| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| test_hmac.c | 39 #include <hmac.h> 49 unsigned char hmac[EVP_MAX_MD_SIZE]; local 58 HMAC_Final(&c, hmac, &hmaclen); 66 if (ct_memcmp(hmac, answer, hmaclen) != 0) {
|
| validate.c | 40 #include <hmac.h> 274 unsigned char hmac[EVP_MAX_MD_SIZE]; local 283 HMAC_Final(&c, hmac, &hmaclen); 289 if (ct_memcmp(hmac, answer, hmaclen) != 0)
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| crypto-aes-sha2.c | 39 * AES HMAC-SHA2 71 unsigned char hmac[EVP_MAX_MD_SIZE]; local 72 unsigned int hmaclen = sizeof(hmac); 78 HMAC(md, key->key->keyvalue.data, key->key->keyvalue.length, 79 data, len, hmac, &hmaclen); 83 memcpy(result->checksum.data, hmac, result->checksum.length); 118 "hmac-sha256-128-aes128", 128 "hmac-sha384-192-aes256", 168 "aes128-cts-hmac-sha256-128", 184 "aes256-cts-hmac-sha384-192" [all...] |
| sp800-108-kdf.c | 41 * As described in SP800-108 5.1 (for HMAC) 64 unsigned char hmac[EVP_MAX_MD_SIZE]; local 95 HMAC_Final(c, hmac, &h); 97 memcpy(p, hmac, len);
|
| /src/external/mpl/dhcp/bind/dist/lib/isc/ |
| hmac.c | 1 /* $NetBSD: hmac.c,v 1.1 2024/02/18 20:57:49 christos Exp $ */ 16 #include <openssl/hmac.h> 20 #include <isc/hmac.h> 32 HMAC_CTX *hmac = HMAC_CTX_new(); local 33 RUNTIME_CHECK(hmac != NULL); 34 return ((struct hmac *)hmac); 38 isc_hmac_free(isc_hmac_t *hmac) { 39 if (ISC_UNLIKELY(hmac == NULL)) { 43 HMAC_CTX_free(hmac); 128 isc_hmac_t *hmac = isc_hmac_new(); local [all...] |
| /src/lib/libc/hash/ |
| hmac.c | 1 /* $NetBSD: hmac.c,v 1.5 2017/10/05 09:59:04 roy Exp $ */ 32 __RCSID("$NetBSD: hmac.c,v 1.5 2017/10/05 09:59:04 roy Exp $"); 48 static const struct hmac { struct 104 static const struct hmac * 116 hmac(const char *name, function 123 const struct hmac *h;
|
| /src/crypto/external/apache2/openssl/dist/crypto/slh_dsa/ |
| slh_dsa_key.h | 49 EVP_MAC *hmac; member in struct:slh_dsa_key_st
|
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
| p12_mutl.c | 11 * HMAC low level APIs are deprecated for public use, but still ok for internal 19 #include <openssl/hmac.h> 87 HMAC_CTX *hmac = NULL; local 162 if ((hmac = HMAC_CTX_new()) == NULL 163 || !HMAC_Init_ex(hmac, key, md_size, md, NULL) 164 || !HMAC_Update(hmac, p12->authsafes->d.data->data, 166 || !HMAC_Final(hmac, mac, maclen)) { 173 HMAC_CTX_free(hmac);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/ |
| p12_mutl.c | 13 #include <openssl/hmac.h> 80 HMAC_CTX *hmac = NULL; local 128 if ((hmac = HMAC_CTX_new()) == NULL 129 || !HMAC_Init_ex(hmac, key, md_size, md_type, NULL) 130 || !HMAC_Update(hmac, p12->authsafes->d.data->data, 132 || !HMAC_Final(hmac, mac, maclen)) { 139 HMAC_CTX_free(hmac);
|
| /src/external/bsd/libfido2/dist/src/ |
| config.c | 17 config_prepare_hmac(uint8_t subcmd, const cbor_item_t *item, fido_blob_t *hmac) 32 if ((hmac->ptr = malloc(cbor_len + sizeof(prefix))) == NULL) { 36 memcpy(hmac->ptr, prefix, sizeof(prefix)); 37 memcpy(hmac->ptr + sizeof(prefix), cbor, cbor_len); 38 hmac->len = cbor_len + sizeof(prefix); 49 fido_blob_t *ecdh = NULL, f, hmac; local 54 memset(&hmac, 0, sizeof(hmac)); 73 if (config_prepare_hmac(subcmd, argv[1], &hmac) < 0) { 81 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin [all...] |
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_record.c | 140 * header, IV (TLS v1.1), and HMAC) 147 * This function fills in the TLS record layer header, adds HMAC, and encrypts 155 struct crypto_hash *hmac; local 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 209 if (hmac == NULL) { 211 "to initialize HMAC"); 214 crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN); 216 crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN); 217 crypto_hash_update(hmac, payload, payload_len); 222 crypto_hash_finish(hmac, NULL, NULL) 284 struct crypto_hash *hmac; local [all...] |
