Home
last modified time | relevance | path

Searched refs:hmac_len (Results 1 – 25 of 111) sorted by relevance

12345

/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/common/
H A Dmech_sha.c306 if (hmac_len == 0) { in sha1_hmac_sign()
455 *out_data_len = hmac_len; in sha1_hmac_sign()
489 if (hmac_len == 0) { in sha224_hmac_sign()
669 if (hmac_len == 0) { in sha256_hmac_sign()
849 if (hmac_len == 0) { in sha384_hmac_sign()
1036 if (hmac_len == 0) { in sha512_hmac_sign()
1201 CK_ULONG hmac_len, len; in sha1_hmac_verify() local
1258 CK_ULONG hmac_len, len; in sha224_hmac_verify() local
1317 CK_ULONG hmac_len, len; in sha256_hmac_verify() local
1377 CK_ULONG hmac_len, len; in sha384_hmac_verify() local
[all …]
H A Dmech_md2.c183 CK_ULONG key_bytes, hash_len, hmac_len; in md2_hmac_sign() local
194 hmac_len = *(CK_ULONG *) ctx->mech.pParameter; in md2_hmac_sign()
196 if (hmac_len == 0) { in md2_hmac_sign()
201 hmac_len = MD2_HASH_SIZE; in md2_hmac_sign()
206 *out_data_len = hmac_len; in md2_hmac_sign()
328 memcpy(out_data, hash, hmac_len); in md2_hmac_sign()
329 *out_data_len = hmac_len; in md2_hmac_sign()
346 CK_ULONG hmac_len, len; in md2_hmac_verify() local
356 hmac_len = MD2_HASH_SIZE; in md2_hmac_verify()
372 if ((len != hmac_len) || (len != sig_len)) { in md2_hmac_verify()
[all …]
H A Dmech_md5.c153 CK_ULONG key_bytes, hash_len, hmac_len; in md5_hmac_sign() local
164 hmac_len = *(CK_ULONG *) ctx->mech.pParameter; in md5_hmac_sign()
166 if (hmac_len == 0) { in md5_hmac_sign()
171 hmac_len = MD5_HASH_SIZE; in md5_hmac_sign()
176 *out_data_len = hmac_len; in md5_hmac_sign()
302 memcpy(out_data, hash, hmac_len); in md5_hmac_sign()
303 *out_data_len = hmac_len; in md5_hmac_sign()
320 CK_ULONG hmac_len, len; in md5_hmac_verify() local
330 hmac_len = MD5_HASH_SIZE; in md5_hmac_verify()
348 if ((len != hmac_len) || (len != sig_len)) { in md5_hmac_verify()
[all …]
/dports/net/kea/kea-2.0.1/src/lib/cryptolink/tests/
H A Dhmac_unittests.cc74 size_t hmac_len) { in doHMACTestConv() argument
108 size_t hmac_len) { in doHMACTestDirect() argument
120 hmac_sign->sign(hmac_sig, hmac_len); in doHMACTestDirect()
154 size_t hmac_len) { in doHMACTestVector() argument
162 ASSERT_EQ(hmac_len, sig.size()); in doHMACTestVector()
183 size_t hmac_len) { in doHMACTestArray() argument
194 uint8_t* sig = new uint8_t[hmac_len]; in doHMACTestArray()
196 hmac_sign->sign(sig, hmac_len); in doHMACTestArray()
197 checkData(sig, expected_hmac, hmac_len); in doHMACTestArray()
227 size_t hmac_len) { in doHMACTest() argument
[all …]
/dports/net/kamailio/kamailio-5.4.5/src/modules/auth_ephemeral/
H A Dauthorize.c46 unsigned int hmac_len = SHA_DIGEST_LENGTH; in get_pass() local
51 hmac_len = SHA_DIGEST_LENGTH; in get_pass()
54 _username->len, hmac_sha1, &hmac_len) == NULL) in get_pass()
61 hmac_len = SHA256_DIGEST_LENGTH; in get_pass()
64 _username->len, hmac_sha1, &hmac_len) == NULL) in get_pass()
71 hmac_len = SHA384_DIGEST_LENGTH; in get_pass()
74 _username->len, hmac_sha1, &hmac_len) == NULL) in get_pass()
81 hmac_len = SHA512_DIGEST_LENGTH; in get_pass()
96 LM_DBG("HMAC-Len (%i)\n", hmac_len); in get_pass()
99 _password->len = base64_enc(hmac_sha1, hmac_len, in get_pass()
[all …]
