/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Digest/t/lib/Digest/ |
H A D | Dummy.pm | 17 sub digest { shift->{d} } subroutine
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/crypto/ |
H A D | md5.h | 54 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon1004
|
/osnet-11/usr/src/lib/libsip/common/ |
H A D | sip_hash.c | 40 * the caller provides the hash table, the digest (opaque), the index into 42 * for removing an object, the caller provides the hash table, the digest 82 * Given the hash table, the digest to be searched for, index into the hash 87 sip_hash_find(sip_hash_t *sip_hash, void *digest, int hindex, argument 98 if (match_func(tmp->sip_obj, digest)) { 135 * Given the hash table, the digest to be searched for, the index into the 140 sip_hash_delete(sip_hash_t *sip_hash, void *digest, int hindex, argument 152 if (del_func(tmp->sip_obj, digest, &found)) {
|
H A D | sip_gids.c | 72 char *str6, int lstr6, uchar_t *digest) 99 _sasl_MD5Final(digest, &ctx); 123 MD5Final(digest, &ctx); 70 sip_md5_hash(char *str1, int lstr1, char *str2, int lstr2, char *str3, int lstr3, char *str4, int lstr4, char *str5, int lstr5, char *str6, int lstr6, uchar_t *digest) argument
|
H A D | sip_logging.c | 245 sip_print_digest(uint16_t *digest, int len, FILE *fp) argument 250 (void) fprintf(fp, "%u ", digest[cnt]);
|
/osnet-11/usr/src/lib/libldap4/sec/ |
H A D | cram_md5.c | 17 /* text is the challenge, key is the password, digest is an allocated 18 buffer (min 16 chars) which will contain the resulting digest */ 20 int key_len, unsigned char *digest) 52 (void) MD5Final(digest, &context); 57 (void) MD5Update(&context, digest, 16); 59 (void) MD5Final(digest, &context); 19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | hash-common.c | 32 /* Run a selftest for hash algorithm ALGO. If the resulting digest 51 unsigned char *digest; local 54 return "digest size does not match expected size"; 84 digest = _gcry_md_read (hd, algo); 86 if ( memcmp (digest, expect, expectlen) ) 87 result = "digest mismatch";
|
H A D | hmac-tests.c | 25 digest algorithm modules, but that would blow up the code too much 44 /* Check one HMAC with digest ALGO using the regualr HAMC 55 const unsigned char *digest; local 68 digest = _gcry_md_read (hd, algo); 69 if (!digest) 74 if (memcmp (digest, expect, expectlen)) 83 /* printf (" 0x%02x,", digest[i]); */ 85 /* printf (" 0x%02x } },\n", digest[i]); */ 369 const unsigned char *digest; local 387 digest [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | hmac_md5.c | 53 char digest[MD5_CKSUM_LENGTH]; local 62 * Solaris Kerberos: The digest length is that of MD5_CKSUM_LENGTH not the key 63 * length, as keys can be of varying lengths but should not affect the digest 64 * length. The signing key is the digest and therefore is also the same 110 (CK_BYTE_PTR)digest, (CK_ULONG_PTR)&hashlen)) != CKR_OK) { 115 md5tmp.data = digest;
|
H A D | k5_md5des.c | 156 unsigned char digest[MD5_CKSUM_LENGTH]; local 240 (CK_BYTE_PTR)digest, (CK_ULONG_PTR)&hashlen)) != CKR_OK) { 248 *valid = (memcmp(plaintext+CONFLENGTH, digest, sizeof(digest)) == 0); 250 *valid = (memcmp(plaintext, digest, sizeof(digest)) == 0);
|
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_signing.c | 56 * Compute MD5 digest of packet data, using the stored MAC key. 68 uchar_t digest[MD5_DIGEST_LENGTH]; local 73 * (2) reduce the number of digest calls, at the 128 MD5Final(digest, &md5); 132 * (first 8 bytes of the digest) 135 bcopy(digest, signature, SMB_SIG_SIZE);
|
/osnet-11/usr/src/lib/libldap4/common/ |
H A D | saslbind.c | 298 unsigned char digest[16]; local 305 bzero(digest, sizeof (digest)); 318 (unsigned char *)cred->bv_val, cred->bv_len, digest); 322 theHDigest = hexa_print(digest, 16);
|
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 17 /* text is the challenge, key is the password, digest is an allocated 18 buffer (min 16 chars) which will contain the resulting digest */ 20 int key_len, unsigned char *digest) 52 (void) MD5Final(digest, &context); 57 (void) MD5Update(&context, digest, 16); 59 (void) MD5Final(digest, &context); 74 unsigned char digest[16]; local 81 bzero(digest, sizeof (digest)); 94 (unsigned char *)cred->bv_val, cred->bv_len, digest); 19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument [all...] |
