HomeSort by relevance Sort by last modified time
    Searched refs:hmac (Results 51 - 75 of 176) sorted by null

1 23 4 5 6 7 8

  /external/nos/test/system-test-harness/src/
blob.h 81 uint8_t hmac[32]; member in struct:km_blob
  /external/tpm2/
HMAC.c 15 // TPM_RC_TYPE key referenced by handle is not an HMAC key
32 // Get HMAC key object and public area pointers
36 // Make sure that the key is an HMAC key
56 = publicArea->parameters.keyedHashDetail.scheme.details.hmac.hashAlg;
67 // Start HMAC stack
71 // Adding HMAC data
74 // Complete HMAC
  /system/keymaster/km_openssl/
hmac_operation.h 21 #include <openssl/hmac.h>
51 * Abstract base for HMAC operation factories. This class does all of the work to create
52 * HMAC operations.
  /hardware/interfaces/confirmationui/1.0/vts/functional/
VtsHalConfirmationUIV1_0TargetTest.cpp 32 #include <openssl/hmac.h>
74 using HMacer = support::HMac<HMacImplementation>;
78 auto hmac = HMacer::hmac256(testKey, data...); local
79 if (!hmac.isOk()) {
80 EXPECT_TRUE(false) << "Failed to compute test hmac. This is a self-test error.";
83 hidl_vec<uint8_t> result(hmac.value().size());
84 copy(hmac.value().data(), hmac.value().data() + hmac.value().size(), result.data());
394 // Test the implementation of HMAC SHA 256 against a golden blob
    [all...]
  /system/gatekeeper/
gatekeeper.cpp 241 uint32_t hash_len = (uint32_t)((uint8_t *)&token->hmac - (uint8_t *)token);
242 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len,
246 memset(token->hmac, 0, sizeof(token->hmac));
  /system/tpm/trunks/
hmac_authorization_delegate.cc 23 #include <openssl/hmac.h>
99 auth.hmac = Make_TPM2B_DIGEST(digest);
124 if (auth_response.hmac.size != kHashDigestSize) {
125 LOG(ERROR) << "TPM auth hmac was incorrect size.";
161 CHECK_EQ(digest.size(), auth_response.hmac.size);
162 if (!crypto::SecureMemEqual(digest.data(), auth_response.hmac.buffer,
275 HMAC(EVP_sha256(), key.data(), key.size(),
hmac_authorization_delegate_test.cc 175 EXPECT_EQ(kHashDigestSize, auth_command.hmac.size);
183 auth_response.hmac.size = kHashDigestSize;
189 memcpy(auth_response.hmac.buffer, hmac_buffer, kHashDigestSize);
  /external/webrtc/webrtc/p2p/base/
stun.cc 179 // Adjust the length parameter in stun message to calculate HMAC.
193 char hmac[kStunMessageIntegritySize]; local
197 hmac, sizeof(hmac));
198 ASSERT(ret == sizeof(hmac));
199 if (ret != sizeof(hmac))
202 // Comparing the calculated HMAC with the one present in the message.
204 hmac,
205 sizeof(hmac)) == 0;
221 // Calculate the HMAC for the message
228 char hmac[kStunMessageIntegritySize]; local
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 168 unsigned char hmac[SHA1_MAC_LEN]; local
187 /* HMAC-SHA1-128 */
195 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
197 hmac, EAP_SIM_MAC_LEN);
200 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1;
207 unsigned char hmac[SHA1_MAC_LEN]; local
216 /* HMAC-SHA1-128 */
223 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
224 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN);
243 * T1 = HMAC-SHA-256 (K, S | 0x01
362 unsigned char hmac[SHA256_MAC_LEN]; local
401 unsigned char hmac[SHA256_MAC_LEN]; local
    [all...]
  /external/boringssl/src/crypto/evp/
pbkdf.c 60 #include <openssl/hmac.h>
  /external/boringssl/src/fipstools/
cavp_hmac_test.cc 15 // cavp_hmac_test processes a NIST CAVP HMAC test vector request file and emits
21 #include <openssl/hmac.h>
