Symbol: hmac
crypto/heimdal/lib/gssapi/ntlm/crypto.c
149
unsigned char hmac[16];
crypto/heimdal/lib/gssapi/ntlm/crypto.c
158
encode_le_uint32(seq, hmac);
crypto/heimdal/lib/gssapi/ntlm/crypto.c
159
HMAC_Update(c, hmac, 4);
crypto/heimdal/lib/gssapi/ntlm/crypto.c
161
HMAC_Final(c, hmac, &hmaclen);
crypto/heimdal/lib/gssapi/ntlm/crypto.c
166
RC4(sealkey, 8, hmac, &out[4]);
crypto/heimdal/lib/gssapi/ntlm/crypto.c
168
memcpy(&out[4], hmac, 8);
crypto/libecc/include/libecc/hash/hmac.h
32
ATTRIBUTE_WARN_UNUSED_RET int hmac(const u8 *hmackey, u32 hmackey_len, hash_alg_type hash_type, const u8 *input, u32 ilen, u8 *output, u8 *outlen);
crypto/libecc/src/examples/sss/sss.c
106
ret = hmac(seed, SSS_SECRET_SIZE, SHA512, C, sizeof(C), hmac_val, &len); EG(ret, err);
crypto/libecc/src/sig/ecdsa_common.c
101
ret = hmac(K, hsize, hash_type, V, hsize, V, &hmac_size); EG(ret, err);
crypto/libecc/src/sig/ecdsa_common.c
116
ret = hmac(K, hsize, hash_type, V, hsize, V, &hmac_size); EG(ret, err);
crypto/libecc/src/sig/ecdsa_common.c
141
ret = hmac(K, hsize, hash_type, V, hsize, V, &hmac_size); EG(ret, err);
crypto/libecc/src/sig/ecdsa_common.c
162
ret = hmac(K, hsize, hash_type, V, hsize, V, &hmac_size); EG(ret, err);
crypto/libecc/src/wycheproof_tests/libecc_wycheproof.c
758
ret = hmac(t->key, t->keylen, t->hash, t->msg, t->msglen, hmac_res, &hlen);
crypto/openssl/crypto/pkcs12/p12_mutl.c
183
HMAC_CTX *hmac = NULL;
crypto/openssl/crypto/pkcs12/p12_mutl.c
287
if ((hmac = HMAC_CTX_new()) == NULL
crypto/openssl/crypto/pkcs12/p12_mutl.c
288
|| !HMAC_Init_ex(hmac, key, keylen, md, NULL)
crypto/openssl/crypto/pkcs12/p12_mutl.c
289
|| !HMAC_Update(hmac, p12->authsafes->d.data->data,
crypto/openssl/crypto/pkcs12/p12_mutl.c
291
|| !HMAC_Final(hmac, mac, maclen)) {
crypto/openssl/crypto/pkcs12/p12_mutl.c
298
HMAC_CTX_free(hmac);
crypto/openssl/crypto/rsa/rsa_ossl.c
434
HMAC_CTX *hmac = NULL;
crypto/openssl/crypto/rsa/rsa_ossl.c
479
hmac = HMAC_CTX_new();
crypto/openssl/crypto/rsa/rsa_ossl.c
480
if (hmac == NULL) {
crypto/openssl/crypto/rsa/rsa_ossl.c
485
if (HMAC_Init_ex(hmac, d_hash, sizeof(d_hash), md, NULL) <= 0) {
crypto/openssl/crypto/rsa/rsa_ossl.c
492
if (HMAC_Update(hmac, buf, num - flen) <= 0) {
crypto/openssl/crypto/rsa/rsa_ossl.c
497
if (HMAC_Update(hmac, from, flen) <= 0) {
crypto/openssl/crypto/rsa/rsa_ossl.c
503
if (HMAC_Final(hmac, kdk, &md_len) <= 0) {
crypto/openssl/crypto/rsa/rsa_ossl.c
510
HMAC_CTX_free(hmac);
crypto/openssl/crypto/rsa/rsa_pk1.c
288
HMAC_CTX *hmac = NULL;
crypto/openssl/crypto/rsa/rsa_pk1.c
301
hmac = HMAC_CTX_new();
crypto/openssl/crypto/rsa/rsa_pk1.c
302
if (hmac == NULL) {
crypto/openssl/crypto/rsa/rsa_pk1.c
320
if (HMAC_Init_ex(hmac, kdk, SHA256_DIGEST_LENGTH, md, NULL) <= 0) {
crypto/openssl/crypto/rsa/rsa_pk1.c
326
if (HMAC_Init_ex(hmac, NULL, 0, NULL, NULL) <= 0) {
crypto/openssl/crypto/rsa/rsa_pk1.c
334
