Searched refs:hmac (Results 1 - 25 of 72) sorted by relevance

123

/freebsd-13-stable/tools/regression/ipsec/
H A Dipsec6.t55 hmac-md5:0123456789012345 \
56 hmac-sha1:01234567890123456789 \
57 hmac-ripemd160:01234567890123456789 \
58 hmac-sha2-256:01234567890123456789012345678901 \
59 hmac-sha2-384:012345678901234567890123456789012345678901234567 \
60 hmac-sha2-512:0123456789012345678901234567890123456789012345678901234567890123; do
H A Dipsec.t55 hmac-md5:0123456789012345 \
56 hmac-sha1:01234567890123456789 \
57 hmac-ripemd160:01234567890123456789 \
58 hmac-sha2-256:01234567890123456789012345678901 \
59 hmac-sha2-384:012345678901234567890123456789012345678901234567 \
60 hmac-sha2-512:0123456789012345678901234567890123456789012345678901234567890123; do
/freebsd-13-stable/tests/sys/netipsec/tunnel/
H A Daes_cbc_128_hmac_sha1.sh8 atf_set descr 'IPSec inet4 tunnel using aes-cbc-128-hmac-sha1'
17 ist_test 4 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890"
28 atf_set descr 'IPSec inet6 tunnel using aes-cbc-128-hmac-sha1'
37 ist_test 6 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890"
H A Daes_cbc_256_hmac_sha2_256.sh8 atf_set descr 'IPSec inet4 tunnel using aes-cbc-256-hmac-sha2-256'
17 ist_test 4 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012"
28 atf_set descr 'IPSec inet6 tunnel using aes-cbc-256-hmac-sha2-256'
37 ist_test 6 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012"
H A Daesni_aes_cbc_128_hmac_sha1.sh8 atf_set descr 'IPSec inet4 tunnel using aes-cbc-128-hmac-sha1 and AESNI'
17 ist_test 4 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890"
28 atf_set descr 'IPSec inet6 tunnel using aes-cbc-128-hmac-sha1 and AESNI'
37 ist_test 6 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890"
H A Daesni_aes_cbc_256_hmac_sha2_256.sh8 atf_set descr 'IPSec inet4 tunnel using aes-cbc-256-hmac-sha2-256 and AESNI'
17 ist_test 4 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012"
28 atf_set descr 'IPSec inet6 tunnel using aes-cbc-256-hmac-sha2-256 and AESNI'
37 ist_test 6 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012"
/freebsd-13-stable/tests/sys/geom/class/eli/
H A Dconf.sh17 # Execute `func` for each combination of cipher, sectorsize, and hmac algo
43 for aalgo in hmac/sha1 hmac/ripemd160 hmac/sha256 \
44 hmac/sha384 hmac/sha512; do
53 # Execute `func` for each combination of cipher, and sectorsize, with no hmac
/freebsd-13-stable/contrib/wpa/src/tls/
H A Dtlsv1_record.c155 struct crypto_hash *hmac; local
207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret,
209 if (hmac == NULL) {
214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN);
216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN);
217 crypto_hash_update(hmac, payload, payload_len);
222 crypto_hash_finish(hmac, NULL, NULL);
226 if (crypto_hash_finish(hmac, pos, &clen) < 0) {
284 struct crypto_hash *hmac; local
436 hmac
[all...]
/freebsd-13-stable/kerberos5/include/
H A Dcrypto-headers.h17 #include <openssl/hmac.h>
/freebsd-13-stable/contrib/libarchive/libarchive/
H A Darchive_openssl_hmac_private.h33 #include <openssl/hmac.h>
H A Darchive_hmac_private.h72 #include <nettle/hmac.h>
/freebsd-13-stable/crypto/heimdal/include/
H A Dcrypto-headers.h24 #include <openssl/hmac.h>
50 #include <hcrypto/hmac.h>
/freebsd-13-stable/crypto/heimdal/include/hcrypto/
H A DMakefile.am18 hmac.h \
/freebsd-13-stable/contrib/netbsd-tests/crypto/libcrypto/
H A Dt_hashes.sh28 atf_test_case hmac
101 atf_add_test_case hmac
/freebsd-13-stable/crypto/openssl/crypto/kdf/
H A Dhkdf.c12 #include <openssl/hmac.h>
295 HMAC_CTX *hmac; local
311 if ((hmac = HMAC_CTX_new()) == NULL)
