Home
last modified time | relevance | path

Searched refs:sik (Results 1 – 6 of 6) sorted by relevance

/openbmc/phosphor-net-ipmid/test/
H A Dcipher.cpp24 std::vector<uint8_t> sik = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, in TEST() local
27 auto algoPtr = std::make_unique<cipher::integrity::AlgoSHA1>(sik); in TEST()
48 if (HMAC(EVP_sha1(), sik.data(), sik.size(), const1.data(), const1.size(), in TEST()
85 std::vector<uint8_t> sik = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, in TEST() local
96 if (HMAC(EVP_sha1(), sik.data(), sik.size(), const1.data(), const1.size(), in TEST()
129 auto algoPtr = std::make_unique<cipher::integrity::AlgoSHA1>(sik); in TEST()
161 std::vector<uint8_t> sik = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, in TEST() local
164 auto algoPtr = std::make_unique<cipher::integrity::AlgoSHA1>(sik); in TEST()
185 std::vector<uint8_t> sik = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, in TEST() local
189 auto algoPtr = std::make_unique<cipher::integrity::AlgoSHA256>(sik); in TEST()
[all …]
/openbmc/phosphor-net-ipmid/
H A Dintegrity_algo.cpp15 AlgoSHA1::AlgoSHA1(const std::vector<uint8_t>& sik) : in AlgoSHA1() argument
18 k1 = generateKn(sik, rmcp::const_1); in AlgoSHA1()
64 std::vector<uint8_t> AlgoSHA1::generateKn(const std::vector<uint8_t>& sik, in generateKn() argument
68 std::vector<uint8_t> Kn(sik.size()); in generateKn()
72 if (HMAC(EVP_sha1(), sik.data(), sik.size(), const_n.data(), const_n.size(), in generateKn()
81 AlgoSHA256::AlgoSHA256(const std::vector<uint8_t>& sik) : in AlgoSHA256() argument
84 k1 = generateKn(sik, rmcp::const_1); in AlgoSHA256()
130 std::vector<uint8_t> AlgoSHA256::generateKn(const std::vector<uint8_t>& sik, in generateKn() argument
134 std::vector<uint8_t> Kn(sik.size()); in generateKn()
138 if (HMAC(EVP_sha256(), sik.data(), sik.size(), const_n.data(), in generateKn()
H A Dintegrity_algo.hpp132 const std::vector<uint8_t>& sik, const rmcp::Const_n& data) const = 0;
168 explicit AlgoSHA1(const std::vector<uint8_t>& sik);
215 std::vector<uint8_t> generateKn(const std::vector<uint8_t>& sik,
253 explicit AlgoSHA256(const std::vector<uint8_t>& sik);
300 std::vector<uint8_t> generateKn(const std::vector<uint8_t>& sik,
/openbmc/ipmitool/src/plugins/lanplus/
H A Dlanplus_crypt.c297 printbuf(session->v2_data.sik, 20l, ">> rakp4 mac key (sik)"); in lanplus_rakp4_hmac_matches()
307 session->v2_data.sik, in lanplus_rakp4_hmac_matches()
481 memset(session->v2_data.sik, 0, IPMI_SIK_BUFFER_SIZE); in lanplus_generate_sik()
570 session->v2_data.sik, in lanplus_generate_sik()
582 printbuf(session->v2_data.sik, 20, "Generated session integrity key"); in lanplus_generate_sik()
616 session->v2_data.sik, in lanplus_generate_k1()
660 session->v2_data.sik, in lanplus_generate_k2()
H A DREADME.lanplus34 per [RFC2104], keyed by sik". And "For the mandatory-to-implement
/openbmc/ipmitool/include/ipmitool/
H A Dipmi_intf.h134 uint8_t sik[IPMI_SIK_BUFFER_SIZE]; /* Session integrity key */ member