Lines Matching refs:key

189 mac_init_ctx(soft_session_t *session_p, soft_object_t *key,
200 if (OBJ_SEC(key)->sk_value_len > MD5_SSL_PAD_AND_KEY_SIZE) {
207 /* SSL MAC is HASH(key + opad + HASH(key + ipad + data)) */
208 (void) memcpy(md5_ipad, OBJ_SEC(key)->sk_value,
209 OBJ_SEC(key)->sk_value_len);
210 (void) memcpy(&md5_ipad[OBJ_SEC(key)->sk_value_len],
212 (void) memcpy(md5_opad, OBJ_SEC(key)->sk_value,
213 OBJ_SEC(key)->sk_value_len);
214 (void) memcpy(&md5_opad[OBJ_SEC(key)->sk_value_len],
233 if (OBJ_SEC(key)->sk_value_len > MD5_HMAC_BLOCK_SIZE) {
235 * Hash the key when it is longer than 64 bytes.
243 rv = soft_digest(session_p, OBJ_SEC(key)->sk_value,
244 OBJ_SEC(key)->sk_value_len, (CK_BYTE_PTR)md5_ipad,
251 (void) memcpy(md5_ipad, OBJ_SEC(key)->sk_value,
252 OBJ_SEC(key)->sk_value_len);
253 (void) memcpy(md5_opad, OBJ_SEC(key)->sk_value,
254 OBJ_SEC(key)->sk_value_len);
266 if (OBJ_SEC(key)->sk_value_len > SHA1_HMAC_BLOCK_SIZE) {
273 /* SSL MAC is HASH(key + opad + HASH(key + ipad + data)) */
274 (void) memcpy(sha1_ipad, OBJ_SEC(key)->sk_value,
275 OBJ_SEC(key)->sk_value_len);
276 (void) memcpy(&sha1_ipad[OBJ_SEC(key)->sk_value_len],
278 (void) memcpy(sha1_opad, OBJ_SEC(key)->sk_value,
279 OBJ_SEC(key)->sk_value_len);
280 (void) memcpy(&sha1_opad[OBJ_SEC(key)->sk_value_len],
299 if (OBJ_SEC(key)->sk_value_len > SHA1_HMAC_BLOCK_SIZE) {
301 * Hash the key when it is longer than 64 bytes.
309 rv = soft_digest(session_p, OBJ_SEC(key)->sk_value,
310 OBJ_SEC(key)->sk_value_len, (CK_BYTE_PTR)sha1_ipad,
317 (void) memcpy(sha1_ipad, OBJ_SEC(key)->sk_value,
318 OBJ_SEC(key)->sk_value_len);
319 (void) memcpy(sha1_opad, OBJ_SEC(key)->sk_value,
320 OBJ_SEC(key)->sk_value_len);
340 if (OBJ_SEC(key)->sk_value_len > SHA256_HMAC_BLOCK_SIZE) {
342 * Hash the key when it is longer than 64 bytes.
350 rv = soft_digest(session_p, OBJ_SEC(key)->sk_value,
351 OBJ_SEC(key)->sk_value_len, (CK_BYTE_PTR)sha_ipad,
358 (void) memcpy(sha_ipad, OBJ_SEC(key)->sk_value,
359 OBJ_SEC(key)->sk_value_len);
360 (void) memcpy(sha_opad, OBJ_SEC(key)->sk_value,
361 OBJ_SEC(key)->sk_value_len);
381 if (OBJ_SEC(key)->sk_value_len > SHA256_HMAC_BLOCK_SIZE) {
383 * Hash the key when it is longer than 64 bytes.
391 rv = soft_digest(session_p, OBJ_SEC(key)->sk_value,
392 OBJ_SEC(key)->sk_value_len, (CK_BYTE_PTR)sha_ipad,
399 (void) memcpy(sha_ipad, OBJ_SEC(key)->sk_value,
400 OBJ_SEC(key)->sk_value_len);
401 (void) memcpy(sha_opad, OBJ_SEC(key)->sk_value,
402 OBJ_SEC(key)->sk_value_len);
422 if (OBJ_SEC(key)->sk_value_len > SHA512_HMAC_BLOCK_SIZE) {
424 * Hash the key when it is longer than 64 bytes.
432 rv = soft_digest(session_p, OBJ_SEC(key)->sk_value,
433 OBJ_SEC(key)->sk_value_len, (CK_BYTE_PTR)sha_ipad,
440 (void) memcpy(sha_ipad, OBJ_SEC(key)->sk_value,
441 OBJ_SEC(key)->sk_value_len);
442 (void) memcpy(sha_opad, OBJ_SEC(key)->sk_value,
443 OBJ_SEC(key)->sk_value_len);
463 if (OBJ_SEC(key)->sk_value_len > SHA512_HMAC_BLOCK_SIZE) {
465 * Hash the key when it is longer than 64 bytes.
473 rv = soft_digest(session_p, OBJ_SEC(key)->sk_value,
474 OBJ_SEC(key)->sk_value_len, (CK_BYTE_PTR)sha_ipad,
481 (void) memcpy(sha_ipad, OBJ_SEC(key)->sk_value,
482 OBJ_SEC(key)->sk_value_len);
483 (void) memcpy(sha_opad, OBJ_SEC(key)->sk_value,
484 OBJ_SEC(key)->sk_value_len);
686 * The following 2 functions expect the MAC key to be already copied to
693 /* XOR key with ipad (0x36) and opad (0x5c) */
705 /* XOR key with ipad (0x36) and opad (0x5c) */
721 /* XOR key with ipad (0x36) and opad (0x5c) */