/freebsd-11-stable/tools/regression/ipsec/ |
H A D | ipsec6.t | 55 hmac-md5:0123456789012345 \ 56 hmac-sha1:01234567890123456789 \ 57 hmac-ripemd160:01234567890123456789 \ 58 hmac-sha2-256:01234567890123456789012345678901 \ 59 hmac-sha2-384:012345678901234567890123456789012345678901234567 \ 60 hmac-sha2-512:0123456789012345678901234567890123456789012345678901234567890123; do
|
H A D | ipsec.t | 55 hmac-md5:0123456789012345 \ 56 hmac-sha1:01234567890123456789 \ 57 hmac-ripemd160:01234567890123456789 \ 58 hmac-sha2-256:01234567890123456789012345678901 \ 59 hmac-sha2-384:012345678901234567890123456789012345678901234567 \ 60 hmac-sha2-512:0123456789012345678901234567890123456789012345678901234567890123; do
|
/freebsd-11-stable/crypto/openssl/crypto/hmac/ |
H A D | Makefile | 5 DIR= hmac 20 LIBSRC=hmac.c hm_ameth.c hm_pmeth.c 21 LIBOBJ=hmac.o hm_ameth.o hm_pmeth.o 25 EXHEADER= hmac.h 95 hm_pmeth.o: ../../include/openssl/hmac.h ../../include/openssl/lhash.h 104 hmac.o: ../../e_os.h ../../include/openssl/asn1.h ../../include/openssl/bio.h 105 hmac.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h 106 hmac.o: ../../include/openssl/e_os2.h ../../include/openssl/err.h 107 hmac.o: ../../include/openssl/evp.h ../../include/openssl/hmac [all...] |
/freebsd-11-stable/tests/sys/geom/class/eli/ |
H A D | conf.sh | 17 # Execute `func` for each combination of cipher, sectorsize, and hmac algo 43 for aalgo in hmac/sha1 hmac/ripemd160 hmac/sha256 \ 44 hmac/sha384 hmac/sha512; do 53 # Execute `func` for each combination of cipher, and sectorsize, with no hmac
|
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 64 # include <openssl/hmac.h> 73 HMAC_CTX hmac; local 101 HMAC_CTX_init(&hmac); 102 if (!HMAC_Init_ex(&hmac, key, md_size, md_type, NULL) 103 || !HMAC_Update(&hmac, p12->authsafes->d.data->data, 105 || !HMAC_Final(&hmac, mac, maclen)) { 106 HMAC_CTX_cleanup(&hmac); 109 HMAC_CTX_cleanup(&hmac);
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_record.c | 155 struct crypto_hash *hmac; local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 209 if (hmac == NULL) { 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); 217 crypto_hash_update(hmac, payload, payload_len); 222 crypto_hash_finish(hmac, NULL, NULL); 226 if (crypto_hash_finish(hmac, pos, &clen) < 0) { 284 struct crypto_hash *hmac; local 436 hmac [all...] |
/freebsd-11-stable/contrib/libarchive/libarchive/ |
H A D | archive_openssl_hmac_private.h | 33 #include <openssl/hmac.h>
|
H A D | archive_hmac_private.h | 72 #include <nettle/hmac.h>
|
/freebsd-11-stable/contrib/netbsd-tests/crypto/libcrypto/ |
H A D | t_hashes.sh | 28 atf_test_case hmac 101 atf_add_test_case hmac
|
/freebsd-11-stable/crypto/heimdal/include/ |
H A D | crypto-headers.h | 24 #include <openssl/hmac.h> 50 #include <hcrypto/hmac.h>
|
/freebsd-11-stable/crypto/heimdal/include/hcrypto/ |
H A D | Makefile.am | 18 hmac.h \
|
/freebsd-11-stable/contrib/ntp/lib/isc/include/isc/ |
H A D | hmacmd5.h | 36 #include <openssl/hmac.h>
|
H A D | hmacsha.h | 40 #include <openssl/hmac.h>
|
/freebsd-11-stable/kerberos5/include/ |
H A D | crypto-headers.h | 17 #include <openssl/hmac.h>
|
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost89.h | 73 unsigned int data_len, unsigned char *hmac); 80 unsigned char *hmac);
|
/freebsd-11-stable/contrib/netbsd-tests/lib/libc/hash/ |
H A D | t_hmac.c | 38 #include <openssl/hmac.h> 91 tmp2len = hmac(names[t], key, i, data, j, tmp2, 114 "Test hmac functions for consistent results");
|
/freebsd-11-stable/contrib/ldns/ |
H A D | keys.c | 5 * and give a general interface for private keys and hmac 40 { LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" }, 41 { LDNS_SIGN_HMACSHA1, "hmac-sha1" }, 42 { LDNS_SIGN_HMACSHA256, "hmac-sha256" }, 300 unsigned char *hmac; local 464 hmac = ldns_key_new_frm_fp_hmac_l(fp, line_nr, &hmac_size); 465 if (!hmac) { 470 ldns_key_set_hmac_key(k, hmac); 832 unsigned char *hmac; local 885 hmac 1032 ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac) argument 1577 unsigned char* hmac; local [all...] |
