/freebsd-13-stable/tools/regression/ipsec/ |
H A D | ipsec6.t | 55 hmac-md5:0123456789012345 \ 56 hmac-sha1:01234567890123456789 \ 57 hmac-ripemd160:01234567890123456789 \ 58 hmac-sha2-256:01234567890123456789012345678901 \ 59 hmac-sha2-384:012345678901234567890123456789012345678901234567 \ 60 hmac-sha2-512:0123456789012345678901234567890123456789012345678901234567890123; do
|
H A D | ipsec.t | 55 hmac-md5:0123456789012345 \ 56 hmac-sha1:01234567890123456789 \ 57 hmac-ripemd160:01234567890123456789 \ 58 hmac-sha2-256:01234567890123456789012345678901 \ 59 hmac-sha2-384:012345678901234567890123456789012345678901234567 \ 60 hmac-sha2-512:0123456789012345678901234567890123456789012345678901234567890123; do
|
/freebsd-13-stable/tests/sys/netipsec/tunnel/ |
H A D | aes_cbc_128_hmac_sha1.sh | 8 atf_set descr 'IPSec inet4 tunnel using aes-cbc-128-hmac-sha1' 17 ist_test 4 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890" 28 atf_set descr 'IPSec inet6 tunnel using aes-cbc-128-hmac-sha1' 37 ist_test 6 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890"
|
H A D | aes_cbc_256_hmac_sha2_256.sh | 8 atf_set descr 'IPSec inet4 tunnel using aes-cbc-256-hmac-sha2-256' 17 ist_test 4 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012" 28 atf_set descr 'IPSec inet6 tunnel using aes-cbc-256-hmac-sha2-256' 37 ist_test 6 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012"
|
H A D | aesni_aes_cbc_128_hmac_sha1.sh | 8 atf_set descr 'IPSec inet4 tunnel using aes-cbc-128-hmac-sha1 and AESNI' 17 ist_test 4 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890" 28 atf_set descr 'IPSec inet6 tunnel using aes-cbc-128-hmac-sha1 and AESNI' 37 ist_test 6 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890"
|
H A D | aesni_aes_cbc_256_hmac_sha2_256.sh | 8 atf_set descr 'IPSec inet4 tunnel using aes-cbc-256-hmac-sha2-256 and AESNI' 17 ist_test 4 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012" 28 atf_set descr 'IPSec inet6 tunnel using aes-cbc-256-hmac-sha2-256 and AESNI' 37 ist_test 6 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012"
|
/freebsd-13-stable/tests/sys/geom/class/eli/ |
H A D | conf.sh | 17 # Execute `func` for each combination of cipher, sectorsize, and hmac algo 43 for aalgo in hmac/sha1 hmac/ripemd160 hmac/sha256 \ 44 hmac/sha384 hmac/sha512; do 53 # Execute `func` for each combination of cipher, and sectorsize, with no hmac
|
/freebsd-13-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_record.c | 155 struct crypto_hash *hmac; local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 209 if (hmac == NULL) { 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); 217 crypto_hash_update(hmac, payload, payload_len); 222 crypto_hash_finish(hmac, NULL, NULL); 226 if (crypto_hash_finish(hmac, pos, &clen) < 0) { 284 struct crypto_hash *hmac; local 436 hmac [all...] |
/freebsd-13-stable/kerberos5/include/ |
H A D | crypto-headers.h | 17 #include <openssl/hmac.h>
|
/freebsd-13-stable/contrib/libarchive/libarchive/ |
H A D | archive_openssl_hmac_private.h | 33 #include <openssl/hmac.h>
|
H A D | archive_hmac_private.h | 72 #include <nettle/hmac.h>
|
/freebsd-13-stable/crypto/heimdal/include/ |
H A D | crypto-headers.h | 24 #include <openssl/hmac.h> 50 #include <hcrypto/hmac.h>
|
/freebsd-13-stable/crypto/heimdal/include/hcrypto/ |
H A D | Makefile.am | 18 hmac.h \
|
/freebsd-13-stable/contrib/netbsd-tests/crypto/libcrypto/ |
H A D | t_hashes.sh | 28 atf_test_case hmac 101 atf_add_test_case hmac
|
/freebsd-13-stable/crypto/openssl/crypto/kdf/ |
