Searched refs:k_pad (Results 1 – 6 of 6) sorted by relevance
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | crypto_internal.c | 43 u8 k_pad[64]; in crypto_hash_init() local 88 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len); in crypto_hash_init() 92 MD5Update(&ctx->u.md5, k_pad, sizeof(k_pad)); in crypto_hash_init() 107 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len); in crypto_hash_init() 111 SHA1Update(&ctx->u.sha1, k_pad, sizeof(k_pad)); in crypto_hash_init() 127 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len); in crypto_hash_init() 131 sha256_process(&ctx->u.sha256, k_pad, sizeof(k_pad)); in crypto_hash_init() 181 u8 k_pad[64]; in crypto_hash_finish() local 260 MD5Update(&ctx->u.md5, k_pad, sizeof(k_pad)); in crypto_hash_finish() 280 SHA1Update(&ctx->u.sha1, k_pad, sizeof(k_pad)); in crypto_hash_finish() [all …]
|
H A D | sha1.c | 29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ in hmac_sha1_vector() local 61 os_memset(k_pad, 0, sizeof(k_pad)); in hmac_sha1_vector() 62 os_memcpy(k_pad, key, key_len); in hmac_sha1_vector() 65 k_pad[i] ^= 0x36; in hmac_sha1_vector() 68 _addr[0] = k_pad; in hmac_sha1_vector() 77 os_memset(k_pad, 0, sizeof(k_pad)); in hmac_sha1_vector() 78 os_memcpy(k_pad, key, key_len); in hmac_sha1_vector() 81 k_pad[i] ^= 0x5c; in hmac_sha1_vector() 84 _addr[0] = k_pad; in hmac_sha1_vector() 89 forced_memzero(k_pad, sizeof(k_pad)); in hmac_sha1_vector()
|
H A D | md5.c | 29 u8 k_pad[64]; /* padding - key XORd with ipad/opad */ in hmac_md5_vector() local 61 os_memset(k_pad, 0, sizeof(k_pad)); in hmac_md5_vector() 62 os_memcpy(k_pad, key, key_len); in hmac_md5_vector() 66 k_pad[i] ^= 0x36; in hmac_md5_vector() 69 _addr[0] = k_pad; in hmac_md5_vector() 78 os_memset(k_pad, 0, sizeof(k_pad)); in hmac_md5_vector() 79 os_memcpy(k_pad, key, key_len); in hmac_md5_vector() 82 k_pad[i] ^= 0x5c; in hmac_md5_vector() 85 _addr[0] = k_pad; in hmac_md5_vector() 90 os_memset(k_pad, 0, sizeof(k_pad)); in hmac_md5_vector()
|
H A D | sha384.c | 29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */ in hmac_sha384_vector() local 60 os_memset(k_pad, 0, sizeof(k_pad)); in hmac_sha384_vector() 61 os_memcpy(k_pad, key, key_len); in hmac_sha384_vector() 64 k_pad[i] ^= 0x36; in hmac_sha384_vector() 67 _addr[0] = k_pad; in hmac_sha384_vector() 76 os_memset(k_pad, 0, sizeof(k_pad)); in hmac_sha384_vector() 77 os_memcpy(k_pad, key, key_len); in hmac_sha384_vector() 80 k_pad[i] ^= 0x5c; in hmac_sha384_vector() 83 _addr[0] = k_pad; in hmac_sha384_vector()
|
H A D | sha512.c | 29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */ in hmac_sha512_vector() local 60 os_memset(k_pad, 0, sizeof(k_pad)); in hmac_sha512_vector() 61 os_memcpy(k_pad, key, key_len); in hmac_sha512_vector() 64 k_pad[i] ^= 0x36; in hmac_sha512_vector() 67 _addr[0] = k_pad; in hmac_sha512_vector() 76 os_memset(k_pad, 0, sizeof(k_pad)); in hmac_sha512_vector() 77 os_memcpy(k_pad, key, key_len); in hmac_sha512_vector() 80 k_pad[i] ^= 0x5c; in hmac_sha512_vector() 83 _addr[0] = k_pad; in hmac_sha512_vector()
|
H A D | sha256.c | 29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ in hmac_sha256_vector() local 60 os_memset(k_pad, 0, sizeof(k_pad)); in hmac_sha256_vector() 61 os_memcpy(k_pad, key, key_len); in hmac_sha256_vector() 64 k_pad[i] ^= 0x36; in hmac_sha256_vector() 67 _addr[0] = k_pad; in hmac_sha256_vector() 76 os_memset(k_pad, 0, sizeof(k_pad)); in hmac_sha256_vector() 77 os_memcpy(k_pad, key, key_len); in hmac_sha256_vector() 80 k_pad[i] ^= 0x5c; in hmac_sha256_vector() 83 _addr[0] = k_pad; in hmac_sha256_vector()
|