Home
last modified time | relevance | path

Searched full:ipad (Results 1 – 25 of 40) sorted by relevance

12

/freebsd/crypto/libecc/src/hash/
H A Dhmac.c19 u8 ipad[MAX_BLOCK_SIZE]; in hmac_init() local
29 /* Set ipad and opad to appropriate values */ in hmac_init()
30 ret = local_memset(ipad, 0x36, sizeof(ipad)); EG(ret, err); in hmac_init()
66 /* Update our input context with K^ipad */ in hmac_init()
68 ipad[i] ^= local_hmac_key[i]; in hmac_init()
70 ret = h->hfunc_update(&(ctx->in_ctx), ipad, h->block_size); EG(ret, err); in hmac_init()
/freebsd/contrib/wpa/src/crypto/
H A Dmd5.c29 u8 k_pad[64]; /* padding - key XORd with ipad/opad */ in hmac_md5_vector()
53 * MD5(K XOR opad, MD5(K XOR ipad, text)) in hmac_md5_vector()
56 * ipad is the byte 0x36 repeated 64 times in hmac_md5_vector()
60 /* start out by storing key in ipad */ in hmac_md5_vector()
64 /* XOR key with ipad values */ in hmac_md5_vector()
H A Dsha1.c29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ in hmac_sha1_vector()
53 * SHA1(K XOR opad, SHA1(K XOR ipad, text)) in hmac_sha1_vector()
56 * ipad is the byte 0x36 repeated 64 times in hmac_sha1_vector()
60 /* start out by storing key in ipad */ in hmac_sha1_vector()
63 /* XOR key with ipad values */ in hmac_sha1_vector()
H A Dsha512.c29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */ in hmac_sha512_vector()
52 * SHA512(K XOR opad, SHA512(K XOR ipad, text)) in hmac_sha512_vector()
55 * ipad is the byte 0x36 repeated 128 times in hmac_sha512_vector()
59 /* start out by storing key in ipad */ in hmac_sha512_vector()
62 /* XOR key with ipad values */ in hmac_sha512_vector()
H A Dsha384.c29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */ in hmac_sha384_vector()
52 * SHA384(K XOR opad, SHA384(K XOR ipad, text)) in hmac_sha384_vector()
55 * ipad is the byte 0x36 repeated 128 times in hmac_sha384_vector()
59 /* start out by storing key in ipad */ in hmac_sha384_vector()
62 /* XOR key with ipad values */ in hmac_sha384_vector()
H A Dsha256.c29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ in hmac_sha256_vector()
53 * SHA256(K XOR opad, SHA256(K XOR ipad, text)) in hmac_sha256_vector()
56 * ipad is the byte 0x36 repeated 64 times in hmac_sha256_vector()
60 /* start out by storing key in ipad */ in hmac_sha256_vector()
63 /* XOR key with ipad values */ in hmac_sha256_vector()
/freebsd/share/man/man4/
H A Dipheth.433 .Nd "USB Apple iPhone/iPad tethered Ethernet driver"
56 iPhone and iPad devices, often referred to as USB tethering.
59 should work with any Apple iPhone or iPad device.
74 Apple iPad tethering (all models)
/freebsd/contrib/tcpdump/
H A Dsignature.c53 unsigned char k_ipad[65]; /* inner padding - key XORd with ipad */ in signature_compute_hmac_md5()
74 * MD5(K XOR opad, MD5(K XOR ipad, text)) in signature_compute_hmac_md5()
77 * ipad is the byte 0x36 repeated 64 times in signature_compute_hmac_md5()
88 /* XOR key with ipad and opad values */ in signature_compute_hmac_md5()
/freebsd/sys/contrib/openzfs/module/icp/io/
H A Dsha2_mod.c304 * SHA2 HMAC is: SHA2(key XOR opad, SHA2(key XOR ipad, text))
309 * - for inner context: SHA2(key XOR ipad)
331 uint64_t ipad[SHA512_HMAC_BLOCK_SIZE / sizeof (uint64_t)] = {0}; in sha2_mac_init_ctx() local
340 (void) memset(ipad, 0, block_size); in sha2_mac_init_ctx()
344 (void) memcpy(ipad, keyval, length_in_bytes); in sha2_mac_init_ctx()
350 /* XOR key with ipad (0x36) and opad (0x5c) */ in sha2_mac_init_ctx()
352 ipad[i] ^= 0x3636363636363636; in sha2_mac_init_ctx()
356 /* perform SHA2 on ipad */ in sha2_mac_init_ctx()
358 SHA2Update(&ctx->hc_icontext, (uint8_t *)ipad, block_size); in sha2_mac_init_ctx()
/freebsd/contrib/dma/
H A Dcrypto.c229 * key XORd with ipad in hmac_md5()
252 * MD5(K XOR opad, MD5(K XOR ipad, text)) in hmac_md5()
255 * ipad is the byte 0x36 repeated 64 times in hmac_md5()