72 if (HMAC(md, key.data(), k_len, msg.data(), msg.size(), out, &out_len) ==
  /hardware/qcom/keymaster/
keymaster_qcom.h 52 #define KM_HMAC_LENGTH (32) /* SHA2 will be used for HMAC */
64 uint8_t hmac[KM_HMAC_LENGTH]; member in struct:qcom_km_key_blob
  /system/hwservicemanager/
TokenManager.h 42 static hidl_vec<uint8_t> getToken(const uint64_t id, const uint8_t *hmac, uint64_t hmacSize);
49 hidl_vec<uint8_t> token; // First eight bytes are tokenId. Remaining bytes are hmac.
  /hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/1.0/generic/
GenericOperation.h 46 using HMacer = support::HMac<HmacImplementation>;
133 auto hmac = HMacer::hmac256(testKey, "\0", bytes_cast(secureInputToken.challenge), local
138 if (!hmac.isOk()) return ResponseCode::Unexpected;
139 if (hmac.value() == secureInputToken.mac) {
  /external/iproute2/ip/
iproute_lwtunnel.c 109 fprintf(fp, "hmac 0x%X ", ntohl(tlv->hmackeyid));
418 static struct ipv6_sr_hdr *parse_srh(char *segbuf, int hmac, bool encap)
435 if (hmac)
446 if (hmac)
455 if (hmac) {
461 tlv->hmackeyid = htonl(hmac);
477 __u32 hmac = 0; local
497 } else if (strcmp(*argv, "hmac") == 0) {
500 duparg2("hmac", *argv);
501 get_u32(&hmac, *argv, 0)
541 __u32 hmac = 0; local
    [all...]
  /external/scapy/scapy/layers/tls/
session.py 100 self.hmac = None
103 self.hmac = ciphersuite.hmac_alg()
104 self.mac_len = self.hmac.hmac_len
106 self.hmac = ciphersuite.hmac_alg() # should be Hmac_NULL
188 self.hmac = None
191 self.hmac = cs.hmac_alg(mac_secret)
192 self.mac_len = self.hmac.hmac_len
262 if self.hmac:
263 snap.hmac.key = self.hmac.ke
    [all...]
  /external/boringssl/src/ssl/test/runner/
ticket.go 10 "crypto/hmac"
175 mac := hmac.New(sha256.New, c.config.SessionTicketKey[16:32])
190 mac := hmac.New(sha256.New, c.config.SessionTicketKey[16:32])
  /prebuilts/go/darwin-x86/src/crypto/tls/
ticket.go 11 "crypto/hmac"
150 mac := hmac.New(sha256.New, key.hmacKey[:])
181 mac := hmac.New(sha256.New, key.hmacKey[:])
  /prebuilts/go/linux-x86/src/crypto/tls/
ticket.go 11 "crypto/hmac"
150 mac := hmac.New(sha256.New, key.hmacKey[:])
181 mac := hmac.New(sha256.New, key.hmacKey[:])
  /device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTrEEPhysicalPresenceLib/
DxeTrEEPhysicalPresenceLib.c 87 LocalAuthSession.hmac.size = PlatformAuth->size;
88 CopyMem (LocalAuthSession.hmac.buffer, PlatformAuth->buffer, PlatformAuth->size);
102 ZeroMem (&LocalAuthSession.hmac, sizeof(LocalAuthSession.hmac));
  /external/boringssl/src/crypto/hmac_extra/
hmac_test.cc 64 #include <openssl/hmac.h>
90 ASSERT_TRUE(t->GetAttribute(&digest_str, "HMAC"));
104 ASSERT_TRUE(HMAC(digest, key.data(), key.size(), input.data(), input.size(),
  /external/python/cpython2/Lib/multiprocessing/
connection.py 417 import hmac
421 digest = hmac.new(authkey, message).digest()
430 import hmac
435 digest = hmac.new(authkey, message).digest()
  /external/scapy/scapy/layers/tls/crypto/
hkdf.py 18 from cryptography.hazmat.primitives.hmac import HMAC
61 hm = HMAC(finished_key, self.hash, default_backend())
  /external/tensorflow/tensorflow/core/platform/s3/
s3_crypto.cc 16 #include <openssl/hmac.h>
24 class S3Sha256HMACOpenSSLImpl : public Aws::Utils::Crypto::HMAC {
108 std::shared_ptr<Aws::Utils::Crypto::HMAC>
  /prebuilts/gdb/darwin-x86/lib/python2.7/multiprocessing/
connection.py 405 import hmac
409 digest = hmac.new(authkey, message).digest()
418 import hmac
423 digest = hmac.new(authkey, message).digest()

Completed in 442 milliseconds

1 23 4 5 6 7 8