/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/crypto/ |
H A D | md5.h | 54 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon2506
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | rsa-md4.h | 44 /* 16 u_char's in the digest */ 89 unsigned char digest[16]; /* actual digest after MD4Final call */ member in struct:__anon4681
|
/illumos-gate/usr/src/lib/libsip/common/ |
H A D | sip_hash.c | 40 * the caller provides the hash table, the digest (opaque), the index into 42 * for removing an object, the caller provides the hash table, the digest 82 * Given the hash table, the digest to be searched for, index into the hash 87 sip_hash_find(sip_hash_t *sip_hash, void *digest, int hindex, argument 98 if (match_func(tmp->sip_obj, digest)) { 135 * Given the hash table, the digest to be searched for, the index into the 140 sip_hash_delete(sip_hash_t *sip_hash, void *digest, int hindex, argument 152 if (del_func(tmp->sip_obj, digest, &found)) {
|
H A D | sip_gids.c | 75 char *str6, int lstr6, uchar_t *digest) 102 _sasl_MD5Final(digest, &ctx); 126 MD5Final(digest, &ctx); 73 sip_md5_hash(char *str1, int lstr1, char *str2, int lstr2, char *str3, int lstr3, char *str4, int lstr4, char *str5, int lstr5, char *str6, int lstr6, uchar_t *digest) argument
|
H A D | sip_logging.c | 248 sip_print_digest(uint16_t *digest, int len, FILE *fp) argument 253 (void) fprintf(fp, "%u ", digest[cnt]);
|
/illumos-gate/usr/src/common/net/wanboot/crypt/ |
H A D | hmac_sha1.c | 76 uchar_t digest[20]) 97 SHA1Final(digest, sha1Context); 101 SHA1Update(sha1Context, digest, 20); 102 SHA1Final(digest, sha1Context); 75 HMACFinal(SHA1_CTX *sha1Context, const uchar_t *key, size_t klen, uchar_t digest[20]) argument
|
H A D | hmac_test.c | 33 * are used by the HMAC SHA-1 implemention to produce a hash digest and 34 * the the result is compared against the expected digest. 50 unsigned char digest[20]; member in struct:test_data 58 uchar_t digest[20]; local 68 getxdata(td[0].digest, "b617318655057264e28bc0b6fb378c8ef146be00", 20); 74 getxdata(td[1].digest, "effcdf6ae5eb2fa2d27416d5f184df9c259a7c79", 20); 82 getxdata(td[2].digest, "125d7342b9ac11cd91a39af48aa17b4f63f175d3", 20); 91 getxdata(td[3].digest, "4c9007f4026250c6bc8414f9bf50c86c2d7235da", 20); 98 getxdata(td[4].digest, "4c1a03424b55e07fe7f27be1d58bb9324a9a5a04", 20); 108 getxdata(td[5].digest, "aa4ae5e15272d00e95705637ce8a3b55ed40211 [all...] |
H A D | sha1_test.c | 87 uint8_t digest[20]; local 104 SHA1Final(digest, &sha); 107 if (bcmp(digest, rdigest, 20) != 0) {
|
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | edonr_zfs.c | 40 uint8_t digest[EDONR_MODE / 8]; local 46 EdonRFinal(&ctx, digest); 47 bcopy(digest, zcp->zc_word, sizeof (zcp->zc_word));
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | hmac_md5.c | 54 char digest[MD5_CKSUM_LENGTH]; local 63 * Solaris Kerberos: The digest length is that of MD5_CKSUM_LENGTH not the key 64 * length, as keys can be of varying lengths but should not affect the digest 65 * length. The signing key is the digest and therefore is also the same 117 (CK_BYTE_PTR)digest, (CK_ULONG_PTR)&hashlen)) != CKR_OK) { 124 md5tmp.data = digest;
|
H A D | k5_md5des.c | 163 unsigned char digest[MD5_CKSUM_LENGTH]; local 253 (CK_BYTE_PTR)digest, (CK_ULONG_PTR)&hashlen)) != CKR_OK) { 263 *valid = (memcmp(plaintext+CONFLENGTH, digest, sizeof(digest)) == 0); 265 *valid = (memcmp(plaintext, digest, sizeof(digest)) == 0);
|
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | signing.c | 58 * Compute MD5 digest of packet data, using the stored MAC key. 70 uchar_t digest[MD5_DIGEST_LENGTH]; local 75 * (2) reduce the number of digest calls, at the 130 MD5Final(digest, &md5); 134 * (first 8 bytes of the digest) 137 bcopy(digest, signature, SMBSIGLEN);
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 17 /* text is the challenge, key is the password, digest is an allocated 18 buffer (min 16 chars) which will contain the resulting digest */ 20 int key_len, unsigned char *digest) 52 (void) MD5Final(digest, &context); 57 (void) MD5Update(&context, digest, 16); 59 (void) MD5Final(digest, &context); 74 unsigned char digest[16]; local 81 bzero(digest, sizeof (digest)); 94 (unsigned char *)cred->bv_val, cred->bv_len, digest); 19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/hmac/ |
H A D | hmac.c | 48 * This routine is used to compute a hash digest for the file represented 50 * will be provided by the caller. The resulting hash digest will be 62 uint8_t digest[HMAC_DIGEST_LEN]; local 81 * Finalize the digest. 83 HMACFinal(&ctx, hmac_key, ka->ka_len, digest); 86 * Write the digest to stdout. 88 if (wbio_nwrite(STDOUT_FILENO, digest, sizeof (digest)) != 0) { 89 wbku_printerr("Cannot output digest"); 110 * This program is used to compute a hash digest fo [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelDigest.c | 74 * the message digest. 76 session_p->digest.flags |= CRYPTO_OPERATION_ACTIVE; 79 session_p->digest.mech.mechanism = pMechanism->mechanism; 80 session_p->digest.mech.pParameter = NULL; 81 session_p->digest.mech.ulParameterLen = 0; 82 session_p->digest.flags |= CRYPTO_EMULATE; 116 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE; 147 crypto_digest_t digest; local 171 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) { 185 if (session_p->digest [all...] |
