/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | sha1.h | 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
D | sha1.c | 104 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() function
|
D | sha1-pbkdf2.c | 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
|
D | random.c | 113 hmac_sha1(stub_key, sizeof(stub_key), (const u8 *) pool, in random_extract() 119 hmac_sha1(stub_key, sizeof(stub_key), (const u8 *) buf, in random_extract()
|
D | sha1-tlsprf.c | 86 hmac_sha1(S2, L_S2, A_SHA1, SHA1_MAC_LEN, A_SHA1); in tls_prf_sha1_md5()
|
D | crypto_nettle.c | 151 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() function
|
D | crypto_gnutls.c | 151 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() function
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | sha1.h | 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
D | sha1.c | 104 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() function
|
D | sha1-pbkdf2.c | 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
|
D | random.c | 113 hmac_sha1(dummy_key, sizeof(dummy_key), (const u8 *) pool, in random_extract() 119 hmac_sha1(dummy_key, sizeof(dummy_key), (const u8 *) buf, in random_extract()
|
D | sha1-tlsprf.c | 86 hmac_sha1(S2, L_S2, A_SHA1, SHA1_MAC_LEN, A_SHA1); in tls_prf_sha1_md5()
|
D | crypto_nettle.c | 151 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() function
|
D | crypto_gnutls.c | 151 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() function
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_teap_common.c | 320 res = hmac_sha1(cmk, cmk_len, buffer, buffer_len, tmp); in eap_teap_tls_mac()
|
D | ikev2_common.c | 65 if (hmac_sha1(key, key_len, data, data_len, tmphash) < 0) in ikev2_integ_hash()
|
D | eap_eke_common.c | 576 return hmac_sha1(key, SHA1_MAC_LEN, data, data_len, res); in eap_eke_mac()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_teap_common.c | 329 res = hmac_sha1(cmk, cmk_len, buffer, buffer_len, tmp); in eap_teap_tls_mac()
|
D | ikev2_common.c | 65 if (hmac_sha1(key, key_len, data, data_len, tmphash) < 0) in ikev2_integ_hash()
|
D | eap_eke_common.c | 576 return hmac_sha1(key, SHA1_MAC_LEN, data, data_len, res); in eap_eke_mac()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_fast.c | 665 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN, in eap_fast_build_crypto_binding() 1221 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN, (u8 *) b, bind_len, in eap_fast_validate_crypto_binding()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_fast.c | 667 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN, in eap_fast_build_crypto_binding() 1235 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN, (u8 *) b, bind_len, in eap_fast_validate_crypto_binding()
|
/third_party/openssl/crypto/objects/ |
D | obj_mac.num | 781 hmac_sha1 781
|
/third_party/node/deps/openssl/openssl/crypto/objects/ |
D | obj_mac.num | 781 hmac_sha1 781
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
D | sign.rs | 771 fn hmac_sha1() { in hmac_sha1() function
|