Home
last modified time | relevance | path

Searched refs:HMAC (Results 1 – 25 of 39) sorted by relevance

12

/external/boringssl/src/crypto/hmac/
Dhmac_tests.txt1 HMAC = MD5
3 # that HMAC_CTX and HMAC treat NULL as the empty key initially.
8 # HMAC tests from RFC2104
9 HMAC = MD5
14 HMAC = MD5
19 HMAC = MD5
24 # HMAC tests from NIST test data
26 HMAC = SHA1
31 HMAC = SHA1
36 HMAC = SHA1
[all …]
Dhmac_test.cc109 if (nullptr == HMAC(digest, key.data(), key.size(), input.data(), in TestHMAC()
Dhmac.c65 uint8_t *HMAC(const EVP_MD *evp_md, const void *key, size_t key_len, in HMAC() function
/external/libchrome/crypto/
Dhmac_unittest.cc80 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
149 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
175 crypto::HMAC hmac(crypto::HMAC::SHA256); in TEST()
216 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
232 crypto::HMAC hmac2(crypto::HMAC::SHA256); in TEST()
241 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
255 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
289 crypto::HMAC hmac(crypto::HMAC::SHA1); in TEST()
Dhmac_openssl.cc24 HMAC::HMAC(HashAlgorithm hash_alg) : hash_alg_(hash_alg) { in HMAC() function in crypto::HMAC
29 bool HMAC::Init(const unsigned char* key, size_t key_length) { in Init()
37 HMAC::~HMAC() { in ~HMAC()
45 bool HMAC::Sign(const base::StringPiece& data, in Sign()
51 return !!::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256(), in Sign()
Dhmac_nss.cc24 HMAC::HMAC(HashAlgorithm hash_alg) in HMAC() function in crypto::HMAC
40 HMAC::~HMAC() { in ~HMAC()
43 bool HMAC::Init(const unsigned char *key, size_t key_length) { in Init()
77 bool HMAC::Sign(const base::StringPiece& data, in Sign()
Dhmac.cc17 bool HMAC::Init(SymmetricKey* key) { in Init()
26 size_t HMAC::DigestLength() const { in DigestLength()
38 bool HMAC::Verify(const base::StringPiece& data, in Verify()
45 bool HMAC::VerifyTruncated(const base::StringPiece& data, in VerifyTruncated()
Dhmac.h25 class CRYPTO_EXPORT HMAC {
33 explicit HMAC(HashAlgorithm hash_alg);
34 ~HMAC();
90 DISALLOW_COPY_AND_ASSIGN(HMAC);
Dhmac_win.cc107 HMAC::HMAC(HashAlgorithm hash_alg) in HMAC() function in crypto::HMAC
113 bool HMAC::Init(const unsigned char* key, size_t key_length) { in Init()
167 HMAC::~HMAC() { in ~HMAC()
170 bool HMAC::Sign(const base::StringPiece& data, in Sign()
Dcrypto.gypi7 # Put all transitive dependencies for Windows HMAC here.
27 # NOTE: all transitive dependencies of HMAC on windows need
/external/tcpdump/tests/
Dbabel_auth.out6 HMAC key-id 30 digest-20 AD0FA7CD8D5A1898EC5409C8EDDA68B3ACA21B80
7 HMAC key-id 50 digest-32 8239F283D985047FA4B88597FDE3246455C6E4DD917B1441C2F3A82B9F737674
8HMAC key-id 1000 digest-64 6718CB4C2BB0976C127AB3CCCBFA1105A1D158F035BC9FAD86B0610A7ACD27E5A3D5A30…
9HMAC key-id 1000 digest-48 D2A5B80FF9D006907E3B6601C0C255D7D12D6EC61815E413A334E2A0D9271C75AFBC086…
10 HMAC key-id 100 digest-20 7213CED66FE7154034EC64CD14AE4142A092DF33
11HMAC key-id 2000 digest-64 2A5D9D55393B19E440FAC49BDA521E18A7FE77F7AB4A90377009E46E2FFE49336435C7E…
12HMAC key-id 2000 digest-48 FE91AF27EEE137EF489F37FEE449100CDA8CCB3E794D0C4A225D12724A8CE2FFC85811B…
13HMAC key-id 3000 digest-64 38C4D82883A5778500D728D1E243E7579DE96FA726C9DB7F0805C52E96FEFDCE7A5FB9A…
Dospf3_auth-vv.out8 Authentication Type HMAC, Length 48, SAID 1, CSN 0x00000000:52da4e0e
/external/srtp/doc/
Dreferences.txt13 HMAC is defined in RFC2104, and HMAC-SHA1 test vectors are available
Drfc3711.txt69 4.2.1. HMAC-SHA1. . . . . . . . . . . . . . . . . . . . 25
76 5.2. Message Authentication/Integrity: HMAC-SHA1. . . . . . . 29
1391 4.2.1. HMAC-SHA1
1393 The pre-defined authentication transform for SRTP is HMAC-SHA1
1394 [RFC2104]. With HMAC-SHA1, the SRTP_PREFIX_LENGTH (Figure 3) SHALL
1395 be 0. For SRTP (respectively SRTCP), the HMAC SHALL be applied to
1397 HMAC(k_a, M). The HMAC output SHALL then be truncated to the n_tag
1559 message integrity HMAC-SHA1 - HMAC-SHA1
1584 5.2. Message Authentication/Integrity: HMAC-SHA1
1586 HMAC-SHA1, as defined in Section 4.2.1, SHALL be the default message
[all …]
/external/srtp/
Dtiming18 plot "timing.dat" index 0 title "HMAC SHA1" with lines, "timing.dat" index 1 title "TMMH/AES" with …
36 … "timing.dat" index 6 title "TMMH/AES" with lines, "timing.dat" index 7 title "HMAC/AES" with lines
/external/chromium-trace/catapult/third_party/gsutil/gslib/
Dcred_types.py21 HMAC = "HMAC" variable in CredTypes