if (HMAC_Update(hmac, be_iter, sizeof(be_iter)) <= 0) {
crypto/openssl/crypto/rsa/rsa_pk1.c
338
if (HMAC_Update(hmac, (unsigned char *)label, llen) <= 0) {
crypto/openssl/crypto/rsa/rsa_pk1.c
342
if (HMAC_Update(hmac, be_bitlen, sizeof(be_bitlen)) <= 0) {
crypto/openssl/crypto/rsa/rsa_pk1.c
354
if (HMAC_Final(hmac, hmac_out, &md_len) <= 0) {
crypto/openssl/crypto/rsa/rsa_pk1.c
360
if (HMAC_Final(hmac, to + pos, &md_len) <= 0) {
crypto/openssl/crypto/rsa/rsa_pk1.c
370
HMAC_CTX_free(hmac);
crypto/openssl/crypto/slh_dsa/slh_dsa_hash_ctx.c
51
if (key->hmac != NULL) {
crypto/openssl/crypto/slh_dsa/slh_dsa_hash_ctx.c
52
ret->hmac_ctx = EVP_MAC_CTX_new(key->hmac);
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
30
EVP_MAC_free(key->hmac);
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
57
key->hmac = EVP_MAC_fetch(key->libctx, "HMAC", key->propq);
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
58
if (key->hmac == NULL)
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
75
if (src->hmac != NULL)
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
76
EVP_MAC_up_ref(src->hmac);
crypto/openssl/crypto/slh_dsa/slh_dsa_key.h
49
EVP_MAC *hmac;
crypto/openssl/providers/implementations/include/prov/hmac_drbg.h
29
int ossl_drbg_hmac_generate(PROV_DRBG_HMAC *hmac,
crypto/openssl/providers/implementations/kdfs/hkdf.c
568
HMAC_CTX *hmac;
crypto/openssl/providers/implementations/kdfs/hkdf.c
587
if ((hmac = HMAC_CTX_new()) == NULL)
crypto/openssl/providers/implementations/kdfs/hkdf.c
590
if (!HMAC_Init_ex(hmac, prk, prk_len, evp_md, NULL))
crypto/openssl/providers/implementations/kdfs/hkdf.c
599
if (!HMAC_Init_ex(hmac, NULL, 0, NULL, NULL))
crypto/openssl/providers/implementations/kdfs/hkdf.c
602
if (!HMAC_Update(hmac, prev, dig_len))
crypto/openssl/providers/implementations/kdfs/hkdf.c
606
if (!HMAC_Update(hmac, info, info_len))
crypto/openssl/providers/implementations/kdfs/hkdf.c
609
if (!HMAC_Update(hmac, &ctr, 1))
crypto/openssl/providers/implementations/kdfs/hkdf.c
612
if (!HMAC_Final(hmac, prev, NULL))
crypto/openssl/providers/implementations/kdfs/hkdf.c
625
HMAC_CTX_free(hmac);
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
142
KDF_HMAC_DRBG *hmac = (KDF_HMAC_DRBG *)vctx;
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
143
PROV_DRBG_HMAC *drbg = &hmac->base;
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
180
KDF_HMAC_DRBG *hmac = (KDF_HMAC_DRBG *)vctx;
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
181
PROV_DRBG_HMAC *drbg = &hmac->base;
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
182
OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(hmac->provctx);
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
196
OPENSSL_free(hmac->entropy);
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
197
hmac->entropy = ptr;
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
198
hmac->entropylen = size;
