/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSoftCommon.c | 170 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local 178 (pSignature != NULL ? hmac : NULL), pulSignatureLen, B_TRUE); 181 (void) memcpy(pSignature, hmac, *pulSignatureLen); 198 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local 209 ulDataLen, hmac, &len, B_FALSE); 216 if (memcmp(hmac, pSignature, len) != 0) {
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSignUtil.c | 155 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local 160 ulDataLen, hmac, pulSignatureLen, B_TRUE); 168 (void) memcpy(pSignature, hmac, *pulSignatureLen); 342 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local 347 0, hmac, pulSignatureLen, B_TRUE); 355 (void) memcpy(pSignature, hmac, *pulSignatureLen);
|
H A D | softVerifyUtil.c | 163 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ local 170 ulDataLen, hmac, &len, B_FALSE); 177 if (memcmp(hmac, pSignature, len) != 0) { 364 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; local 371 hmac, &len, B_FALSE); 378 if (memcmp(hmac, pSignature, len) != 0) {
|
H A D | softKeystoreUtil.c | 1257 CK_BYTE hmac[OBJ_HMAC_SIZE], *decrypted_buf = NULL, *buf = NULL; local 1370 /* calculate hmac on re-encrypted data using new hmac key */ 1373 encrypted_len, hmac, &hmac_len) != CKR_OK) { 1384 /* write new hmac */ 1385 if (writen_nointr(new_fd, (char *)hmac, OBJ_HMAC_SIZE) 1531 /* read old hmac salt */ 1590 /* no change to the hmac salt */ 1726 /* destroy the old encryption key, and hmac key */ 2378 /* write hmac */ [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_md5.c | 492 CK_BYTE hmac[MD5_DIGEST_LENGTH]; local 513 len = sizeof (hmac); 515 in_data, in_data_len, hmac, &len); 524 if (memcmp(hmac, signature, hmac_len) != 0) {
|
H A D | mech_sha.c | 222 CK_BYTE hmac[SHA1_DIGEST_LENGTH]; local 241 len = sizeof (hmac); 243 in_data, in_data_len, hmac, &len); 252 if (memcmp(hmac, signature, hmac_len) != 0) {
|
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | md5.c | 45 #include "hmac-md5.h" 366 void _sasl_hmac_md5_init(HMAC_MD5_CTX *hmac, argument 414 _sasl_MD5Init(&hmac->ictx); /* init inner context */ 415 _sasl_MD5Update(&hmac->ictx, k_ipad, 64); /* apply inner pad */ 417 _sasl_MD5Init(&hmac->octx); /* init outer context */ 418 _sasl_MD5Update(&hmac->octx, k_opad, 64); /* apply outer pad */ 440 HMAC_MD5_CTX hmac; local 443 _sasl_hmac_md5_init(&hmac, key, key_len); 445 state->istate[lupe] = htonl(hmac.ictx.state[lupe]); 446 state->ostate[lupe] = htonl(hmac 452 _sasl_hmac_md5_import(HMAC_MD5_CTX *hmac, HMAC_MD5_STATE *state) argument 467 _sasl_hmac_md5_final(unsigned char digest[HMAC_MD5_SIZE], HMAC_MD5_CTX *hmac) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/disk/ |
H A D | geli.c | 97 grub_uint8_t hmac[64]; member in struct:grub_geli_key 509 - sizeof (candidate_key.hmac)), 514 if (grub_memcmp (candidate_key.hmac, key_hmac, dev->hash->mdlen) != 0)
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | md.c | 153 int secure, int hmac); 427 md_open (gcry_md_hd_t *h, int algo, int secure, int hmac) argument 475 if (hmac) 828 /* Finish the hmac. */
|