| /src/external/ibm-public/postfix/dist/src/tls/ |
| tls_scache.h | 37 #define TLS_TICKET_MACLEN 32 /* RFC 5077 HMAC key size */ 43 unsigned char hmac[TLS_TICKET_MACLEN]; member in struct:TLS_TICKET_KEY
|
| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_pk1.c | 26 #include <openssl/hmac.h> 288 HMAC_CTX *hmac = NULL; local 301 hmac = HMAC_CTX_new(); 302 if (hmac == NULL) { 320 if (HMAC_Init_ex(hmac, kdk, SHA256_DIGEST_LENGTH, md, NULL) <= 0) { 326 if (HMAC_Init_ex(hmac, NULL, 0, NULL, NULL) <= 0) { 334 if (HMAC_Update(hmac, be_iter, sizeof(be_iter)) <= 0) { 338 if (HMAC_Update(hmac, (unsigned char *)label, llen) <= 0) { 342 if (HMAC_Update(hmac, be_bitlen, sizeof(be_bitlen)) <= 0) { 354 if (HMAC_Final(hmac, hmac_out, &md_len) <= 0) [all...] |
| rsa_ossl.c | 22 #include <openssl/hmac.h> 434 HMAC_CTX *hmac = NULL; local 479 hmac = HMAC_CTX_new(); 480 if (hmac == NULL) { 485 if (HMAC_Init_ex(hmac, d_hash, sizeof(d_hash), md, NULL) <= 0) { 492 if (HMAC_Update(hmac, buf, num - flen) <= 0) { 497 if (HMAC_Update(hmac, from, flen) <= 0) { 503 if (HMAC_Final(hmac, kdk, &md_len) <= 0) { 510 HMAC_CTX_free(hmac);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/ |
| hmacdrbg_kdf.c | 142 KDF_HMAC_DRBG *hmac = (KDF_HMAC_DRBG *)vctx; local 143 PROV_DRBG_HMAC *drbg = &hmac->base; 180 KDF_HMAC_DRBG *hmac = (KDF_HMAC_DRBG *)vctx; local 181 PROV_DRBG_HMAC *drbg = &hmac->base; 182 OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(hmac->provctx); 196 OPENSSL_free(hmac->entropy); 197 hmac->entropy = ptr; 198 hmac->entropylen = size; 199 hmac->init = 0; 207 OPENSSL_free(hmac->nonce) [all...] |
| hkdf.c | 11 * HMAC low level APIs are deprecated for public use, but still ok for internal 19 #include <openssl/hmac.h> 430 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)" 444 * k is the output length in bits of the hash function used with HMAC 482 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)" 503 * PRK = HMAC-Hash(salt, IKM) 518 /* calc: PRK = HMAC-Hash(salt, IKM) */ 519 return EVP_Q_mac(libctx, "HMAC", NULL, EVP_MD_get0_name(evp_md), NULL, salt, 525 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)" 555 * T(1) = HMAC-Hash(PRK, T(0) | info | 0x01 568 HMAC_CTX *hmac; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
| crypto.c | 157 unsigned char hmac[16]; local 170 encode_le_uint32(seq, hmac); 171 HMAC_Update(c, hmac, 4); 173 HMAC_Final(c, hmac, &hmaclen); 182 RC4(sealkey, 8, hmac, &out[4]); 184 memcpy(&out[4], hmac, 8);
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/rands/ |
| drbg_hmac.c | 46 * hmac is an object that holds the input/output Key and Value (K and V). 52 * hmac->K = HMAC(hmac->K, hmac->V || inbyte || [in1] || [in2] || [in3]) 53 * hmac->V = HMAC(hmac->K, hmac->V) 57 static int do_hmac(PROV_DRBG_HMAC *hmac, unsigned char inbyte 99 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local 127 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local 198 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local 252 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local 267 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local 276 PROV_DRBG_HMAC *hmac; local 308 PROV_DRBG_HMAC *hmac; local 321 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local 360 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)ctx->data; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/kdf/ |
