/illumos-gate/usr/src/lib/libsip/common/ |
H A D | sip_hash.h | 41 #define SIP_DIGEST_TO_HASH(digest) \ 42 ((digest[0] + digest[1] + digest[2] + digest[3] + digest[4] + \ 43 digest[5] + digest[6] + digest[7]) % SIP_HASH_SZ)
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDigestUtil.c | 49 * context, then calls the corresponding software provided digest 66 session_p->digest.context = malloc(sizeof (MD5_CTX)); 68 if (session_p->digest.context == NULL) { 73 session_p->digest.mech.mechanism = CKM_MD5; 76 MD5Init((MD5_CTX *)session_p->digest.context); 84 session_p->digest.context = malloc(sizeof (SHA1_CTX)); 86 if (session_p->digest.context == NULL) { 91 session_p->digest.mech.mechanism = CKM_SHA_1; 92 session_p->digest.mech.pParameter = pMechanism->pParameter; 93 session_p->digest [all...] |
H A D | softSessionUtil.c | 352 if (session_p->digest.context != NULL) 353 free(session_p->digest.context); 488 /* Check to see if digest operation is active. */ 489 if (session_p->digest.flags & CRYPTO_OPERATION_ACTIVE) { 493 switch (session_p->digest.mech.mechanism) { 526 &session_p->digest, 529 switch (session_p->digest.mech.mechanism) { 531 /* Save MD5_CTX for the active digest operation */ 535 session_p->digest.context, 540 /* Save SHA1_CTX for the active digest operatio [all...] |
H A D | softDigest.c | 60 /* Check to see if digest operation is already active */ 61 if (session_p->digest.flags & CRYPTO_OPERATION_ACTIVE) { 64 * digest.context is only a flat structure. 72 * the message digest. 74 session_p->digest.flags = CRYPTO_OPERATION_ACTIVE; 82 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE; 132 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) { 146 if (session_p->digest.flags & CRYPTO_OPERATION_UPDATE) { 149 * operation, so we'll leave the active digest operation 151 * digest updat [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | md4_mod.c | 75 #define MD4_DIGEST_LENGTH 16 /* MD4 digest length in bytes */ 207 * KCF software provider digest entry points. 232 * Helper MD4 digest update function for uio data. 281 * The caller requested to digest more data than it provided. 290 * Helper MD4 digest final function for uio data. 291 * digest_len is the length of the desired digest. If digest_len 292 * is smaller than the default MD4 digest length, the caller 297 md4_digest_final_uio(MD4_CTX *md4_ctx, crypto_data_t *digest, argument 300 off_t offset = digest->cd_offset; 304 if (digest 442 md4_digest_final_mblk(MD4_CTX *md4_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument 519 md4_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 634 md4_digest_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 687 md4_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument [all...] |
H A D | md5_mod.c | 82 #define MD5_DIGEST_LENGTH 16 /* MD5 digest length in bytes */ 101 uint32_t hc_digest_len; /* digest len in bytes */ 113 /* to extract the digest length passed as mechanism parameter */ 125 #define PROV_MD5_DIGEST_KEY(ctx, key, len, digest) { \ 128 MD5Final(digest, ctx); \ 292 * KCF software provider digest entry points. 317 * Helper MD5 digest update function for uio data. 366 * The caller requested to digest more data than it provided. 375 * Helper MD5 digest final function for uio data. 376 * digest_len is the length of the desired digest 382 md5_digest_final_uio(MD5_CTX *md5_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument 527 md5_digest_final_mblk(MD5_CTX *md5_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument 604 md5_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 719 md5_digest_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 772 md5_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 1009 uchar_t digest[MD5_DIGEST_LENGTH]; local 1115 uchar_t digest[MD5_DIGEST_LENGTH]; local 1235 uchar_t digest[MD5_DIGEST_LENGTH]; local [all...] |
