HomeSort by: relevance | last modified time | path
    Searched defs:hmac (Results 1 - 25 of 42) sorted by relevancy

1 2

  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
test_hmac.c 39 #include <hmac.h>
49 unsigned char hmac[EVP_MAX_MD_SIZE]; local
58 HMAC_Final(&c, hmac, &hmaclen);
66 if (ct_memcmp(hmac, answer, hmaclen) != 0) {
validate.c 40 #include <hmac.h>
274 unsigned char hmac[EVP_MAX_MD_SIZE]; local
283 HMAC_Final(&c, hmac, &hmaclen);
289 if (ct_memcmp(hmac, answer, hmaclen) != 0)
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
crypto-aes-sha2.c 39 * AES HMAC-SHA2
71 unsigned char hmac[EVP_MAX_MD_SIZE]; local
72 unsigned int hmaclen = sizeof(hmac);
78 HMAC(md, key->key->keyvalue.data, key->key->keyvalue.length,
79 data, len, hmac, &hmaclen);
83 memcpy(result->checksum.data, hmac, result->checksum.length);
118 "hmac-sha256-128-aes128",
128 "hmac-sha384-192-aes256",
168 "aes128-cts-hmac-sha256-128",
184 "aes256-cts-hmac-sha384-192"
    [all...]
sp800-108-kdf.c 41 * As described in SP800-108 5.1 (for HMAC)
64 unsigned char hmac[EVP_MAX_MD_SIZE]; local
95 HMAC_Final(c, hmac, &h);
97 memcpy(p, hmac, len);
  /src/external/mpl/dhcp/bind/dist/lib/isc/
hmac.c 1 /* $NetBSD: hmac.c,v 1.1 2024/02/18 20:57:49 christos Exp $ */
16 #include <openssl/hmac.h>
20 #include <isc/hmac.h>
32 HMAC_CTX *hmac = HMAC_CTX_new(); local
33 RUNTIME_CHECK(hmac != NULL);
34 return ((struct hmac *)hmac);
38 isc_hmac_free(isc_hmac_t *hmac) {
39 if (ISC_UNLIKELY(hmac == NULL)) {
43 HMAC_CTX_free(hmac);
128 isc_hmac_t *hmac = isc_hmac_new(); local
    [all...]
  /src/lib/libc/hash/
hmac.c 1 /* $NetBSD: hmac.c,v 1.5 2017/10/05 09:59:04 roy Exp $ */
32 __RCSID("$NetBSD: hmac.c,v 1.5 2017/10/05 09:59:04 roy Exp $");
48 static const struct hmac { struct
104 static const struct hmac *
116 hmac(const char *name, function
123 const struct hmac *h;
  /src/crypto/external/apache2/openssl/dist/crypto/slh_dsa/
slh_dsa_key.h 49 EVP_MAC *hmac; member in struct:slh_dsa_key_st
  /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/
p12_mutl.c 11 * HMAC low level APIs are deprecated for public use, but still ok for internal
19 #include <openssl/hmac.h>
87 HMAC_CTX *hmac = NULL; local
162 if ((hmac = HMAC_CTX_new()) == NULL
163 || !HMAC_Init_ex(hmac, key, md_size, md, NULL)
164 || !HMAC_Update(hmac, p12->authsafes->d.data->data,
166 || !HMAC_Final(hmac, mac, maclen)) {
173 HMAC_CTX_free(hmac);
  /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/
p12_mutl.c 13 #include <openssl/hmac.h>
80 HMAC_CTX *hmac = NULL; local
128 if ((hmac = HMAC_CTX_new()) == NULL
129 || !HMAC_Init_ex(hmac, key, md_size, md_type, NULL)
130 || !HMAC_Update(hmac, p12->authsafes->d.data->data,
132 || !HMAC_Final(hmac, mac, maclen)) {
139 HMAC_CTX_free(hmac);
  /src/external/bsd/libfido2/dist/src/
config.c 17 config_prepare_hmac(uint8_t subcmd, const cbor_item_t *item, fido_blob_t *hmac)
32 if ((hmac->ptr = malloc(cbor_len + sizeof(prefix))) == NULL) {
36 memcpy(hmac->ptr, prefix, sizeof(prefix));
37 memcpy(hmac->ptr + sizeof(prefix), cbor, cbor_len);
38 hmac->len = cbor_len + sizeof(prefix);
49 fido_blob_t *ecdh = NULL, f, hmac; local
54 memset(&hmac, 0, sizeof(hmac));
73 if (config_prepare_hmac(subcmd, argv[1], &hmac) < 0) {
81 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin
    [all...]
