/titanic_50/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDigestUtil.c | 66 session_p->digest.context = malloc(sizeof (MD5_CTX)); in soft_digest_init() 68 if (session_p->digest.context == NULL) { in soft_digest_init() 73 session_p->digest.mech.mechanism = CKM_MD5; in soft_digest_init() 76 MD5Init((MD5_CTX *)session_p->digest.context); in soft_digest_init() 84 session_p->digest.context = malloc(sizeof (SHA1_CTX)); in soft_digest_init() 86 if (session_p->digest.context == NULL) { in soft_digest_init() 91 session_p->digest.mech.mechanism = CKM_SHA_1; in soft_digest_init() 92 session_p->digest.mech.pParameter = pMechanism->pParameter; in soft_digest_init() 93 session_p->digest.mech.ulParameterLen = in soft_digest_init() 97 SHA1Init((SHA1_CTX *)session_p->digest.context); in soft_digest_init() [all …]
|
H A D | softSessionUtil.c | 352 if (session_p->digest.context != NULL) in soft_delete_session() 353 free(session_p->digest.context); in soft_delete_session() 489 if (session_p->digest.flags & CRYPTO_OPERATION_ACTIVE) { in soft_get_operationstate() 493 switch (session_p->digest.mech.mechanism) { in soft_get_operationstate() 526 &session_p->digest, in soft_get_operationstate() 529 switch (session_p->digest.mech.mechanism) { in soft_get_operationstate() 535 session_p->digest.context, in soft_get_operationstate() 544 session_p->digest.context, in soft_get_operationstate() 646 if (session_p->digest.context && in soft_set_operationstate() 647 (session_p->digest.mech.mechanism != mech)) { in soft_set_operationstate() [all …]
|
H A D | softDigest.c | 61 if (session_p->digest.flags & CRYPTO_OPERATION_ACTIVE) { in C_DigestInit() 74 session_p->digest.flags = CRYPTO_OPERATION_ACTIVE; in C_DigestInit() 82 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE; in C_DigestInit() 132 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) { in C_Digest() 146 if (session_p->digest.flags & CRYPTO_OPERATION_UPDATE) { in C_Digest() 234 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) { in C_DigestUpdate() 245 session_p->digest.flags |= CRYPTO_OPERATION_UPDATE; in C_DigestUpdate() 312 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) { in C_DigestKey() 327 session_p->digest.flags |= (CRYPTO_KEY_DIGESTED | in C_DigestKey() 397 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) { in C_DigestFinal()
|
/titanic_50/usr/src/uts/common/crypto/io/ |
H A D | md4_mod.c | 297 md4_digest_final_uio(MD4_CTX *md4_ctx, crypto_data_t *digest, in md4_digest_final_uio() argument 300 off_t offset = digest->cd_offset; in md4_digest_final_uio() 304 if (digest->cd_uio->uio_segflg != UIO_SYSSPACE) in md4_digest_final_uio() 311 for (vec_idx = 0; offset >= digest->cd_uio->uio_iov[vec_idx].iov_len && in md4_digest_final_uio() 312 vec_idx < digest->cd_uio->uio_iovcnt; in md4_digest_final_uio() 313 offset -= digest->cd_uio->uio_iov[vec_idx++].iov_len) in md4_digest_final_uio() 315 if (vec_idx == digest->cd_uio->uio_iovcnt) { in md4_digest_final_uio() 325 digest->cd_uio->uio_iov[vec_idx].iov_len) { in md4_digest_final_uio() 337 bcopy(digest_scratch, (uchar_t *)digest-> in md4_digest_final_uio() 341 MD4Final((uchar_t *)digest-> in md4_digest_final_uio() [all …]
|