H A D | sha1_mod.c | 71 /* to extract the digest length passed as mechanism parameter */ 82 #define PROV_SHA1_DIGEST_KEY(ctx, key, len, digest) { \ 85 SHA1Final(digest, ctx); \ 234 * KCF software provider digest entry points. 259 * Helper SHA1 digest update function for uio data. 309 * The caller requested to digest more data than it provided. 318 * Helper SHA1 digest final function for uio data. 319 * digest_len is the length of the desired digest. If digest_len 320 * is smaller than the default SHA1 digest length, the caller 325 sha1_digest_final_uio(SHA1_CTX *sha1_ctx, crypto_data_t *digest, argument 470 sha1_digest_final_mblk(SHA1_CTX *sha1_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument 547 sha1_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 662 sha1_digest_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 715 sha1_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 951 uchar_t digest[SHA1_DIGEST_LENGTH]; local 1057 uchar_t digest[SHA1_DIGEST_LENGTH]; local 1177 uchar_t digest[SHA1_DIGEST_LENGTH]; local [all...] |
H A D | sha2_mod.c | 69 /* to extract the digest length passed as mechanism parameter */ 80 #define PROV_SHA2_DIGEST_KEY(mech, ctx, key, len, digest) { \ 83 SHA2Final(digest, ctx); \ 260 * KCF software provider digest entry points. 283 * Helper SHA2 digest update function for uio data. 331 * The caller requested to digest more data than it provided. 340 * Helper SHA2 digest final function for uio data. 341 * digest_len is the length of the desired digest. If digest_len 342 * is smaller than the default SHA2 digest length, the caller 344 * be at least the algorithm's digest lengt 347 sha2_digest_final_uio(SHA2_CTX *sha2_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument 498 sha2_digest_final_mblk(SHA2_CTX *sha2_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument 578 sha2_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 707 sha2_digest_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 774 sha2_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 1040 uchar_t digest[SHA512_DIGEST_LENGTH]; local 1163 uchar_t digest[SHA512_DIGEST_LENGTH]; local 1305 uchar_t digest[SHA512_DIGEST_LENGTH]; local [all...] |
H A D | skein_mod.c | 109 skein_update, /* using regular digest update is OK here */ 110 skein_final, /* using regular digest final is OK here */ 307 * The caller requested to digest more data than it provided. 316 * Performs a Final on a context and writes to a uio digest output. 319 skein_digest_final_uio(skein_ctx_t *ctx, crypto_data_t *digest, argument 322 off_t offset = digest->cd_offset; 324 uio_t *uio = digest->cd_uio; 331 * Jump to the first iovec containing ptr to the digest to be returned. 346 /* The computed digest will fit in the current iovec. */ 377 * The caller requested to digest mor 435 skein_digest_final_mblk(skein_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 531 skein_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 597 skein_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 646 skein_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelDigest.c | 74 * the message digest. 76 session_p->digest.flags |= CRYPTO_OPERATION_ACTIVE; 79 session_p->digest.mech.mechanism = pMechanism->mechanism; 80 session_p->digest.mech.pParameter = NULL; 81 session_p->digest.mech.ulParameterLen = 0; 82 session_p->digest.flags |= CRYPTO_EMULATE; 116 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE; 147 crypto_digest_t digest; local 171 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) { 185 if (session_p->digest [all...] |
/illumos-gate/usr/src/common/net/wanboot/crypt/ |
