Searched refs:digest (Results 51 - 75 of 78) sorted by relevance

1234

/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSessionUtil.c296 if (session_p->digest.context != NULL) {
297 digest_buf_t *bufp = session_p->digest.context;
300 void **sp = get_spp(&session_p->digest);
H A DkernelSession.h47 /* Used for emulating digest and HMAC mechs */
58 * CRYPTO_EMULATE flag is set for a digest or sign/verify with a HMAC
94 crypto_active_op_t digest; /* context of active digest operation */ member in struct:session
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_ntlm.c300 * Output: digest (16-bytes)
303 smbfs_HMACT64(uchar_t *digest, argument
345 MD5Final(digest, &context); /* finish up 1st pass */
352 MD5Update(&context, digest, 16); /* then results of 1st hash */
353 MD5Final(digest, &context); /* finish up 2nd pass */
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/md4/
H A Dmd4.c158 /* store buffer in digest */
160 mdContext->digest[ii] = (unsigned char)(mdContext->buf[i] & 0xFF);
161 mdContext->digest[ii+1] =
163 mdContext->digest[ii+2] =
165 mdContext->digest[ii+3] =
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_crypt.c38 * Compute an MD4 digest.
51 /* 16-byte MD5 digest */
69 /* Initialize the digest operation in the session */
94 unsigned char *digest)
117 /* Initialize the digest operation in the session */
130 rv = C_SignFinal(hSession, (CK_BYTE_PTR)digest, &diglen);
90 smb_auth_hmac_md5(const unsigned char *data, int data_len, const unsigned char *key, int key_len, unsigned char *digest) argument
H A Dsmb_auth.c203 uint8_t digest[MD_DIGEST_LEN]; local
205 if (smb_auth_md5(digest, nonce, nlen) != SMBAUTH_SUCCESS)
208 bcopy(digest, ntlm2_sess_hash, SMBAUTH_SESSION_HASH_SZ);
H A Dlibsmb.h701 #define SMBAUTH_HMACT64(D, Ds, K, Ks, digest) \
702 smb_auth_hmac_md5(D, Ds, K, (Ks > 64) ? 64 : Ks, digest)
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dhmac-tests.c25 digest algorithm modules, but that would blow up the code too much
44 /* Check one HMAC with digest ALGO using the regualr HAMC
55 const unsigned char *digest; local
68 digest = _gcry_md_read (hd, algo);
69 if (!digest)
74 if (memcmp (digest, expect, expectlen))
83 /* printf (" 0x%02x,", digest[i]); */
85 /* printf (" 0x%02x } },\n", digest[i]); */
369 const unsigned char *digest; local
387 digest
[all...]
/osnet-11/usr/src/lib/libsum/common/
H A Dsum-sha1.c51 uint8_t digest[20]; member in struct:Sha1_s
283 * Add padding and return the message digest.
309 for (i = 0; i < elementsof(sha->digest); i++)
311 sha->digest[i] = (unsigned char)((sha->state[i >> 2] >> ((3 - (i & 3)) * 8)) & 255);
312 sha->digest_sum[i] ^= sha->digest[i];
327 d = (flags & SUM_TOTAL) ? sha->digest_sum : sha->digest;
328 for (n = 0; n < elementsof(sha->digest); n++)
338 data->size = elementsof(sha->digest);
340 data->buf = sha->digest;
/osnet-11/usr/src/lib/libsasl/lib/
H A Dcheckpw.c274 unsigned char digest[16]; local
314 _sasl_MD5Final(digest, &ctx);
316 /* convert digest from binary to ASCII hex */
318 sprintf(digeststr + (i*2), "%02x", digest[i]);
/osnet-11/usr/src/grub/grub2/grub-core/disk/
H A Dgeli.c397 grub_uint8_t digest[dev->hash->mdlen]; local
470 sizeof (geomkey), "\1", 1, digest);
494 digest, keysize);
H A Dluks.c350 grub_uint8_t digest[keysize]; local
365 digest, keysize);
375 gcry_err = grub_cryptodisk_setkey (dev, digest, keysize);
428 /* Compare the calculated PBKDF2 to the digest stored
433 grub_dprintf ("luks", "bad digest\n");
/osnet-11/usr/src/grub/grub2/grub-core/lib/
H A Dcrypto.c79 grub_md_register (gcry_md_spec_t *digest) argument
81 digest->next = grub_digests;
82 grub_digests = digest;
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/crypto/
H A Dmd5.c46 ** Message-digest routines: **
47 ** To form the message digest for a message M **
51 ** The message digest is now in mdContext->digest[0...15] **
102 * The routine MD5Init initializes the message-digest context
119 * The routine MD5Update updates the message-digest context to
121 * in the message whose digest is being computed.