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
199
hmac->init = 0;
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
207
OPENSSL_free(hmac->nonce);
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
208
hmac->nonce = ptr;
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
209
hmac->noncelen = size;
crypto/openssl/providers/implementations/kdfs/hmacdrbg_kdf.c
210
hmac->init = 0;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
103
return do_hmac(hmac, 0x01, in1, in1len, in2, in2len, in3, in3len);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
117
int ossl_drbg_hmac_init(PROV_DRBG_HMAC *hmac,
crypto/openssl/providers/implementations/rands/drbg_hmac.c
122
if (hmac->ctx == NULL) {
crypto/openssl/providers/implementations/rands/drbg_hmac.c
128
memset(hmac->K, 0x00, hmac->blocklen);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
130
memset(hmac->V, 0x01, hmac->blocklen);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
132
return drbg_hmac_update(hmac, ent, ent_len, nonce, nonce_len, pstr,
crypto/openssl/providers/implementations/rands/drbg_hmac.c
181
PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
184
return drbg_hmac_update(hmac, ent, ent_len, adin, adin_len, NULL, 0);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
206
int ossl_drbg_hmac_generate(PROV_DRBG_HMAC *hmac,
crypto/openssl/providers/implementations/rands/drbg_hmac.c
210
EVP_MAC_CTX *ctx = hmac->ctx;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
211
const unsigned char *temp = hmac->V;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
216
&& !drbg_hmac_update(hmac, adin, adin_len, NULL, 0, NULL, 0))
crypto/openssl/providers/implementations/rands/drbg_hmac.c
227
if (!EVP_MAC_init(ctx, hmac->K, hmac->blocklen, NULL)
crypto/openssl/providers/implementations/rands/drbg_hmac.c
228
|| !EVP_MAC_update(ctx, temp, hmac->blocklen))
crypto/openssl/providers/implementations/rands/drbg_hmac.c
231
if (outlen > hmac->blocklen) {
crypto/openssl/providers/implementations/rands/drbg_hmac.c
236
if (!EVP_MAC_final(ctx, hmac->V, NULL, sizeof(hmac->V)))
crypto/openssl/providers/implementations/rands/drbg_hmac.c
238
memcpy(out, hmac->V, outlen);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
241
out += hmac->blocklen;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
242
outlen -= hmac->blocklen;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
245
if (!drbg_hmac_update(hmac, adin, adin_len, NULL, 0, NULL, 0))
crypto/openssl/providers/implementations/rands/drbg_hmac.c
271
PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
273
OPENSSL_cleanse(hmac->K, sizeof(hmac->K));
crypto/openssl/providers/implementations/rands/drbg_hmac.c
274
OPENSSL_cleanse(hmac->V, sizeof(hmac->V));
crypto/openssl/providers/implementations/rands/drbg_hmac.c
297
PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
303
PROV_DRBG_VERIFY_ZEROIZATION(hmac->K);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
