/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSessionUtil.c | 296 if (session_p->digest.context != NULL) { 297 digest_buf_t *bufp = session_p->digest.context; 300 void **sp = get_spp(&session_p->digest);
|
H A D | kernelSession.h | 47 /* Used for emulating digest and HMAC mechs */ 58 * CRYPTO_EMULATE flag is set for a digest or sign/verify with a HMAC 94 crypto_active_op_t digest; /* context of active digest operation */ member in struct:session
|
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_ntlm.c | 300 * Output: digest (16-bytes) 303 smbfs_HMACT64(uchar_t *digest, argument 345 MD5Final(digest, &context); /* finish up 1st pass */ 352 MD5Update(&context, digest, 16); /* then results of 1st hash */ 353 MD5Final(digest, &context); /* finish up 2nd pass */
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/md4/ |
H A D | md4.c | 158 /* store buffer in digest */ 160 mdContext->digest[ii] = (unsigned char)(mdContext->buf[i] & 0xFF); 161 mdContext->digest[ii+1] = 163 mdContext->digest[ii+2] = 165 mdContext->digest[ii+3] =
|
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_crypt.c | 38 * Compute an MD4 digest. 51 /* 16-byte MD5 digest */ 69 /* Initialize the digest operation in the session */ 94 unsigned char *digest) 117 /* Initialize the digest operation in the session */ 130 rv = C_SignFinal(hSession, (CK_BYTE_PTR)digest, &diglen); 90 smb_auth_hmac_md5(const unsigned char *data, int data_len, const unsigned char *key, int key_len, unsigned char *digest) argument
|
H A D | smb_auth.c | 203 uint8_t digest[MD_DIGEST_LEN]; local 205 if (smb_auth_md5(digest, nonce, nlen) != SMBAUTH_SUCCESS) 208 bcopy(digest, ntlm2_sess_hash, SMBAUTH_SESSION_HASH_SZ);
|
H A D | libsmb.h | 701 #define SMBAUTH_HMACT64(D, Ds, K, Ks, digest) \ 702 smb_auth_hmac_md5(D, Ds, K, (Ks > 64) ? 64 : Ks, digest)
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | hmac-tests.c | 25 digest algorithm modules, but that would blow up the code too much 44 /* Check one HMAC with digest ALGO using the regualr HAMC 55 const unsigned char *digest; local 68 digest = _gcry_md_read (hd, algo); 69 if (!digest) 74 if (memcmp (digest, expect, expectlen)) 83 /* printf (" 0x%02x,", digest[i]); */ 85 /* printf (" 0x%02x } },\n", digest[i]); */ 369 const unsigned char *digest; local 387 digest [all...] |
/osnet-11/usr/src/lib/libsum/common/ |
H A D | sum-sha1.c | 51 uint8_t digest[20]; member in struct:Sha1_s 283 * Add padding and return the message digest. 309 for (i = 0; i < elementsof(sha->digest); i++) 311 sha->digest[i] = (unsigned char)((sha->state[i >> 2] >> ((3 - (i & 3)) * 8)) & 255); 312 sha->digest_sum[i] ^= sha->digest[i]; 327 d = (flags & SUM_TOTAL) ? sha->digest_sum : sha->digest; 328 for (n = 0; n < elementsof(sha->digest); n++) 338 data->size = elementsof(sha->digest); 340 data->buf = sha->digest;
|
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 274 unsigned char digest[16]; local 314 _sasl_MD5Final(digest, &ctx); 316 /* convert digest from binary to ASCII hex */ 318 sprintf(digeststr + (i*2), "%02x", digest[i]);
|
/osnet-11/usr/src/grub/grub2/grub-core/disk/ |
H A D | geli.c | 397 grub_uint8_t digest[dev->hash->mdlen]; local 470 sizeof (geomkey), "\1", 1, digest); 494 digest, keysize);
|
H A D | luks.c | 350 grub_uint8_t digest[keysize]; local 365 digest, keysize); 375 gcry_err = grub_cryptodisk_setkey (dev, digest, keysize); 428 /* Compare the calculated PBKDF2 to the digest stored 433 grub_dprintf ("luks", "bad digest\n");
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/ |
H A D | crypto.c | 79 grub_md_register (gcry_md_spec_t *digest) argument 81 digest->next = grub_digests; 82 grub_digests = digest;
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/crypto/ |
H A D | md5.c | 46 ** Message-digest routines: ** 47 ** To form the message digest for a message M ** 51 ** The message digest is now in mdContext->digest[0...15] ** 102 * The routine MD5Init initializes the message-digest context 119 * The routine MD5Update updates the message-digest context to 121 * in the message whose digest is being computed. 156 * The routine MD5Final terminates the message-digest computation and 157 * ends with the desired message digest in mdContext->digest[ [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softEC.c | 454 session_p->digest.flags = 0; 464 /* soft_digest_common() has freed the digest context */ 465 session_p->digest.flags = 0; 622 session_p->digest.flags = 0; 636 /* soft_digest_common() has freed the digest context */ 637 session_p->digest.flags = 0;
