/prebuilts/gdb/linux-x86/lib/python2.7/multiprocessing/ |
connection.py | 405 import hmac 409 digest = hmac.new(authkey, message).digest() 418 import hmac 423 digest = hmac.new(authkey, message).digest()
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 405 import hmac 409 digest = hmac.new(authkey, message).digest() 418 import hmac 423 digest = hmac.new(authkey, message).digest()
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 405 import hmac 409 digest = hmac.new(authkey, message).digest() 418 import hmac 423 digest = hmac.new(authkey, message).digest()
|
/external/tpm2/ |
SessionProcess.c | 163 // TPM_RH_NULL. The binding only occurs if the session is an HMAC session. The bind value is a 553 // This function computes the HMAC for an authorization session in a command. 559 TPM2B_DIGEST *hmac // OUT: authorization HMAC 578 // session that uses an HMAC, then check if additional session nonces are to be 605 // Continue with the HMAC processing. 607 // Generate HMAC key. 611 // this entity to the HMAC key. 613 // with no authValue required, do not include the authValue in the HMAC key. 620 // or an hmac session that is not boun 686 TPM2B_DIGEST hmac; \/\/ authHMAC for comparing local [all...] |
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/ |
DxeTcg2PhysicalPresenceLib.c | 89 LocalAuthSession.hmac.size = PlatformAuth->size;
90 CopyMem (LocalAuthSession.hmac.buffer, PlatformAuth->buffer, PlatformAuth->size);
104 ZeroMem (&LocalAuthSession.hmac, sizeof(LocalAuthSession.hmac));
130 LocalAuthSession.hmac.size = PlatformAuth->size;
131 CopyMem (LocalAuthSession.hmac.buffer, PlatformAuth->buffer, PlatformAuth->size);
137 ZeroMem(&LocalAuthSession.hmac, sizeof(LocalAuthSession.hmac));
[all...] |
/external/boringssl/src/ssl/test/runner/ |
shim_ticket.go | 21 "crypto/hmac" 35 h := hmac.New(sha256.New, macKey) 55 if !hmac.Equal(mac, h.Sum(nil)) { 92 h := hmac.New(sha256.New, macKey)
|
cipher_suites.go | 12 "crypto/hmac" 186 return tls10MAC{hmac.New(sha1.New, key)} 198 return tls10MAC{hmac.New(md5.New, key)} 210 return tls10MAC{hmac.New(sha256.New, key)} 222 return tls10MAC{hmac.New(sha512.New384, key)}
|
prf.go | 9 "crypto/hmac" 25 h := hmac.New(hash, secret) 332 finishedHMAC := hmac.New(h.hash.New, clientFinishedKey) 351 finishedHMAC := hmac.New(h.hash.New, serverFinishedKey)
|
/external/honggfuzz/examples/bind/ |
named.conf | 96 algorithm hmac-md5;
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 149 hmac_state hmac; member in union:crypto_hash::__anon44622 175 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) != 180 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) != 209 ctx->error = hmac_process(&ctx->u.hmac, data, len) != CRYPT_OK; 268 if (hmac_done(&ctx->u.hmac, mac, &clen) != CRYPT_OK) {
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/OpensslLib/ |
Install.sh | 20 cp crypto/hmac/hmac.h include/openssl
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/ |
Tpm2Integrity.c | 571 LocalAuthSession.hmac.size = PlatformAuth->size;
572 CopyMem (LocalAuthSession.hmac.buffer, PlatformAuth->buffer, PlatformAuth->size);
669 ZeroMem(&LocalAuthSession.hmac, sizeof(LocalAuthSession.hmac));
|
/external/boringssl/src/crypto/fipsmodule/hmac/ |
hmac.c | 57 #include <openssl/hmac.h> 68 uint8_t *HMAC(const EVP_MD *evp_md, const void *key, size_t key_len,
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8_x509.c | 68 #include <openssl/hmac.h> 585 uint8_t hmac[EVP_MAX_MD_SIZE]; local 587 if (NULL == HMAC(md, hmac_key, EVP_MD_size(md), CBS_data(&authsafes), 588 CBS_len(&authsafes), hmac, &hmac_len)) { 592 if (!CBS_mem_equal(&expected_mac, hmac, hmac_len)) {
|
/external/boringssl/src/util/fipstools/ |
break-hash.go | 21 "crypto/hmac" 116 mac := hmac.New(sha512.New, zeroKey[:])
|
inject-hash.go | 22 "crypto/hmac" 141 mac := hmac.New(sha512.New, zeroKey[:])
|
/external/syslinux/gpxe/src/crypto/ |
sha1extra.c | 23 #include <gpxe/hmac.h> 47 u8 in[strlen ( label ) + 1 + data_len + 1]; /* message to HMAC */ 49 u8 out[SHA1_SIZE]; /* HMAC-SHA1 result */ 53 /* The HMAC-SHA-1 is calculated using the given key on the
|
/prebuilts/go/darwin-x86/src/net/smtp/ |
auth.go | 8 "crypto/hmac" 104 d := hmac.New(md5.New, []byte(a.secret))
|
/prebuilts/go/linux-x86/src/net/smtp/ |
auth.go | 8 "crypto/hmac" 104 d := hmac.New(md5.New, []byte(a.secret))
|
/system/keymaster/ |
Makefile | 95 km_openssl/hmac.cpp \ 220 km_openssl/hmac.o \ 242 km_openssl/hmac.o \ 295 km_openssl/hmac.o \
|
/system/keymaster/km_openssl/ |
hmac_operation.cpp | 22 #include <openssl/hmac.h> 41 LOG_E("HMAC key must have KM_TAG_MIN_MAC_LENGTH", 0); 62 LOG_E("%d digests found in HMAC key authorizations; must be exactly 1",
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
example_test.go | 111 // using crypto/hmac) before being decrypted in order to avoid creating 151 // (i.e. by using crypto/hmac) as well as being encrypted in order to 211 // (i.e. by using crypto/hmac) as well as being encrypted in order to 241 // (i.e. by using crypto/hmac) as well as being encrypted in order to 280 // (i.e. by using crypto/hmac) as well as being encrypted in order to
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
example_test.go | 111 // using crypto/hmac) before being decrypted in order to avoid creating 151 // (i.e. by using crypto/hmac) as well as being encrypted in order to 211 // (i.e. by using crypto/hmac) as well as being encrypted in order to 241 // (i.e. by using crypto/hmac) as well as being encrypted in order to 280 // (i.e. by using crypto/hmac) as well as being encrypted in order to
|
/external/scapy/scapy/layers/ |
radius.py | 14 import hmac 571 radius_hmac = hmac.new(shared_secret, data, hashlib.md5)
|
/hardware/interfaces/keymaster/3.0/ |
types.hal | 166 HMAC = 128, 259 SIGN = 2, /* Usable with RSA, EC and HMAC keys. */ 260 VERIFY = 3, /* Usable with RSA, EC and HMAC keys. */ 414 uint8_t[32] hmac; // HMAC is computed over 0 || challenge || user_id ||
|