304
PROV_DRBG_VERIFY_ZEROIZATION(hmac->V);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
315
PROV_DRBG_HMAC *hmac;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
317
hmac = OPENSSL_secure_zalloc(sizeof(*hmac));
crypto/openssl/providers/implementations/rands/drbg_hmac.c
318
if (hmac == NULL)
crypto/openssl/providers/implementations/rands/drbg_hmac.c
323
drbg->data = hmac;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
347
PROV_DRBG_HMAC *hmac;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
349
if (drbg != NULL && (hmac = (PROV_DRBG_HMAC *)drbg->data) != NULL) {
crypto/openssl/providers/implementations/rands/drbg_hmac.c
350
EVP_MAC_CTX_free(hmac->ctx);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
351
ossl_prov_digest_reset(&hmac->digest);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
352
OPENSSL_secure_clear_free(hmac, sizeof(*hmac));
crypto/openssl/providers/implementations/rands/drbg_hmac.c
360
PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)drbg->data;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
377
if (hmac->ctx == NULL)
crypto/openssl/providers/implementations/rands/drbg_hmac.c
379
name = EVP_MAC_get0_name(EVP_MAC_CTX_get0_mac(hmac->ctx));
crypto/openssl/providers/implementations/rands/drbg_hmac.c
386
md = ossl_prov_digest_md(&hmac->digest);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
494
PROV_DRBG_HMAC *hmac = (PROV_DRBG_HMAC *)ctx->data;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
506
if (!drbg_fetch_algs_from_prov(params, libctx, &hmac->ctx, &prov_md)) {
crypto/openssl/providers/implementations/rands/drbg_hmac.c
509
if (!ossl_prov_digest_load_from_params(&hmac->digest, params, libctx))
crypto/openssl/providers/implementations/rands/drbg_hmac.c
512
if (!ossl_prov_macctx_load_from_params(&hmac->ctx, params,
crypto/openssl/providers/implementations/rands/drbg_hmac.c
518
ossl_prov_digest_set_md(&hmac->digest, prov_md);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
521
md = ossl_prov_digest_md(&hmac->digest);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
525
if (md != NULL && hmac->ctx != NULL) {
crypto/openssl/providers/implementations/rands/drbg_hmac.c
530
hmac->blocklen = (size_t)md_size;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
532
ctx->strength = 64 * (int)(hmac->blocklen >> 3);
crypto/openssl/providers/implementations/rands/drbg_hmac.c
535
ctx->seedlen = hmac->blocklen;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
54
static int do_hmac(PROV_DRBG_HMAC *hmac, unsigned char inbyte,
crypto/openssl/providers/implementations/rands/drbg_hmac.c
59
EVP_MAC_CTX *ctx = hmac->ctx;
crypto/openssl/providers/implementations/rands/drbg_hmac.c
61
if (!EVP_MAC_init(ctx, hmac->K, hmac->blocklen, NULL)
crypto/openssl/providers/implementations/rands/drbg_hmac.c
63
|| !EVP_MAC_update(ctx, hmac->V, hmac->blocklen)