314 if (!HMAC_Init_ex(hmac, prk, prk_len, evp_md, NULL))
322 if (!HMAC_Init_ex(hmac, NULL, 0, NULL, NULL))
325 if (!HMAC_Update(hmac, prev, dig_len))
329 if (!HMAC_Update(hmac, info, info_len))
332 if (!HMAC_Update(hmac, &ctr, 1))
335 if (!HMAC_Final(hmac, prev, NULL))
350 HMAC_CTX_free(hmac);
[all...]
/freebsd-13-stable/crypto/openssl/crypto/pkcs12/
H A Dp12_mutl.c13 #include <openssl/hmac.h>
80 HMAC_CTX *hmac = NULL; local
128 if ((hmac = HMAC_CTX_new()) == NULL
129 || !HMAC_Init_ex(hmac, key, md_size, md_type, NULL)
130 || !HMAC_Update(hmac, p12->authsafes->d.data->data,
132 || !HMAC_Final(hmac, mac, maclen)) {
139 HMAC_CTX_free(hmac);
/freebsd-13-stable/contrib/ntp/lib/isc/include/isc/
H A Dhmacmd5.h36 #include <openssl/hmac.h>
/freebsd-13-stable/contrib/netbsd-tests/lib/libc/hash/
H A Dt_hmac.c38 #include <openssl/hmac.h>
91 tmp2len = hmac(names[t], key, i, data, j, tmp2,
114 "Test hmac functions for consistent results");
/freebsd-13-stable/sys/crypto/ccp/
H A Dccp.c241 axf = s->hmac.auth_hash;
245 axf->Final(s->hmac.ipad, &auth_ctx);
249 memcpy(s->hmac.ipad, key, klen);
251 memset(s->hmac.ipad + klen, 0, axf->blocksize - klen);
252 memcpy(s->hmac.opad, s->hmac.ipad, axf->blocksize);
255 s->hmac.ipad[i] ^= HMAC_IPAD_VAL;
256 s->hmac.opad[i] ^= HMAC_OPAD_VAL;
495 s->hmac.auth_hash = auth_hash;
496 s->hmac
[all...]
/freebsd-13-stable/crypto/openssh/regress/unittests/hostkeys/
H A DMakefile9 SRCS+=ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
/freebsd-13-stable/crypto/openssh/regress/unittests/sshkey/
H A DMakefile9 SRCS+=ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
/freebsd-13-stable/contrib/wpa/src/eap_common/
H A Deap_sim_common.c168 unsigned char hmac[SHA1_MAC_LEN]; local
195 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
197 hmac, EAP_SIM_MAC_LEN);
200 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1;
207 unsigned char hmac[SHA1_MAC_LEN]; local
223 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
224 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN);
362 unsigned char hmac[SHA256_MAC_LEN]; local
389 hmac_sha256_vector(k_aut, EAP_AKA_PRIME_K_AUT_LEN, 2, addr, len, hmac);
391 hmac, EAP_SIM_MAC_LE
401 unsigned char hmac[SHA256_MAC_LEN]; local
[all...]
/freebsd-13-stable/crypto/heimdal/lib/gssapi/ntlm/
H A Dcrypto.c149 unsigned char hmac[16]; local
158 encode_le_uint32(seq, hmac);
159 HMAC_Update(c, hmac, 4);
161 HMAC_Final(c, hmac, &hmaclen);
166 RC4(sealkey, 8, hmac, &out[4]);
168 memcpy(&out[4], hmac, 8);
/freebsd-13-stable/contrib/ldns/
H A Dkeys.c5 * and give a general interface for private keys and hmac
48 { LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" },
49 { LDNS_SIGN_HMACSHA1, "hmac-sha1" },
50 { LDNS_SIGN_HMACSHA256, "hmac-sha256" },
51 { LDNS_SIGN_HMACSHA224, "hmac-sha224" },
52 { LDNS_SIGN_HMACSHA384, "hmac-sha384" },
53 { LDNS_SIGN_HMACSHA512, "hmac-sha512" },
465 unsigned char *hmac; local
684 hmac = ldns_key_new_frm_fp_hmac_l(fp, line_nr, &hmac_size);
685 if (!hmac) {
1143 unsigned char *hmac; local
1451 ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac) argument
2073 unsigned char* hmac; local
[all...]
/freebsd-13-stable/sys/mips/nlm/hal/
H A Dnlmsaelib.h208 * hmac : 1 for hash with hmac
220 nlm_crypto_form_pkt_ctrl_desc(unsigned int hmac, unsigned int hashalg, argument
225 return (left_shift64(hmac, 61, 1) |
305 * hmacpad : 1 if hmac padding is already done
454 * hmac : 1 for hash with hmac
462 nlm_crypto_fill_pkt_ctrl(struct nlm_crypto_pkt_ctrl *ctrl, unsigned int hmac, argument
470 ctrl->desc0 = nlm_crypto_form_pkt_ctrl_desc(hmac, hashalg, hashmode,
502 * hmacpad : hmac paddin
[all...]

Completed in 281 milliseconds

123