H A D | hkdf.c | 12 #include <openssl/hmac.h> 295 HMAC_CTX *hmac; local 311 if ((hmac = HMAC_CTX_new()) == NULL) 314 if (!HMAC_Init_ex(hmac, prk, prk_len, evp_md, NULL)) 322 if (!HMAC_Init_ex(hmac, NULL, 0, NULL, NULL)) 325 if (!HMAC_Update(hmac, prev, dig_len)) 329 if (!HMAC_Update(hmac, info, info_len)) 332 if (!HMAC_Update(hmac, &ctr, 1)) 335 if (!HMAC_Final(hmac, prev, NULL)) 350 HMAC_CTX_free(hmac); [all...] |
/freebsd-13-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 13 #include <openssl/hmac.h> 80 HMAC_CTX *hmac = NULL; local 128 if ((hmac = HMAC_CTX_new()) == NULL 129 || !HMAC_Init_ex(hmac, key, md_size, md_type, NULL) 130 || !HMAC_Update(hmac, p12->authsafes->d.data->data, 132 || !HMAC_Final(hmac, mac, maclen)) { 139 HMAC_CTX_free(hmac);
|
/freebsd-13-stable/contrib/ntp/lib/isc/include/isc/ |
H A D | hmacmd5.h | 36 #include <openssl/hmac.h>
|
/freebsd-13-stable/contrib/netbsd-tests/lib/libc/hash/ |
H A D | t_hmac.c | 38 #include <openssl/hmac.h> 91 tmp2len = hmac(names[t], key, i, data, j, tmp2, 114 "Test hmac functions for consistent results");
|
/freebsd-13-stable/sys/crypto/ccp/ |
H A D | ccp.c | 241 axf = s->hmac.auth_hash; 245 axf->Final(s->hmac.ipad, &auth_ctx); 249 memcpy(s->hmac.ipad, key, klen); 251 memset(s->hmac.ipad + klen, 0, axf->blocksize - klen); 252 memcpy(s->hmac.opad, s->hmac.ipad, axf->blocksize); 255 s->hmac.ipad[i] ^= HMAC_IPAD_VAL; 256 s->hmac.opad[i] ^= HMAC_OPAD_VAL; 495 s->hmac.auth_hash = auth_hash; 496 s->hmac [all...] |
/freebsd-13-stable/crypto/openssh/regress/unittests/hostkeys/ |
H A D | Makefile | 9 SRCS+=ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
|
/freebsd-13-stable/crypto/openssh/regress/unittests/sshkey/ |
H A D | Makefile | 9 SRCS+=ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
|
/freebsd-13-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.c | 168 unsigned char hmac[SHA1_MAC_LEN]; local 195 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 197 hmac, EAP_SIM_MAC_LEN); 200 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1; 207 unsigned char hmac[SHA1_MAC_LEN]; local 223 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 224 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN); 362 unsigned char hmac[SHA256_MAC_LEN]; local 389 hmac_sha256_vector(k_aut, EAP_AKA_PRIME_K_AUT_LEN, 2, addr, len, hmac); 391 hmac, EAP_SIM_MAC_LE 401 unsigned char hmac[SHA256_MAC_LEN]; local [all...] |
/freebsd-13-stable/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | crypto.c | 149 unsigned char hmac[16]; local 158 encode_le_uint32(seq, hmac); 159 HMAC_Update(c, hmac, 4); 161 HMAC_Final(c, hmac, &hmaclen); 166 RC4(sealkey, 8, hmac, &out[4]); 168 memcpy(&out[4], hmac, 8);
|
/freebsd-13-stable/contrib/ldns/ |
H A D | keys.c | 5 * and give a general interface for private keys and hmac 48 { LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" }, 49 { LDNS_SIGN_HMACSHA1, "hmac-sha1" }, 50 { LDNS_SIGN_HMACSHA256, "hmac-sha256" }, 51 { LDNS_SIGN_HMACSHA224, "hmac-sha224" }, 52 { LDNS_SIGN_HMACSHA384, "hmac-sha384" }, 53 { LDNS_SIGN_HMACSHA512, "hmac-sha512" }, 465 unsigned char *hmac; local 684 hmac = ldns_key_new_frm_fp_hmac_l(fp, line_nr, &hmac_size); 685 if (!hmac) { 1143 unsigned char *hmac; local 1451 ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac) argument 2073 unsigned char* hmac; local [all...] |
/freebsd-13-stable/sys/mips/nlm/hal/ |
H A D | nlmsaelib.h | 208 * hmac : 1 for hash with hmac 220 nlm_crypto_form_pkt_ctrl_desc(unsigned int hmac, unsigned int hashalg, argument 225 return (left_shift64(hmac, 61, 1) | 305 * hmacpad : 1 if hmac padding is already done 454 * hmac : 1 for hash with hmac 462 nlm_crypto_fill_pkt_ctrl(struct nlm_crypto_pkt_ctrl *ctrl, unsigned int hmac, argument 470 ctrl->desc0 = nlm_crypto_form_pkt_ctrl_desc(hmac, hashalg, hashmode, 502 * hmacpad : hmac paddin [all...] |