/external/dhcpcd-6.8.2/crypt/ |
H A D | crypt.h | 31 void hmac_md5(const uint8_t *, size_t, const uint8_t *, size_t, uint8_t *);
|
H A D | hmac_md5.c | 46 /* hmac_md5 as per RFC3118 */ 48 hmac_md5(const uint8_t *text, size_t text_len, function
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.h | 16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
H A D | md5.c | 97 * hmac_md5 - HMAC-MD5 over data buffer (RFC 2104) 105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, function
|
H A D | sha1-tlsprf.c | 83 hmac_md5(S1, L_S1, A_MD5, MD5_MAC_LEN, A_MD5);
|
H A D | crypto_linux.c | 179 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, function
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.h | 16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
H A D | md5.c | 97 * hmac_md5 - HMAC-MD5 over data buffer (RFC 2104) 105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, function
|
H A D | sha1-tlsprf.c | 83 hmac_md5(S1, L_S1, A_MD5, MD5_MAC_LEN, A_MD5);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.h | 16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
H A D | md5.c | 97 * hmac_md5 - HMAC-MD5 over data buffer (RFC 2104) 105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, function
|
H A D | sha1-tlsprf.c | 83 hmac_md5(S1, L_S1, A_MD5, MD5_MAC_LEN, A_MD5);
|
/external/dhcpcd-6.8.2/test/ |
H A D | test_hmac_md5.c | 58 hmac_md5(text, 8, key, 16, hmac); 71 hmac_md5(text, 28, key, 4, hmac); 89 hmac_md5(text, 50, key, 16, hmac); 107 hmac_md5(text, 50, key, 25, hmac); 123 hmac_md5(text, 20, key, 16, hmac); 139 hmac_md5(text, 54, key, 80, hmac); 155 hmac_md5(text, 73, key, 80, hmac);
|
H A D | Makefile | 6 SRCS+= test_hmac_md5.c ../crypt/hmac_md5.c
|
/external/curl/tests/python_dependencies/impacket/ |
H A D | ntlm.py | 766 messageSignature['Checksum'] = struct.unpack('<q',handle(hmac_md5(signingKey, struct.pack('<i',seqNum)+message)[:8]))[0] 771 messageSignature['Checksum'] = struct.unpack('<q',hmac_md5(signingKey, struct.pack('<i',seqNum)+message)[:8])[0] 852 keyExchangeKey = hmac_md5(sessionBaseKey, serverChallenge + lmChallengeResponse[:8]) 867 def hmac_md5(key, data): function 884 return hmac_md5(theHash, user.upper().encode('utf-16le') + domain.encode('utf-16le')) 916 ntProofStr = hmac_md5(responseKeyNT, serverChallenge + temp) 919 lmChallengeResponse = hmac_md5(responseKeyNT, serverChallenge + clientChallenge) + clientChallenge 920 sessionBaseKey = hmac_md5(responseKeyNT, ntProofStr)
|
/external/dhcpcd-6.8.2/ |
H A D | Android.mk | 40 crypt/hmac_md5.c \
|
H A D | auth.c | 330 hmac_md5(mm, mlen, t->key, t->key_len, hmac); 656 hmac_md5(m, mlen, t->key, t->key_len, hmac);
|
H A D | Makefile | 22 CRYPT_SRCS= crypt/hmac_md5.c ${MD5_SRC} ${SHA256_SRC}
|
/external/syslinux/gpxe/src/crypto/axtls/ |
H A D | crypto.h | 118 void hmac_md5(const uint8_t *msg, int length, const uint8_t *key,
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 382 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 414 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 456 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 595 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 829 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.c | 382 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 414 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 456 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 595 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 829 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.c | 382 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 414 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 456 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 595 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 829 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 72 if (hmac_md5(key, key_len, data, data_len, tmphash) < 0)
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.c | 72 if (hmac_md5(key, key_len, data, data_len, tmphash) < 0)
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 72 if (hmac_md5(key, key_len, data, data_len, tmphash) < 0)
|