /external/syslinux/gpxe/src/include/gpxe/
hmac.h 14 * Update HMAC
30 void *key, size_t *key_len, void *hmac );
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 140 * header, IV (TLS v1.1), and HMAC)
147 * This function fills in the TLS record layer header, adds HMAC, and encrypts
155 struct crypto_hash *hmac; local
207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret,
209 if (hmac == NULL) {
211 "to initialize HMAC");
214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN);
216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN);
217 crypto_hash_update(hmac, payload, payload_len);
222 crypto_hash_finish(hmac, NULL, NULL)
284 struct crypto_hash *hmac; local
    [all...]
  /system/hwservicemanager/
TokenManager.cpp 8 #include <openssl/hmac.h>
110 std::array<uint8_t, EVP_MAX_MD_SIZE> hmac; local
113 uint8_t *hmacOut = HMAC(EVP_sha256(),
116 hmac.data(), &hmacSize);
119 hmacOut != hmac.data()) {
124 // only care about the first HMAC_SIZE bytes of the HMAC
125 const hidl_vec<uint8_t> &token = TokenManager::getToken(id, hmac.data(), hmacSize);
157 hidl_vec<uint8_t> TokenManager::getToken(const uint64_t id, const uint8_t *hmac, uint64_t hmacSize) {
166 token[i + ID_SIZE] = hmac[i];
  /external/boringssl/src/crypto/fipsmodule/tls/
kdf.c 55 #include <openssl/hmac.h>
93 uint8_t hmac[EVP_MAX_MD_SIZE]; local
101 !HMAC_Final(&ctx, hmac, &len)) {
111 out[i] ^= hmac[i];

Completed in 725 milliseconds

1 2 3 4 5 6 7 8