/external/dhcpcd-6.8.2/test/ |
H A D | test_hmac_md5.c | 37 print_hmac(uint8_t *hmac) argument 43 printf("%02x", *hmac++); 50 uint8_t hmac[16]; local 58 hmac_md5(text, 8, key, 16, hmac); 59 print_hmac(hmac); 66 uint8_t hmac[16]; local 71 hmac_md5(text, 28, key, 4, hmac); 72 print_hmac(hmac); 79 uint8_t hmac[16]; local 89 hmac_md5(text, 50, key, 16, hmac); 97 uint8_t hmac[16]; local 115 uint8_t hmac[16]; local 131 uint8_t hmac[16]; local 147 uint8_t hmac[16]; local [all...] |
/external/python/cpython2/Lib/test/ |
H A D | test_hmac.py | 3 import hmac namespace 15 h = hmac.HMAC(key, data) 49 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 83 h = hmac.HMAC(key, data, digestmod=hashfunc) 219 hmac.HMAC('a', 'b', digestmod=MockCrazyHash) 224 hmac.HMAC('a', 'b', digestmod=MockCrazyHash) 235 h = hmac.HMAC("key") 242 h = hmac.HMAC("key", "hash this!") 249 h = hmac.HMAC("key", "", hashlib.sha1) 257 # NOTE: this whitebox test depends on the hmac clas [all...] |
H A D | test_pep247.py | 12 import hmac namespace 68 self.check_module(hmac, key='abc')
|
/external/boringssl/src/crypto/hkdf/ |
H A D | hkdf.c | 21 #include <openssl/hmac.h> 68 HMAC_CTX hmac; local 77 HMAC_CTX_init(&hmac); 78 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { 86 if (i != 0 && (!HMAC_Init_ex(&hmac, NULL, 0, NULL, NULL) || 87 !HMAC_Update(&hmac, previous, digest_len))) { 90 if (!HMAC_Update(&hmac, info, info_len) || 91 !HMAC_Update(&hmac, &ctr, 1) || 92 !HMAC_Final(&hmac, previous, NULL)) { 107 HMAC_CTX_cleanup(&hmac); [all...] |
/external/python/cpython3/Lib/test/ |
H A D | test_hmac.py | 2 import hmac namespace 24 h = hmac.HMAC(key, data, digestmod=hashlib.md5) 26 self.assertEqual(h.name, "hmac-md5") 30 h = hmac.HMAC(key, data, digestmod='md5') 32 self.assertEqual(h.name, "hmac-md5") 68 h = hmac.HMAC(key, data, digestmod=hashlib.sha1) 70 self.assertEqual(h.name, "hmac-sha1") 74 h = hmac.HMAC(key, data, digestmod='sha1') 76 self.assertEqual(h.name, "hmac-sha1") 112 hmac_name = "hmac [all...] |
/external/libchrome/crypto/ |
H A D | hmac_unittest.cc | 10 #include "crypto/hmac.h" 80 crypto::HMAC hmac(crypto::HMAC::SHA1); 81 ASSERT_TRUE(hmac.Init(kClientKey, kKeySize)); 84 EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize)); 149 crypto::HMAC hmac(crypto::HMAC::SHA1); 150 ASSERT_TRUE(hmac.Init(reinterpret_cast<const unsigned char*>(cases[i].key), 154 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); 175 crypto::HMAC hmac(crypto::HMAC::SHA256); 176 ASSERT_TRUE(hmac.Init(key, sizeof(key))); 179 EXPECT_EQ(kSHA256DigestSize, hmac [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | PasswordRecipient.java | 21 private final String hmac; field in class:PasswordRecipient.PRF 24 private PRF(String hmac, AlgorithmIdentifier prfAlgID) argument 26 this.hmac = hmac; 32 return hmac;
|
/external/iproute2/include/uapi/linux/ |
H A D | seg6_hmac.h | 15 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member in struct:sr6_tlv_hmac
|
/external/kernel-headers/original/uapi/linux/ |
H A D | seg6_hmac.h | 15 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member in struct:sr6_tlv_hmac
|
/external/syslinux/gpxe/src/crypto/ |
H A D | hmac.c | 30 #include <gpxe/hmac.h> 91 * @v hmac HMAC digest to fill in 99 void *key, size_t *key_len, void *hmac ) { 115 digest_final ( digest, digest_ctx, hmac ); 120 digest_update ( digest, digest_ctx, hmac, digest->digestsize ); 121 digest_final ( digest, digest_ctx, hmac );
|
/external/syslinux/gpxe/src/include/gpxe/ |
