/freebsd-11-stable/contrib/ntp/lib/isc/ |
H A D | hmacmd5.c | 116 unsigned char opad[PADLEN]; local 121 memset(opad, OPAD, sizeof(opad)); 123 opad[i] ^= ctx->key[i]; 126 isc_md5_update(&ctx->md5ctx, opad, sizeof(opad));
|
H A D | hmacsha.c | 246 unsigned char opad[ISC_SHA1_BLOCK_LENGTH]; local 253 memset(opad, OPAD, sizeof(opad)); 255 opad[i] ^= ctx->key[i]; 258 isc_sha1_update(&ctx->sha1ctx, opad, sizeof(opad)); 313 unsigned char opad[ISC_SHA224_BLOCK_LENGTH]; local 320 memset(opad, OPAD, sizeof(opad)); 322 opad[ 379 unsigned char opad[ISC_SHA256_BLOCK_LENGTH]; local 445 unsigned char opad[ISC_SHA384_BLOCK_LENGTH]; local 511 unsigned char opad[ISC_SHA512_BLOCK_LENGTH]; local [all...] |
/freebsd-11-stable/sys/dev/cxgbe/tom/ |
H A D | t4_tls.h | 110 unsigned char opad[MAX_MAC_KSZ]; member in struct:tls_tx_ctxt 117 unsigned char opad[MAX_MAC_KSZ]; member in struct:tls_rx_ctxt 322 __u8 opad[64]; member in struct:tls_keyctx::keys
|
/freebsd-11-stable/sys/netinet/ |
H A D | sctp_auth.c | 929 uint8_t ipad[128], opad[128]; /* keyed hash inner/outer pads */ local 956 memset(opad, 0, blocklen); 958 memcpy(opad, key, keylen); 960 /* XOR the key with ipad and opad values */ 963 opad[i] ^= 0x5c; 974 sctp_hmac_update(hmac_algo, &ctx, opad, blocklen); 989 uint8_t ipad[128], opad[128]; /* keyed hash inner/outer pads */ local 1016 memset(opad, 0, blocklen); 1018 memcpy(opad, key, keylen); 1020 /* XOR the key with ipad and opad value [all...] |
/freebsd-11-stable/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 61 static const uint8_t opad = 0x5c; variable 111 key2[i] = extkey[i] ^ opad;
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 191 unsigned char *ipad, *opad; local 199 opad = malloc(cm->blocksize + cm->checksumsize); 200 if (opad == NULL) { 205 memset(opad, 0x5c, cm->blocksize); 222 opad[i] ^= key[i]; 227 memcpy(opad + cm->blocksize, result->checksum.data, 229 (*cm->checksum)(context, keyblock, opad, 233 memset(opad, 0, cm->blocksize + cm->checksumsize); 234 free(opad);
|
/freebsd-11-stable/sys/dev/cesa/ |
H A D | cesa.c | 451 uint8_t opad[CESA_MAX_HMAC_BLOCK_LEN]; local 460 memset(opad, HMAC_OPAD_VAL, CESA_MAX_HMAC_BLOCK_LEN); 463 opad[i] ^= mkey[i]; 475 MD5Update(&md5ctx, opad, MD5_HMAC_BLOCK_LEN); 483 SHA1Update(&sha1ctx, opad, SHA1_HMAC_BLOCK_LEN); 491 SHA256_Update(&sha256ctx, opad, SHA2_256_HMAC_BLOCK_LEN);
|
/freebsd-11-stable/sys/dev/cxgbe/crypto/ |
H A D | t4_crypto.c | 143 char opad[CHCR_HASH_MAX_BLOCK_SIZE_128]; member in struct:ccr_session_hmac 515 memcpy(crwr->key_ctx.key + iopad_size, s->hmac.opad, 1052 memcpy(dst + iopad_size, s->hmac.opad, s->hmac.partial_digest_len); 1762 memcpy(s->hmac.opad, s->hmac.ipad, axf->blocksize); 1766 s->hmac.opad[i] ^= HMAC_OPAD_VAL; 1770 * Hash the raw ipad and opad and store the partial result in 1778 axf->Update(&auth_ctx, s->hmac.opad, axf->blocksize); 1779 ccr_copy_partial_hash(s->hmac.opad, cri_alg, &auth_ctx);
|