/external/curl/tests/python_dependencies/impacket/ |
D | ntlm.py | 766 …messageSignature['Checksum'] = struct.unpack('<q',handle(hmac_md5(signingKey, struct.pack('<i',seq… 771 …messageSignature['Checksum'] = struct.unpack('<q',hmac_md5(signingKey, struct.pack('<i',seqNum)+me… 852 keyExchangeKey = hmac_md5(sessionBaseKey, serverChallenge + lmChallengeResponse[:8]) 867 def hmac_md5(key, data): function 884 return hmac_md5(theHash, user.upper().encode('utf-16le') + domain.encode('utf-16le')) 916 ntProofStr = hmac_md5(responseKeyNT, serverChallenge + temp) 919 … lmChallengeResponse = hmac_md5(responseKeyNT, serverChallenge + clientChallenge) + clientChallenge 920 sessionBaseKey = hmac_md5(responseKeyNT, ntProofStr)
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.in | 109 authentication_algorithm hmac_md5; 118 authentication_algorithm hmac_sha1, hmac_md5;
|
D | racoon.conf.sample-inherit | 53 authentication_algorithm hmac_sha1, hmac_md5;
|
D | racoon.conf.sample-plainrsa | 44 authentication_algorithm hmac_sha1, hmac_md5;
|
D | racoon.conf.sample-gssapi | 41 authentication_algorithm hmac_sha1, hmac_md5;
|
D | racoon.conf.sample | 59 authentication_algorithm hmac_sha1, hmac_md5 ;
|
/external/wpa_supplicant_8/src/crypto/ |
D | md5.h | 16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
D | md5.c | 105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() function
|
D | sha1-tlsprf.c | 80 hmac_md5(S1, L_S1, A_MD5, MD5_MAC_LEN, A_MD5); in tls_prf_sha1_md5()
|
D | crypto_nettle.c | 126 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() function
|
D | crypto_gnutls.c | 136 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() function
|
D | crypto_linux.c | 179 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() function
|
D | crypto_wolfssl.c | 193 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() function
|
D | crypto_openssl.c | 1109 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() function
|
/external/curl/lib/ |
D | curl_ntlm_core.c | 624 static CURLcode hmac_md5(const unsigned char *key, unsigned int keylen, in hmac_md5() function 671 result = hmac_md5(ntlmhash, 16, identity, curlx_uztoui(identity_len), in Curl_ntlm_core_mk_ntlmv2_hash() 758 result = hmac_md5(ntlmv2hash, NTLM_HMAC_MD5_LEN, ptr + 8, in Curl_ntlm_core_mk_ntlmv2_resp() 801 result = hmac_md5(ntlmv2hash, 16, &data[0], 16, hmac_output); in Curl_ntlm_core_mk_lmv2_resp()
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.c | 384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 597 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_verify_das_req() 831 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_verify_msg_auth()
|
/external/boringssl/src/crypto/obj/ |
D | obj_mac.num | 771 hmac_md5 780
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 72 if (hmac_md5(key, key_len, data, data_len, tmphash) < 0) in ikev2_integ_hash()
|
/external/wpa_supplicant_8/src/eapol_supp/ |
D | eapol_supp_sm.c | 762 hmac_md5(keydata.sign_key, sign_key_len, in eapol_sm_processKey()
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 207 return hmac_md5(key, key_len, buf, len, mic); in wpa_eapol_key_mic()
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_1x.c | 202 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one()
|
/external/curl/ |
D | CHANGES | 1355 curl_ntlm_core: make hmac_md5 static
|