Searched refs:digest (Results 1 - 25 of 110) sorted by relevance

12345

/illumos-gate/usr/src/lib/libsip/common/
H A Dsip_hash.h41 #define SIP_DIGEST_TO_HASH(digest) \
42 ((digest[0] + digest[1] + digest[2] + digest[3] + digest[4] + \
43 digest[5] + digest[6] + digest[7]) % SIP_HASH_SZ)
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDigestUtil.c49 * context, then calls the corresponding software provided digest
66 session_p->digest.context = malloc(sizeof (MD5_CTX));
68 if (session_p->digest.context == NULL) {
73 session_p->digest.mech.mechanism = CKM_MD5;
76 MD5Init((MD5_CTX *)session_p->digest.context);
84 session_p->digest.context = malloc(sizeof (SHA1_CTX));
86 if (session_p->digest.context == NULL) {
91 session_p->digest.mech.mechanism = CKM_SHA_1;
92 session_p->digest.mech.pParameter = pMechanism->pParameter;
93 session_p->digest
[all...]
H A DsoftSessionUtil.c352 if (session_p->digest.context != NULL)
353 free(session_p->digest.context);
488 /* Check to see if digest operation is active. */
489 if (session_p->digest.flags & CRYPTO_OPERATION_ACTIVE) {
493 switch (session_p->digest.mech.mechanism) {
526 &session_p->digest,
529 switch (session_p->digest.mech.mechanism) {
531 /* Save MD5_CTX for the active digest operation */
535 session_p->digest.context,
540 /* Save SHA1_CTX for the active digest operatio
[all...]
H A DsoftDigest.c60 /* Check to see if digest operation is already active */
61 if (session_p->digest.flags & CRYPTO_OPERATION_ACTIVE) {
64 * digest.context is only a flat structure.
72 * the message digest.
74 session_p->digest.flags = CRYPTO_OPERATION_ACTIVE;
82 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE;
132 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) {
146 if (session_p->digest.flags & CRYPTO_OPERATION_UPDATE) {
149 * operation, so we'll leave the active digest operation
151 * digest updat
[all...]
/illumos-gate/usr/src/uts/common/crypto/io/
H A Dmd4_mod.c75 #define MD4_DIGEST_LENGTH 16 /* MD4 digest length in bytes */
207 * KCF software provider digest entry points.
232 * Helper MD4 digest update function for uio data.
281 * The caller requested to digest more data than it provided.
290 * Helper MD4 digest final function for uio data.
291 * digest_len is the length of the desired digest. If digest_len
292 * is smaller than the default MD4 digest length, the caller
297 md4_digest_final_uio(MD4_CTX *md4_ctx, crypto_data_t *digest, argument
300 off_t offset = digest->cd_offset;
304 if (digest
442 md4_digest_final_mblk(MD4_CTX *md4_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument
519 md4_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
634 md4_digest_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument
687 md4_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
[all...]
H A Dmd5_mod.c82 #define MD5_DIGEST_LENGTH 16 /* MD5 digest length in bytes */
101 uint32_t hc_digest_len; /* digest len in bytes */
113 /* to extract the digest length passed as mechanism parameter */
125 #define PROV_MD5_DIGEST_KEY(ctx, key, len, digest) { \
128 MD5Final(digest, ctx); \
292 * KCF software provider digest entry points.
317 * Helper MD5 digest update function for uio data.
366 * The caller requested to digest more data than it provided.
375 * Helper MD5 digest final function for uio data.
376 * digest_len is the length of the desired digest
382 md5_digest_final_uio(MD5_CTX *md5_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument
527 md5_digest_final_mblk(MD5_CTX *md5_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument
604 md5_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
719 md5_digest_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument
772 md5_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
1009 uchar_t digest[MD5_DIGEST_LENGTH]; local
1115 uchar_t digest[MD5_DIGEST_LENGTH]; local
1235 uchar_t digest[MD5_DIGEST_LENGTH]; local
[all...]
H A Dsha1_mod.c71 /* to extract the digest length passed as mechanism parameter */
82 #define PROV_SHA1_DIGEST_KEY(ctx, key, len, digest) { \
85 SHA1Final(digest, ctx); \
234 * KCF software provider digest entry points.