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_crypt.c | 38 * Compute an MD4 digest. 51 /* 16-byte MD5 digest */ 69 /* Initialize the digest operation in the session */ 94 unsigned char *digest) 117 /* Initialize the digest operation in the session */ 130 rv = C_SignFinal(hSession, (CK_BYTE_PTR)digest, &diglen); 90 smb_auth_hmac_md5(const unsigned char *data, int data_len, const unsigned char *key, int key_len, unsigned char *digest) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelDigest.c | 73 * the message digest. 75 session_p->digest.flags |= CRYPTO_OPERATION_ACTIVE; 78 session_p->digest.mech.mechanism = pMechanism->mechanism; 79 session_p->digest.mech.pParameter = NULL; 80 session_p->digest.mech.ulParameterLen = 0; 81 session_p->digest.flags |= CRYPTO_EMULATE; 115 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE; 146 crypto_digest_t digest; local 170 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) { 184 if (session_p->digest [all...] |
H A D | kernelSession.h | 47 /* Used for emulating digest and HMAC mechs */ 58 * CRYPTO_EMULATE flag is set for a digest or sign/verify with a HMAC 94 crypto_active_op_t digest; /* context of active digest operation */ member in struct:session
|
/osnet-11/usr/src/lib/libresolv2/common/dst/ |
H A D | hmac_link.c | 82 * context the context to be used in this digest 189 u_char digest[MD5_LEN]; local 192 MD5Final(digest, ctx); 197 MD5Update(ctx, digest, MD5_LEN); 198 MD5Final(digest, ctx); 201 if (memcmp(digest, signature, MD5_LEN) != 0)
|
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 274 unsigned char digest[16]; local 314 _sasl_MD5Final(digest, &ctx); 316 /* convert digest from binary to ASCII hex */ 318 sprintf(digeststr + (i*2), "%02x", digest[i]);
|
H A D | md5.c | 7 /* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm 133 /* MD5 block update operation. Continues an MD5 message-digest 178 /* MD5 finalization. Ends an MD5 message-digest operation, writing the 179 the message digest and zeroizing the context. 182 void _sasl_MD5Final (digest, context) 183 unsigned char digest[16]; /* message digest */ 200 /* Store state in digest */ 201 Encode (digest, context->state, 16); 467 void _sasl_hmac_md5_final(unsigned char digest[HMAC_MD5_SIZ argument [all...] |
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | xcrypt.c | 291 uint8_t digest[MD5HEXSIZE/2]; local 296 MD5Final(digest, &md5_ctx); 298 /* convert md5 binary digest to hex */ 299 (void) bin2hex(MD5HEXSIZE/2, digest, md5hexbuf); 422 uint8_t digest[MD5HEXSIZE/2]; local 427 MD5Final(digest, &md5_ctx); 429 /* convert md5 binary digest to hex */ 430 (void) bin2hex(MD5HEXSIZE/2, digest, md5hexbuf); 432 /* does the digest match the appended one? */
|
/osnet-11/usr/src/grub/grub2/grub-core/disk/ |
H A D | luks.c | 350 grub_uint8_t digest[keysize]; local 365 digest, keysize); 375 gcry_err = grub_cryptodisk_setkey (dev, digest, keysize); 428 /* Compare the calculated PBKDF2 to the digest stored 433 grub_dprintf ("luks", "bad digest\n");
|
/osnet-11/usr/src/lib/crypt_modules/sunmd5/ |
H A D | sunmd5.c | 95 md5bit(uint8_t *digest, int bit_num) argument 104 /* return the value of bit N from the digest */ 105 return ((digest[byte_off] & (0x01 << bit_off)) ? 1 : 0); 259 uint8_t digest[DIGEST_LEN]; /* where the MD5 digest is stored */ member in struct:__anon951 268 int indirect_a; /* 7bit index into digest */ 271 int indirect_b; /* 7bit index into digest */ 317 /* compute the digest */ 319 MD5Final(data.digest, &data.context); 331 /* update with the previous digest */ [all...] |
/osnet-11/usr/src/grub/grub-0.97/stage2/ |
H A D | md5.c | 215 unsigned char *digest; local 241 digest = md5_final (); 242 memcpy (alt_result, digest, 16); 254 digest = md5_final (); 258 memcpy (alt_result, digest, 16); 277 digest = md5_final (); 284 digest[i == 4 ? 5 : 12+i] | (digest[6+i] << 8) | (digest[i] << 16); 301 unsigned int w = digest[1 339 unsigned char* digest = md5 (buffer); local [all...] |
/osnet-11/usr/src/lib/libsqlite/src/ |
H A D | md5.c | 19 * This code implements the MD5 message-digest algorithm. 29 * To compute the message digest of a chunk of bytes, declare an 32 * will fill a supplied 16-byte array with the digest. 236 static void MD5Final(unsigned char digest[16], MD5Context *pCtx){ argument 273 memcpy(digest, ctx->buf, 16); 278 ** Convert a digest into base-16. digest should be declared as 279 ** "unsigned char digest[16]" in the calling function. The MD5 280 ** digest is stored in the first 16 bytes. zBuf should 283 static void DigestToBase16(unsigned char *digest, cha argument 301 unsigned char digest[16]; local 322 unsigned char digest[16]; local 379 unsigned char digest[16]; local [all...] |
/osnet-11/usr/src/lib/libsum/common/ |
H A D | sum-sha1.c | 51 uint8_t digest[20]; member in struct:Sha1_s 283 * Add padding and return the message digest. 309 for (i = 0; i < elementsof(sha->digest); i++) 311 sha->digest[i] = (unsigned char)((sha->state[i >> 2] >> ((3 - (i & 3)) * 8)) & 255); 312 sha->digest_sum[i] ^= sha->digest[i]; 327 d = (flags & SUM_TOTAL) ? sha->digest_sum : sha->digest; 328 for (n = 0; n < elementsof(sha->digest); n++) 338 data->size = elementsof(sha->digest); 340 data->buf = sha->digest;
|