H A D | kernelSession.h | 48 /* Used for emulating digest and HMAC mechs */ 59 * CRYPTO_EMULATE flag is set for a digest or sign/verify with a HMAC 95 crypto_active_op_t digest; /* context of active digest operation */ member in struct:session
|
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_crypt.c | 64 * Compute an MD4 digest. 82 unsigned char *digest) 105 /* Initialize the digest operation in the session */ 118 rv = C_SignFinal(hSession, (CK_BYTE_PTR)digest, &diglen); 78 smb_auth_hmac_md5(unsigned char *data, int data_len, unsigned char *key, int key_len, unsigned char *digest) argument
|
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/ |
H A D | smb_sign.c | 89 crypto_data_t digest; local 95 * (2) reduce the number of digest calls, at the 168 digest.cd_format = CRYPTO_DATA_RAW; 169 digest.cd_offset = 0; 170 digest.cd_length = sizeof (mac); 171 digest.cd_miscdata = 0; 172 digest.cd_raw.iov_base = (char *)mac; 173 digest.cd_raw.iov_len = sizeof (mac); 174 status = crypto_digest_final(crypto_ctx, &digest, 0);
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_digest.c | 40 * Message digest routines 76 * digest: Storage for the digest. The length needed depends on the 84 * When complete and successful, 'digest' will contain the digest value. 96 crypto_mechanism_t *mech, crypto_data_t *data, crypto_data_t *digest, 115 data, digest); 131 crypto_data_t *digest, crypto_call_req_t *crq) 154 digest, KCF_SWFP_RHNDL(crq)); 163 pd->pd_sid, mech, NULL, data, digest); 95 crypto_digest_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_data_t *digest, crypto_call_req_t *crq) argument 130 crypto_digest(crypto_mechanism_t *mech, crypto_data_t *data, crypto_data_t *digest, crypto_call_req_t *crq) argument 385 crypto_digest_final(crypto_context_t context, crypto_data_t *digest, crypto_call_req_t *cr) argument 456 crypto_digest_single(crypto_context_t context, crypto_data_t *data, crypto_data_t *digest, crypto_call_req_t *cr) argument [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb2_signing.c | 157 uint8_t *digest) 235 * Note: digest is _always_ SMB2_SIG_SIZE, 238 if ((rc = smb2_hmac_final(ctx, digest)) != 0) 156 smb2_sign_calc(smb_request_t *sr, struct mbuf_chain *mbc, uint8_t *digest) argument
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSession.h | 92 crypto_active_op_t digest; /* context of active digest operation */ member in struct:session
|
/illumos-gate/usr/src/lib/crypt_modules/sunmd5/ |
H A D | sunmd5.c | 95 md5bit(uint8_t *digest, int bit_num) argument 104 /* return the value of bit N from the digest */ 105 return ((digest[byte_off] & (0x01 << bit_off)) ? 1 : 0); 259 uint8_t digest[DIGEST_LEN]; /* where the MD5 digest is stored */ member in struct:__anon2456 268 int indirect_a; /* 7bit index into digest */ 271 int indirect_b; /* 7bit index into digest */ 317 /* compute the digest */ 319 MD5Final(data.digest, &data.context); 331 /* update with the previous digest */ [all...] |
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 274 unsigned char digest[16]; local 314 _sasl_MD5Final(digest, &ctx); 316 /* convert digest from binary to ASCII hex */ 318 sprintf(digeststr + (i*2), "%02x", digest[i]);
|
H A D | md5.c | 7 /* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm 133 /* MD5 block update operation. Continues an MD5 message-digest 178 /* MD5 finalization. Ends an MD5 message-digest operation, writing the 179 the message digest and zeroizing the context. 182 void _sasl_MD5Final (digest, context) 183 unsigned char digest[16]; /* message digest */ 200 /* Store state in digest */ 201 Encode (digest, context->state, 16); 467 void _sasl_hmac_md5_final(unsigned char digest[HMAC_MD5_SIZ argument [all...] |
/illumos-gate/usr/src/lib/libsqlite/src/ |
H A D | md5.c | 19 * This code implements the MD5 message-digest algorithm. 29 * To compute the message digest of a chunk of bytes, declare an 32 * will fill a supplied 16-byte array with the digest. 236 static void MD5Final(unsigned char digest[16], MD5Context *pCtx){ argument 273 memcpy(digest, ctx->buf, 16); 278 ** Convert a digest into base-16. digest should be declared as 279 ** "unsigned char digest[16]" in the calling function. The MD5 280 ** digest is stored in the first 16 bytes. zBuf should 283 static void DigestToBase16(unsigned char *digest, cha argument 301 unsigned char digest[16]; local 322 unsigned char digest[16]; local 379 unsigned char digest[16]; local [all...] |