259 * Helper SHA1 digest update function for uio data.
309 * The caller requested to digest more data than it provided.
318 * Helper SHA1 digest final function for uio data.
319 * digest_len is the length of the desired digest. If digest_len
320 * is smaller than the default SHA1 digest length, the caller
325 sha1_digest_final_uio(SHA1_CTX *sha1_ctx, crypto_data_t *digest, argument
470 sha1_digest_final_mblk(SHA1_CTX *sha1_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument
547 sha1_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
662 sha1_digest_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument
715 sha1_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
951 uchar_t digest[SHA1_DIGEST_LENGTH]; local
1057 uchar_t digest[SHA1_DIGEST_LENGTH]; local
1177 uchar_t digest[SHA1_DIGEST_LENGTH]; local
[all...]
H A Dsha2_mod.c69 /* to extract the digest length passed as mechanism parameter */
80 #define PROV_SHA2_DIGEST_KEY(mech, ctx, key, len, digest) { \
83 SHA2Final(digest, ctx); \
260 * KCF software provider digest entry points.
283 * Helper SHA2 digest update function for uio data.
331 * The caller requested to digest more data than it provided.
340 * Helper SHA2 digest final function for uio data.
341 * digest_len is the length of the desired digest. If digest_len
342 * is smaller than the default SHA2 digest length, the caller
344 * be at least the algorithm's digest lengt
347 sha2_digest_final_uio(SHA2_CTX *sha2_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument
498 sha2_digest_final_mblk(SHA2_CTX *sha2_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument
578 sha2_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
707 sha2_digest_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument
774 sha2_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
1040 uchar_t digest[SHA512_DIGEST_LENGTH]; local
1163 uchar_t digest[SHA512_DIGEST_LENGTH]; local
1305 uchar_t digest[SHA512_DIGEST_LENGTH]; local
[all...]
H A Dskein_mod.c109 skein_update, /* using regular digest update is OK here */
110 skein_final, /* using regular digest final is OK here */
307 * The caller requested to digest more data than it provided.
316 * Performs a Final on a context and writes to a uio digest output.
319 skein_digest_final_uio(skein_ctx_t *ctx, crypto_data_t *digest, argument
322 off_t offset = digest->cd_offset;
324 uio_t *uio = digest->cd_uio;
331 * Jump to the first iovec containing ptr to the digest to be returned.
346 /* The computed digest will fit in the current iovec. */
377 * The caller requested to digest mor
435 skein_digest_final_mblk(skein_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument
531 skein_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
597 skein_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument
646 skein_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelDigest.c74 * the message digest.
76 session_p->digest.flags |= CRYPTO_OPERATION_ACTIVE;
79 session_p->digest.mech.mechanism = pMechanism->mechanism;
80 session_p->digest.mech.pParameter = NULL;
81 session_p->digest.mech.ulParameterLen = 0;
82 session_p->digest.flags |= CRYPTO_EMULATE;
116 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE;
147 crypto_digest_t digest; local
171 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) {
185 if (session_p->digest
[all...]
/illumos-gate/usr/src/common/net/wanboot/crypt/
H A Dhmac_test.c33 * are used by the HMAC SHA-1 implemention to produce a hash digest and
34 * the the result is compared against the expected digest.
50 unsigned char digest[20]; member in struct:test_data
58 uchar_t digest[20]; local
68 getxdata(td[0].digest, "b617318655057264e28bc0b6fb378c8ef146be00", 20);
74 getxdata(td[1].digest, "effcdf6ae5eb2fa2d27416d5f184df9c259a7c79", 20);
82 getxdata(td[2].digest, "125d7342b9ac11cd91a39af48aa17b4f63f175d3", 20);
91 getxdata(td[3].digest, "4c9007f4026250c6bc8414f9bf50c86c2d7235da", 20);
98 getxdata(td[4].digest, "4c1a03424b55e07fe7f27be1d58bb9324a9a5a04", 20);
108 getxdata(td[5].digest, "aa4ae5e15272d00e95705637ce8a3b55ed40211
[all...]
