Searched defs:hmac (Results 1 - 8 of 8) sorted by relevance

/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSoftCommon.c170 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local
178 (pSignature != NULL ? hmac : NULL), pulSignatureLen, B_TRUE);
181 (void) memcpy(pSignature, hmac, *pulSignatureLen);
198 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local
209 ulDataLen, hmac, &len, B_FALSE);
216 if (memcmp(hmac, pSignature, len) != 0) {
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSignUtil.c152 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local
157 ulDataLen, hmac, pulSignatureLen, B_TRUE);
165 (void) memcpy(pSignature, hmac, *pulSignatureLen);
333 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local
338 0, hmac, pulSignatureLen, B_TRUE);
346 (void) memcpy(pSignature, hmac, *pulSignatureLen);
H A DsoftVerifyUtil.c154 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local
161 ulDataLen, hmac, &len, B_FALSE);
168 if (memcmp(hmac, pSignature, len) != 0) {
345 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; local
352 hmac, &len, B_FALSE);
359 if (memcmp(hmac, pSignature, len) != 0) {
H A DsoftKeystoreUtil.c1252 CK_BYTE hmac[OBJ_HMAC_SIZE], *decrypted_buf = NULL, *buf = NULL; local
1365 /* calculate hmac on re-encrypted data using new hmac key */
1368 encrypted_len, hmac, &hmac_len) != CKR_OK) {
1379 /* write new hmac */
1380 if (writen_nointr(new_fd, (char *)hmac, OBJ_HMAC_SIZE)
1526 /* read old hmac salt */
1585 /* no change to the hmac salt */
1721 /* destroy the old encryption key, and hmac key */
2371 /* write hmac */
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dmech_md5.c492 CK_BYTE hmac[MD5_DIGEST_LENGTH]; local
513 len = sizeof (hmac);
515 in_data, in_data_len, hmac, &len);
524 if (memcmp(hmac, signature, hmac_len) != 0) {
H A Dmech_sha.c222 CK_BYTE hmac[SHA1_DIGEST_LENGTH]; local
241 len = sizeof (hmac);
243 in_data, in_data_len, hmac, &len);
252 if (memcmp(hmac, signature, hmac_len) != 0) {
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dmd5.c45 #include "hmac-md5.h"
366 void _sasl_hmac_md5_init(HMAC_MD5_CTX *hmac, argument
414 _sasl_MD5Init(&hmac->ictx); /* init inner context */
415 _sasl_MD5Update(&hmac->ictx, k_ipad, 64); /* apply inner pad */
417 _sasl_MD5Init(&hmac->octx); /* init outer context */
418 _sasl_MD5Update(&hmac->octx, k_opad, 64); /* apply outer pad */
440 HMAC_MD5_CTX hmac; local
443 _sasl_hmac_md5_init(&hmac, key, key_len);
445 state->istate[lupe] = htonl(hmac.ictx.state[lupe]);
446 state->ostate[lupe] = htonl(hmac
452 _sasl_hmac_md5_import(HMAC_MD5_CTX *hmac, HMAC_MD5_STATE *state) argument
467 _sasl_hmac_md5_final(unsigned char digest[HMAC_MD5_SIZE], HMAC_MD5_CTX *hmac) argument
[all...]
/illumos-gate/usr/src/uts/common/io/
H A Dcryptmod.c977 char *hmac, int hmaclen)
989 ASSERT(hmac != NULL);
997 v1.iov_base = hmac;
1046 char *hmac, int hmaclen)
1058 ASSERT(hmac != NULL);
1066 v1.iov_base = hmac;
1182 char *hmac, int hmaclen)
1203 vmac.iov_base = hmac;
1568 * | confounder | msg-data | hmac |
1650 * | confounder | msg-data | hmac |
975 kef_decr_hmac(struct cipher_data_t *cdata, mblk_t *mp, int length, char *hmac, int hmaclen) argument
1044 kef_encr_hmac(struct cipher_data_t *cdata, mblk_t *mp, int length, char *hmac, int hmaclen) argument
1179 do_hmac(crypto_mech_type_t mech, crypto_key_t *key, char *data, int datalen, char *hmac, int hmaclen) argument
[all...]

Completed in 77 milliseconds