/dports/security/opencryptoki/opencryptoki-3.11.0/usr/lib/common/ |
H A D | mech_sha.c | 306 if (hmac_len == 0) { in sha1_hmac_sign() 455 *out_data_len = hmac_len; in sha1_hmac_sign() 489 if (hmac_len == 0) { in sha224_hmac_sign() 669 if (hmac_len == 0) { in sha256_hmac_sign() 849 if (hmac_len == 0) { in sha384_hmac_sign() 1036 if (hmac_len == 0) { in sha512_hmac_sign() 1201 CK_ULONG hmac_len, len; in sha1_hmac_verify() local 1258 CK_ULONG hmac_len, len; in sha224_hmac_verify() local 1317 CK_ULONG hmac_len, len; in sha256_hmac_verify() local 1377 CK_ULONG hmac_len, len; in sha384_hmac_verify() local [all …]
|
H A D | mech_md2.c | 183 CK_ULONG key_bytes, hash_len, hmac_len; in md2_hmac_sign() local 194 hmac_len = *(CK_ULONG *) ctx->mech.pParameter; in md2_hmac_sign() 196 if (hmac_len == 0) { in md2_hmac_sign() 201 hmac_len = MD2_HASH_SIZE; in md2_hmac_sign() 206 *out_data_len = hmac_len; in md2_hmac_sign() 328 memcpy(out_data, hash, hmac_len); in md2_hmac_sign() 329 *out_data_len = hmac_len; in md2_hmac_sign() 346 CK_ULONG hmac_len, len; in md2_hmac_verify() local 356 hmac_len = MD2_HASH_SIZE; in md2_hmac_verify() 372 if ((len != hmac_len) || (len != sig_len)) { in md2_hmac_verify() [all …]
|
H A D | mech_md5.c | 153 CK_ULONG key_bytes, hash_len, hmac_len; in md5_hmac_sign() local 164 hmac_len = *(CK_ULONG *) ctx->mech.pParameter; in md5_hmac_sign() 166 if (hmac_len == 0) { in md5_hmac_sign() 171 hmac_len = MD5_HASH_SIZE; in md5_hmac_sign() 176 *out_data_len = hmac_len; in md5_hmac_sign() 302 memcpy(out_data, hash, hmac_len); in md5_hmac_sign() 303 *out_data_len = hmac_len; in md5_hmac_sign() 320 CK_ULONG hmac_len, len; in md5_hmac_verify() local 330 hmac_len = MD5_HASH_SIZE; in md5_hmac_verify() 348 if ((len != hmac_len) || (len != sig_len)) { in md5_hmac_verify() [all …]
|
/dports/net/kea/kea-2.0.1/src/lib/cryptolink/tests/ |
H A D | hmac_unittests.cc | 74 size_t hmac_len) { in doHMACTestConv() argument 108 size_t hmac_len) { in doHMACTestDirect() argument 120 hmac_sign->sign(hmac_sig, hmac_len); in doHMACTestDirect() 154 size_t hmac_len) { in doHMACTestVector() argument 162 ASSERT_EQ(hmac_len, sig.size()); in doHMACTestVector() 183 size_t hmac_len) { in doHMACTestArray() argument 194 uint8_t* sig = new uint8_t[hmac_len]; in doHMACTestArray() 196 hmac_sign->sign(sig, hmac_len); in doHMACTestArray() 197 checkData(sig, expected_hmac, hmac_len); in doHMACTestArray() 227 size_t hmac_len) { in doHMACTest() argument [all …]
|
/dports/net/kamailio/kamailio-5.4.5/src/modules/auth_ephemeral/ |
H A D | authorize.c | 46 unsigned int hmac_len = SHA_DIGEST_LENGTH; in get_pass() local 51 hmac_len = SHA_DIGEST_LENGTH; in get_pass() 54 _username->len, hmac_sha1, &hmac_len) == NULL) in get_pass() 61 hmac_len = SHA256_DIGEST_LENGTH; in get_pass() 64 _username->len, hmac_sha1, &hmac_len) == NULL) in get_pass() 71 hmac_len = SHA384_DIGEST_LENGTH; in get_pass() 74 _username->len, hmac_sha1, &hmac_len) == NULL) in get_pass() 81 hmac_len = SHA512_DIGEST_LENGTH; in get_pass() 96 LM_DBG("HMAC-Len (%i)\n", hmac_len); in get_pass() 99 _password->len = base64_enc(hmac_sha1, hmac_len, in get_pass() [all …]
|
/dports/net/turnserver/coturn-4.5.2/src/apps/uclient/ |
