/openssl/providers/implementations/ciphers/ |
H A D | cipher_rc4_hmac_md5_hw.c | 196 unsigned char hmac_key[64]; in cipher_hw_rc4_hmac_md5_init_mackey() local 198 memset(hmac_key, 0, sizeof(hmac_key)); in cipher_hw_rc4_hmac_md5_init_mackey() 200 if (len > (int)sizeof(hmac_key)) { in cipher_hw_rc4_hmac_md5_init_mackey() 203 MD5_Final(hmac_key, &ctx->head); in cipher_hw_rc4_hmac_md5_init_mackey() 205 memcpy(hmac_key, key, len); in cipher_hw_rc4_hmac_md5_init_mackey() 208 for (i = 0; i < sizeof(hmac_key); i++) in cipher_hw_rc4_hmac_md5_init_mackey() 209 hmac_key[i] ^= 0x36; /* ipad */ in cipher_hw_rc4_hmac_md5_init_mackey() 211 MD5_Update(&ctx->head, hmac_key, sizeof(hmac_key)); in cipher_hw_rc4_hmac_md5_init_mackey() 213 for (i = 0; i < sizeof(hmac_key); i++) in cipher_hw_rc4_hmac_md5_init_mackey() 216 MD5_Update(&ctx->tail, hmac_key, sizeof(hmac_key)); in cipher_hw_rc4_hmac_md5_init_mackey() [all …]
|
H A D | cipher_aes_cbc_hmac_sha1_hw.c | 637 unsigned char hmac_key[64]; in aesni_cbc_hmac_sha1_set_mac_key() local 639 memset(hmac_key, 0, sizeof(hmac_key)); in aesni_cbc_hmac_sha1_set_mac_key() 641 if (len > (int)sizeof(hmac_key)) { in aesni_cbc_hmac_sha1_set_mac_key() 644 SHA1_Final(hmac_key, &ctx->head); in aesni_cbc_hmac_sha1_set_mac_key() 646 memcpy(hmac_key, mac, len); in aesni_cbc_hmac_sha1_set_mac_key() 649 for (i = 0; i < sizeof(hmac_key); i++) in aesni_cbc_hmac_sha1_set_mac_key() 650 hmac_key[i] ^= 0x36; /* ipad */ in aesni_cbc_hmac_sha1_set_mac_key() 652 sha1_update(&ctx->head, hmac_key, sizeof(hmac_key)); in aesni_cbc_hmac_sha1_set_mac_key() 654 for (i = 0; i < sizeof(hmac_key); i++) in aesni_cbc_hmac_sha1_set_mac_key() 657 sha1_update(&ctx->tail, hmac_key, sizeof(hmac_key)); in aesni_cbc_hmac_sha1_set_mac_key() [all …]
|
H A D | cipher_aes_cbc_hmac_sha256_hw.c | 690 unsigned char hmac_key[64]; in aesni_cbc_hmac_sha256_set_mac_key() local 692 memset(hmac_key, 0, sizeof(hmac_key)); in aesni_cbc_hmac_sha256_set_mac_key() 694 if (len > sizeof(hmac_key)) { in aesni_cbc_hmac_sha256_set_mac_key() 697 SHA256_Final(hmac_key, &ctx->head); in aesni_cbc_hmac_sha256_set_mac_key() 699 memcpy(hmac_key, mackey, len); in aesni_cbc_hmac_sha256_set_mac_key() 702 for (i = 0; i < sizeof(hmac_key); i++) in aesni_cbc_hmac_sha256_set_mac_key() 703 hmac_key[i] ^= 0x36; /* ipad */ in aesni_cbc_hmac_sha256_set_mac_key() 705 sha256_update(&ctx->head, hmac_key, sizeof(hmac_key)); in aesni_cbc_hmac_sha256_set_mac_key() 707 for (i = 0; i < sizeof(hmac_key); i++) in aesni_cbc_hmac_sha256_set_mac_key() 710 sha256_update(&ctx->tail, hmac_key, sizeof(hmac_key)); in aesni_cbc_hmac_sha256_set_mac_key() [all …]
|
