HomeSort by relevance Sort by last modified time
    Searched refs:hmac (Results 76 - 100 of 176) sorted by null

1 2 34 5 6 7 8

  /prebuilts/gdb/linux-x86/lib/python2.7/multiprocessing/
connection.py 405 import hmac
409 digest = hmac.new(authkey, message).digest()
418 import hmac
423 digest = hmac.new(authkey, message).digest()
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/
connection.py 405 import hmac
409 digest = hmac.new(authkey, message).digest()
418 import hmac
423 digest = hmac.new(authkey, message).digest()
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/
connection.py 405 import hmac
409 digest = hmac.new(authkey, message).digest()
418 import hmac
423 digest = hmac.new(authkey, message).digest()
  /external/tpm2/
SessionProcess.c 163 // TPM_RH_NULL. The binding only occurs if the session is an HMAC session. The bind value is a
553 // This function computes the HMAC for an authorization session in a command.
559 TPM2B_DIGEST *hmac // OUT: authorization HMAC
578 // session that uses an HMAC, then check if additional session nonces are to be
605 // Continue with the HMAC processing.
607 // Generate HMAC key.
611 // this entity to the HMAC key.
613 // with no authValue required, do not include the authValue in the HMAC key.
620 // or an hmac session that is not boun
686 TPM2B_DIGEST hmac; \/\/ authHMAC for comparing local
    [all...]
  /device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/
DxeTcg2PhysicalPresenceLib.c 89 LocalAuthSession.hmac.size = PlatformAuth->size;
90 CopyMem (LocalAuthSession.hmac.buffer, PlatformAuth->buffer, PlatformAuth->size);
104 ZeroMem (&LocalAuthSession.hmac, sizeof(LocalAuthSession.hmac));
130 LocalAuthSession.hmac.size = PlatformAuth->size;
131 CopyMem (LocalAuthSession.hmac.buffer, PlatformAuth->buffer, PlatformAuth->size);
137 ZeroMem(&LocalAuthSession.hmac, sizeof(LocalAuthSession.hmac));
    [all...]
  /external/boringssl/src/ssl/test/runner/
shim_ticket.go 21 "crypto/hmac"
35 h := hmac.New(sha256.New, macKey)
55 if !hmac.Equal(mac, h.Sum(nil)) {
92 h := hmac.New(sha256.New, macKey)
cipher_suites.go 12 "crypto/hmac"
186 return tls10MAC{hmac.New(sha1.New, key)}
198 return tls10MAC{hmac.New(md5.New, key)}
210 return tls10MAC{hmac.New(sha256.New, key)}
222 return tls10MAC{hmac.New(sha512.New384, key)}
prf.go 9 "crypto/hmac"
25 h := hmac.New(hash, secret)
332 finishedHMAC := hmac.New(h.hash.New, clientFinishedKey)
351 finishedHMAC := hmac.New(h.hash.New, serverFinishedKey)
  /external/honggfuzz/examples/bind/
named.conf 96 algorithm hmac-md5;
  /external/wpa_supplicant_8/src/crypto/
crypto_libtomcrypt.c 149 hmac_state hmac; member in union:crypto_hash::__anon44622
175 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) !=
180 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) !=
209 ctx->error = hmac_process(&ctx->u.hmac, data, len) != CRYPT_OK;
268 if (hmac_done(&ctx->u.hmac, mac, &clen) != CRYPT_OK) {
  /device/linaro/bootloader/edk2/CryptoPkg/Library/OpensslLib/
Install.sh 20 cp crypto/hmac/hmac.h include/openssl
  /device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/
Tpm2Integrity.c 571 LocalAuthSession.hmac.size = PlatformAuth->size;
572 CopyMem (LocalAuthSession.hmac.buffer, PlatformAuth->buffer, PlatformAuth->size);
669 ZeroMem(&LocalAuthSession.hmac, sizeof(LocalAuthSession.hmac));
  /external/boringssl/src/crypto/fipsmodule/hmac/
hmac.c 57 #include <openssl/hmac.h>
68 uint8_t *HMAC(const EVP_MD *evp_md, const void *key, size_t key_len,
  /external/boringssl/src/crypto/pkcs8/
pkcs8_x509.c 68 #include <openssl/hmac.h>
585 uint8_t hmac[EVP_MAX_MD_SIZE]; local
587 if (NULL == HMAC(md, hmac_key, EVP_MD_size(md), CBS_data(&authsafes),
588 CBS_len(&authsafes), hmac, &hmac_len)) {
592 if (!CBS_mem_equal(&expected_mac, hmac, hmac_len)) {
  /external/boringssl/src/util/fipstools/
break-hash.go 21 "crypto/hmac"
116 mac := hmac.New(sha512.New, zeroKey[:])
inject-hash.go 22 "crypto/hmac"
141 mac := hmac.New(sha512.New, zeroKey[:])
  /external/syslinux/gpxe/src/crypto/
sha1extra.c 23 #include <gpxe/hmac.h>
47 u8 in[strlen ( label ) + 1 + data_len + 1]; /* message to HMAC */
49 u8 out[SHA1_SIZE]; /* HMAC-SHA1 result */
53 /* The HMAC-SHA-1 is calculated using the given key on the
  /prebuilts/go/darwin-x86/src/net/smtp/
auth.go 8 "crypto/hmac"
104 d := hmac.New(md5.New, []byte(a.secret))
  /prebuilts/go/linux-x86/src/net/smtp/
auth.go 8 "crypto/hmac"
104 d := hmac.New(md5.New, []byte(a.secret))
  /system/keymaster/
Makefile 95 km_openssl/hmac.cpp \
220 km_openssl/hmac.o \
242 km_openssl/hmac.o \
295 km_openssl/hmac.o \
  /system/keymaster/km_openssl/
hmac_operation.cpp 22 #include <openssl/hmac.h>
41 LOG_E("HMAC key must have KM_TAG_MIN_MAC_LENGTH", 0);
62 LOG_E("%d digests found in HMAC key authorizations; must be exactly 1",
  /prebuilts/go/darwin-x86/src/crypto/cipher/
example_test.go 111 // using crypto/hmac) before being decrypted in order to avoid creating
151 // (i.e. by using crypto/hmac) as well as being encrypted in order to
211 // (i.e. by using crypto/hmac) as well as being encrypted in order to
241 // (i.e. by using crypto/hmac) as well as being encrypted in order to
280 // (i.e. by using crypto/hmac) as well as being encrypted in order to
  /prebuilts/go/linux-x86/src/crypto/cipher/
example_test.go 111 // using crypto/hmac) before being decrypted in order to avoid creating
151 // (i.e. by using crypto/hmac) as well as being encrypted in order to
211 // (i.e. by using crypto/hmac) as well as being encrypted in order to
241 // (i.e. by using crypto/hmac) as well as being encrypted in order to
280 // (i.e. by using crypto/hmac) as well as being encrypted in order to
  /external/scapy/scapy/layers/
radius.py 14 import hmac
571 radius_hmac = hmac.new(shared_secret, data, hashlib.md5)
  /hardware/interfaces/keymaster/3.0/
types.hal 166 HMAC = 128,
259 SIGN = 2, /* Usable with RSA, EC and HMAC keys. */
260 VERIFY = 3, /* Usable with RSA, EC and HMAC keys. */
414 uint8_t[32] hmac; // HMAC is computed over 0 || challenge || user_id ||

Completed in 842 milliseconds

1 2 34 5 6 7 8