H A Dsha1_test.c87 uint8_t digest[20]; local
104 SHA1Final(digest, &sha);
107 if (bcmp(digest, rdigest, 20) != 0) {
H A Dhmac_sha1.c76 uchar_t digest[20])
97 SHA1Final(digest, sha1Context);
101 SHA1Update(sha1Context, digest, 20);
102 SHA1Final(digest, sha1Context);
75 HMACFinal(SHA1_CTX *sha1Context, const uchar_t *key, size_t klen, uchar_t digest[20]) argument
H A Dhmac_sha1.h44 uchar_t digest[HMAC_DIGEST_LEN]);
/illumos-gate/usr/src/lib/crypt_modules/sunmd5/
H A Dsunmd5.c95 md5bit(uint8_t *digest, int bit_num) argument
104 /* return the value of bit N from the digest */
105 return ((digest[byte_off] & (0x01 << bit_off)) ? 1 : 0);
259 uint8_t digest[DIGEST_LEN]; /* where the MD5 digest is stored */ member in struct:__anon2456
268 int indirect_a; /* 7bit index into digest */
271 int indirect_b; /* 7bit index into digest */
317 /* compute the digest */
319 MD5Final(data.digest, &data.context);
331 /* update with the previous digest */
[all...]
/illumos-gate/usr/src/lib/libldap5/include/ldap/
H A Dsec.h10 int key_len, unsigned char *digest);
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Dcram_md5.c17 /* text is the challenge, key is the password, digest is an allocated
18 buffer (min 16 chars) which will contain the resulting digest */
20 int key_len, unsigned char *digest)
52 (void) MD5Final(digest, &context);
57 (void) MD5Update(&context, digest, 16);
59 (void) MD5Final(digest, &context);
74 unsigned char digest[16]; local
81 bzero(digest, sizeof (digest));
94 (unsigned char *)cred->bv_val, cred->bv_len, digest);
19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument
[all...]
/illumos-gate/usr/src/lib/libsasl/include/
H A Dhmac-md5.h37 * digest may be same as text or key
41 unsigned char digest[HMAC_MD5_SIZE]);
61 void _sasl_hmac_md5_final(unsigned char digest[HMAC_MD5_SIZE],
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/crypto/
H A Dmd5.h54 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon2506
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Drsa-md4.h44 /* 16 u_char's in the digest */
89 unsigned char digest[16]; /* actual digest after MD4Final call */ member in struct:__anon4681
/illumos-gate/usr/src/cmd/cmd-crypto/digest/
H A DMakefile.com26 PROG = digest
31 OBJS = digest.o
/illumos-gate/usr/src/uts/common/fs/zfs/
H A Dedonr_zfs.c40 uint8_t digest[EDONR_MODE / 8]; local
46 EdonRFinal(&ctx, digest);
47 bcopy(digest, zcp->zc_word, sizeof (zcp->zc_word));
/illumos-gate/usr/src/grub/grub-0.97/stage2/
H A Dmd5.c215 unsigned char *digest; local
241 digest = md5_final ();
242 memcpy (alt_result, digest, 16);
254 digest = md5_final ();
258 memcpy (alt_result, digest, 16);
277 digest = md5_final ();
284 digest[i == 4 ? 5 : 12+i] | (digest[6+i] << 8) | (digest[i] << 16);
301 unsigned int w = digest[1
339 unsigned char* digest = md5 (buffer); local
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/hmac/
H A Dhmac.c48 * This routine is used to compute a hash digest for the file represented
50 * will be provided by the caller. The resulting hash digest will be
62 uint8_t digest[HMAC_DIGEST_LEN]; local
81 * Finalize the digest.
83 HMACFinal(&ctx, hmac_key, ka->ka_len, digest);
86 * Write the digest to stdout.
88 if (wbio_nwrite(STDOUT_FILENO, digest, sizeof (digest)) != 0) {
89 wbku_printerr("Cannot output digest");
110 * This program is used to compute a hash digest fo
[all...]
/illumos-gate/usr/src/cmd/cmd-crypto/
H A DMakefile29 digest \

Completed in 119 milliseconds

12345