| /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/ |
| cipher_rc4_hmac_md5_hw.c | 196 unsigned char hmac_key[64]; local 198 memset(hmac_key, 0, sizeof(hmac_key)); 200 if (len > (int)sizeof(hmac_key)) { 203 MD5_Final(hmac_key, &ctx->head); 205 memcpy(hmac_key, key, len); 208 for (i = 0; i < sizeof(hmac_key); i++) 209 hmac_key[i] ^= 0x36; /* ipad */ 211 MD5_Update(&ctx->head, hmac_key, sizeof(hmac_key)); [all...] |
| cipher_aes_cbc_hmac_sha1_hw.c | 633 unsigned char hmac_key[64]; local 635 memset(hmac_key, 0, sizeof(hmac_key)); 637 if (len > (int)sizeof(hmac_key)) { 640 SHA1_Final(hmac_key, &ctx->head); 642 memcpy(hmac_key, mac, len); 645 for (i = 0; i < sizeof(hmac_key); i++) 646 hmac_key[i] ^= 0x36; /* ipad */ 648 sha1_update(&ctx->head, hmac_key, sizeof(hmac_key)); [all...] |
| cipher_aes_cbc_hmac_sha256_hw.c | 685 unsigned char hmac_key[64]; local 687 memset(hmac_key, 0, sizeof(hmac_key)); 689 if (len > sizeof(hmac_key)) { 692 SHA256_Final(hmac_key, &ctx->head); 694 memcpy(hmac_key, mackey, len); 697 for (i = 0; i < sizeof(hmac_key); i++) 698 hmac_key[i] ^= 0x36; /* ipad */ 700 sha256_update(&ctx->head, hmac_key, sizeof(hmac_key)); [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/ |
| cipher_rc4_hmac_md5_hw.c | 196 unsigned char hmac_key[64]; local 198 memset(hmac_key, 0, sizeof(hmac_key)); 200 if (len > (int)sizeof(hmac_key)) { 203 MD5_Final(hmac_key, &ctx->head); 205 memcpy(hmac_key, key, len); 208 for (i = 0; i < sizeof(hmac_key); i++) 209 hmac_key[i] ^= 0x36; /* ipad */ 211 MD5_Update(&ctx->head, hmac_key, sizeof(hmac_key)); [all...] |
| cipher_aes_cbc_hmac_sha1_hw.c | 637 unsigned char hmac_key[64]; local 639 memset(hmac_key, 0, sizeof(hmac_key)); 641 if (len > (int)sizeof(hmac_key)) { 644 SHA1_Final(hmac_key, &ctx->head); 646 memcpy(hmac_key, mac, len); 649 for (i = 0; i < sizeof(hmac_key); i++) 650 hmac_key[i] ^= 0x36; /* ipad */ 652 sha1_update(&ctx->head, hmac_key, sizeof(hmac_key)); [all...] |
| cipher_aes_cbc_hmac_sha256_hw.c | 690 unsigned char hmac_key[64]; local 692 memset(hmac_key, 0, sizeof(hmac_key)); 694 if (len > sizeof(hmac_key)) { 697 SHA256_Final(hmac_key, &ctx->head); 699 memcpy(hmac_key, mackey, len); 702 for (i = 0; i < sizeof(hmac_key); i++) 703 hmac_key[i] ^= 0x36; /* ipad */ 705 sha256_update(&ctx->head, hmac_key, sizeof(hmac_key)); [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| e_rc4_hmac_md5.c | 190 unsigned char hmac_key[64]; local 192 memset(hmac_key, 0, sizeof(hmac_key)); 194 if (arg > (int)sizeof(hmac_key)) { 197 MD5_Final(hmac_key, &key->head); 199 memcpy(hmac_key, ptr, arg); 202 for (i = 0; i < sizeof(hmac_key); i++) 203 hmac_key[i] ^= 0x36; /* ipad */ 205 MD5_Update(&key->head, hmac_key, sizeof(hmac_key)); [all...] |
| e_aes_cbc_hmac_sha1.c | 777 unsigned char hmac_key[64]; local 779 memset(hmac_key, 0, sizeof(hmac_key)); 781 if (arg > (int)sizeof(hmac_key)) { 784 SHA1_Final(hmac_key, &key->head); 786 memcpy(hmac_key, ptr, arg); 789 for (i = 0; i < sizeof(hmac_key); i++) 790 hmac_key[i] ^= 0x36; /* ipad */ 792 SHA1_Update(&key->head, hmac_key, sizeof(hmac_key)); [all...] |
| e_aes_cbc_hmac_sha256.c | 747 unsigned char hmac_key[64]; local 749 memset(hmac_key, 0, sizeof(hmac_key)); 754 if (u_arg > sizeof(hmac_key)) { 757 SHA256_Final(hmac_key, &key->head); 759 memcpy(hmac_key, ptr, arg); 762 for (i = 0; i < sizeof(hmac_key); i++) 763 hmac_key[i] ^= 0x36; /* ipad */ 765 SHA256_Update(&key->head, hmac_key, sizeof(hmac_key)); [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| e_rc4_hmac_md5.c | 195 unsigned char hmac_key[64]; local 197 memset(hmac_key, 0, sizeof(hmac_key)); 199 if (arg > (int)sizeof(hmac_key)) { 202 MD5_Final(hmac_key, &key->head); 204 memcpy(hmac_key, ptr, arg); 207 for (i = 0; i < sizeof(hmac_key); i++) 208 hmac_key[i] ^= 0x36; /* ipad */ 210 MD5_Update(&key->head, hmac_key, sizeof(hmac_key)); [all...] |