156 * The routine MD5Final terminates the message-digest computation and
157 * ends with the desired message digest in mdContext->digest[
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftEC.c454 session_p->digest.flags = 0;
464 /* soft_digest_common() has freed the digest context */
465 session_p->digest.flags = 0;
622 session_p->digest.flags = 0;
636 /* soft_digest_common() has freed the digest context */
637 session_p->digest.flags = 0;
H A DsoftSession.h92 crypto_active_op_t digest; /* context of active digest operation */ member in struct:session
H A DsoftDSA.c70 * Use CKM_DSA for digests other than SHA1 and pre-compute the digest.
308 /* Check arguments before performing message digest. */
332 /* Calculate the digest */
354 /* soft_digest_common() has freed the digest context */
355 session_p->digest.flags = 0;
445 /* soft_digest_common() has freed the digest context */
446 session_p->digest.flags = 0;
/osnet-11/usr/src/lib/libsip/common/
H A Dsip_logging.c245 sip_print_digest(uint16_t *digest, int len, FILE *fp) argument
250 (void) fprintf(fp, "%u ", digest[cnt]);
H A Dsip_dialog.c1278 uint16_t digest[8]; local
1305 NULL, 0, NULL, 0, NULL, 0, (uchar_t *)digest);
1308 (void *)digest, SIP_DIGEST_TO_HASH(digest), sip_dialog_match);
1312 NULL, 0, NULL, 0, NULL, 0, (uchar_t *)digest);
1314 (void *)digest, SIP_DIGEST_TO_HASH(digest),
/osnet-11/usr/src/lib/sasl_plugins/digestmd5/
H A Ddigestmd5.c326 * calculate request-digest/response-digest as per HTTP Digest spec
339 HASHHEX Response /* request-digest or response-digest */
754 unsigned char digest[16],
785 /* copy in the HMAC to digest */
786 memcpy(digest, output + inputlen - 10, 10);
794 unsigned char digest[16],
808 memcpy(output+inputlen+paddinglen, digest, 10); /* hmac */
875 unsigned char digest[1
751 dec_3des(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument
791 enc_3des(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument
872 dec_des(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument
915 enc_des(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument
1143 dec_rc4(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument
1164 enc_rc4(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument
1475 dec_rc4_uef(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument
1515 enc_rc4_uef(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument
1556 dec_des_uef(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument
1610 enc_des_uef(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument
1741 unsigned char digest[16]; local
1826 unsigned char digest[16]; local
[all...]
/osnet-11/usr/src/grub/grub2/include/grub/
H A Dcrypto.h256 grub_md_register (gcry_md_spec_t *digest);
299 of digest supplied by MD. Inputs are the password P of length PLEN,
/osnet-11/usr/src/lib/libinetsvc/common/
H A Dinetsvc.c1322 * calculate_hash calculates the MD5 message-digest of the file pathname.
1323 * On success, hash is modified to point to the digest string and 0 is returned.
1325 * The space for the digest string is obtained using malloc(3C) and should be
1334 char *digest; local
1346 /* allocate space for a 16-byte MD5 digest as a string of hex digits */
1348 if ((digest = malloc(len)) == NULL) {
1373 (void) snprintf(&digest[2 * i], len - (2 * i), "%02x",
1376 *hash = digest;
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcrypto.c239 /* If we have a message to digest, digest it */
247 /* Copy the digest to the signature */
248 memcpy(signature->dh_signature_val, (void *)md5_ctx.digest, 16);
/osnet-11/usr/src/lib/libkmf/libkmf/common/
H A Dpk11keys.c449 uchar_t digest[1024]; local
478 hashData.Data = digest;
479 hashData.Length = sizeof (digest);
481 /* Get handle for the digest operation */
767 * the digest.
796 * separate session. The resulting digest can be signed later.
/osnet-11/usr/src/lib/libslp/clib/
H A Dslp_ami.h298 _octet1 digest; member in struct:ami_digest_info
758 const ami_algid *, /* IN: digest algorithm */
759 uchar_t **, /* OUT: digest */
760 size_t *)); /* OUT: length of digest */

Completed in 79 milliseconds

1234