| hkdf.c | 12 #include <openssl/hmac.h> 283 if (!HMAC(evp_md, salt, salt_len, key, key_len, prk, &tmp_len)) 295 HMAC_CTX *hmac; local 311 if ((hmac = HMAC_CTX_new()) == NULL) 314 if (!HMAC_Init_ex(hmac, prk, prk_len, evp_md, NULL)) 322 if (!HMAC_Init_ex(hmac, NULL, 0, NULL, NULL)) 325 if (!HMAC_Update(hmac, prev, dig_len)) 329 if (!HMAC_Update(hmac, info, info_len)) 332 if (!HMAC_Update(hmac, &ctr, 1)) 335 if (!HMAC_Final(hmac, prev, NULL) [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/ |
| p12_mutl.c | 11 * HMAC low level APIs are deprecated for public use, but still ok for internal 20 #include <openssl/hmac.h> 183 HMAC_CTX *hmac = NULL; local 287 if ((hmac = HMAC_CTX_new()) == NULL 288 || !HMAC_Init_ex(hmac, key, keylen, md, NULL) 289 || !HMAC_Update(hmac, p12->authsafes->d.data->data, 291 || !HMAC_Final(hmac, mac, maclen)) { 298 HMAC_CTX_free(hmac);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/rands/ |
| drbg_hmac.c | 43 * hmac is an object that holds the input/output Key and Value (K and V). 49 * hmac->K = HMAC(hmac->K, hmac->V || inbyte || [in1] || [in2] || [in3]) 50 * hmac->V = HMAC(hmac->K, hmac->V) 54 static int do_hmac(PROV_DRBG_HMAC *hmac, unsigned char inbyte 181 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local 271 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local 297 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local 315 PROV_DRBG_HMAC *hmac; local 347 PROV_DRBG_HMAC *hmac; local 360 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data; local 494 PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)ctx->data; local [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/record/methods/ |
| tls1_meth.c | 64 mac_key = EVP_PKEY_new_raw_private_key_ex(rl->libctx, "HMAC", 69 * If its not HMAC then the only other types of MAC we support are 117 /* Needed for "composite" AEADs, such as RC4-HMAC-MD5 */ 485 EVP_MD_CTX *hmac = NULL, *mac_ctx; local 500 hmac = EVP_MD_CTX_new(); 501 if (hmac == NULL || !EVP_MD_CTX_copy(hmac, hash)) { 504 mac_ctx = hmac; 570 EVP_MD_CTX_free(hmac);
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| bad_dtls_test.c | 468 /* Create header, HMAC, pad, encrypt and send a record */ 473 * and in the HMAC, is different. So we just keep them in separate 479 EVP_MAC *hmac = NULL; local 503 /* Append HMAC to data */ 504 if (!TEST_ptr(hmac = EVP_MAC_fetch(NULL, "HMAC", NULL)) 505 || !TEST_ptr(ctx = EVP_MAC_CTX_new(hmac))) 549 EVP_MAC_free(hmac);
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
| hkdf.c | 11 * HMAC low level APIs are deprecated for public use, but still ok for internal 19 #include <openssl/hmac.h> 379 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)" 393 * k is the output length in bits of the hash function used with HMAC 431 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)" 452 * PRK = HMAC-Hash(salt, IKM) 467 /* calc: PRK = HMAC-Hash(salt, IKM) */ 469 EVP_Q_mac(libctx, "HMAC", NULL, EVP_MD_get0_name(evp_md), NULL, salt, 475 * Refer to "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)" 505 * T(1) = HMAC-Hash(PRK, T(0) | info | 0x01 518 HMAC_CTX *hmac; local [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| bad_dtls_test.c | 273 /* Create header, HMAC, pad, encrypt and send a record */ 278 * and in the HMAC, is different. So we just keep them in separate 284 EVP_MAC *hmac = NULL; local 308 /* Append HMAC to data */ 309 if (!TEST_ptr(hmac = EVP_MAC_fetch(NULL, "HMAC", NULL)) 310 || !TEST_ptr(ctx = EVP_MAC_CTX_new(hmac))) 354 EVP_MAC_free(hmac);
|