crypto/openssl/providers/implementations/rands/drbg_hmac.c
68
|| !EVP_MAC_final(ctx, hmac->K, NULL, sizeof(hmac->K)))
crypto/openssl/providers/implementations/rands/drbg_hmac.c
72
return EVP_MAC_init(ctx, hmac->K, hmac->blocklen, NULL)
crypto/openssl/providers/implementations/rands/drbg_hmac.c
73
&& EVP_MAC_update(ctx, hmac->V, hmac->blocklen)
crypto/openssl/providers/implementations/rands/drbg_hmac.c
74
&& EVP_MAC_final(ctx, hmac->V, NULL, sizeof(hmac->V));
crypto/openssl/providers/implementations/rands/drbg_hmac.c
91
static int drbg_hmac_update(PROV_DRBG_HMAC *hmac,
crypto/openssl/providers/implementations/rands/drbg_hmac.c
97
if (!do_hmac(hmac, 0x00, in1, in1len, in2, in2len, in3, in3len))
crypto/openssl/providers/implementations/signature/mac_legacy_sig.c
239
MAC_SETTABLE_CTX_PARAMS(hmac, "HMAC")
crypto/openssl/providers/implementations/signature/mac_legacy_sig.c
262
MAC_SIGNATURE_FUNCTIONS(hmac)
crypto/openssl/providers/implementations/signature/mac_legacy_sig.c
91
MAC_NEWCTX(hmac, "HMAC")
crypto/openssl/ssl/record/methods/tls1_meth.c
485
EVP_MD_CTX *hmac = NULL, *mac_ctx;
crypto/openssl/ssl/record/methods/tls1_meth.c
500
hmac = EVP_MD_CTX_new();
crypto/openssl/ssl/record/methods/tls1_meth.c
501
if (hmac == NULL || !EVP_MD_CTX_copy(hmac, hash)) {
crypto/openssl/ssl/record/methods/tls1_meth.c
504
mac_ctx = hmac;
crypto/openssl/ssl/record/methods/tls1_meth.c
570
EVP_MD_CTX_free(hmac);
crypto/openssl/ssl/statem/extensions_srvr.c
1013
unsigned char hmac[SHA256_DIGEST_LENGTH];
crypto/openssl/ssl/statem/extensions_srvr.c
1057
|| EVP_DigestSign(hctx, hmac, &hmaclen, data,
crypto/openssl/ssl/statem/extensions_srvr.c
1070
if (CRYPTO_memcmp(hmac, mdin, SHA256_DIGEST_LENGTH) != 0) {
crypto/openssl/ssl/statem/extensions_srvr.c
2067
unsigned char *hmac, *hmac2;
crypto/openssl/ssl/statem/extensions_srvr.c
2135
|| !WPACKET_reserve_bytes(pkt, SHA256_DIGEST_LENGTH, &hmac)) {
crypto/openssl/ssl/statem/extensions_srvr.c
2161
|| EVP_DigestSign(hctx, hmac, &hmaclen, cookie,
crypto/openssl/ssl/statem/extensions_srvr.c
2174
|| !ossl_assert(hmac == hmac2)
crypto/openssl/ssl/statem/extensions_srvr.c
2175
|| !ossl_assert(cookie == hmac - totcookielen)
crypto/openssl/test/bad_dtls_test.c
479
EVP_MAC *hmac = NULL;
crypto/openssl/test/bad_dtls_test.c
504
if (!TEST_ptr(hmac = EVP_MAC_fetch(NULL, "HMAC", NULL))
crypto/openssl/test/bad_dtls_test.c
505
|| !TEST_ptr(ctx = EVP_MAC_CTX_new(hmac)))
crypto/openssl/test/bad_dtls_test.c
549
EVP_MAC_free(hmac);
sys/crypto/aesni/aesni.c
489
if ((ses->hmac && klen == 0) || (!ses->hmac && klen != 0))
sys/crypto/aesni/aesni.c
510
ses->hmac = true;
sys/crypto/aesni/aesni.c
519
ses->hmac = true;
sys/crypto/aesni/aesni.c
528
ses->hmac = true;
sys/crypto/aesni/aesni.c
790
if (ses->hmac) {
sys/crypto/aesni/aesni.h
64
bool hmac;
sys/crypto/ccp/ccp.c
242
axf = s->hmac.auth_hash;
sys/crypto/ccp/ccp.c
246
axf->Final(s->hmac.ipad, &auth_ctx);
