/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
racoon.conf | 31 authentication_algorithm hmac_sha1;
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
racoon.conf | 39 authentication_algorithm hmac_sha1;
|
/external/wpa_supplicant_8/src/crypto/ |
sha1.h | 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
sha1-pbkdf2.c | 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
|
sha1.c | 50 /* the HMAC_SHA1 transform looks like: 92 * hmac_sha1 - HMAC-SHA1 over data buffer (RFC 2104) 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, function
|
sha1-tlsprf.c | 89 hmac_sha1(S2, L_S2, A_SHA1, SHA1_MAC_LEN, A_SHA1);
|
random.c | 107 hmac_sha1(dummy_key, sizeof(dummy_key), (const u8 *) pool, 113 hmac_sha1(dummy_key, sizeof(dummy_key), (const u8 *) buf,
|
crypto_openssl.c | 733 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, function
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.c | 606 return hmac_sha1(key, SHA1_MAC_LEN, data, data_len, res);
|
ikev2_common.c | 65 hmac_sha1(key, key_len, data, data_len, tmphash);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 660 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN, 1211 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN, (u8 *) b, bind_len, [all...] |
eap_server_peap.c | 627 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 618 hmac_sha1(cmk, EAP_FAST_CMK_LEN, (u8 *) rbind, sizeof(*rbind), 758 hmac_sha1(cmk, EAP_FAST_CMK_LEN, (u8 *) _bind, bind_len, [all...] |
eap_peap.c | 427 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac); [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 51 if (hmac_sha1(key, 16, buf, len, hash)) [all...] |
/external/ipsec-tools/src/racoon/ |
cftoken.l | 450 hmac_sha1 { YYD; yylval.num = algtype_hmac_sha1; return(ALGORITHMTYPE); }
|