/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSoftCommon.c | 170 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local 178 (pSignature != NULL ? hmac : NULL), pulSignatureLen, B_TRUE); 181 (void) memcpy(pSignature, hmac, *pulSignatureLen); 198 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local 209 ulDataLen, hmac, &len, B_FALSE); 216 if (memcmp(hmac, pSignature, len) != 0) {
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSignUtil.c | 152 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local 157 ulDataLen, hmac, pulSignatureLen, B_TRUE); 165 (void) memcpy(pSignature, hmac, *pulSignatureLen); 333 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local 338 0, hmac, pulSignatureLen, B_TRUE); 346 (void) memcpy(pSignature, hmac, *pulSignatureLen);
|
H A D | softVerifyUtil.c | 154 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local 161 ulDataLen, hmac, &len, B_FALSE); 168 if (memcmp(hmac, pSignature, len) != 0) { 345 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; local 352 hmac, &len, B_FALSE); 359 if (memcmp(hmac, pSignature, len) != 0) {
|
H A D | softKeystoreUtil.c | 1252 CK_BYTE hmac[OBJ_HMAC_SIZE], *decrypted_buf = NULL, *buf = NULL; local 1365 /* calculate hmac on re-encrypted data using new hmac key */ 1368 encrypted_len, hmac, &hmac_len) != CKR_OK) { 1379 /* write new hmac */ 1380 if (writen_nointr(new_fd, (char *)hmac, OBJ_HMAC_SIZE) 1526 /* read old hmac salt */ 1585 /* no change to the hmac salt */ 1721 /* destroy the old encryption key, and hmac key */ 2371 /* write hmac */ [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_md5.c | 492 CK_BYTE hmac[MD5_DIGEST_LENGTH]; local 513 len = sizeof (hmac); 515 in_data, in_data_len, hmac, &len); 524 if (memcmp(hmac, signature, hmac_len) != 0) {
|
H A D | mech_sha.c | 222 CK_BYTE hmac[SHA1_DIGEST_LENGTH]; local 241 len = sizeof (hmac); 243 in_data, in_data_len, hmac, &len); 252 if (memcmp(hmac, signature, hmac_len) != 0) {
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | md5.c | 45 #include "hmac-md5.h" 366 void _sasl_hmac_md5_init(HMAC_MD5_CTX *hmac, argument 414 _sasl_MD5Init(&hmac->ictx); /* init inner context */ 415 _sasl_MD5Update(&hmac->ictx, k_ipad, 64); /* apply inner pad */ 417 _sasl_MD5Init(&hmac->octx); /* init outer context */ 418 _sasl_MD5Update(&hmac->octx, k_opad, 64); /* apply outer pad */ 440 HMAC_MD5_CTX hmac; local 443 _sasl_hmac_md5_init(&hmac, key, key_len); 445 state->istate[lupe] = htonl(hmac.ictx.state[lupe]); 446 state->ostate[lupe] = htonl(hmac 452 _sasl_hmac_md5_import(HMAC_MD5_CTX *hmac, HMAC_MD5_STATE *state) argument 467 _sasl_hmac_md5_final(unsigned char digest[HMAC_MD5_SIZE], HMAC_MD5_CTX *hmac) argument [all...] |
/illumos-gate/usr/src/uts/common/io/ |
H A D | cryptmod.c | 977 char *hmac, int hmaclen) 989 ASSERT(hmac != NULL); 997 v1.iov_base = hmac; 1046 char *hmac, int hmaclen) 1058 ASSERT(hmac != NULL); 1066 v1.iov_base = hmac; 1182 char *hmac, int hmaclen) 1203 vmac.iov_base = hmac; 1568 * | confounder | msg-data | hmac | 1650 * | confounder | msg-data | hmac | 975 kef_decr_hmac(struct cipher_data_t *cdata, mblk_t *mp, int length, char *hmac, int hmaclen) argument 1044 kef_encr_hmac(struct cipher_data_t *cdata, mblk_t *mp, int length, char *hmac, int hmaclen) argument 1179 do_hmac(crypto_mech_type_t mech, crypto_key_t *key, char *data, int datalen, char *hmac, int hmaclen) argument [all...] |