/external/nos/test/system-test-harness/src/ |
blob.h | 81 uint8_t hmac[32]; member in struct:km_blob
|
/external/tpm2/ |
HMAC.c | 15 // TPM_RC_TYPE key referenced by handle is not an HMAC key 32 // Get HMAC key object and public area pointers 36 // Make sure that the key is an HMAC key 56 = publicArea->parameters.keyedHashDetail.scheme.details.hmac.hashAlg; 67 // Start HMAC stack 71 // Adding HMAC data 74 // Complete HMAC
|
/system/keymaster/km_openssl/ |
hmac_operation.h | 21 #include <openssl/hmac.h> 51 * Abstract base for HMAC operation factories. This class does all of the work to create 52 * HMAC operations.
|
/hardware/interfaces/confirmationui/1.0/vts/functional/ |
VtsHalConfirmationUIV1_0TargetTest.cpp | 32 #include <openssl/hmac.h> 74 using HMacer = support::HMac<HMacImplementation>; 78 auto hmac = HMacer::hmac256(testKey, data...); local 79 if (!hmac.isOk()) { 80 EXPECT_TRUE(false) << "Failed to compute test hmac. This is a self-test error."; 83 hidl_vec<uint8_t> result(hmac.value().size()); 84 copy(hmac.value().data(), hmac.value().data() + hmac.value().size(), result.data()); 394 // Test the implementation of HMAC SHA 256 against a golden blob [all...] |
/system/gatekeeper/ |
gatekeeper.cpp | 241 uint32_t hash_len = (uint32_t)((uint8_t *)&token->hmac - (uint8_t *)token); 242 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len, 246 memset(token->hmac, 0, sizeof(token->hmac));
|
/system/tpm/trunks/ |
hmac_authorization_delegate.cc | 23 #include <openssl/hmac.h> 99 auth.hmac = Make_TPM2B_DIGEST(digest); 124 if (auth_response.hmac.size != kHashDigestSize) { 125 LOG(ERROR) << "TPM auth hmac was incorrect size."; 161 CHECK_EQ(digest.size(), auth_response.hmac.size); 162 if (!crypto::SecureMemEqual(digest.data(), auth_response.hmac.buffer, 275 HMAC(EVP_sha256(), key.data(), key.size(),
|
hmac_authorization_delegate_test.cc | 175 EXPECT_EQ(kHashDigestSize, auth_command.hmac.size); 183 auth_response.hmac.size = kHashDigestSize; 189 memcpy(auth_response.hmac.buffer, hmac_buffer, kHashDigestSize);
|
/external/webrtc/webrtc/p2p/base/ |
stun.cc | 179 // Adjust the length parameter in stun message to calculate HMAC. 193 char hmac[kStunMessageIntegritySize]; local 197 hmac, sizeof(hmac)); 198 ASSERT(ret == sizeof(hmac)); 199 if (ret != sizeof(hmac)) 202 // Comparing the calculated HMAC with the one present in the message. 204 hmac, 205 sizeof(hmac)) == 0; 221 // Calculate the HMAC for the message 228 char hmac[kStunMessageIntegritySize]; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 168 unsigned char hmac[SHA1_MAC_LEN]; local 187 /* HMAC-SHA1-128 */ 195 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 197 hmac, EAP_SIM_MAC_LEN); 200 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1; 207 unsigned char hmac[SHA1_MAC_LEN]; local 216 /* HMAC-SHA1-128 */ 223 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 224 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN); 243 * T1 = HMAC-SHA-256 (K, S | 0x01 362 unsigned char hmac[SHA256_MAC_LEN]; local 401 unsigned char hmac[SHA256_MAC_LEN]; local [all...] |
/external/boringssl/src/crypto/evp/ |
pbkdf.c | 60 #include <openssl/hmac.h>
|
/external/boringssl/src/fipstools/ |
cavp_hmac_test.cc | 15 // cavp_hmac_test processes a NIST CAVP HMAC test vector request file and emits 21 #include <openssl/hmac.h> 72 if (HMAC(md, key.data(), k_len, msg.data(), msg.size(), out, &out_len) ==
|
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 52 #define KM_HMAC_LENGTH (32) /* SHA2 will be used for HMAC */ 64 uint8_t hmac[KM_HMAC_LENGTH]; member in struct:qcom_km_key_blob
|
/system/hwservicemanager/ |
TokenManager.h | 42 static hidl_vec<uint8_t> getToken(const uint64_t id, const uint8_t *hmac, uint64_t hmacSize); 49 hidl_vec<uint8_t> token; // First eight bytes are tokenId. Remaining bytes are hmac.
