/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/ |
H A D | evpciph_aes_stitched.txt | 1 Title = AES-128-CBC-HMAC-SHA1 test vectors 3 Cipher = AES-128-CBC-HMAC-SHA1 13 Cipher = AES-128-CBC-HMAC-SHA1 23 Cipher = AES-128-CBC-HMAC-SHA1 33 Title = AES-256-CBC-HMAC-SHA1 test vectors 35 Cipher = AES-256-CBC-HMAC-SHA1 45 Cipher = AES-256-CBC-HMAC-SHA1 55 Cipher = AES-256-CBC-HMAC-SHA1 64 Title = AES-128-CBC-HMAC-SHA256 test vectors 66 Cipher = AES-128-CBC-HMAC-SHA256 [all …]
|
H A D | evpkdf_ss.txt | 433 Ctrl.mac = mac:HMAC 441 Ctrl.mac = mac:HMAC 449 Ctrl.mac = mac:HMAC 457 Ctrl.mac = mac:HMAC 465 Ctrl.mac = mac:HMAC 473 Ctrl.mac = mac:HMAC 481 Ctrl.mac = mac:HMAC 489 Ctrl.mac = mac:HMAC 497 Ctrl.mac = mac:HMAC 505 Ctrl.mac = mac:HMAC [all …]
|
H A D | evpmac_common.txt | 15 Title = HMAC tests (from RFC2104 and others) 18 MAC = HMAC 27 MAC = HMAC 35 MAC = HMAC 44 # HMAC tests from NIST test data 46 MAC = HMAC 54 MAC = HMAC 61 MAC = HMAC 70 MAC = HMAC 78 MAC = HMAC [all …]
|
H A D | evpmac_sm3.txt | 14 Title = HMAC-SM3 from GM/T 0042-2015 Appendix D.3 16 MAC = HMAC 22 MAC = HMAC 28 MAC = HMAC 34 MAC = HMAC
|
H A D | evpciph_rc4_stitched.txt | 1 Title = RC4-HMAC-MD5 test vectors 4 Cipher = RC4-HMAC-MD5 15 Cipher = RC4-HMAC-MD5
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/30-test_evp_data/ |
H A D | evpmac.txt | 162 Title = HMAC tests (from RFC2104 and others) 164 MAC = HMAC 170 MAC = HMAC 176 MAC = HMAC 184 # HMAC tests from NIST test data 186 MAC = HMAC 192 MAC = HMAC 198 MAC = HMAC 206 MAC = HMAC 212 MAC = HMAC [all …]
|
/netbsd-src/external/gpl3/gcc/dist/libphobos/src/std/digest/ |
H A D | hmac.d | 49 template HMAC(H) 52 alias HMAC = HMAC!(H, H.blockSize); variable 60 struct HMAC(H, size_t hashBlockSize) 99 auto hmac = HMAC!SHA1("My s3cR3T keY".representation); 119 ref HMAC!(H, blockSize) start() return 137 auto hmac = HMAC!SHA1("My s3cR3T keY".representation); 156 ref HMAC!(H, blockSize) put(in ubyte[] data...) return 168 auto hmac = HMAC!SHA1("My s3cR3T keY".representation); 204 auto hmac = HMAC!SHA1("My s3cR3T keY".representation); 236 return HMAC!(H, blockSize)(secret); [all …]
|
/netbsd-src/external/gpl3/gcc.old/dist/libphobos/src/std/digest/ |
H A D | hmac.d | 49 template HMAC(H) 52 alias HMAC = HMAC!(H, H.blockSize); variable 60 struct HMAC(H, size_t hashBlockSize) 97 auto hmac = HMAC!SHA1("My s3cR3T keY".representation); 117 ref HMAC!(H, blockSize) start() return 135 auto hmac = HMAC!SHA1("My s3cR3T keY".representation); 154 ref HMAC!(H, blockSize) put(in ubyte[] data...) return 166 auto hmac = HMAC!SHA1("My s3cR3T keY".representation); 202 auto hmac = HMAC!SHA1("My s3cR3T keY".representation); 234 return HMAC!(H, blockSize)(secret); [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/ |
H A D | EVP_RAND-HMAC-DRBG.pod | 5 EVP_RAND-HMAC-DRBG - The HMAC DRBG EVP_RAND implementation 9 Support for the HMAC deterministic random bit generator through the 14 "HMAC-DRBG" is the name for this implementation; it can be used with the 59 A context for HMAC DRBG can be obtained by calling: 61 EVP_RAND *rand = EVP_RAND_fetch(NULL, "HMAC-DRBG", NULL); 72 rand = EVP_RAND_fetch(NULL, "HMAC-DRBG", NULL);
|
H A D | EVP_SIGNATURE-HMAC.pod | 5 EVP_SIGNATURE-HMAC, EVP_SIGNATURE-Siphash, EVP_SIGNATURE-Poly1305, 19 L<EVP_MAC-HMAC(7)>, L<EVP_MAC-Siphash(7)>, L<EVP_MAC-Poly1305(7)> and 22 See L<EVP_PKEY-HMAC(7)>, L<EVP_PKEY-Siphash(7)>, L<EVP_PKEY-Poly1305(7)> or 30 L<EVP_PKEY-HMAC(7)>, 34 L<EVP_MAC-HMAC(7)>,
|
H A D | EVP_MAC-HMAC.pod | 5 EVP_MAC-HMAC - The HMAC EVP_MAC implementation 9 Support for computing HMAC MACs through the B<EVP_MAC> API. 21 =item "HMAC", "provider=default" or "provider=fips" 89 L<EVP_MAC(3)/PARAMETERS>, L<OSSL_PARAM(3)>, L<HMAC(3)>
|
H A D | EVP_PKEY-HMAC.pod | 5 EVP_PKEY-HMAC, EVP_KEYMGMT-HMAC, EVP_PKEY-Siphash, EVP_KEYMGMT-Siphash, 11 The B<HMAC> and B<CMAC> key types are implemented in OpenSSL's default and FIPS 19 L<EVP_SIGNATURE-HMAC(7)>, L<EVP_SIGNATURE-Siphash(7)>,