267 /* XOR key with ipad and opad values */ in hmac_md5()
/freebsd/sys/crypto/ccp/
H A Dccp.c151 /* Two more SGEs than sg_crp to accommodate ipad. */ in ccp_initialize_queues()
246 axf->Final(s->hmac.ipad, &auth_ctx); in ccp_init_hmac_digest()
250 memcpy(s->hmac.ipad, key, klen); in ccp_init_hmac_digest()
252 memset(s->hmac.ipad + klen, 0, axf->blocksize - klen); in ccp_init_hmac_digest()
253 memcpy(s->hmac.opad, s->hmac.ipad, axf->blocksize); in ccp_init_hmac_digest()
256 s->hmac.ipad[i] ^= HMAC_IPAD_VAL; in ccp_init_hmac_digest()
H A Dccp.h68 char ipad[CCP_HASH_MAX_BLOCK_SIZE]; member
/freebsd/crypto/krb5/src/lib/crypto/builtin/
H A Dhmac.c43 * H(K XOR opad, H(K XOR ipad, text))
47 * ipad is the byte 0x36 repeated blocksize times
/freebsd/sys/netinet/
H A Dsctp_auth.c918 uint8_t ipad[128], opad[128]; /* keyed hash inner/outer pads */ in sctp_hmac() local
944 memset(ipad, 0, blocklen); in sctp_hmac()
946 memcpy(ipad, key, keylen); in sctp_hmac()
949 /* XOR the key with ipad and opad values */ in sctp_hmac()
951 ipad[i] ^= 0x36; in sctp_hmac()
957 sctp_hmac_update(hmac_algo, &ctx, ipad, blocklen); in sctp_hmac()
978 uint8_t ipad[128], opad[128]; /* keyed hash inner/outer pads */ in sctp_hmac_m() local
1004 memset(ipad, 0, blocklen); in sctp_hmac_m()
1006 memcpy(ipad, key, keylen); in sctp_hmac_m()
1009 /* XOR the key with ipad and opad values */ in sctp_hmac_m()
[all …]
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/
H A Dlac_sym_hash_sw_precomputes.c184 /* XOR Key with IPAD at 4-byte level */ in LacSymHash_HmacPreComputes()
186 Cpa8U *ipad = pHmacIpadQatData->data + i; in LacSymHash_HmacPreComputes() local
189 *ipad ^= LAC_HASH_IPAD_BYTE; in LacSymHash_HmacPreComputes()
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/
H A Dlac_sym_hash.h51 * hash((key \oplus ipad) \parallel msg ))\f$.
53 * algorithm if necessary and xored with the ipad/opad. The following portion
54 * of the operation can be precomputed: \f$ hash(key \oplus ipad) \f$ as the
58 * The same applies to \f$ hash(key \oplus ipad) \f$. There is a saving in
440 * operations. The results of the ipad and opad state calculation
446 * This function performs the XORing of the IPAD and OPAD constants to
H A Dlac_sym_hash_defs.h234 * Ipad Byte */
241 * Ipad for 4 Bytes */
/freebsd/crypto/krb5/src/lib/crypto/openssl/
H A Dhmac.c96 * H(K XOR opad, H(K XOR ipad, text))
100 * ipad is the byte 0x36 repeated blocksize times
/freebsd/crypto/heimdal/lib/krb5/
H A Dcrypto.c191 unsigned char *ipad, *opad; in _krb5_internal_hmac() local
196 ipad = malloc(cm->blocksize + len); in _krb5_internal_hmac()
197 if (ipad == NULL) in _krb5_internal_hmac()
201 free(ipad); in _krb5_internal_hmac()
204 memset(ipad, 0x36, cm->blocksize); in _krb5_internal_hmac()
221 ipad[i] ^= key[i]; in _krb5_internal_hmac()
224 memcpy(ipad + cm->blocksize, data, len); in _krb5_internal_hmac()
225 (*cm->checksum)(context, keyblock, ipad, cm->blocksize + len, in _krb5_internal_hmac()
231 memset(ipad, 0, cm->blocksize + len); in _krb5_internal_hmac()
232 free(ipad); in _krb5_internal_hmac()
/freebsd/sys/contrib/device-tree/Bindings/pinctrl/
H A Dapple,pinctrl.yaml15 iPhone and iPad devices and the "Apple Silicon" Macs.
/freebsd/sys/contrib/device-tree/Bindings/interrupt-controller/
H A Dapple,aic.yaml14 Apple ARM SoC platforms, including various iPhone and iPad devices and the
/freebsd/contrib/bsnmp/lib/
H A Dsnmpcrypto.c61 static const uint8_t ipad = 0x36; variable
114 key1[i] = extkey[i] ^ ipad; in snmp_pdu_calc_digest()
/freebsd/sys/contrib/device-tree/Bindings/pci/
H A Dapple,pcie.yaml15 various iPhone and iPad devices and the "Apple Silicon" Macs.
/freebsd/sys/geom/eli/
H A Dg_eli_hmac.c65 /* XOR key with ipad and opad values. */ in g_eli_crypto_hmac_init()
/freebsd/sys/dev/cxgbe/crypto/
H A Dt4_crypto.h235 __u8 ipad[64]; member

12