H A D | hmac_test.c | 33 * are used by the HMAC SHA-1 implemention to produce a hash digest and 34 * the the result is compared against the expected digest. 50 unsigned char digest[20]; member in struct:test_data 58 uchar_t digest[20]; local 68 getxdata(td[0].digest, "b617318655057264e28bc0b6fb378c8ef146be00", 20); 74 getxdata(td[1].digest, "effcdf6ae5eb2fa2d27416d5f184df9c259a7c79", 20); 82 getxdata(td[2].digest, "125d7342b9ac11cd91a39af48aa17b4f63f175d3", 20); 91 getxdata(td[3].digest, "4c9007f4026250c6bc8414f9bf50c86c2d7235da", 20); 98 getxdata(td[4].digest, "4c1a03424b55e07fe7f27be1d58bb9324a9a5a04", 20); 108 getxdata(td[5].digest, "aa4ae5e15272d00e95705637ce8a3b55ed40211 [all...] |
H A D | sha1_test.c | 87 uint8_t digest[20]; local 104 SHA1Final(digest, &sha); 107 if (bcmp(digest, rdigest, 20) != 0) {
|
H A D | hmac_sha1.c | 76 uchar_t digest[20]) 97 SHA1Final(digest, sha1Context); 101 SHA1Update(sha1Context, digest, 20); 102 SHA1Final(digest, sha1Context); 75 HMACFinal(SHA1_CTX *sha1Context, const uchar_t *key, size_t klen, uchar_t digest[20]) argument
|
H A D | hmac_sha1.h | 44 uchar_t digest[HMAC_DIGEST_LEN]);
|
/illumos-gate/usr/src/lib/crypt_modules/sunmd5/ |
H A D | sunmd5.c | 95 md5bit(uint8_t *digest, int bit_num) argument 104 /* return the value of bit N from the digest */ 105 return ((digest[byte_off] & (0x01 << bit_off)) ? 1 : 0); 259 uint8_t digest[DIGEST_LEN]; /* where the MD5 digest is stored */ member in struct:__anon2456 268 int indirect_a; /* 7bit index into digest */ 271 int indirect_b; /* 7bit index into digest */ 317 /* compute the digest */ 319 MD5Final(data.digest, &data.context); 331 /* update with the previous digest */ [all...] |
/illumos-gate/usr/src/lib/libldap5/include/ldap/ |
H A D | sec.h | 10 int key_len, unsigned char *digest);
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 17 /* text is the challenge, key is the password, digest is an allocated 18 buffer (min 16 chars) which will contain the resulting digest */ 20 int key_len, unsigned char *digest) 52 (void) MD5Final(digest, &context); 57 (void) MD5Update(&context, digest, 16); 59 (void) MD5Final(digest, &context); 74 unsigned char digest[16]; local 81 bzero(digest, sizeof (digest)); 94 (unsigned char *)cred->bv_val, cred->bv_len, digest); 19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument [all...] |
/illumos-gate/usr/src/lib/libsasl/include/ |
H A D | hmac-md5.h | 37 * digest may be same as text or key 41 unsigned char digest[HMAC_MD5_SIZE]); 61 void _sasl_hmac_md5_final(unsigned char digest[HMAC_MD5_SIZE],
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/crypto/ |
H A D | md5.h | 54 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon2506
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | rsa-md4.h | 44 /* 16 u_char's in the digest */ 89 unsigned char digest[16]; /* actual digest after MD4Final call */ member in struct:__anon4681
|
/illumos-gate/usr/src/cmd/cmd-crypto/digest/ |
H A D | Makefile.com | 26 PROG = digest 31 OBJS = digest.o
|
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | edonr_zfs.c | 40 uint8_t digest[EDONR_MODE / 8]; local 46 EdonRFinal(&ctx, digest); 47 bcopy(digest, zcp->zc_word, sizeof (zcp->zc_word));
|
/illumos-gate/usr/src/grub/grub-0.97/stage2/ |
H A D | md5.c | 215 unsigned char *digest; local 241 digest = md5_final (); 242 memcpy (alt_result, digest, 16); 254 digest = md5_final (); 258 memcpy (alt_result, digest, 16); 277 digest = md5_final (); 284 digest[i == 4 ? 5 : 12+i] | (digest[6+i] << 8) | (digest[i] << 16); 301 unsigned int w = digest[1 339 unsigned char* digest = md5 (buffer); local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/hmac/ |
H A D | hmac.c | 48 * This routine is used to compute a hash digest for the file represented 50 * will be provided by the caller. The resulting hash digest will be 62 uint8_t digest[HMAC_DIGEST_LEN]; local 81 * Finalize the digest. 83 HMACFinal(&ctx, hmac_key, ka->ka_len, digest); 86 * Write the digest to stdout. 88 if (wbio_nwrite(STDOUT_FILENO, digest, sizeof (digest)) != 0) { 89 wbku_printerr("Cannot output digest"); 110 * This program is used to compute a hash digest fo [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/ |
H A D | Makefile | 29 digest \
|