H A D | mainuclient.c | 393 unsigned int hmac_len; 397 hmac_len = SHA256SIZEBYTES; 400 hmac_len = SHA384SIZEBYTES; 403 hmac_len = SHA512SIZEBYTES; 406 hmac_len = SHA1SIZEBYTES; 411 …en((char*)g_uname), (uint8_t*)g_auth_secret, strlen(g_auth_secret), hmac, &hmac_len, shatype)>=0) { 413 char *pwd = base64_encode(hmac,hmac_len,&pwd_length);
|
/dports/sysutils/bareos-server/bareos-Release-20.0.3/core/src/droplet/libdroplet/src/backend/s3/auth/ |
H A D | v2.c | 160 u_int hmac_len; in dpl_s3_add_authorization_v2_to_headers() local 184 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_add_authorization_v2_to_headers() 187 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_add_authorization_v2_to_headers() 218 u_int hmac_len; in dpl_s3_get_authorization_v2_params() local 231 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_get_authorization_v2_params() 234 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_get_authorization_v2_params()
|
/dports/sysutils/bareos-client/bareos-Release-20.0.3/core/src/droplet/libdroplet/src/backend/s3/auth/ |
H A D | v2.c | 160 u_int hmac_len; in dpl_s3_add_authorization_v2_to_headers() local 184 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_add_authorization_v2_to_headers() 187 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_add_authorization_v2_to_headers() 218 u_int hmac_len; in dpl_s3_get_authorization_v2_params() local 231 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_get_authorization_v2_params() 234 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_get_authorization_v2_params()
|
/dports/sysutils/bareos-traymonitor/bareos-Release-20.0.3/core/src/droplet/libdroplet/src/backend/s3/auth/ |
H A D | v2.c | 160 u_int hmac_len; in dpl_s3_add_authorization_v2_to_headers() local 184 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_add_authorization_v2_to_headers() 187 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_add_authorization_v2_to_headers() 218 u_int hmac_len; in dpl_s3_get_authorization_v2_params() local 231 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_get_authorization_v2_params() 234 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_get_authorization_v2_params()
|
/dports/www/bareos-webui/bareos-Release-20.0.3/core/src/droplet/libdroplet/src/backend/s3/auth/ |
H A D | v2.c | 160 u_int hmac_len; in dpl_s3_add_authorization_v2_to_headers() local 184 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_add_authorization_v2_to_headers() 187 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_add_authorization_v2_to_headers() 218 u_int hmac_len; in dpl_s3_get_authorization_v2_params() local 231 hmac_len = dpl_hmac_sha1(req->ctx->secret_key, strlen(req->ctx->secret_key), in dpl_s3_get_authorization_v2_params() 234 base64_len = dpl_base64_encode((const u_char*)hmac_str, hmac_len, in dpl_s3_get_authorization_v2_params()
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/fs/ubifs/ |
H A D | auth.c | 392 int hmac_len = c->hmac_desc_len; in ubifs_node_calc_hmac() local 396 ubifs_assert(c, ofs_hmac + hmac_len < len); in ubifs_node_calc_hmac() 410 if (len - ofs_hmac - hmac_len > 0) { in ubifs_node_calc_hmac() 411 err = crypto_shash_update(shash, node + ofs_hmac + hmac_len, in ubifs_node_calc_hmac() 412 len - ofs_hmac - hmac_len); in ubifs_node_calc_hmac() 451 int hmac_len = c->hmac_desc_len; in __ubifs_node_verify_hmac() local 455 hmac = kmalloc(hmac_len, GFP_NOFS); in __ubifs_node_verify_hmac() 465 err = crypto_memneq(hmac, node + ofs_hmac, hmac_len); in __ubifs_node_verify_hmac()
