Lines Matching defs:key

26     Secret key;
32 EXPECT_ZX(hmac.Init(digest::kUninitialized, key), ZX_ERR_INVALID_ARGS);
35 EXPECT_ZX(hmac.Init(digest::kSHA256, key, 0x8000), ZX_ERR_INVALID_ARGS);
37 // Short key
38 ASSERT_OK(key.Generate(key_len - 1));
39 EXPECT_ZX(hmac.Init(digest::kSHA256, key), ZX_ERR_INVALID_ARGS);
41 // Medium key
42 ASSERT_OK(key.Generate(key_len));
43 EXPECT_OK(hmac.Init(digest::kSHA256, key));
45 // Long key
46 ASSERT_OK(key.Generate(PAGE_SIZE));
47 EXPECT_OK(hmac.Init(digest::kSHA256, key));
56 Secret key;
59 ASSERT_OK(key.Generate(key_len));
66 ASSERT_OK(hmac.Init(digest::kSHA256, key));
81 Secret key;
84 ASSERT_OK(key.Generate(key_len));
92 ASSERT_OK(hmac.Init(digest::kSHA256, key));
102 ASSERT_OK(hmac.Init(digest::kSHA256, key));
110 Secret key;
119 EXPECT_ZX(HMAC::Create(digest::kUninitialized, key, block1.get(), PAGE_SIZE, &digest1),
121 ASSERT_OK(key.Generate(key_len - 1));
122 EXPECT_ZX(HMAC::Create(digest::kSHA256, key, block1.get(), PAGE_SIZE, &digest1),
124 ASSERT_OK(key.Generate(key_len));
125 EXPECT_ZX(HMAC::Create(digest::kSHA256, key, nullptr, PAGE_SIZE, &digest1),
127 EXPECT_ZX(HMAC::Create(digest::kSHA256, key, block1.get(), PAGE_SIZE, nullptr),
132 EXPECT_OK(HMAC::Create(digest::kSHA256, key, block1.get(), PAGE_SIZE, &digest1));
133 EXPECT_OK(HMAC::Create(digest::kSHA256, key, block2.get(), PAGE_SIZE, &digest2));
138 EXPECT_OK(HMAC::Create(digest::kSHA256, key, block2.get(), PAGE_SIZE, &digest2));
145 Secret key;
154 EXPECT_ZX(HMAC::Verify(digest::kUninitialized, key, block.get(), PAGE_SIZE, out),
156 ASSERT_OK(key.Generate(key_len - 1));
157 EXPECT_ZX(HMAC::Verify(digest::kSHA256, key, block.get(), PAGE_SIZE, out), ZX_ERR_INVALID_ARGS);
158 ASSERT_OK(key.Generate(key_len));
159 EXPECT_ZX(HMAC::Verify(digest::kSHA256, key, nullptr, PAGE_SIZE, out), ZX_ERR_INVALID_ARGS);
160 ASSERT_OK(key.Generate(key_len));
161 EXPECT_ZX(HMAC::Verify(digest::kSHA256, key, block.get(), PAGE_SIZE, out), ZX_ERR_INVALID_ARGS);
164 ASSERT_OK(key.Generate(key_len));
165 ASSERT_OK(HMAC::Create(digest::kSHA256, key, block.get(), PAGE_SIZE, &out));
166 EXPECT_OK(HMAC::Verify(digest::kSHA256, key, block.get(), PAGE_SIZE, out));
170 EXPECT_ZX(HMAC::Verify(digest::kSHA256, key, block.get(), PAGE_SIZE, out),
173 EXPECT_OK(HMAC::Verify(digest::kSHA256, key, block.get(), PAGE_SIZE, out));
175 ASSERT_OK(key.Generate(key_len));
176 EXPECT_ZX(HMAC::Verify(digest::kSHA256, key, block.get(), PAGE_SIZE, out),
185 Secret key;
187 ASSERT_OK(HexToSecret(xkey, &key));
190 EXPECT_OK(HMAC::Verify(digest::kSHA256, key, data.get(), data.len(), hmac,
283 "6174612e20546865206b6579206e6565" // "ata. The key nee"