H A D | md5_mod.c | 125 #define PROV_MD5_DIGEST_KEY(ctx, key, len, digest) { \ argument 128 MD5Final(digest, ctx); \ 382 md5_digest_final_uio(MD5_CTX *md5_ctx, crypto_data_t *digest, in md5_digest_final_uio() argument 385 off_t offset = digest->cd_offset; in md5_digest_final_uio() 389 if (digest->cd_uio->uio_segflg != UIO_SYSSPACE) in md5_digest_final_uio() 396 for (vec_idx = 0; offset >= digest->cd_uio->uio_iov[vec_idx].iov_len && in md5_digest_final_uio() 397 vec_idx < digest->cd_uio->uio_iovcnt; in md5_digest_final_uio() 398 offset -= digest->cd_uio->uio_iov[vec_idx++].iov_len) in md5_digest_final_uio() 400 if (vec_idx == digest->cd_uio->uio_iovcnt) { in md5_digest_final_uio() 410 digest->cd_uio->uio_iov[vec_idx].iov_len) { in md5_digest_final_uio() [all …]
|
H A D | sha1_mod.c | 82 #define PROV_SHA1_DIGEST_KEY(ctx, key, len, digest) { \ argument 85 SHA1Final(digest, ctx); \ 325 sha1_digest_final_uio(SHA1_CTX *sha1_ctx, crypto_data_t *digest, in sha1_digest_final_uio() argument 328 off_t offset = digest->cd_offset; in sha1_digest_final_uio() 332 if (digest->cd_uio->uio_segflg != UIO_SYSSPACE) in sha1_digest_final_uio() 339 for (vec_idx = 0; offset >= digest->cd_uio->uio_iov[vec_idx].iov_len && in sha1_digest_final_uio() 340 vec_idx < digest->cd_uio->uio_iovcnt; in sha1_digest_final_uio() 341 offset -= digest->cd_uio->uio_iov[vec_idx++].iov_len) in sha1_digest_final_uio() 343 if (vec_idx == digest->cd_uio->uio_iovcnt) { in sha1_digest_final_uio() 353 digest->cd_uio->uio_iov[vec_idx].iov_len) { in sha1_digest_final_uio() [all …]
|
H A D | sha2_mod.c | 80 #define PROV_SHA2_DIGEST_KEY(mech, ctx, key, len, digest) { \ argument 83 SHA2Final(digest, ctx); \ 347 sha2_digest_final_uio(SHA2_CTX *sha2_ctx, crypto_data_t *digest, in sha2_digest_final_uio() argument 350 off_t offset = digest->cd_offset; in sha2_digest_final_uio() 354 if (digest->cd_uio->uio_segflg != UIO_SYSSPACE) in sha2_digest_final_uio() 361 for (vec_idx = 0; offset >= digest->cd_uio->uio_iov[vec_idx].iov_len && in sha2_digest_final_uio() 362 vec_idx < digest->cd_uio->uio_iovcnt; in sha2_digest_final_uio() 363 offset -= digest->cd_uio->uio_iov[vec_idx++].iov_len) in sha2_digest_final_uio() 365 if (vec_idx == digest->cd_uio->uio_iovcnt) { in sha2_digest_final_uio() 375 digest->cd_uio->uio_iov[vec_idx].iov_len) { in sha2_digest_final_uio() [all …]
|
H A D | skein_mod.c | 319 skein_digest_final_uio(skein_ctx_t *ctx, crypto_data_t *digest, in skein_digest_final_uio() argument 322 off_t offset = digest->cd_offset; in skein_digest_final_uio() 324 uio_t *uio = digest->cd_uio; in skein_digest_final_uio() 435 skein_digest_final_mblk(skein_ctx_t *ctx, crypto_data_t *digest, in skein_digest_final_mblk() argument 438 off_t offset = digest->cd_offset; in skein_digest_final_mblk() 442 for (mp = digest->cd_mp; mp != NULL && offset >= MBLKL(mp); in skein_digest_final_mblk() 531 skein_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, in skein_digest() argument 538 if (digest->cd_length < in skein_digest() 540 digest->cd_length = in skein_digest() 550 digest->cd_length = 0; in skein_digest() [all …]
|
/titanic_50/usr/src/lib/crypt_modules/sunmd5/ |