/freebsd-11-stable/sys/dev/cxgbe/crypto/ |
H A D | t4_crypto.c | 165 struct ccr_session_hmac hmac; member in union:ccr_session::__anon2 443 axf = s->hmac.auth_hash; 446 iopad_size = roundup2(s->hmac.partial_digest_len, 16); 508 V_SCMD_AUTH_MODE(s->hmac.auth_mode) | 514 memcpy(crwr->key_ctx.key, s->hmac.ipad, s->hmac.partial_digest_len); 515 memcpy(crwr->key_ctx.key + iopad_size, s->hmac.opad, 516 s->hmac.partial_digest_len); 523 V_KEY_CONTEXT_MK_SIZE(s->hmac.mk_size) | V_KEY_CONTEXT_VALID(1)); 551 s->hmac [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.c | 168 unsigned char hmac[SHA1_MAC_LEN]; local 195 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 197 hmac, EAP_SIM_MAC_LEN); 200 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1; 207 unsigned char hmac[SHA1_MAC_LEN]; local 223 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 224 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN); 362 unsigned char hmac[SHA256_MAC_LEN]; local 389 hmac_sha256_vector(k_aut, EAP_AKA_PRIME_K_AUT_LEN, 2, addr, len, hmac); 391 hmac, EAP_SIM_MAC_LE 401 unsigned char hmac[SHA256_MAC_LEN]; local [all...] |
/freebsd-11-stable/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | crypto.c | 149 unsigned char hmac[16]; local 156 encode_le_uint32(seq, hmac); 157 HMAC_Update(&c, hmac, 4); 159 HMAC_Final(&c, hmac, &hmaclen); 164 RC4(sealkey, 8, hmac, &out[4]); 166 memcpy(&out[4], hmac, 8);
|
/freebsd-11-stable/sys/mips/nlm/hal/ |
H A D | nlmsaelib.h | 206 * hmac : 1 for hash with hmac 218 nlm_crypto_form_pkt_ctrl_desc(unsigned int hmac, unsigned int hashalg, argument 223 return (left_shift64(hmac, 61, 1) | 303 * hmacpad : 1 if hmac padding is already done 452 * hmac : 1 for hash with hmac 460 nlm_crypto_fill_pkt_ctrl(struct nlm_crypto_pkt_ctrl *ctrl, unsigned int hmac, argument 468 ctrl->desc0 = nlm_crypto_form_pkt_ctrl_desc(hmac, hashalg, hashmode, 500 * hmacpad : hmac paddin [all...] |
/freebsd-11-stable/tools/tools/crypto/ |
H A D | cryptocheck.c | 76 * hmac Run all hmac tests 83 * sha1 sha1 hmac 84 * sha256 256-bit sha2 hmac 85 * sha384 384-bit sha2 hmac 86 * sha512 512-bit sha2 hmac 99 * <block cipher>+<hmac> 118 #include <openssl/hmac.h> 194 build_authenc(struct alg *cipher, struct alg *hmac) argument 200 assert(hmac 215 struct alg *cipher, *hmac; local 1070 struct alg *authenc, *cipher, *hmac; local [all...] |
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | Makefile | 116 bio_ssl.o: ../include/openssl/hmac.h ../include/openssl/kssl.h 134 d1_both.o: ../include/openssl/evp.h ../include/openssl/hmac.h 155 d1_clnt.o: ../include/openssl/evp.h ../include/openssl/hmac.h 176 d1_lib.o: ../include/openssl/evp.h ../include/openssl/hmac.h 196 d1_meth.o: ../include/openssl/evp.h ../include/openssl/hmac.h 216 d1_pkt.o: ../include/openssl/evp.h ../include/openssl/hmac.h 236 d1_srtp.o: ../include/openssl/evp.h ../include/openssl/hmac.h 257 d1_srvr.o: ../include/openssl/evp.h ../include/openssl/hmac.h 277 kssl.o: ../include/openssl/evp.h ../include/openssl/hmac.h 297 s23_clnt.o: ../include/openssl/evp.h ../include/openssl/hmac [all...] |
/freebsd-11-stable/sys/netinet/ |
H A D | sctp_auth.c | 642 alloc_size = sizeof(*new_list) + num_hmacs * sizeof(new_list->hmac[0]); 680 if (list->hmac[i] == hmac_id) { 686 list->hmac[list->num_algo++] = hmac_id; 706 new_list->hmac[i] = list->hmac[i]; 738 if (peer->hmac[i] == local->hmac[j]) { 742 peer->hmac[i]); 743 return (peer->hmac[i]); 765 hmac_id = htons(list->hmac[ [all...] |
/freebsd-11-stable/contrib/ldns/ldns/ |
H A D | keys.h | 127 } hmac; member in struct:ldns_struct_key::__anon1813 344 * Set the key's hmac data 346 * \param[in] hmac the raw key data 348 void ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac); 363 * Set the key's hmac size 365 * \param[in] hmac_size the size of the hmac data 475 * return the hmac key data 477 * \return the hmac key data 487 * return the hmac key size 489 * \return the hmac ke [all...] |