/external/openssl/crypto/evp/ |
e_rc4_hmac_md5.c | 229 unsigned char hmac_key[64]; local 231 memset (hmac_key,0,sizeof(hmac_key)); 233 if (arg > (int)sizeof(hmac_key)) { 236 MD5_Final(hmac_key,&key->head); 238 memcpy(hmac_key,ptr,arg); 241 for (i=0;i<sizeof(hmac_key);i++) 242 hmac_key[i] ^= 0x36; /* ipad */ 244 MD5_Update(&key->head,hmac_key,sizeof(hmac_key)); [all...] |
e_aes_cbc_hmac_sha1.c | 463 unsigned char hmac_key[64]; local 465 memset (hmac_key,0,sizeof(hmac_key)); 467 if (arg > (int)sizeof(hmac_key)) { 470 SHA1_Final(hmac_key,&key->head); 472 memcpy(hmac_key,ptr,arg); 475 for (i=0;i<sizeof(hmac_key);i++) 476 hmac_key[i] ^= 0x36; /* ipad */ 478 SHA1_Update(&key->head,hmac_key,sizeof(hmac_key)); [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
e_rc4.c | 109 uint8_t hmac_key[MD5_CBLOCK]; local 137 memset(hmac_key, 0, sizeof(hmac_key)); 138 memcpy(hmac_key, key, MD5_DIGEST_LENGTH); 139 for (i = 0; i < sizeof(hmac_key); i++) { 140 hmac_key[i] ^= 0x36; 143 MD5_Update(&rc4_ctx->head, hmac_key, sizeof(hmac_key)); 144 for (i = 0; i < sizeof(hmac_key); i++) { 145 hmac_key[i] ^= 0x36 ^ 0x5c [all...] |
/external/openssl/apps/ |
dgst.c | 128 char *hmac_key=NULL; local 220 hmac_key = "etaonrishdlcupfm"; 227 hmac_key=*++argv; 345 if ((!!mac_name + !!keyfile + !!hmac_key) > 1) 410 if (hmac_key) 413 (unsigned char *)hmac_key, -1);
|
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 947 uint8_t hmac_key[EVP_MAX_MD_SIZE]; local 979 EVP_MD_size(md), hmac_key, md)) { 983 if (NULL == HMAC(md, hmac_key, EVP_MD_size(md), CBS_data(&authsafes), [all...] |