sys/crypto/ccp/ccp.c
250
memcpy(s->hmac.ipad, key, klen);
sys/crypto/ccp/ccp.c
252
memset(s->hmac.ipad + klen, 0, axf->blocksize - klen);
sys/crypto/ccp/ccp.c
253
memcpy(s->hmac.opad, s->hmac.ipad, axf->blocksize);
sys/crypto/ccp/ccp.c
256
s->hmac.ipad[i] ^= HMAC_IPAD_VAL;
sys/crypto/ccp/ccp.c
257
s->hmac.opad[i] ^= HMAC_OPAD_VAL;
sys/crypto/ccp/ccp.c
491
s->hmac.auth_hash = auth_hash;
sys/crypto/ccp/ccp.c
492
s->hmac.auth_mode = auth_mode;
sys/crypto/ccp/ccp.c
494
s->hmac.hash_len = auth_hash->hashsize;
sys/crypto/ccp/ccp.c
496
s->hmac.hash_len = csp->csp_auth_mlen;
sys/crypto/ccp/ccp.c
555
KASSERT(s->hmac.auth_hash != NULL, ("auth key without HMAC"));
sys/crypto/ccp/ccp.h
92
struct ccp_session_hmac hmac;
sys/crypto/ccp/ccp_hardware.c
1209
axf = s->hmac.auth_hash;
sys/crypto/ccp/ccp_hardware.c
1220
axf->Update(&auth_ctx, s->hmac.opad, axf->blocksize);
sys/crypto/ccp/ccp_hardware.c
1221
ccp_sha_copy_result(ihash, s->hmac.res, s->hmac.auth_mode);
sys/crypto/ccp/ccp_hardware.c
1227
axf->Final(s->hmac.res, &auth_ctx);
sys/crypto/ccp/ccp_hardware.c
1230
crypto_copydata(crp, crp->crp_digest_start, s->hmac.hash_len,
sys/crypto/ccp/ccp_hardware.c
1232
if (timingsafe_bcmp(s->hmac.res, ihash, s->hmac.hash_len) != 0)
sys/crypto/ccp/ccp_hardware.c
1235
crypto_copyback(crp, crp->crp_digest_start, s->hmac.hash_len,
sys/crypto/ccp/ccp_hardware.c
1236
s->hmac.res);
sys/crypto/ccp/ccp_hardware.c
1240
explicit_bzero(s->hmac.res, sizeof(s->hmac.res));
sys/crypto/ccp/ccp_hardware.c
1265
axf = s->hmac.auth_hash;
sys/crypto/ccp/ccp_hardware.c
1273
error = sglist_append(qp->cq_sg_ulptx, s->hmac.ipad, axf->blocksize);
sys/crypto/ccp/ccp_hardware.c
1290
error = sglist_append(qp->cq_sg_dst, s->hmac.res,
sys/crypto/ccp/ccp_hardware.c
1295
error = ccp_sha(qp, s->hmac.auth_mode, qp->cq_sg_ulptx, qp->cq_sg_dst,
sys/dev/cxgbe/crypto/t4_crypto.c
1037
V_SCMD_AUTH_MODE(s->hmac.auth_mode) |
sys/dev/cxgbe/crypto/t4_crypto.c
1074
memcpy(dst, s->hmac.pads, iopad_size * 2);
sys/dev/cxgbe/crypto/t4_crypto.c
2061
axf = s->hmac.auth_hash;
sys/dev/cxgbe/crypto/t4_crypto.c
2063
t4_copy_partial_hash(axf->type, &auth_ctx, s->hmac.pads);
sys/dev/cxgbe/crypto/t4_crypto.c
2124
mk_size = s->hmac.mk_size;
sys/dev/cxgbe/crypto/t4_crypto.c
2126
iopad_size = roundup2(s->hmac.partial_digest_len, 16);
sys/dev/cxgbe/crypto/t4_crypto.c
225
struct ccr_session_hmac hmac;
sys/dev/cxgbe/crypto/t4_crypto.c
2483
s->hmac.auth_hash = auth_hash;
sys/dev/cxgbe/crypto/t4_crypto.c
2484
s->hmac.auth_mode = auth_mode;
sys/dev/cxgbe/crypto/t4_crypto.c
2485
s->hmac.mk_size = mk_size;
sys/dev/cxgbe/crypto/t4_crypto.c
2486
s->hmac.partial_digest_len = partial_digest_len;
sys/dev/cxgbe/crypto/t4_crypto.c
2488
s->hmac.hash_len = auth_hash->hashsize;
sys/dev/cxgbe/crypto/t4_crypto.c
2490
s->hmac.hash_len = csp->csp_auth_mlen;
sys/dev/cxgbe/crypto/t4_crypto.c
2494
s->hmac.pads);
sys/dev/cxgbe/crypto/t4_crypto.c
