Searched defs:hmac (Results 1 - 9 of 9) sorted by relevance

/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSoftCommon.c170 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local
178 (pSignature != NULL ? hmac : NULL), pulSignatureLen, B_TRUE);
181 (void) memcpy(pSignature, hmac, *pulSignatureLen);
198 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local
209 ulDataLen, hmac, &len, B_FALSE);
216 if (memcmp(hmac, pSignature, len) != 0) {
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSignUtil.c155 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local
160 ulDataLen, hmac, pulSignatureLen, B_TRUE);
168 (void) memcpy(pSignature, hmac, *pulSignatureLen);
342 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local
347 0, hmac, pulSignatureLen, B_TRUE);
355 (void) memcpy(pSignature, hmac, *pulSignatureLen);
H A DsoftVerifyUtil.c163 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local
170 ulDataLen, hmac, &len, B_FALSE);
177 if (memcmp(hmac, pSignature, len) != 0) {
364 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; local
371 hmac, &len, B_FALSE);
378 if (memcmp(hmac, pSignature, len) != 0) {
H A DsoftKeystoreUtil.c1257 CK_BYTE hmac[OBJ_HMAC_SIZE], *decrypted_buf = NULL, *buf = NULL; local
1370 /* calculate hmac on re-encrypted data using new hmac key */
1373 encrypted_len, hmac, &hmac_len) != CKR_OK) {
1384 /* write new hmac */
1385 if (writen_nointr(new_fd, (char *)hmac, OBJ_HMAC_SIZE)
1531 /* read old hmac salt */
1590 /* no change to the hmac salt */
1726 /* destroy the old encryption key, and hmac key */
2378 /* write hmac */
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dmech_md5.c492 CK_BYTE hmac[MD5_DIGEST_LENGTH]; local
513 len = sizeof (hmac);
515 in_data, in_data_len, hmac, &len);
524 if (memcmp(hmac, signature, hmac_len) != 0) {
H A Dmech_sha.c222 CK_BYTE hmac[SHA1_DIGEST_LENGTH]; local
241 len = sizeof (hmac);
243 in_data, in_data_len, hmac, &len);
252 if (memcmp(hmac, signature, hmac_len) != 0) {
/osnet-11/usr/src/lib/libsasl/lib/
H A Dmd5.c45 #include "hmac-md5.h"
366 void _sasl_hmac_md5_init(HMAC_MD5_CTX *hmac, argument
414 _sasl_MD5Init(&hmac->ictx); /* init inner context */
415 _sasl_MD5Update(&hmac->ictx, k_ipad, 64); /* apply inner pad */
417 _sasl_MD5Init(&hmac->octx); /* init outer context */
418 _sasl_MD5Update(&hmac->octx, k_opad, 64); /* apply outer pad */
440 HMAC_MD5_CTX hmac; local
443 _sasl_hmac_md5_init(&hmac, key, key_len);
445 state->istate[lupe] = htonl(hmac.ictx.state[lupe]);
446 state->ostate[lupe] = htonl(hmac
452 _sasl_hmac_md5_import(HMAC_MD5_CTX *hmac, HMAC_MD5_STATE *state) argument
467 _sasl_hmac_md5_final(unsigned char digest[HMAC_MD5_SIZE], HMAC_MD5_CTX *hmac) argument
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/disk/
H A Dgeli.c97 grub_uint8_t hmac[64]; member in struct:grub_geli_key
509 - sizeof (candidate_key.hmac)),
514 if (grub_memcmp (candidate_key.hmac, key_hmac, dev->hash->mdlen) != 0)
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dmd.c153 int secure, int hmac);
427 md_open (gcry_md_hd_t *h, int algo, int secure, int hmac) argument
475 if (hmac)
828 /* Finish the hmac. */

Completed in 28 milliseconds