| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| hmac.c | 55 if (ctx->opad) { 56 memset(ctx->opad, 0, EVP_MD_block_size(ctx->md)); 57 free(ctx->opad); 58 ctx->opad = NULL; 106 if (ctx->opad) { 107 memset(ctx->opad, 0, ctx->key_length); 108 free(ctx->opad); 115 ctx->opad = malloc(EVP_MD_block_size(ctx->md)); 118 memset(ctx->opad, 0x5c, EVP_MD_block_size(ctx->md)); 122 for (i = 0, p = ctx->opad; i < keylen; i++ [all...] |
| hmac.h | 65 void *opad; member in struct:hc_HMAC_CTX
|
| /src/external/mpl/bind/dist/bin/tests/system/padding/ |
| tests.sh | 100 opad=$(nextpart ns2/named.stats | awk '/EDNS padding option received/ { print $1}') 105 if [ "$opad" -eq "$npad" ]; then 106 echo_i "error: opad ($opad) == npad ($npad)" 118 opad=$(nextpart ns2/named.stats | awk '/EDNS padding option received/ { print $1}') 123 if [ "$opad" -ne "$npad" ]; then 124 echo_i "error: opad ($opad) != npad ($npad)"
|
| /src/lib/libc/hash/ |
| hmac.c | 121 uint8_t ipad[HMAC_SIZE], opad[HMAC_SIZE], d[HMAC_SIZE]; local 142 opad[i] = (i < klen ? k[i] : 0) ^ HMAC_OPAD; 156 (*h->update)(c, opad, (unsigned int)h->blocksize);
|
| /src/sbin/cgdconfig/ |
| hkdf_hmac_sha256.c | 85 uint8_t opad[SHA256_BLOCK_LENGTH]; local 89 opad[i] = 0x5c ^ H->key[i]; 93 SHA256_Update(&H->sha256, opad, SHA256_BLOCK_LENGTH); 97 explicit_memset(opad, 0, sizeof(opad));
|
| /src/external/gpl3/gcc.old/dist/libphobos/src/std/digest/ |
| hmac.d | 184 ubyte[blockSize / 8] opad = void; 186 opad[i] = key[i] ^ 0x5c; 191 digest.put(opad[]);
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| crypto.c | 191 unsigned char *ipad, *opad; local 199 opad = malloc(cm->blocksize + cm->checksumsize); 200 if (opad == NULL) { 205 memset(opad, 0x5c, cm->blocksize); 222 opad[i] ^= key[i]; 227 memcpy(opad + cm->blocksize, result->checksum.data, 229 (*cm->checksum)(context, keyblock, opad, 233 memset(opad, 0, cm->blocksize + cm->checksumsize); 234 free(opad);
|
| /src/sys/dev/marvell/ |
| mvxpsec.c | 2773 * IV is a hash of ipad/opad. these are defined by FIPS-198a 2785 uint8_t opad[64]; local 2811 opad[i] = (key8[i] ^ HMAC_OPAD); 2815 opad[i] = HMAC_OPAD; 2830 "%s: opad:\n", __func__); 2831 mvxpsec_dump_data(__func__, opad, sizeof(opad)); 2853 SHA1Update(&sha1, opad, 64); 2877 MD5Update(&md5, opad, sizeof(opad)); [all...] |
| /src/sys/dev/pci/qat/ |
| qat.c | 1357 uint8_t *opad = desc->qcd_hash_state_prefix_buf + local 1368 memcpy(opad, cria->cri_key, keylen); 1372 memset(opad + keylen, 0, padlen); 1376 opad[i] ^= 0x5c; 1392 /* opad */ 1394 sah->Update(ctx, opad, blklen);
|
| /src/sys/net/ |
| if_wg.c | 1107 #define OPAD 0x5c 1110 uint8_t opad[HMAC_BLOCK_LEN]; local 1121 opad[i] = hmackey[i] ^ OPAD; 1130 blake2s_update(&state, opad, sizeof(opad)); 1134 #undef OPAD
|