| /f-stack/freebsd/crypto/aesni/ |
| H A D | aesni.c | 848 uint8_t hmac_key[SHA1_BLOCK_LEN] __aligned(16); in aesni_cipher_mac() local 853 hmac_key[i] = key[i] ^ HMAC_IPAD_VAL; in aesni_cipher_mac() 854 for (i = keylen; i < sizeof(hmac_key); i++) in aesni_cipher_mac() 855 hmac_key[i] = 0 ^ HMAC_IPAD_VAL; in aesni_cipher_mac() 856 ses->hash_update(&sctx, hmac_key, sizeof(hmac_key)); in aesni_cipher_mac() 882 hmac_key[i] = key[i] ^ HMAC_OPAD_VAL; in aesni_cipher_mac() 883 for (i = keylen; i < sizeof(hmac_key); i++) in aesni_cipher_mac() 884 hmac_key[i] = 0 ^ HMAC_OPAD_VAL; in aesni_cipher_mac() 885 ses->hash_update(&sctx, hmac_key, sizeof(hmac_key)); in aesni_cipher_mac() 888 explicit_bzero(hmac_key, sizeof(hmac_key)); in aesni_cipher_mac()
|
| /f-stack/freebsd/opencrypto/ |
| H A D | crypto.c | 416 uint8_t hmac_key[HMAC_MAX_BLOCK_LEN]; in hmac_init_pad() local 419 KASSERT(axf->blocksize <= sizeof(hmac_key), in hmac_init_pad() 426 memset(hmac_key, 0, sizeof(hmac_key)); in hmac_init_pad() 430 axf->Final(hmac_key, auth_ctx); in hmac_init_pad() 433 memcpy(hmac_key, key, klen); in hmac_init_pad() 436 hmac_key[i] ^= padval; in hmac_init_pad() 439 axf->Update(auth_ctx, hmac_key, axf->blocksize); in hmac_init_pad() 440 explicit_bzero(hmac_key, sizeof(hmac_key)); in hmac_init_pad()
|
| /f-stack/dpdk/drivers/crypto/octeontx2/ |
| H A D | otx2_ipsec_fp.h | 116 uint8_t hmac_key[48]; member 143 uint8_t hmac_key[48]; member
|
| H A D | otx2_ipsec_po.h | 161 uint8_t hmac_key[48]; member
|
| H A D | otx2_cryptodev_sec.c | 384 aes_gcm.hmac_key[0]) >> 3; in crypto_sec_ipsec_inb_session_create()
|
| /f-stack/dpdk/drivers/net/octeontx2/ |
| H A D | otx2_ethdev_sec.c | 275 const uint8_t *auth_key, int len, uint8_t *hmac_key) in hmac_init() argument 336 memcpy(hmac_key, md->buffer, 48); in hmac_init() 449 ret = hmac_init(ctl, qp, auth_key, auth_key_len, sa->hmac_key); in eth_sec_ipsec_out_sess_create() 538 ret = hmac_init(ctl, qp, auth_key, auth_key_len, sa->hmac_key); in eth_sec_ipsec_in_sess_create()
|
| /f-stack/app/nginx-1.16.1/src/event/ |
| H A D | ngx_event_openssl.h | 141 u_char hmac_key[32]; member
|
| H A D | ngx_event_openssl.c | 3820 ngx_memcpy(key->hmac_key, buf + 32, 16); in ngx_ssl_session_ticket_keys() 3825 ngx_memcpy(key->hmac_key, buf + 16, 32); in ngx_ssl_session_ticket_keys() 3933 if (HMAC_Init_ex(hctx, key[0].hmac_key, size, digest, NULL) != 1) { in ngx_ssl_session_ticket_key_callback() 3938 HMAC_Init_ex(hctx, key[0].hmac_key, size, digest, NULL); in ngx_ssl_session_ticket_key_callback() 3977 if (HMAC_Init_ex(hctx, key[i].hmac_key, size, digest, NULL) != 1) { in ngx_ssl_session_ticket_key_callback() 3982 HMAC_Init_ex(hctx, key[i].hmac_key, size, digest, NULL); in ngx_ssl_session_ticket_key_callback()
|
| /f-stack/dpdk/app/test/ |
| H A D | test_cryptodev.c | 121 uint8_t *hmac_key); 1798 uint8_t *hmac_key); 1813 uint8_t *hmac_key) in test_AES_CBC_HMAC_SHA512_decrypt_create_session_params() argument 1833 ut_params->auth_xform.auth.key.data = hmac_key; in test_AES_CBC_HMAC_SHA512_decrypt_create_session_params() 10458 uint8_t *hmac_key; member 10477 .hmac_key = ms_hmac_key0, in test_multi_session_random_usage() 10484 .hmac_key = ms_hmac_key1, in test_multi_session_random_usage() 10491 .hmac_key = ms_hmac_key2, in test_multi_session_random_usage() 10527 ut_paramz[i].cipher_key, ut_paramz[i].hmac_key); in test_multi_session_random_usage()
|