|
/dports/multimedia/libv4l/linux-5.13-rc2/fs/ubifs/ |
H A D | auth.c | 392 int hmac_len = c->hmac_desc_len; in ubifs_node_calc_hmac() local 396 ubifs_assert(c, ofs_hmac + hmac_len < len); in ubifs_node_calc_hmac() 410 if (len - ofs_hmac - hmac_len > 0) { in ubifs_node_calc_hmac() 411 err = crypto_shash_update(shash, node + ofs_hmac + hmac_len, in ubifs_node_calc_hmac() 412 len - ofs_hmac - hmac_len); in ubifs_node_calc_hmac() 451 int hmac_len = c->hmac_desc_len; in __ubifs_node_verify_hmac() local 455 hmac = kmalloc(hmac_len, GFP_NOFS); in __ubifs_node_verify_hmac() 465 err = crypto_memneq(hmac, node + ofs_hmac, hmac_len); in __ubifs_node_verify_hmac()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/fs/ubifs/ |
H A D | auth.c | 392 int hmac_len = c->hmac_desc_len; in ubifs_node_calc_hmac() local 396 ubifs_assert(c, ofs_hmac + hmac_len < len); in ubifs_node_calc_hmac() 410 if (len - ofs_hmac - hmac_len > 0) { in ubifs_node_calc_hmac() 411 err = crypto_shash_update(shash, node + ofs_hmac + hmac_len, in ubifs_node_calc_hmac() 412 len - ofs_hmac - hmac_len); in ubifs_node_calc_hmac() 451 int hmac_len = c->hmac_desc_len; in __ubifs_node_verify_hmac() local 455 hmac = kmalloc(hmac_len, GFP_NOFS); in __ubifs_node_verify_hmac() 465 err = crypto_memneq(hmac, node + ofs_hmac, hmac_len); in __ubifs_node_verify_hmac()
|
/dports/security/openconnect/openconnect-8.10/ |
H A D | openssl-esp.c | 157 unsigned int hmac_len = sizeof(hmac_buf); in decrypt_esp_packet() local 162 HMAC_Final(esp->hmac, hmac_buf, &hmac_len); in decrypt_esp_packet() 195 unsigned int hmac_len = vpninfo->hmac_out_len; in encrypt_esp_packet() local 207 HMAC_Final(vpninfo->esp_out.hmac, pkt->data + crypt_len, &hmac_len); in encrypt_esp_packet() 210 pkt->data + crypt_len + hmac_len - blksize, blksize); in encrypt_esp_packet()
|
/dports/security/libressl/libressl-3.4.3/ssl/ |
H A D | t1_enc.c | 166 size_t A1_len, hmac_len; in tls1_P_hash() local 211 if (!EVP_DigestSignFinal(&ctx, hmac, &hmac_len)) in tls1_P_hash() 214 if (hmac_len > out_len) in tls1_P_hash() 215 hmac_len = out_len; in tls1_P_hash() 217 for (i = 0; i < hmac_len; i++) in tls1_P_hash() 220 out += hmac_len; in tls1_P_hash() 221 out_len -= hmac_len; in tls1_P_hash()
|
/dports/www/obhttpd/libressl-3.4.1/ssl/ |
H A D | t1_enc.c | 166 size_t A1_len, hmac_len; in tls1_P_hash() local 211 if (!EVP_DigestSignFinal(&ctx, hmac, &hmac_len)) in tls1_P_hash() 214 if (hmac_len > out_len) in tls1_P_hash() 215 hmac_len = out_len; in tls1_P_hash() 217 for (i = 0; i < hmac_len; i++) in tls1_P_hash() 220 out += hmac_len; in tls1_P_hash() 221 out_len -= hmac_len; in tls1_P_hash()
|
/dports/finance/vanitygen/vanitygen-cd1a728/ |
H A D | util.c | 503 int hmac_len = 0, hmac_keylen = 0; in vg_protect_crypt() local 545 hmac_len = 8; in vg_protect_crypt() 559 if (!enc && (data_in_len != (1 + ciphertext_len + hmac_len + salt_len))) in vg_protect_crypt() 569 salt = data_in + 1 + ciphertext_len + hmac_len; in vg_protect_crypt() 571 salt = data_out + 1 + ciphertext_len + hmac_len; in vg_protect_crypt() 603 olen = 1 + ciphertext_len + hmac_len + salt_len - opos; in vg_protect_crypt() 619 if (hmac_len) { in vg_protect_crypt() 627 memcpy(data_out + 1 + ciphertext_len, hmac, hmac_len); in vg_protect_crypt() 630 hmac_len)) in vg_protect_crypt() 639 opos += hmac_len + salt_len; in vg_protect_crypt()
