Searched defs:digest (Results 1 - 25 of 47) sorted by relevance

12

/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Digest/t/lib/Digest/
H A DDummy.pm17 sub digest { shift->{d} } subroutine
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/crypto/
H A Dmd5.h54 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon1004
/osnet-11/usr/src/lib/libsip/common/
H A Dsip_hash.c40 * the caller provides the hash table, the digest (opaque), the index into
42 * for removing an object, the caller provides the hash table, the digest
82 * Given the hash table, the digest to be searched for, index into the hash
87 sip_hash_find(sip_hash_t *sip_hash, void *digest, int hindex, argument
98 if (match_func(tmp->sip_obj, digest)) {
135 * Given the hash table, the digest to be searched for, the index into the
140 sip_hash_delete(sip_hash_t *sip_hash, void *digest, int hindex, argument
152 if (del_func(tmp->sip_obj, digest, &found)) {
H A Dsip_gids.c72 char *str6, int lstr6, uchar_t *digest)
99 _sasl_MD5Final(digest, &ctx);
123 MD5Final(digest, &ctx);
70 sip_md5_hash(char *str1, int lstr1, char *str2, int lstr2, char *str3, int lstr3, char *str4, int lstr4, char *str5, int lstr5, char *str6, int lstr6, uchar_t *digest) argument
H A Dsip_logging.c245 sip_print_digest(uint16_t *digest, int len, FILE *fp) argument
250 (void) fprintf(fp, "%u ", digest[cnt]);
/osnet-11/usr/src/lib/libldap4/sec/
H A Dcram_md5.c17 /* text is the challenge, key is the password, digest is an allocated
18 buffer (min 16 chars) which will contain the resulting digest */
20 int key_len, unsigned char *digest)
52 (void) MD5Final(digest, &context);
57 (void) MD5Update(&context, digest, 16);
59 (void) MD5Final(digest, &context);
19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dhash-common.c32 /* Run a selftest for hash algorithm ALGO. If the resulting digest
51 unsigned char *digest; local
54 return "digest size does not match expected size";
84 digest = _gcry_md_read (hd, algo);
86 if ( memcmp (digest, expect, expectlen) )
87 result = "digest mismatch";
H A Dhmac-tests.c25 digest algorithm modules, but that would blow up the code too much
44 /* Check one HMAC with digest ALGO using the regualr HAMC
55 const unsigned char *digest; local
68 digest = _gcry_md_read (hd, algo);
69 if (!digest)
74 if (memcmp (digest, expect, expectlen))
83 /* printf (" 0x%02x,", digest[i]); */
85 /* printf (" 0x%02x } },\n", digest[i]); */
369 const unsigned char *digest; local
387 digest
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/
H A Dhmac_md5.c53 char digest[MD5_CKSUM_LENGTH]; local
62 * Solaris Kerberos: The digest length is that of MD5_CKSUM_LENGTH not the key
63 * length, as keys can be of varying lengths but should not affect the digest
64 * length. The signing key is the digest and therefore is also the same
110 (CK_BYTE_PTR)digest, (CK_ULONG_PTR)&hashlen)) != CKR_OK) {
115 md5tmp.data = digest;
H A Dk5_md5des.c156 unsigned char digest[MD5_CKSUM_LENGTH]; local
240 (CK_BYTE_PTR)digest, (CK_ULONG_PTR)&hashlen)) != CKR_OK) {
248 *valid = (memcmp(plaintext+CONFLENGTH, digest, sizeof(digest)) == 0);
250 *valid = (memcmp(plaintext, digest, sizeof(digest)) == 0);
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_signing.c56 * Compute MD5 digest of packet data, using the stored MAC key.
68 uchar_t digest[MD5_DIGEST_LENGTH]; local
73 * (2) reduce the number of digest calls, at the
128 MD5Final(digest, &md5);
132 * (first 8 bytes of the digest)
135 bcopy(digest, signature, SMB_SIG_SIZE);
/osnet-11/usr/src/lib/libldap4/common/
H A Dsaslbind.c298 unsigned char digest[16]; local
305 bzero(digest, sizeof (digest));
318 (unsigned char *)cred->bv_val, cred->bv_len, digest);
322 theHDigest = hexa_print(digest, 16);
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/
H A Dcram_md5.c17 /* text is the challenge, key is the password, digest is an allocated
18 buffer (min 16 chars) which will contain the resulting digest */
20 int key_len, unsigned char *digest)
52 (void) MD5Final(digest, &context);
57 (void) MD5Update(&context, digest, 16);
59 (void) MD5Final(digest, &context);
74 unsigned char digest[16]; local
81 bzero(digest, sizeof (digest));
94 (unsigned char *)cred->bv_val, cred->bv_len, digest);
19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument
[all...]
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_crypt.c38 * Compute an MD4 digest.
51 /* 16-byte MD5 digest */
69 /* Initialize the digest operation in the session */
94 unsigned char *digest)
117 /* Initialize the digest operation in the session */
130 rv = C_SignFinal(hSession, (CK_BYTE_PTR)digest, &diglen);