H A D | sunmd5.c | 95 md5bit(uint8_t *digest, int bit_num) in md5bit() argument 105 return ((digest[byte_off] & (0x01 << bit_off)) ? 1 : 0); in md5bit() 259 uint8_t digest[DIGEST_LEN]; /* where the MD5 digest is stored */ in crypt_genhash_impl() member 319 MD5Final(data.digest, &data.context); in crypt_genhash_impl() 333 MD5Update(&data.context, data.digest, sizeof (data.digest)); in crypt_genhash_impl() 342 data.s7shift = data.digest[i] % 8; in crypt_genhash_impl() 343 data.shift_4[i] = data.digest[j] % 5; in crypt_genhash_impl() 344 data.shift_7[i] = (data.digest[j] >> data.s7shift) in crypt_genhash_impl() 348 data.shift_a = md5bit(data.digest, round); in crypt_genhash_impl() 349 data.shift_b = md5bit(data.digest, round + 64); in crypt_genhash_impl() [all …]
|
/titanic_50/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelDigest.c | 76 session_p->digest.flags |= CRYPTO_OPERATION_ACTIVE; in common_digest_init() 79 session_p->digest.mech.mechanism = pMechanism->mechanism; in common_digest_init() 80 session_p->digest.mech.pParameter = NULL; in common_digest_init() 81 session_p->digest.mech.ulParameterLen = 0; in common_digest_init() 82 session_p->digest.flags |= CRYPTO_EMULATE; in common_digest_init() 116 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE; in common_digest_init() 147 crypto_digest_t digest; in C_Digest() local 171 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) { in C_Digest() 185 if (session_p->digest.flags & CRYPTO_OPERATION_UPDATE) { in C_Digest() 200 if (session_p->digest.flags & CRYPTO_EMULATE) { in C_Digest() [all …]
|
/titanic_50/usr/src/lib/libsip/common/ |
H A D | sip_hash.h | 41 #define SIP_DIGEST_TO_HASH(digest) \ argument 42 ((digest[0] + digest[1] + digest[2] + digest[3] + digest[4] + \ 43 digest[5] + digest[6] + digest[7]) % SIP_HASH_SZ)
|
/titanic_50/usr/src/common/net/wanboot/crypt/ |
H A D | hmac_test.c | 50 unsigned char digest[20]; member 58 uchar_t digest[20]; in hmactest() local 68 getxdata(td[0].digest, "b617318655057264e28bc0b6fb378c8ef146be00", 20); in hmactest() 74 getxdata(td[1].digest, "effcdf6ae5eb2fa2d27416d5f184df9c259a7c79", 20); in hmactest() 82 getxdata(td[2].digest, "125d7342b9ac11cd91a39af48aa17b4f63f175d3", 20); in hmactest() 91 getxdata(td[3].digest, "4c9007f4026250c6bc8414f9bf50c86c2d7235da", 20); in hmactest() 98 getxdata(td[4].digest, "4c1a03424b55e07fe7f27be1d58bb9324a9a5a04", 20); in hmactest() 108 getxdata(td[5].digest, "aa4ae5e15272d00e95705637ce8a3b55ed402112", 20); in hmactest() 119 getxdata(td[6].digest, "e8e99d0f45237d786d6bbaa7965c7808bbff1a91", 20); in hmactest() 128 HMACFinal(&sha, td[i].key, td[i].keylen, digest); in hmactest() [all …]
|
H A D | hmac_sha1.c | 76 uchar_t digest[20]) in HMACFinal() 97 SHA1Final(digest, sha1Context); in HMACFinal() 101 SHA1Update(sha1Context, digest, 20); in HMACFinal() 102 SHA1Final(digest, sha1Context); in HMACFinal()
|
/titanic_50/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 20 int key_len, unsigned char *digest) in hmac_md5() argument 52 (void) MD5Final(digest, &context); in hmac_md5() 57 (void) MD5Update(&context, digest, 16); in hmac_md5() 59 (void) MD5Final(digest, &context); in hmac_md5() 74 unsigned char digest[16]; in ldap_sasl_cram_md5_bind_s() local 81 bzero(digest, sizeof (digest)); in ldap_sasl_cram_md5_bind_s() 94 (unsigned char *)cred->bv_val, cred->bv_len, digest); in ldap_sasl_cram_md5_bind_s() 98 theHDigest = hexa_print(digest, 16); in ldap_sasl_cram_md5_bind_s()