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_record.c 140 * header, IV (TLS v1.1), and HMAC)
147 * This function fills in the TLS record layer header, adds HMAC, and encrypts
155 struct crypto_hash *hmac; local
207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret,
209 if (hmac == NULL) {
211 "to initialize HMAC");
214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN);
216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN);
217 crypto_hash_update(hmac, payload, payload_len);
222 crypto_hash_finish(hmac, NULL, NULL)
284 struct crypto_hash *hmac; local
    [all...]
  /src/external/ibm-public/postfix/dist/src/tls/
tls_scache.h 37 #define TLS_TICKET_MACLEN 32 /* RFC 5077 HMAC key size */
43 unsigned char hmac[TLS_TICKET_MACLEN]; member in struct:TLS_TICKET_KEY
  /src/crypto/external/apache2/openssl/dist/crypto/rsa/
rsa_pk1.c 26 #include <openssl/hmac.h>
288 HMAC_CTX *hmac = NULL; local
301 hmac = HMAC_CTX_new();
302 if (hmac == NULL) {
320 if (HMAC_Init_ex(hmac, kdk, SHA256_DIGEST_LENGTH, md, NULL) <= 0) {
326 if (HMAC_Init_ex(hmac, NULL, 0, NULL, NULL) <= 0) {
334 if (HMAC_Update(hmac, be_iter, sizeof(be_iter)) <= 0) {
338 if (HMAC_Update(hmac, (unsigned char *)label, llen) <= 0) {
342 if (HMAC_Update(hmac, be_bitlen, sizeof(be_bitlen)) <= 0) {
354 if (HMAC_Final(hmac, hmac_out, &md_len) <= 0)
    [all...]
rsa_ossl.c 22 #include <openssl/hmac.h>
434 HMAC_CTX *hmac = NULL; local
479 hmac = HMAC_CTX_new();
480 if (hmac == NULL) {
485 if (HMAC_Init_ex(hmac, d_hash, sizeof(d_hash), md, NULL) <= 0) {
492 if (HMAC_Update(hmac, buf, num - flen) <= 0) {
497 if (HMAC_Update(hmac, from, flen) <= 0) {
503 if (HMAC_Final(hmac, kdk, &md_len) <= 0) {
510 HMAC_CTX_free(hmac);
  /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/
hmacdrbg_kdf.c 142 KDF_HMAC_DRBG *hmac = (KDF_HMAC_DRBG *)vctx; local
143 PROV_DRBG_HMAC *drbg = &hmac->base;
180 KDF_HMAC_DRBG *hmac = (KDF_HMAC_DRBG *)vctx; local
181 PROV_DRBG_HMAC *drbg = &hmac->base;
182 OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(hmac->provctx);
196 OPENSSL_free(hmac->entropy);
197 hmac->entropy = ptr;
198 hmac->entropylen = size;
199 hmac->init = 0;
207 OPENSSL_free(hmac->nonce)
    [all...]
hkdf.c 11 * HMAC low level APIs are deprecated for public use, but still ok for internal
19 #include <openssl/hmac.h>
430 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)"
444 * k is the output length in bits of the hash function used with HMAC
482 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)"
503 * PRK = HMAC-Hash(salt, IKM)
518 /* calc: PRK = HMAC-Hash(salt, IKM) */
519 return EVP_Q_mac(libctx, "HMAC", NULL, EVP_MD_get0_name(evp_md), NULL, salt,
525 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)"
555 * T(1) = HMAC-Hash(PRK, T(0) | info | 0x01
568 HMAC_CTX *hmac; local
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/
crypto.c 157 unsigned char hmac[16]; local
170 encode_le_uint32(seq, hmac);
171 HMAC_Update(c, hmac, 4);
173 HMAC_Final(c, hmac, &hmaclen);
182 RC4(sealkey, 8, hmac, &out[4]);
184 memcpy(&out[4], hmac, 8);
  /src/crypto/external/bsd/openssl/dist/providers/implementations/rands/
drbg_hmac.c 46 * hmac is an object that holds the input/output Key and Value (K and V).