90 smb_auth_hmac_md5(const unsigned char *data, int data_len, const unsigned char *key, int key_len, unsigned char *digest) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelDigest.c73 * the message digest.
75 session_p->digest.flags |= CRYPTO_OPERATION_ACTIVE;
78 session_p->digest.mech.mechanism = pMechanism->mechanism;
79 session_p->digest.mech.pParameter = NULL;
80 session_p->digest.mech.ulParameterLen = 0;
81 session_p->digest.flags |= CRYPTO_EMULATE;
115 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE;
146 crypto_digest_t digest; local
170 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) {
184 if (session_p->digest
[all...]
H A DkernelSession.h47 /* Used for emulating digest and HMAC mechs */
58 * CRYPTO_EMULATE flag is set for a digest or sign/verify with a HMAC
94 crypto_active_op_t digest; /* context of active digest operation */ member in struct:session
/osnet-11/usr/src/lib/libresolv2/common/dst/
H A Dhmac_link.c82 * context the context to be used in this digest
189 u_char digest[MD5_LEN]; local
192 MD5Final(digest, ctx);
197 MD5Update(ctx, digest, MD5_LEN);
198 MD5Final(digest, ctx);
201 if (memcmp(digest, signature, MD5_LEN) != 0)
/osnet-11/usr/src/lib/libsasl/lib/
H A Dcheckpw.c274 unsigned char digest[16]; local
314 _sasl_MD5Final(digest, &ctx);
316 /* convert digest from binary to ASCII hex */
318 sprintf(digeststr + (i*2), "%02x", digest[i]);
H A Dmd5.c7 /* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm
133 /* MD5 block update operation. Continues an MD5 message-digest
178 /* MD5 finalization. Ends an MD5 message-digest operation, writing the
179 the message digest and zeroizing the context.
182 void _sasl_MD5Final (digest, context)
183 unsigned char digest[16]; /* message digest */
200 /* Store state in digest */
201 Encode (digest, context->state, 16);
467 void _sasl_hmac_md5_final(unsigned char digest[HMAC_MD5_SIZ argument
[all...]
/osnet-11/usr/src/lib/libnsl/key/
H A Dxcrypt.c291 uint8_t digest[MD5HEXSIZE/2]; local
296 MD5Final(digest, &md5_ctx);
298 /* convert md5 binary digest to hex */
299 (void) bin2hex(MD5HEXSIZE/2, digest, md5hexbuf);
422 uint8_t digest[MD5HEXSIZE/2]; local
427 MD5Final(digest, &md5_ctx);
429 /* convert md5 binary digest to hex */
430 (void) bin2hex(MD5HEXSIZE/2, digest, md5hexbuf);
432 /* does the digest match the appended one? */
/osnet-11/usr/src/grub/grub2/grub-core/disk/
H A Dluks.c350 grub_uint8_t digest[keysize]; local
365 digest, keysize);
375 gcry_err = grub_cryptodisk_setkey (dev, digest, keysize);
428 /* Compare the calculated PBKDF2 to the digest stored
433 grub_dprintf ("luks", "bad digest\n");
/osnet-11/usr/src/lib/crypt_modules/sunmd5/
H A Dsunmd5.c95 md5bit(uint8_t *digest, int bit_num) argument
104 /* return the value of bit N from the digest */
105 return ((digest[byte_off] & (0x01 << bit_off)) ? 1 : 0);
259 uint8_t digest[DIGEST_LEN]; /* where the MD5 digest is stored */ member in struct:__anon951
268 int indirect_a; /* 7bit index into digest */
271 int indirect_b; /* 7bit index into digest */
317 /* compute the digest */
319 MD5Final(data.digest, &data.context);
331 /* update with the previous digest */
[all...]
/osnet-11/usr/src/grub/grub-0.97/stage2/
H A Dmd5.c215 unsigned char *digest; local
241 digest = md5_final ();
242 memcpy (alt_result, digest, 16);
254 digest = md5_final ();
258 memcpy (alt_result, digest, 16);
277 digest = md5_final ();
284 digest[i == 4 ? 5 : 12+i] | (digest[6+i] << 8) | (digest[i] << 16);
301 unsigned int w = digest[1
339 unsigned char* digest = md5 (buffer); local
[all...]
/osnet-11/usr/src/lib/libsqlite/src/
H A Dmd5.c19 * This code implements the MD5 message-digest algorithm.
29 * To compute the message digest of a chunk of bytes, declare an
32 * will fill a supplied 16-byte array with the digest.
236 static void MD5Final(unsigned char digest[16], MD5Context *pCtx){ argument
273 memcpy(digest, ctx->buf, 16);
278 ** Convert a digest into base-16. digest should be declared as
279 ** "unsigned char digest[16]" in the calling function. The MD5
280 ** digest is stored in the first 16 bytes. zBuf should
283 static void DigestToBase16(unsigned char *digest, cha argument
301 unsigned char digest[16]; local
322 unsigned char digest[16]; local
379 unsigned char digest[16]; local
[all...]
/osnet-11/usr/src/lib/libsum/common/
H A Dsum-sha1.c51 uint8_t digest[20]; member in struct:Sha1_s
283 * Add padding and return the message digest.
309 for (i = 0; i < elementsof(sha->digest); i++)
311 sha->digest[i] = (unsigned char)((sha->state[i >> 2] >> ((3 - (i & 3)) * 8)) & 255);
312 sha->digest_sum[i] ^= sha->digest[i];
327 d = (flags & SUM_TOTAL) ? sha->digest_sum : sha->digest;
328 for (n = 0; n < elementsof(sha->digest); n++)
338 data->size = elementsof(sha->digest);
340 data->buf = sha->digest;

Completed in 109 milliseconds

12