/dports/net/turnserver/coturn-4.5.2/src/apps/uclient/
H A Dmainuclient.c393 unsigned int hmac_len;
397 hmac_len = SHA256SIZEBYTES;
400 hmac_len = SHA384SIZEBYTES;
403 hmac_len = SHA512SIZEBYTES;
406 hmac_len = SHA1SIZEBYTES;
411 …en((char*)g_uname), (uint8_t*)g_auth_secret, strlen(g_auth_secret), hmac, &hmac_len, shatype)>=0) {
413 char *pwd = base64_encode(hmac,hmac_len,&pwd_length);
/dports/sysutils/bareos-server/bareos-Release-20.0.3/core/src/droplet/libdroplet/src/backend/s3/auth/
H A Dv2.c160 u_int hmac_len; in dpl_s3_add_authorization_v2_to_headers() local
184 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_add_authorization_v2_to_headers()
187 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_add_authorization_v2_to_headers()
218 u_int hmac_len; in dpl_s3_get_authorization_v2_params() local
231 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_get_authorization_v2_params()
234 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_get_authorization_v2_params()
/dports/sysutils/bareos-client/bareos-Release-20.0.3/core/src/droplet/libdroplet/src/backend/s3/auth/
H A Dv2.c160 u_int hmac_len; in dpl_s3_add_authorization_v2_to_headers() local
184 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_add_authorization_v2_to_headers()
187 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_add_authorization_v2_to_headers()
218 u_int hmac_len; in dpl_s3_get_authorization_v2_params() local
231 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_get_authorization_v2_params()
234 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_get_authorization_v2_params()
/dports/sysutils/bareos-traymonitor/bareos-Release-20.0.3/core/src/droplet/libdroplet/src/backend/s3/auth/
H A Dv2.c160 u_int hmac_len; in dpl_s3_add_authorization_v2_to_headers() local
184 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_add_authorization_v2_to_headers()
187 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_add_authorization_v2_to_headers()
218 u_int hmac_len; in dpl_s3_get_authorization_v2_params() local
231 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_get_authorization_v2_params()
234 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_get_authorization_v2_params()
/dports/www/bareos-webui/bareos-Release-20.0.3/core/src/droplet/libdroplet/src/backend/s3/auth/
H A Dv2.c160 u_int hmac_len; in dpl_s3_add_authorization_v2_to_headers() local
184 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_add_authorization_v2_to_headers()
187 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_add_authorization_v2_to_headers()
218 u_int hmac_len; in dpl_s3_get_authorization_v2_params() local
231 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_get_authorization_v2_params()
234 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_get_authorization_v2_params()
/dports/multimedia/v4l_compat/linux-5.13-rc2/fs/ubifs/
H A Dauth.c392 int hmac_len = c->hmac_desc_len; in ubifs_node_calc_hmac() local
396 ubifs_assert(c, ofs_hmac + hmac_len < len); in ubifs_node_calc_hmac()
410 if (len - ofs_hmac - hmac_len > 0) { in ubifs_node_calc_hmac()
411 err = crypto_shash_update(shash, node + ofs_hmac + hmac_len, in ubifs_node_calc_hmac()
412 len - ofs_hmac - hmac_len); in ubifs_node_calc_hmac()