| e_aes_cbc_hmac_sha1.c | 780 unsigned char hmac_key[64]; local 782 memset(hmac_key, 0, sizeof(hmac_key)); 784 if (arg > (int)sizeof(hmac_key)) { 787 SHA1_Final(hmac_key, &key->head); 789 memcpy(hmac_key, ptr, arg); 792 for (i = 0; i < sizeof(hmac_key); i++) 793 hmac_key[i] ^= 0x36; /* ipad */ 795 SHA1_Update(&key->head, hmac_key, sizeof(hmac_key)); [all...] |
| e_aes_cbc_hmac_sha256.c | 758 unsigned char hmac_key[64]; local 760 memset(hmac_key, 0, sizeof(hmac_key)); 765 if (u_arg > sizeof(hmac_key)) { 768 SHA256_Final(hmac_key, &key->head); 770 memcpy(hmac_key, ptr, arg); 773 for (i = 0; i < sizeof(hmac_key); i++) 774 hmac_key[i] ^= 0x36; /* ipad */ 776 SHA256_Update(&key->head, hmac_key, sizeof(hmac_key)); [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
| e_rc4_hmac_md5.c | 185 unsigned char hmac_key[64]; local 187 memset(hmac_key, 0, sizeof(hmac_key)); 189 if (arg > (int)sizeof(hmac_key)) { 192 MD5_Final(hmac_key, &key->head); 194 memcpy(hmac_key, ptr, arg); 197 for (i = 0; i < sizeof(hmac_key); i++) 198 hmac_key[i] ^= 0x36; /* ipad */ 200 MD5_Update(&key->head, hmac_key, sizeof(hmac_key)); [all...] |
| e_aes_cbc_hmac_sha1.c | 777 unsigned char hmac_key[64]; local 779 memset(hmac_key, 0, sizeof(hmac_key)); 781 if (arg > (int)sizeof(hmac_key)) { 784 SHA1_Final(hmac_key, &key->head); 786 memcpy(hmac_key, ptr, arg); 789 for (i = 0; i < sizeof(hmac_key); i++) 790 hmac_key[i] ^= 0x36; /* ipad */ 792 SHA1_Update(&key->head, hmac_key, sizeof(hmac_key)); [all...] |
| e_aes_cbc_hmac_sha256.c | 755 unsigned char hmac_key[64]; local 757 memset(hmac_key, 0, sizeof(hmac_key)); 762 if (u_arg > sizeof(hmac_key)) { 765 SHA256_Final(hmac_key, &key->head); 767 memcpy(hmac_key, ptr, arg); 770 for (i = 0; i < sizeof(hmac_key); i++) 771 hmac_key[i] ^= 0x36; /* ipad */ 773 SHA256_Update(&key->head, hmac_key, sizeof(hmac_key)); [all...] |
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| srp-crypto.h | 30 typedef struct hmac_key hmac_key_t; 31 struct hmac_key { struct
|
| /src/external/mpl/bind/dist/lib/dns/ |
| dst_internal.h | 102 dst_hmac_key_t *hmac_key; member in union:dst_key::__anon23981
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| dst_internal.h | 129 dst_hmac_key_t *hmac_key; member in union:dst_key::__anon24248
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| dgst.c | 120 char *hmac_key = NULL; local 217 hmac_key = "etaonrishdlcupfm"; 220 hmac_key = opt_arg(); 297 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { 351 if (hmac_key != NULL) { 357 (unsigned char *)hmac_key, 358 strlen(hmac_key));
|
| speed.c | 2797 static const char hmac_key[] = "This is a key..."; local 2798 int len = strlen(hmac_key); 2811 (char *)hmac_key, len);
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| dgst.c | 100 char *hmac_key = NULL; local 194 hmac_key = "etaonrishdlcupfm"; 197 hmac_key = opt_arg(); 274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { 327 if (hmac_key != NULL) { 333 (unsigned char *)hmac_key, 334 strlen(hmac_key));
|
| speed.c | 2092 static const char hmac_key[] = "This is a key..."; local 2093 int len = strlen(hmac_key); 2109 (char *)hmac_key, len);
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| dgst.c | 91 char *hmac_key = NULL; local 179 hmac_key = "etaonrishdlcupfm"; 182 hmac_key = opt_arg(); 250 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { 308 if (hmac_key != NULL) { 310 (unsigned char *)hmac_key, -1);
|
| speed.c | 2203 static const char hmac_key[] = "This is a key..."; local 2204 int len = strlen(hmac_key); 2213 HMAC_Init_ex(loopargs[i].hctx, hmac_key, len, EVP_md5(), NULL);
|
| /src/external/bsd/unbound/dist/util/ |
| net_help.c | 99 unsigned char *hmac_key; member in struct:tls_session_ticket_key 1841 keys->hmac_key = data + 48; 1890 ticket_keys->hmac_key, 32); 1900 if (HMAC_Init_ex(hmac_ctx, ticket_keys->hmac_key, 32, digest, NULL) != 1) { 1905 HMAC_Init_ex(hmac_ctx, ticket_keys->hmac_key, 32, digest, NULL); 1925 key->hmac_key, 32); 1935 if (HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL) != 1) { 1940 HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL);
|