2570
t4_init_hmac_digest(s->hmac.auth_hash,
sys/dev/cxgbe/crypto/t4_crypto.c
2571
s->hmac.partial_digest_len, crp->crp_auth_key,
sys/dev/cxgbe/crypto/t4_crypto.c
2572
csp->csp_auth_klen, s->hmac.pads);
sys/dev/cxgbe/crypto/t4_crypto.c
2591
t4_init_hmac_digest(s->hmac.auth_hash,
sys/dev/cxgbe/crypto/t4_crypto.c
2592
s->hmac.partial_digest_len, crp->crp_auth_key,
sys/dev/cxgbe/crypto/t4_crypto.c
2593
csp->csp_auth_klen, s->hmac.pads);
sys/dev/cxgbe/crypto/t4_crypto.c
492
axf = s->hmac.auth_hash;
sys/dev/cxgbe/crypto/t4_crypto.c
503
iopad_size = roundup2(s->hmac.partial_digest_len, 16);
sys/dev/cxgbe/crypto/t4_crypto.c
566
V_SCMD_AUTH_MODE(s->hmac.auth_mode) |
sys/dev/cxgbe/crypto/t4_crypto.c
573
memcpy(crwr->key_ctx.key, s->hmac.pads, kctx_len);
sys/dev/cxgbe/crypto/t4_crypto.c
581
V_KEY_CONTEXT_MK_SIZE(s->hmac.mk_size) | V_KEY_CONTEXT_VALID(1));
sys/dev/cxgbe/crypto/t4_crypto.c
611
crypto_copydata(crp, crp->crp_digest_start, s->hmac.hash_len,
sys/dev/cxgbe/crypto/t4_crypto.c
613
if (timingsafe_bcmp((cpl + 1), hash, s->hmac.hash_len) != 0)
sys/dev/cxgbe/crypto/t4_crypto.c
616
crypto_copyback(crp, crp->crp_digest_start, s->hmac.hash_len,
sys/dev/cxgbe/crypto/t4_crypto.c
850
axf = s->hmac.auth_hash;
sys/dev/cxgbe/crypto/t4_crypto.c
851
hash_size_in_response = s->hmac.hash_len;
sys/dev/cxgbe/crypto/t4_crypto.c
904
iopad_size = roundup2(s->hmac.partial_digest_len, 16);
sys/dev/wg/wg_noise.c
1241
hmac(sec, x, ck, BLAKE2S_HASH_SIZE, x_len, NOISE_HASH_LEN);
sys/dev/wg/wg_noise.c
1248
hmac(out, out, sec, BLAKE2S_HASH_SIZE, 1, BLAKE2S_HASH_SIZE);
sys/dev/wg/wg_noise.c
1256
hmac(out, out, sec, BLAKE2S_HASH_SIZE, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE);
sys/dev/wg/wg_noise.c
1264
hmac(out, out, sec, BLAKE2S_HASH_SIZE, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE);
sys/netinet/sctp_auth.c
1129
if (list->hmac[i] == id)
sys/netinet/sctp_auth.c
1511
memset(auth->hmac, 0, SCTP_SIZE32(digestlen));
sys/netinet/sctp_auth.c
1545
m, auth_offset, auth->hmac);
sys/netinet/sctp_auth.c
1683
memcpy(digest, auth->hmac, digestlen);
sys/netinet/sctp_auth.c
1920
sizeof(stcb->asoc.local_hmacs->hmac[0]);
sys/netinet/sctp_auth.c
632
alloc_size = sizeof(*new_list) + num_hmacs * sizeof(new_list->hmac[0]);
sys/netinet/sctp_auth.c
670
if (list->hmac[i] == hmac_id) {
sys/netinet/sctp_auth.c
676
list->hmac[list->num_algo++] = hmac_id;
sys/netinet/sctp_auth.c
696
new_list->hmac[i] = list->hmac[i];
sys/netinet/sctp_auth.c
728
if (peer->hmac[i] == local->hmac[j]) {
sys/netinet/sctp_auth.c
732
peer->hmac[i]);
sys/netinet/sctp_auth.c
733
return (peer->hmac[i]);
sys/netinet/sctp_auth.c
755
hmac_id = htons(list->hmac[i]);
sys/netinet/sctp_auth.h
80
uint16_t hmac[];
sys/netinet/sctp_header.h
517
uint8_t hmac[];
sys/netinet/sctp_usrreq.c
2871
shmac->shmac_idents[i] = hmaclist->hmac[i];
sys/netinet/sctp_usrreq.c
4423
if (hmaclist->hmac[i] == SCTP_AUTH_HMAC_ID_SHA1) {