|
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/1.0/generic/ |
GenericOperation.h | 46 using HMacer = support::HMac<HmacImplementation>; 133 auto hmac = HMacer::hmac256(testKey, "\0", bytes_cast(secureInputToken.challenge), local 138 if (!hmac.isOk()) return ResponseCode::Unexpected; 139 if (hmac.value() == secureInputToken.mac) {
|
/external/iproute2/ip/ |
iproute_lwtunnel.c | 109 fprintf(fp, "hmac 0x%X ", ntohl(tlv->hmackeyid)); 418 static struct ipv6_sr_hdr *parse_srh(char *segbuf, int hmac, bool encap) 435 if (hmac) 446 if (hmac) 455 if (hmac) { 461 tlv->hmackeyid = htonl(hmac); 477 __u32 hmac = 0; local 497 } else if (strcmp(*argv, "hmac") == 0) { 500 duparg2("hmac", *argv); 501 get_u32(&hmac, *argv, 0) 541 __u32 hmac = 0; local [all...] |
/external/scapy/scapy/layers/tls/ |
session.py | 100 self.hmac = None 103 self.hmac = ciphersuite.hmac_alg() 104 self.mac_len = self.hmac.hmac_len 106 self.hmac = ciphersuite.hmac_alg() # should be Hmac_NULL 188 self.hmac = None 191 self.hmac = cs.hmac_alg(mac_secret) 192 self.mac_len = self.hmac.hmac_len 262 if self.hmac: 263 snap.hmac.key = self.hmac.ke [all...] |
/external/boringssl/src/ssl/test/runner/ |
ticket.go | 10 "crypto/hmac" 175 mac := hmac.New(sha256.New, c.config.SessionTicketKey[16:32]) 190 mac := hmac.New(sha256.New, c.config.SessionTicketKey[16:32])
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
ticket.go | 11 "crypto/hmac" 150 mac := hmac.New(sha256.New, key.hmacKey[:]) 181 mac := hmac.New(sha256.New, key.hmacKey[:])
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
ticket.go | 11 "crypto/hmac" 150 mac := hmac.New(sha256.New, key.hmacKey[:]) 181 mac := hmac.New(sha256.New, key.hmacKey[:])
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTrEEPhysicalPresenceLib/ |
DxeTrEEPhysicalPresenceLib.c | 87 LocalAuthSession.hmac.size = PlatformAuth->size;
88 CopyMem (LocalAuthSession.hmac.buffer, PlatformAuth->buffer, PlatformAuth->size);
102 ZeroMem (&LocalAuthSession.hmac, sizeof(LocalAuthSession.hmac));
|
/external/boringssl/src/crypto/hmac_extra/ |
hmac_test.cc | 64 #include <openssl/hmac.h> 90 ASSERT_TRUE(t->GetAttribute(&digest_str, "HMAC")); 104 ASSERT_TRUE(HMAC(digest, key.data(), key.size(), input.data(), input.size(),
|
/external/python/cpython2/Lib/multiprocessing/ |
connection.py | 417 import hmac 421 digest = hmac.new(authkey, message).digest() 430 import hmac 435 digest = hmac.new(authkey, message).digest()
|
/external/scapy/scapy/layers/tls/crypto/ |
hkdf.py | 18 from cryptography.hazmat.primitives.hmac import HMAC 61 hm = HMAC(finished_key, self.hash, default_backend())
|
/external/tensorflow/tensorflow/core/platform/s3/ |
s3_crypto.cc | 16 #include <openssl/hmac.h> 24 class S3Sha256HMACOpenSSLImpl : public Aws::Utils::Crypto::HMAC { 108 std::shared_ptr<Aws::Utils::Crypto::HMAC>
|
/prebuilts/gdb/darwin-x86/lib/python2.7/multiprocessing/ |
connection.py | 405 import hmac 409 digest = hmac.new(authkey, message).digest() 418 import hmac 423 digest = hmac.new(authkey, message).digest()
|