/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 195 unsigned char hmac_key[64]; in rc4_hmac_md5_ctrl() local 197 memset(hmac_key, 0, sizeof(hmac_key)); in rc4_hmac_md5_ctrl() 199 if (arg > (int)sizeof(hmac_key)) { in rc4_hmac_md5_ctrl() 202 MD5_Final(hmac_key, &key->head); in rc4_hmac_md5_ctrl() 204 memcpy(hmac_key, ptr, arg); in rc4_hmac_md5_ctrl() 207 for (i = 0; i < sizeof(hmac_key); i++) in rc4_hmac_md5_ctrl() 208 hmac_key[i] ^= 0x36; /* ipad */ in rc4_hmac_md5_ctrl() 210 MD5_Update(&key->head, hmac_key, sizeof(hmac_key)); in rc4_hmac_md5_ctrl() 212 for (i = 0; i < sizeof(hmac_key); i++) in rc4_hmac_md5_ctrl() 215 MD5_Update(&key->tail, hmac_key, sizeof(hmac_key)); in rc4_hmac_md5_ctrl() [all …]
|
H A D | e_aes_cbc_hmac_sha1.c | 787 unsigned char hmac_key[64]; in aesni_cbc_hmac_sha1_ctrl() local 789 memset(hmac_key, 0, sizeof(hmac_key)); in aesni_cbc_hmac_sha1_ctrl() 791 if (arg > (int)sizeof(hmac_key)) { in aesni_cbc_hmac_sha1_ctrl() 794 SHA1_Final(hmac_key, &key->head); in aesni_cbc_hmac_sha1_ctrl() 796 memcpy(hmac_key, ptr, arg); in aesni_cbc_hmac_sha1_ctrl() 799 for (i = 0; i < sizeof(hmac_key); i++) in aesni_cbc_hmac_sha1_ctrl() 800 hmac_key[i] ^= 0x36; /* ipad */ in aesni_cbc_hmac_sha1_ctrl() 802 SHA1_Update(&key->head, hmac_key, sizeof(hmac_key)); in aesni_cbc_hmac_sha1_ctrl() 804 for (i = 0; i < sizeof(hmac_key); i++) in aesni_cbc_hmac_sha1_ctrl() 807 SHA1_Update(&key->tail, hmac_key, sizeof(hmac_key)); in aesni_cbc_hmac_sha1_ctrl() [all …]
|
H A D | e_aes_cbc_hmac_sha256.c | 758 unsigned char hmac_key[64]; in aesni_cbc_hmac_sha256_ctrl() local 760 memset(hmac_key, 0, sizeof(hmac_key)); in aesni_cbc_hmac_sha256_ctrl() 765 if (u_arg > sizeof(hmac_key)) { in aesni_cbc_hmac_sha256_ctrl() 768 SHA256_Final(hmac_key, &key->head); in aesni_cbc_hmac_sha256_ctrl() 770 memcpy(hmac_key, ptr, arg); in aesni_cbc_hmac_sha256_ctrl() 773 for (i = 0; i < sizeof(hmac_key); i++) in aesni_cbc_hmac_sha256_ctrl() 774 hmac_key[i] ^= 0x36; /* ipad */ in aesni_cbc_hmac_sha256_ctrl() 776 SHA256_Update(&key->head, hmac_key, sizeof(hmac_key)); in aesni_cbc_hmac_sha256_ctrl() 778 for (i = 0; i < sizeof(hmac_key); i++) in aesni_cbc_hmac_sha256_ctrl() 781 SHA256_Update(&key->tail, hmac_key, sizeof(hmac_key)); in aesni_cbc_hmac_sha256_ctrl() [all …]
|
/openssl/apps/ |
H A D | dgst.c | 100 char *hmac_key = NULL; in dgst_main() local 195 hmac_key = "etaonrishdlcupfm"; in dgst_main() 198 hmac_key = opt_arg(); in dgst_main() 275 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main() 328 if (hmac_key != NULL) { in dgst_main() 334 (unsigned char *)hmac_key, in dgst_main() 335 strlen(hmac_key)); in dgst_main()
|
H A D | speed.c | 2728 static const char hmac_key[] = "This is a key..."; in speed_main() local 2729 int len = strlen(hmac_key); in speed_main() 2744 (char *)hmac_key, len); in speed_main()
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 174 * an aes_key, a hmac_key and optionally 187 key->hmac_key, 32); 204 key->hmac_key, 32);
|