/external/chromium-trace/catapult/third_party/gsutil/gslib/commands/
Dconfig.py838 elif cred_type == CredTypes.HMAC:
946 if cred_type == CredTypes.HMAC: api_version = 1
1005 cred_type = CredTypes.HMAC
/external/boringssl/src/include/openssl/
Dhmac.h79 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
/external/boringssl/src/crypto/hkdf/
Dhkdf.c50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) { in HKDF()
/external/mdnsresponder/mDNSCore/
DmDNS.c643 if (!(authrr->resrec.RecordType & kDNSRecordTypeUniqueMask) || authrr->WakeUp.HMAC.l[0]) in PacketRRMatchesSignature()
777 if (rr->WakeUp.HMAC.l[0] && rr->resrec.rrtype == kDNSType_AAAA) in InitializeLastAPTime()
1163 if (rr->WakeUp.HMAC.l[0] && !rr->AddressProxy.type) rr->AnnounceCount = 2; in mDNS_Register_internal()
1521 if (rr->WakeUp.HMAC.l[0] || in mDNS_Deregister_internal()
1527 …rr->AnnounceCount = rr->WakeUp.HMAC.l[0] ? WakeupCount : (drt == mDNS_Dereg_rapid) ? 1 : Go… in mDNS_Deregister_internal()
1757 rr->WakeUp.HMAC = zeroEthAddr; in CompleteDeregistration()
2009 owner->u.owner.HMAC = m->PrimaryMAC; in SetupOwnerOpt()
2080 if (!rr->WakeUp.HMAC.l[0]) in SendResponses()
2096 r2->AnnounceCount-3, &r2->WakeUp.HMAC, &r2->WakeUp.IMAC, ARDisplayString(m,r2)); in SendResponses()
2101 if (--r2->AnnounceCount <= GoodbyeCount) r2->WakeUp.HMAC = zeroEthAddr; in SendResponses()
[all …]
/external/boringssl/src/crypto/obj/
Dobjects.txt14 # HMAC OIDs
15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5
16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1
1162 cryptopro 10 : id-HMACGostR3411-94 : HMAC GOST 34.11-94
1281 # There is no OID that just denotes "HMAC" oddly enough...
1283 : HMAC : hmac
1288 : RC4-HMAC-MD5 : rc4-hmac-md5
1289 : AES-128-CBC-HMAC-SHA1 : aes-128-cbc-hmac-sha1
1290 : AES-192-CBC-HMAC-SHA1 : aes-192-cbc-hmac-sha1
1291 : AES-256-CBC-HMAC-SHA1 : aes-256-cbc-hmac-sha1
/external/tpm2/
Dpart4.txt108 …5.8.3.3 Hash and HMAC State Structures ....................................................…
626 …10.2.4 Hash/HMAC Functions .......................................................................…
831 …B.8.5. HMAC Functions .......................................................................…
1621 5.8.3.3 Hash and HMAC State Structures
1633 or HMAC_STATE_SEQUENCE then state is followed by the HMAC key in oPad format.
1649 An HMAC_STATE structure contains an opaque HMAC stack state. A caller would use this structure
1650 … when performing incremental HMAC operations. This structure contains a hash state and an HMAC key
1651 and allows slightly better stack optimization than adding an HMAC key to each hash state.
1656 37 TPM2B_HASH_BLOCK hmacKey; // the HMAC key
1681 hash, HMAC, or event.
[all …]
DAndroid.mk91 HMAC.c \
/external/tpm2/generator/
Draw_commands.txt236 Hash/HMAC/Event Sequences .........................................................................…
1318 1) If the session handle is not a handle for an HMAC session, a handle for a policy session, or,
1324 If the HMAC and policy session contexts use the same memory, the type of the context must
1398 c) If the object or NV Index is subject to DA protection, and the authorization is with an HMAC or
1407 An HMAC or password is required in a policy
1464 if the authorization is an HMAC session or a password;
1519 7) if the authorization uses an HMAC, then the HMAC is properly constructed using the authValue
1699 appropriate, generate an HMAC.
2005 If use of a handle requires authorization, the Password, HMAC, or Policy session associated with the
3703 indicates the type of the session; simple HMAC or policy
[all …]
Draw_commands_fixed.txt236 Hash/HMAC/Event Sequences .........................................................................…
1318 1) If the session handle is not a handle for an HMAC session, a handle for a policy session, or,
1324 If the HMAC and policy session contexts use the same memory, the type of the context must
1398 c) If the object or NV Index is subject to DA protection, and the authorization is with an HMAC or
1407 An HMAC or password is required in a policy
1464 if the authorization is an HMAC session or a password;
1519 7) if the authorization uses an HMAC, then the HMAC is properly constructed using the authValue
1699 appropriate, generate an HMAC.
2005 If use of a handle requires authorization, the Password, HMAC, or Policy session associated with the
3705 indicates the type of the session; simple HMAC or policy
[all …]

12