|
/dports/security/libressl-static/libressl-3.3.5/ssl/ |
H A D | t1_enc.c | 170 size_t A1_len, hmac_len; in tls1_P_hash() local 215 if (!EVP_DigestSignFinal(&ctx, hmac, &hmac_len)) in tls1_P_hash() 218 if (hmac_len > out_len) in tls1_P_hash() 219 hmac_len = out_len; in tls1_P_hash() 221 for (i = 0; i < hmac_len; i++) in tls1_P_hash() 224 out += hmac_len; in tls1_P_hash() 225 out_len -= hmac_len; in tls1_P_hash()
|
/dports/security/hashcat/hashcat-6.2.5/src/modules/ |
H A D | module_28100.c | 56 int hmac_len; member 190 const int hmac_len = token.len[6]; in module_hash_decode() local 224 winhello->hmac_len = hex_decode (hmac_pos, hmac_len, (u8 *) winhello->hmac_buf); in module_hash_decode() 226 for (int i = 0, j = 0; i < winhello->hmac_len; i += 4, j += 1) in module_hash_decode() 350 for (int i = 0, j = 0; i < winhello->hmac_len; i += 4, j += 1) in module_hash_encode() 355 out_len += hex_encode ((u8 *) tmp32, winhello->hmac_len, out_buf + out_len); in module_hash_encode()
|
/dports/devel/glib20/glib-2.70.4/glib/tests/ |
H A D | hmac.c | 399 gsize digest_len, hmac_len; in test_hmac() local 402 hmac_len = digest_len = g_checksum_type_get_length (t->digest_type); in test_hmac() 403 digest = g_malloc (hmac_len); in test_hmac() 409 g_assert_cmpmem (digest, hmac_len, t->result, digest_len); in test_hmac()
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/security/keys/trusted-keys/ |
H A D | trusted_tpm2.c | 202 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument 204 tpm_buf_append_u32(buf, 9 + nonce_len + hmac_len); in tpm2_buf_append_auth() 212 tpm_buf_append_u16(buf, hmac_len); in tpm2_buf_append_auth() 214 if (hmac && hmac_len) in tpm2_buf_append_auth() 215 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
|
/dports/multimedia/libv4l/linux-5.13-rc2/security/keys/trusted-keys/ |
H A D | trusted_tpm2.c | 202 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument 204 tpm_buf_append_u32(buf, 9 + nonce_len + hmac_len); in tpm2_buf_append_auth() 212 tpm_buf_append_u16(buf, hmac_len); in tpm2_buf_append_auth() 214 if (hmac && hmac_len) in tpm2_buf_append_auth() 215 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/security/keys/trusted-keys/ |
H A D | trusted_tpm2.c | 202 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument 204 tpm_buf_append_u32(buf, 9 + nonce_len + hmac_len); in tpm2_buf_append_auth() 212 tpm_buf_append_u16(buf, hmac_len); in tpm2_buf_append_auth() 214 if (hmac && hmac_len) in tpm2_buf_append_auth() 215 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
|
/dports/security/openssl-legacy-static/openssl-1.0.2u/engines/ccgost/ |
H A D | gost89.h | 72 int gost_mac(gost_ctx * ctx, int hmac_len, const unsigned char *data, 78 int gost_mac_iv(gost_ctx * ctx, int hmac_len, const unsigned char *iv,
|
/dports/security/openssl-unsafe/openssl-c9ba19c/engines/ccgost/ |
H A D | gost89.h | 72 int gost_mac(gost_ctx * ctx, int hmac_len, const unsigned char *data, 78 int gost_mac_iv(gost_ctx * ctx, int hmac_len, const unsigned char *iv,
|