451 int hmac_len = c->hmac_desc_len; in __ubifs_node_verify_hmac() local
455 hmac = kmalloc(hmac_len, GFP_NOFS); in __ubifs_node_verify_hmac()
465 err = crypto_memneq(hmac, node + ofs_hmac, hmac_len); in __ubifs_node_verify_hmac()
/dports/multimedia/libv4l/linux-5.13-rc2/fs/ubifs/
H A Dauth.c392 int hmac_len = c->hmac_desc_len; in ubifs_node_calc_hmac() local
396 ubifs_assert(c, ofs_hmac + hmac_len < len); in ubifs_node_calc_hmac()
410 if (len - ofs_hmac - hmac_len > 0) { in ubifs_node_calc_hmac()
411 err = crypto_shash_update(shash, node + ofs_hmac + hmac_len, in ubifs_node_calc_hmac()
412 len - ofs_hmac - hmac_len); in ubifs_node_calc_hmac()
451 int hmac_len = c->hmac_desc_len; in __ubifs_node_verify_hmac() local
455 hmac = kmalloc(hmac_len, GFP_NOFS); in __ubifs_node_verify_hmac()
465 err = crypto_memneq(hmac, node + ofs_hmac, hmac_len); in __ubifs_node_verify_hmac()
/dports/multimedia/v4l-utils/linux-5.13-rc2/fs/ubifs/
H A Dauth.c392 int hmac_len = c->hmac_desc_len; in ubifs_node_calc_hmac() local
396 ubifs_assert(c, ofs_hmac + hmac_len < len); in ubifs_node_calc_hmac()
410 if (len - ofs_hmac - hmac_len > 0) { in ubifs_node_calc_hmac()
411 err = crypto_shash_update(shash, node + ofs_hmac + hmac_len, in ubifs_node_calc_hmac()
412 len - ofs_hmac - hmac_len); in ubifs_node_calc_hmac()
451 int hmac_len = c->hmac_desc_len; in __ubifs_node_verify_hmac() local
455 hmac = kmalloc(hmac_len, GFP_NOFS); in __ubifs_node_verify_hmac()
465 err = crypto_memneq(hmac, node + ofs_hmac, hmac_len); in __ubifs_node_verify_hmac()
/dports/security/openconnect/openconnect-8.10/
H A Dopenssl-esp.c157 unsigned int hmac_len = sizeof(hmac_buf); in decrypt_esp_packet() local
162 HMAC_Final(esp->hmac, hmac_buf, &hmac_len); in decrypt_esp_packet()
195 unsigned int hmac_len = vpninfo->hmac_out_len; in encrypt_esp_packet() local
207 HMAC_Final(vpninfo->esp_out.hmac, pkt->data + crypt_len, &hmac_len); in encrypt_esp_packet()
210 pkt->data + crypt_len + hmac_len - blksize, blksize); in encrypt_esp_packet()
/dports/security/libressl/libressl-3.4.3/ssl/
H A Dt1_enc.c166 size_t A1_len, hmac_len; in tls1_P_hash() local
211 if (!EVP_DigestSignFinal(&ctx, hmac, &hmac_len)) in tls1_P_hash()
214 if (hmac_len > out_len) in tls1_P_hash()
215 hmac_len = out_len; in tls1_P_hash()
217 for (i = 0; i < hmac_len; i++) in tls1_P_hash()
220 out += hmac_len; in tls1_P_hash()
221 out_len -= hmac_len; in tls1_P_hash()
/dports/www/obhttpd/libressl-3.4.1/ssl/
H A Dt1_enc.c166 size_t A1_len, hmac_len; in tls1_P_hash() local
211 if (!EVP_DigestSignFinal(&ctx, hmac, &hmac_len)) in tls1_P_hash()
214 if (hmac_len > out_len) in tls1_P_hash()
215 hmac_len = out_len; in tls1_P_hash()
217 for (i = 0; i < hmac_len; i++) in tls1_P_hash()
220 out += hmac_len; in tls1_P_hash()
221 out_len -= hmac_len; in tls1_P_hash()
/dports/finance/vanitygen/vanitygen-cd1a728/
H A Dutil.c503 int hmac_len = 0, hmac_keylen = 0; in vg_protect_crypt() local
545 hmac_len = 8; in vg_protect_crypt()
559 if (!enc && (data_in_len != (1 + ciphertext_len + hmac_len + salt_len))) in vg_protect_crypt()
569 salt = data_in + 1 + ciphertext_len + hmac_len; in vg_protect_crypt()
571 salt = data_out + 1 + ciphertext_len + hmac_len; in vg_protect_crypt()
