/freebsd/crypto/libecc/src/hash/ |
H A D | hmac.c | 19 u8 ipad[MAX_BLOCK_SIZE]; in hmac_init() local 29 /* Set ipad and opad to appropriate values */ in hmac_init() 30 ret = local_memset(ipad, 0x36, sizeof(ipad)); EG(ret, err); in hmac_init() 66 /* Update our input context with K^ipad */ in hmac_init() 68 ipad[i] ^= local_hmac_key[i]; in hmac_init() 70 ret = h->hfunc_update(&(ctx->in_ctx), ipad, h->block_size); EG(ret, err); in hmac_init()
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | md5.c | 29 u8 k_pad[64]; /* padding - key XORd with ipad/opad */ in hmac_md5_vector() 53 * MD5(K XOR opad, MD5(K XOR ipad, text)) in hmac_md5_vector() 56 * ipad is the byte 0x36 repeated 64 times in hmac_md5_vector() 60 /* start out by storing key in ipad */ in hmac_md5_vector() 64 /* XOR key with ipad values */ in hmac_md5_vector()
|
H A D | sha1.c | 29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ in hmac_sha1_vector() 53 * SHA1(K XOR opad, SHA1(K XOR ipad, text)) in hmac_sha1_vector() 56 * ipad is the byte 0x36 repeated 64 times in hmac_sha1_vector() 60 /* start out by storing key in ipad */ in hmac_sha1_vector() 63 /* XOR key with ipad values */ in hmac_sha1_vector()
|
H A D | sha512.c | 29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */ in hmac_sha512_vector() 52 * SHA512(K XOR opad, SHA512(K XOR ipad, text)) in hmac_sha512_vector() 55 * ipad is the byte 0x36 repeated 128 times in hmac_sha512_vector() 59 /* start out by storing key in ipad */ in hmac_sha512_vector() 62 /* XOR key with ipad values */ in hmac_sha512_vector()
|
H A D | sha384.c | 29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */ in hmac_sha384_vector() 52 * SHA384(K XOR opad, SHA384(K XOR ipad, text)) in hmac_sha384_vector() 55 * ipad is the byte 0x36 repeated 128 times in hmac_sha384_vector() 59 /* start out by storing key in ipad */ in hmac_sha384_vector() 62 /* XOR key with ipad values */ in hmac_sha384_vector()
|
H A D | sha256.c | 29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ in hmac_sha256_vector() 53 * SHA256(K XOR opad, SHA256(K XOR ipad, text)) in hmac_sha256_vector() 56 * ipad is the byte 0x36 repeated 64 times in hmac_sha256_vector() 60 /* start out by storing key in ipad */ in hmac_sha256_vector() 63 /* XOR key with ipad values */ in hmac_sha256_vector()
|
/freebsd/share/man/man4/ |
H A D | ipheth.4 | 33 .Nd "USB Apple iPhone/iPad tethered Ethernet driver" 56 iPhone and iPad devices, often referred to as USB tethering. 59 should work with any Apple iPhone or iPad device. 74 Apple iPad tethering (all models)
|
/freebsd/contrib/tcpdump/ |
H A D | signature.c | 53 unsigned char k_ipad[65]; /* inner padding - key XORd with ipad */ in signature_compute_hmac_md5() 74 * MD5(K XOR opad, MD5(K XOR ipad, text)) in signature_compute_hmac_md5() 77 * ipad is the byte 0x36 repeated 64 times in signature_compute_hmac_md5() 88 /* XOR key with ipad and opad values */ in signature_compute_hmac_md5()
|
/freebsd/sys/contrib/openzfs/module/icp/io/ |
H A D | sha2_mod.c | 304 * SHA2 HMAC is: SHA2(key XOR opad, SHA2(key XOR ipad, text)) 309 * - for inner context: SHA2(key XOR ipad) 331 uint64_t ipad[SHA512_HMAC_BLOCK_SIZE / sizeof (uint64_t)] = {0}; in sha2_mac_init_ctx() local 340 (void) memset(ipad, 0, block_size); in sha2_mac_init_ctx() 344 (void) memcpy(ipad, keyval, length_in_bytes); in sha2_mac_init_ctx() 350 /* XOR key with ipad (0x36) and opad (0x5c) */ in sha2_mac_init_ctx() 352 ipad[i] ^= 0x3636363636363636; in sha2_mac_init_ctx() 356 /* perform SHA2 on ipad */ in sha2_mac_init_ctx() 358 SHA2Update(&ctx->hc_icontext, (uint8_t *)ipad, block_size); in sha2_mac_init_ctx()
|
/freebsd/contrib/dma/ |
H A D | crypto.c | 229 * key XORd with ipad in hmac_md5() 252 * MD5(K XOR opad, MD5(K XOR ipad, text)) in hmac_md5() 255 * ipad is the byte 0x36 repeated 64 times in hmac_md5() 267 /* XOR key with ipad and opad values */ in hmac_md5()
|
/freebsd/sys/crypto/ccp/ |