52 * hmac->K = HMAC(hmac->K, hmac->V || inbyte || [in1] || [in2] || [in3])
53 * hmac->V = HMAC(hmac->K, hmac->V)
57 static int do_hmac(PROV_DRBG_HMAC *hmac, unsigned char inbyte
99 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local
127 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local
198 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local
252 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local
267 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local
276 PROV_DRBG_HMAC *hmac; local
308 PROV_DRBG_HMAC *hmac; local
321 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local
360 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)ctx->data; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/kdf/
hkdf.c 12 #include <openssl/hmac.h>
283 if (!HMAC(evp_md, salt, salt_len, key, key_len, prk, &tmp_len))
295 HMAC_CTX *hmac; local
311 if ((hmac = HMAC_CTX_new()) == NULL)
314 if (!HMAC_Init_ex(hmac, prk, prk_len, evp_md, NULL))
322 if (!HMAC_Init_ex(hmac, NULL, 0, NULL, NULL))
325 if (!HMAC_Update(hmac, prev, dig_len))
329 if (!HMAC_Update(hmac, info, info_len))
332 if (!HMAC_Update(hmac, &ctr, 1))
335 if (!HMAC_Final(hmac, prev, NULL)
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/
p12_mutl.c 11 * HMAC low level APIs are deprecated for public use, but still ok for internal
20 #include <openssl/hmac.h>
183 HMAC_CTX *hmac = NULL; local
287 if ((hmac = HMAC_CTX_new()) == NULL
288 || !HMAC_Init_ex(hmac, key, keylen, md, NULL)
289 || !HMAC_Update(hmac, p12->authsafes->d.data->data,
291 || !HMAC_Final(hmac, mac, maclen)) {
298 HMAC_CTX_free(hmac);
  /src/crypto/external/apache2/openssl/dist/providers/implementations/rands/
drbg_hmac.c 43 * hmac is an object that holds the input/output Key and Value (K and V).
49 * hmac->K = HMAC(hmac->K, hmac->V || inbyte || [in1] || [in2] || [in3])
50 * hmac->V = HMAC(hmac->K, hmac->V)
54 static int do_hmac(PROV_DRBG_HMAC *hmac, unsigned char inbyte
181 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local
271 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local
297 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local
315 PROV_DRBG_HMAC *hmac; local
347 PROV_DRBG_HMAC *hmac; local
360 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local
494 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)ctx->data; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/record/methods/
tls1_meth.c 64 mac_key = EVP_PKEY_new_raw_private_key_ex(rl->libctx, "HMAC",
69 * If its not HMAC then the only other types of MAC we support are
117 /* Needed for "composite" AEADs, such as RC4-HMAC-MD5 */
485 EVP_MD_CTX *hmac = NULL, *mac_ctx; local
500 hmac = EVP_MD_CTX_new();
501 if (hmac == NULL || !EVP_MD_CTX_copy(hmac, hash)) {
504 mac_ctx = hmac;
570 EVP_MD_CTX_free(hmac);
  /src/crypto/external/apache2/openssl/dist/test/
bad_dtls_test.c 468 /* Create header, HMAC, pad, encrypt and send a record */
473 * and in the HMAC, is different. So we just keep them in separate
479 EVP_MAC *hmac = NULL; local
503 /* Append HMAC to data */
504 if (!TEST_ptr(hmac = EVP_MAC_fetch(NULL, "HMAC", NULL))
505 || !TEST_ptr(ctx = EVP_MAC_CTX_new(hmac)))
549 EVP_MAC_free(hmac);
  /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/
hkdf.c 11 * HMAC low level APIs are deprecated for public use, but still ok for internal
19 #include <openssl/hmac.h>
379 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)"
393 * k is the output length in bits of the hash function used with HMAC
431 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)"
452 * PRK = HMAC-Hash(salt, IKM)
467 /* calc: PRK = HMAC-Hash(salt, IKM) */
469 EVP_Q_mac(libctx, "HMAC", NULL, EVP_MD_get0_name(evp_md), NULL, salt,
475 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)"
505 * T(1) = HMAC-Hash(PRK, T(0) | info | 0x01
518 HMAC_CTX *hmac; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
bad_dtls_test.c 273 /* Create header, HMAC, pad, encrypt and send a record */
278 * and in the HMAC, is different. So we just keep them in separate
284 EVP_MAC *hmac = NULL; local
308 /* Append HMAC to data */
309 if (!TEST_ptr(hmac = EVP_MAC_fetch(NULL, "HMAC", NULL))
310 || !TEST_ptr(ctx = EVP_MAC_CTX_new(hmac)))
354 EVP_MAC_free(hmac);

Completed in 50 milliseconds

1 2