603 olen = 1 + ciphertext_len + hmac_len + salt_len - opos; in vg_protect_crypt()
619 if (hmac_len) { in vg_protect_crypt()
627 memcpy(data_out + 1 + ciphertext_len, hmac, hmac_len); in vg_protect_crypt()
630 hmac_len)) in vg_protect_crypt()
639 opos += hmac_len + salt_len; in vg_protect_crypt()
/dports/security/libressl-static/libressl-3.3.5/ssl/
H A Dt1_enc.c170 size_t A1_len, hmac_len; in tls1_P_hash() local
215 if (!EVP_DigestSignFinal(&ctx, hmac, &hmac_len)) in tls1_P_hash()
218 if (hmac_len > out_len) in tls1_P_hash()
219 hmac_len = out_len; in tls1_P_hash()
221 for (i = 0; i < hmac_len; i++) in tls1_P_hash()
224 out += hmac_len; in tls1_P_hash()
225 out_len -= hmac_len; in tls1_P_hash()
/dports/security/hashcat/hashcat-6.2.5/src/modules/
H A Dmodule_28100.c56 int hmac_len; member
190 const int hmac_len = token.len[6]; in module_hash_decode() local
224 winhello->hmac_len = hex_decode (hmac_pos, hmac_len, (u8 *) winhello->hmac_buf); in module_hash_decode()
226 for (int i = 0, j = 0; i < winhello->hmac_len; i += 4, j += 1) in module_hash_decode()
350 for (int i = 0, j = 0; i < winhello->hmac_len; i += 4, j += 1) in module_hash_encode()
355 out_len += hex_encode ((u8 *) tmp32, winhello->hmac_len, out_buf + out_len); in module_hash_encode()
/dports/devel/glib20/glib-2.70.4/glib/tests/
H A Dhmac.c399 gsize digest_len, hmac_len; in test_hmac() local
402 hmac_len = digest_len = g_checksum_type_get_length (t->digest_type); in test_hmac()
403 digest = g_malloc (hmac_len); in test_hmac()
409 g_assert_cmpmem (digest, hmac_len, t->result, digest_len); in test_hmac()
/dports/multimedia/v4l_compat/linux-5.13-rc2/security/keys/trusted-keys/
H A Dtrusted_tpm2.c202 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument
204 tpm_buf_append_u32(buf, 9 + nonce_len + hmac_len); in tpm2_buf_append_auth()
212 tpm_buf_append_u16(buf, hmac_len); in tpm2_buf_append_auth()
214 if (hmac && hmac_len) in tpm2_buf_append_auth()
215 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
/dports/multimedia/libv4l/linux-5.13-rc2/security/keys/trusted-keys/
H A Dtrusted_tpm2.c202 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument
204 tpm_buf_append_u32(buf, 9 + nonce_len + hmac_len); in tpm2_buf_append_auth()
212 tpm_buf_append_u16(buf, hmac_len); in tpm2_buf_append_auth()
214 if (hmac && hmac_len) in tpm2_buf_append_auth()
215 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
/dports/multimedia/v4l-utils/linux-5.13-rc2/security/keys/trusted-keys/
H A Dtrusted_tpm2.c202 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument
204 tpm_buf_append_u32(buf, 9 + nonce_len + hmac_len); in tpm2_buf_append_auth()
212 tpm_buf_append_u16(buf, hmac_len); in tpm2_buf_append_auth()
214 if (hmac && hmac_len) in tpm2_buf_append_auth()
215 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
/dports/security/openssl-legacy-static/openssl-1.0.2u/engines/ccgost/
H A Dgost89.h72 int gost_mac(gost_ctx * ctx, int hmac_len, const unsigned char *data,
78 int gost_mac_iv(gost_ctx * ctx, int hmac_len, const unsigned char *iv,
/dports/security/openssl-unsafe/openssl-c9ba19c/engines/ccgost/
H A Dgost89.h72 int gost_mac(gost_ctx * ctx, int hmac_len, const unsigned char *data,
78 int gost_mac_iv(gost_ctx * ctx, int hmac_len, const unsigned char *iv,

12345