H A D | ccp.c | 151 /* Two more SGEs than sg_crp to accommodate ipad. */ in ccp_initialize_queues() 246 axf->Final(s->hmac.ipad, &auth_ctx); in ccp_init_hmac_digest() 250 memcpy(s->hmac.ipad, key, klen); in ccp_init_hmac_digest() 252 memset(s->hmac.ipad + klen, 0, axf->blocksize - klen); in ccp_init_hmac_digest() 253 memcpy(s->hmac.opad, s->hmac.ipad, axf->blocksize); in ccp_init_hmac_digest() 256 s->hmac.ipad[i] ^= HMAC_IPAD_VAL; in ccp_init_hmac_digest()
|
H A D | ccp.h | 68 char ipad[CCP_HASH_MAX_BLOCK_SIZE]; member
|
/freebsd/crypto/krb5/src/lib/crypto/builtin/ |
H A D | hmac.c | 43 * H(K XOR opad, H(K XOR ipad, text)) 47 * ipad is the byte 0x36 repeated blocksize times
|
/freebsd/sys/netinet/ |
H A D | sctp_auth.c | 918 uint8_t ipad[128], opad[128]; /* keyed hash inner/outer pads */ in sctp_hmac() local 944 memset(ipad, 0, blocklen); in sctp_hmac() 946 memcpy(ipad, key, keylen); in sctp_hmac() 949 /* XOR the key with ipad and opad values */ in sctp_hmac() 951 ipad[i] ^= 0x36; in sctp_hmac() 957 sctp_hmac_update(hmac_algo, &ctx, ipad, blocklen); in sctp_hmac() 978 uint8_t ipad[128], opad[128]; /* keyed hash inner/outer pads */ in sctp_hmac_m() local 1004 memset(ipad, 0, blocklen); in sctp_hmac_m() 1006 memcpy(ipad, key, keylen); in sctp_hmac_m() 1009 /* XOR the key with ipad and opad values */ in sctp_hmac_m() [all …]
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/ |
H A D | lac_sym_hash_sw_precomputes.c | 184 /* XOR Key with IPAD at 4-byte level */ in LacSymHash_HmacPreComputes() 186 Cpa8U *ipad = pHmacIpadQatData->data + i; in LacSymHash_HmacPreComputes() local 189 *ipad ^= LAC_HASH_IPAD_BYTE; in LacSymHash_HmacPreComputes()
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
H A D | lac_sym_hash.h | 51 * hash((key \oplus ipad) \parallel msg ))\f$. 53 * algorithm if necessary and xored with the ipad/opad. The following portion 54 * of the operation can be precomputed: \f$ hash(key \oplus ipad) \f$ as the 58 * The same applies to \f$ hash(key \oplus ipad) \f$. There is a saving in 440 * operations. The results of the ipad and opad state calculation 446 * This function performs the XORing of the IPAD and OPAD constants to
|
H A D | lac_sym_hash_defs.h | 234 * Ipad Byte */ 241 * Ipad for 4 Bytes */
|
/freebsd/crypto/krb5/src/lib/crypto/openssl/ |
H A D | hmac.c | 96 * H(K XOR opad, H(K XOR ipad, text)) 100 * ipad is the byte 0x36 repeated blocksize times
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 191 unsigned char *ipad, *opad; in _krb5_internal_hmac() local 196 ipad = malloc(cm->blocksize + len); in _krb5_internal_hmac() 197 if (ipad == NULL) in _krb5_internal_hmac() 201 free(ipad); in _krb5_internal_hmac() 204 memset(ipad, 0x36, cm->blocksize); in _krb5_internal_hmac() 221 ipad[i] ^= key[i]; in _krb5_internal_hmac() 224 memcpy(ipad + cm->blocksize, data, len); in _krb5_internal_hmac() 225 (*cm->checksum)(context, keyblock, ipad, cm->blocksize + len, in _krb5_internal_hmac() 231 memset(ipad, 0, cm->blocksize + len); in _krb5_internal_hmac() 232 free(ipad); in _krb5_internal_hmac()
|
/freebsd/sys/contrib/device-tree/Bindings/pinctrl/ |
H A D | apple,pinctrl.yaml | 15 iPhone and iPad devices and the "Apple Silicon" Macs.
|
/freebsd/sys/contrib/device-tree/Bindings/interrupt-controller/ |
H A D | apple,aic.yaml | 14 Apple ARM SoC platforms, including various iPhone and iPad devices and the
|
/freebsd/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 61 static const uint8_t ipad = 0x36; variable 114 key1[i] = extkey[i] ^ ipad; in snmp_pdu_calc_digest()
|
/freebsd/sys/contrib/device-tree/Bindings/pci/ |
H A D | apple,pcie.yaml | 15 various iPhone and iPad devices and the "Apple Silicon" Macs.
|
/freebsd/sys/geom/eli/ |
H A D | g_eli_hmac.c | 65 /* XOR key with ipad and opad values. */ in g_eli_crypto_hmac_init()
|
/freebsd/sys/dev/cxgbe/crypto/ |
H A D | t4_crypto.h | 235 __u8 ipad[64]; member
|