H A D | hmac.h | 30 void *key, size_t *key_len, void *hmac );
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 155 struct crypto_hash *hmac; local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 209 if (hmac == NULL) { 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); 217 crypto_hash_update(hmac, payload, payload_len); 222 crypto_hash_finish(hmac, NULL, NULL); 226 if (crypto_hash_finish(hmac, pos, &clen) < 0) { 284 struct crypto_hash *hmac; local 436 hmac [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.c | 155 struct crypto_hash *hmac; local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 209 if (hmac == NULL) { 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); 217 crypto_hash_update(hmac, payload, payload_len); 222 crypto_hash_finish(hmac, NULL, NULL); 226 if (crypto_hash_finish(hmac, pos, &clen) < 0) { 284 struct crypto_hash *hmac; local 436 hmac [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 155 struct crypto_hash *hmac; local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 209 if (hmac == NULL) { 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); 217 crypto_hash_update(hmac, payload, payload_len); 222 crypto_hash_finish(hmac, NULL, NULL); 226 if (crypto_hash_finish(hmac, pos, &clen) < 0) { 284 struct crypto_hash *hmac; local 436 hmac [all...] |
/external/boringssl/src/crypto/fipsmodule/tls/ |
H A D | kdf.c | 55 #include <openssl/hmac.h> 93 uint8_t hmac[EVP_MAX_MD_SIZE]; local 101 !HMAC_Final(&ctx, hmac, &len)) { 111 out[i] ^= hmac[i];
|
/external/python/cpython3/Lib/ |
H A D | secrets.py | 19 from hmac import compare_digest
|
/external/rappor/client/java/com/google/android/rappor/ |
H A D | HmacDrbg.java | 31 // private HashFunction hmac; 32 private Mac hmac; field in class:HmacDrbg 116 // hmac = Hashing.hmacSha256(key); 118 hmac = Mac.getInstance("HmacSHA256"); 120 hmac.init(secretKey); 126 * Computes hmac("key" from the spec, x). 130 // return hmac.hashBytes(x).asBytes(); 132 return hmac.doFinal(x);
|
/external/scapy/scapy/contrib/ |
H A D | carp.py | 18 import struct, hmac, hashlib namespace 59 h = hmac.new(pw, digestmod = hashlib.sha1)
|
/external/boringssl/src/crypto/fipsmodule/ |
H A D | bcm.c | 24 #include <openssl/hmac.h> 69 #include "hmac/hmac.c"
|
/external/tpm2/ |
H A D | HMAC_Start.c | 56 = publicArea->parameters.keyedHashDetail.scheme.details.hmac.hashAlg;
|
H A D | HMAC.c | 56 = publicArea->parameters.keyedHashDetail.scheme.details.hmac.hashAlg;
|
/external/scapy/scapy/layers/tls/crypto/ |
H A D | h_mac.py | 11 import hmac namespace 60 return hmac.new(raw(self.key), raw(tbd), self.hash_alg.hash_cls).digest()
|
/external/dhcpcd-6.8.2/ |
H A D | auth.c | 117 uint8_t hmac[HMAC_LENGTH]; local 184 if (dlen < sizeof(secretid) + sizeof(hmac)) { 193 if (dlen < sizeof(secretid) + sizeof(hmac)) { 197 realm_len = dlen - (sizeof(secretid) + sizeof(hmac)); 327 memset(hmac, 0, sizeof(hmac)); 330 hmac_md5(mm, mlen, t->key, t->key_len, hmac); 339 if (memcmp(d, &hmac, dlen)) { 480 uint8_t hmac[HMAC_LENGTH]; local 553 dlen += sizeof(t->secretid) + sizeof(hmac); [all...] |
/external/nos/test/system-test-harness/src/ |
H A D | blob.h | 81 uint8_t hmac[32]; member in struct:km_blob
|
/external/webrtc/webrtc/p2p/base/ |
H A D | stun.cc | 193 char hmac[kStunMessageIntegritySize]; local 197 hmac, sizeof(hmac)); 198 ASSERT(ret == sizeof(hmac)); 199 if (ret != sizeof(hmac)) 204 hmac, 205 sizeof(hmac)) == 0; 228 char hmac[kStunMessageIntegritySize]; local 232 hmac, sizeof(hmac)); [all...] |