|
H A D | softSession.h | 92 crypto_active_op_t digest; /* context of active digest operation */ member in struct:session
|
H A D | softDSA.c | 70 * Use CKM_DSA for digests other than SHA1 and pre-compute the digest. 308 /* Check arguments before performing message digest. */ 332 /* Calculate the digest */ 354 /* soft_digest_common() has freed the digest context */ 355 session_p->digest.flags = 0; 445 /* soft_digest_common() has freed the digest context */ 446 session_p->digest.flags = 0;
|
/osnet-11/usr/src/lib/libsip/common/ |
H A D | sip_logging.c | 245 sip_print_digest(uint16_t *digest, int len, FILE *fp) argument 250 (void) fprintf(fp, "%u ", digest[cnt]);
|
H A D | sip_dialog.c | 1278 uint16_t digest[8]; local 1305 NULL, 0, NULL, 0, NULL, 0, (uchar_t *)digest); 1308 (void *)digest, SIP_DIGEST_TO_HASH(digest), sip_dialog_match); 1312 NULL, 0, NULL, 0, NULL, 0, (uchar_t *)digest); 1314 (void *)digest, SIP_DIGEST_TO_HASH(digest),
|
/osnet-11/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 326 * calculate request-digest/response-digest as per HTTP Digest spec 339 HASHHEX Response /* request-digest or response-digest */ 754 unsigned char digest[16], 785 /* copy in the HMAC to digest */ 786 memcpy(digest, output + inputlen - 10, 10); 794 unsigned char digest[16], 808 memcpy(output+inputlen+paddinglen, digest, 10); /* hmac */ 875 unsigned char digest[1 751 dec_3des(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument 791 enc_3des(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument 872 dec_des(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument 915 enc_des(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument 1143 dec_rc4(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument 1164 enc_rc4(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument 1475 dec_rc4_uef(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument 1515 enc_rc4_uef(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument 1556 dec_des_uef(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument 1610 enc_des_uef(context_t *text, const char *input, unsigned inputlen, unsigned char digest[16], char *output, unsigned *outputlen) argument 1741 unsigned char digest[16]; local 1826 unsigned char digest[16]; local [all...] |
/osnet-11/usr/src/grub/grub2/include/grub/ |
H A D | crypto.h | 256 grub_md_register (gcry_md_spec_t *digest); 299 of digest supplied by MD. Inputs are the password P of length PLEN,
|
/osnet-11/usr/src/lib/libinetsvc/common/ |
H A D | inetsvc.c | 1322 * calculate_hash calculates the MD5 message-digest of the file pathname. 1323 * On success, hash is modified to point to the digest string and 0 is returned. 1325 * The space for the digest string is obtained using malloc(3C) and should be 1334 char *digest; local 1346 /* allocate space for a 16-byte MD5 digest as a string of hex digits */ 1348 if ((digest = malloc(len)) == NULL) { 1373 (void) snprintf(&digest[2 * i], len - (2 * i), "%02x", 1376 *hash = digest;
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | crypto.c | 239 /* If we have a message to digest, digest it */ 247 /* Copy the digest to the signature */ 248 memcpy(signature->dh_signature_val, (void *)md5_ctx.digest, 16);
|
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 449 uchar_t digest[1024]; local 478 hashData.Data = digest; 479 hashData.Length = sizeof (digest); 481 /* Get handle for the digest operation */ 767 * the digest. 796 * separate session. The resulting digest can be signed later.
|
/osnet-11/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 298 _octet1 digest; member in struct:ami_digest_info 758 const ami_algid *, /* IN: digest algorithm */ 759 uchar_t **, /* OUT: digest */ 760 size_t *)); /* OUT: length of digest */
|