/external/srtp/crypto/ae_xfm/ |
D | xfm.c | 52 status = hmac_init(&hmac_ctx, key, KEY_LEN); in aes_128_cbc_hmac_sha1_96_func() 57 status = hmac_init(&hmac_ctx, key, KEY_LEN); in aes_128_cbc_hmac_sha1_96_func() 79 status = hmac_init(&hmac_ctx, mac_key, MAC_KEY_LEN); in aes_128_cbc_hmac_sha1_96_func() 129 status = hmac_init(&hmac_ctx, key, KEY_LEN); in aes_128_cbc_hmac_sha1_96_inv() 134 status = hmac_init(&hmac_ctx, key, KEY_LEN); in aes_128_cbc_hmac_sha1_96_inv() 155 status = hmac_init(&hmac_ctx, mac_key, MAC_KEY_LEN); in aes_128_cbc_hmac_sha1_96_inv() 217 status = hmac_init(&hmac_ctx, key, KEY_LEN); in aes_128_cbc_hmac_sha1_96_enc() 222 status = hmac_init(&hmac_ctx, key, KEY_LEN); in aes_128_cbc_hmac_sha1_96_enc() 262 status = hmac_init(&hmac_ctx, mac_key, MAC_KEY_LEN); in aes_128_cbc_hmac_sha1_96_enc() 330 status = hmac_init(&hmac_ctx, key, KEY_LEN); in aes_128_cbc_hmac_sha1_96_dec() [all …]
|
/external/srtp/crypto/hash/ |
D | hmac.c | 112 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len) { in hmac_init() function 258 (auth_init_func) hmac_init,
|
/external/srtp/crypto/include/ |
D | hmac.h | 65 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len);
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
D | hmac_memory.c | 61 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) { in hmac_memory()
|
D | hmac_memory_multi.c | 56 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) { in hmac_memory_multi()
|
D | hmac_file.c | 52 if ((err = hmac_init(&hmac, hash, key, keylen)) != CRYPT_OK) { in hmac_file()
|
D | hmac_init.c | 30 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen) in hmac_init() function
|
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
D | pkcs_5_2.c | 78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { in pkcs_5_alg2()
|
/external/dropbear/ |
D | packet.c | 329 if (hmac_init(&hmac, in checkmac() 533 if (hmac_init(&hmac, in writemac()
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | crypto_libtomcrypt.c | 181 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) != in crypto_hash_init() 186 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) != in crypto_hash_init()
|
/external/wpa_supplicant/ |
D | crypto_libtomcrypt.c | 181 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) != in crypto_hash_init() 186 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) != in crypto_hash_init()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_libtomcrypt.c | 180 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) != in crypto_hash_init() 185 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) != in crypto_hash_init()
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_mac.h | 9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen);
|
/external/dropbear/libtomcrypt/ |
D | Android.mk | 31 src/mac/hmac/hmac_done.c src/mac/hmac/hmac_file.c src/mac/hmac/hmac_init.c src/mac/hmac/hmac_memory…
|
D | Makefile.in | 122 src/mac/hmac/hmac_done.o src/mac/hmac/hmac_file.o src/mac/hmac/hmac_init.o src/mac/hmac/hmac_memory…
|
D | makefile.msvc | 29 src/mac/hmac/hmac_done.obj src/mac/hmac/hmac_file.obj src/mac/hmac/hmac_init.obj src/mac/hmac/hmac_…
|
D | makefile.icc | 119 src/mac/hmac/hmac_done.o src/mac/hmac/hmac_file.o src/mac/hmac/hmac_init.o src/mac/hmac/hmac_memory…
|
D | makefile.unix | 65 src/mac/hmac/hmac_done.o src/mac/hmac/hmac_file.o src/mac/hmac/hmac_init.o src/mac/hmac/hmac_memory…
|
D | makefile.shared | 124 src/mac/hmac/hmac_done.o src/mac/hmac/hmac_file.o src/mac/hmac/hmac_init.o src/mac/hmac/hmac_memory…
|
D | changes | 471 v0.98 -- Update to hmac_init to free all allocated memory on error 557 -- fixed bugs in hmac_done()/hmac_init()/[various others()] where I didn't trap errors
|
D | crypt.tex | 2087 int hmac_init( hmac_state *hmac, 2173 if ((err = hmac_init(&hmac, idx, key, 16)) != CRYPT_OK) {
|