/freebsd/sys/crypto/ccp/ |
H A D | ccp.c | 246 axf->Final(s->hmac.ipad, &auth_ctx); in ccp_init_hmac_digest() 250 memcpy(s->hmac.ipad, key, klen); in ccp_init_hmac_digest() 252 memset(s->hmac.ipad + klen, 0, axf->blocksize - klen); in ccp_init_hmac_digest() 253 memcpy(s->hmac.opad, s->hmac.ipad, axf->blocksize); in ccp_init_hmac_digest() 256 s->hmac.ipad[i] ^= HMAC_IPAD_VAL; in ccp_init_hmac_digest()
|
H A D | ccp.h | 68 char ipad[CCP_HASH_MAX_BLOCK_SIZE]; member
|
H A D | ccp_hardware.c | 1273 error = sglist_append(qp->cq_sg_ulptx, s->hmac.ipad, axf->blocksize); in ccp_do_hmac()
|
/freebsd/sys/contrib/openzfs/module/icp/io/ |
H A D | sha2_mod.c | 330 uint64_t ipad[SHA512_HMAC_BLOCK_SIZE / sizeof (uint64_t)] = {0}; in sha2_mac_init_ctx() local 339 (void) memset(ipad, 0, block_size); in sha2_mac_init_ctx() 343 (void) memcpy(ipad, keyval, length_in_bytes); in sha2_mac_init_ctx() 351 ipad[i] ^= 0x3636363636363636; in sha2_mac_init_ctx() 357 SHA2Update(&ctx->hc_icontext, (uint8_t *)ipad, block_size); in sha2_mac_init_ctx()
|
/freebsd/sys/netinet/ |
H A D | sctp_auth.c | 918 uint8_t ipad[128], opad[128]; /* keyed hash inner/outer pads */ in sctp_hmac() local 944 memset(ipad, 0, blocklen); in sctp_hmac() 946 memcpy(ipad, key, keylen); in sctp_hmac() 951 ipad[i] ^= 0x36; in sctp_hmac() 957 sctp_hmac_update(hmac_algo, &ctx, ipad, blocklen); in sctp_hmac() 978 uint8_t ipad[128], opad[128]; /* keyed hash inner/outer pads */ in sctp_hmac_m() local 1004 memset(ipad, 0, blocklen); in sctp_hmac_m() 1006 memcpy(ipad, key, keylen); in sctp_hmac_m() 1011 ipad[i] ^= 0x36; in sctp_hmac_m() 1017 sctp_hmac_update(hmac_algo, &ctx, ipad, blocklen); in sctp_hmac_m()
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/ |
H A D | lac_sym_hash_sw_precomputes.c | 186 Cpa8U *ipad = pHmacIpadQatData->data + i; in LacSymHash_HmacPreComputes() local 189 *ipad ^= LAC_HASH_IPAD_BYTE; in LacSymHash_HmacPreComputes()
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 191 unsigned char *ipad, *opad; in _krb5_internal_hmac() local 196 ipad = malloc(cm->blocksize + len); in _krb5_internal_hmac() 197 if (ipad == NULL) in _krb5_internal_hmac() 201 free(ipad); in _krb5_internal_hmac() 204 memset(ipad, 0x36, cm->blocksize); in _krb5_internal_hmac() 221 ipad[i] ^= key[i]; in _krb5_internal_hmac() 224 memcpy(ipad + cm->blocksize, data, len); in _krb5_internal_hmac() 225 (*cm->checksum)(context, keyblock, ipad, cm->blocksize + len, in _krb5_internal_hmac() 231 memset(ipad, 0, cm->blocksize + len); in _krb5_internal_hmac() 232 free(ipad); in _krb5_internal_hmac()
|
/freebsd/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 61 static const uint8_t ipad = 0x36; variable 114 key1[i] = extkey[i] ^ ipad; in snmp_pdu_calc_digest()
|
/freebsd/sys/dev/cxgbe/crypto/ |
H A D | t4_crypto.h | 235 __u8 ipad[64]; member
|
/freebsd/sys/dev/safexcel/ |
H A D | safexcel.c | 1357 const uint8_t *key, int klen, uint8_t *ipad, uint8_t *opad) in safexcel_setkey_hmac() argument 1364 safexcel_setkey_hmac_digest(ahash, &ctx, ipad); in safexcel_setkey_hmac()
|