|
H A D | EVP_CIPHER-AES.pod | 43 =item "AES-128-CBC-HMAC-SHA1", "AES-256-CBC-HMAC-SHA1", 44 "AES-128-CBC-HMAC-SHA256" and "AES-256-CBC-HMAC-SHA256"
|
H A D | OSSL_PROVIDER-FIPS.pod | 77 =item HMAC, see L<EVP_MAC-HMAC(7)> 133 =item HMAC, see L<EVP_SIGNATURE-HMAC(7)> 183 =item HMAC-DRBG, see L<EVP_RAND-HMAC-DRBG(7)> 212 Uses HMAC SHA256 on the module file to validate that the module has not been 218 Uses HMAC SHA256 on a fixed string to validate that the installation process 280 =item "HMAC" (B<OSSL_SELF_TEST_DESC_INTEGRITY_HMAC>) 354 =item "HMAC" (B<OSSL_SELF_TEST_DESC_DRBG_HMAC>)
|
H A D | OSSL_PROVIDER-default.pod | 112 =item HMAC, see L<EVP_MAC-HMAC(7)> 175 =item HMAC, see L<EVP_SIGNATURE-HMAC(7)> 231 =item HMAC-DRBG, see L<EVP_RAND-HMAC-DRBG(7)>
|
H A D | EVP_KDF-KB.pod | 32 The value is either CMAC or HMAC. 63 Depending on whether mac is CMAC or HMAC, either digest or cipher is required 88 This example derives 10 bytes using COUNTER-HMAC-SHA256, with KI "secret", 103 "HMAC", 0);
|
H A D | EVP_KDF-SS.pod | 28 Both the HMAC and KMAC implementations set the key using the 'salt' value. 29 The hash and HMAC also require the digest to be set. 103 This example derives 10 bytes using H(x) = HMAC(SHA-256), with the secret key "secret",
|
/netbsd-src/external/mpl/bind/dist/bin/rndc/ |
H A D | rndc.conf.rst | 72 authentication algorithm for :iscman:`rndc` to use; currently only HMAC-MD5 73 (for compatibility), HMAC-SHA1, HMAC-SHA224, HMAC-SHA256 (default), 74 HMAC-SHA384, and HMAC-SHA512 are supported. This is followed by a secret 127 key statement indicates that "samplekey" uses the HMAC-SHA256 algorithm 128 and its secret clause contains the base-64 encoding of the HMAC-SHA256
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | HMAC.pod | 5 HMAC, 17 - HMAC message authentication code 23 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, 52 HMAC is a MAC (message authentication code), i.e. a keyed hash 56 HMAC() computes the message authentication code of the B<n> bytes at 66 B<evp_md> is a message digest such as EVP_sha1(), EVP_ripemd160() etc. HMAC does 116 HMAC() returns a pointer to the message authentication code or NULL if
|
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | hmac.h | 50 #define HMAC hc_HMAC macro 81 void * HMAC(const EVP_MD *evp_md, const void *key, size_t key_len,
|
H A D | pkcs5.c | 110 HMAC(md, password, password_len, data, datalen, in PKCS5_PBKDF2_HMAC() 115 HMAC(md, password, password_len, tmpcksum, checksumsize, in PKCS5_PBKDF2_HMAC()
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | PKCS12_gen_mac.pod | 23 PKCS12_gen_mac() generates an HMAC over the entire PKCS#12 object using the 27 PKCS12_verify_mac() verifies the PKCS#12 object's HMAC using the supplied 35 I<pass> is the passphrase to use in the HMAC. I<salt> is the salt value to use,
|
/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | tsp_auth.c | 99 (BYTE *)&auth->HMAC); in secret_PerformAuth_OIAP() 267 (BYTE *)&auth->HMAC))) 332 (BYTE *)&auth->HMAC))) 359 memcpy(digest, &auth->HMAC, 20); in validateReturnAuth() 362 return ((TSS_BOOL) (memcmp(digest, &auth->HMAC, 20) != 0)); in validateReturnAuth() 377 Trspi_HMAC(TSS_HASH_SHA1, 20, secret, offset, Blob, (BYTE *)&auth->HMAC); in HMAC_Auth() 475 (BYTE *)&auth->HMAC); in obj_policy_validate_auth_oiap() 578 (BYTE *)&auth->HMAC); 1059 digest->digest, sess->auth.HMAC.authdata))) in authsess_xsap_hmac() 1091 digest->digest, sess->auth.HMAC.authdata); in authsess_xsap_verify()
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man1/ |
H A D | openssl-mac.pod.in | 57 Used by HMAC as an alphanumeric string (use if the key contains printable 126 To create a hex-encoded HMAC-SHA1 MAC of a file and write to stdout: 130 -in msg.bin HMAC 166 L<EVP_MAC-HMAC(7)>,
|
/netbsd-src/crypto/external/bsd/openssl/lib/libcrypto/ |
H A D | man.inc | 210 EVP_MAC-HMAC.7 \ 237 EVP_PKEY-HMAC.7 \ 286 EVP_RAND-HMAC-DRBG.7 \ 294 EVP_SIGNATURE-HMAC.7 \
|