|
/titanic_50/usr/src/cmd/ssh/libssh/common/ |
H A D | ssh-dss.c | 51 u_char digest[EVP_MAX_MD_SIZE], sigblob[SIGBLOB_LEN]; in ssh_dss_sign() local 61 EVP_DigestFinal(&md, digest, &dlen); in ssh_dss_sign() 63 sig = DSA_do_sign(digest, dlen, key->dsa); in ssh_dss_sign() 64 memset(digest, 'd', sizeof(digest)); in ssh_dss_sign() 113 u_char digest[EVP_MAX_MD_SIZE], *sigblob; in ssh_dss_verify() local 173 EVP_DigestFinal(&md, digest, &dlen); in ssh_dss_verify() 175 ret = DSA_do_verify(digest, dlen, sig, key->dsa); in ssh_dss_verify() 176 memset(digest, 'd', sizeof(digest)); in ssh_dss_verify()
|
H A D | ssh-rsa.c | 51 u_char digest[EVP_MAX_MD_SIZE], *sig; in ssh_rsa_sign() local 67 EVP_DigestFinal(&md, digest, &dlen); in ssh_rsa_sign() 72 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); in ssh_rsa_sign() 73 memset(digest, 'd', sizeof(digest)); in ssh_rsa_sign() 118 u_char digest[EVP_MAX_MD_SIZE], *sigblob; in ssh_rsa_verify() local 172 EVP_DigestFinal(&md, digest, &dlen); in ssh_rsa_verify() 174 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa); in ssh_rsa_verify() 175 memset(digest, 'd', sizeof(digest)); in ssh_rsa_verify()
|
H A D | kexdh.c | 55 static u_char digest[EVP_MAX_MD_SIZE]; in kex_dh_hash() local 81 EVP_DigestFinal(&md, digest, NULL); in kex_dh_hash() 86 dump_digest("hash", digest, EVP_MD_size(evp_md)); in kex_dh_hash() 88 return digest; in kex_dh_hash()
|
H A D | kexgex.c | 57 static u_char digest[EVP_MAX_MD_SIZE]; in kexgex_hash() local 92 EVP_DigestFinal(&md, digest, NULL); in kexgex_hash() 97 dump_digest("hash", digest, EVP_MD_size(evp_md)); in kexgex_hash() 99 return digest; in kexgex_hash()
|
/titanic_50/usr/src/grub/grub-0.97/stage2/ |
H A D | md5.c | 215 unsigned char *digest; in md5_password() local 241 digest = md5_final (); in md5_password() 242 memcpy (alt_result, digest, 16); in md5_password() 254 digest = md5_final (); in md5_password() 258 memcpy (alt_result, digest, 16); in md5_password() 277 digest = md5_final (); in md5_password() 284 digest[i == 4 ? 5 : 12+i] | (digest[6+i] << 8) | (digest[i] << 16); in md5_password() 301 unsigned int w = digest[11]; in md5_password() 339 unsigned char* digest = md5 (buffer); in test() local 343 sprintf (result+2*i, "%02x", digest[i]); in test()
|
/titanic_50/usr/src/uts/common/fs/smbclnt/netsmb/ |
H A D | smb_sign.c | 89 crypto_data_t digest; in smb_compute_MAC() local 168 digest.cd_format = CRYPTO_DATA_RAW; in smb_compute_MAC() 169 digest.cd_offset = 0; in smb_compute_MAC() 170 digest.cd_length = sizeof (mac); in smb_compute_MAC() 171 digest.cd_miscdata = 0; in smb_compute_MAC() 172 digest.cd_raw.iov_base = (char *)mac; in smb_compute_MAC() 173 digest.cd_raw.iov_len = sizeof (mac); in smb_compute_MAC() 174 status = crypto_digest_final(crypto_ctx, &digest, 0); in smb_compute_MAC()
|
/titanic_50/usr/src/test/zfs-tests/tests/functional/checksum/edonr/ |
H A D | edonr_test.c | 157 uint8_t digest[mode / 8]; \ in main() 160 EdonRFinal(&ctx, digest); \ in main() 163 if (bcmp(digest, testdigest, mode / 8) == 0) { \ in main() 175 uint8_t digest[mode / 8]; \ in main() 186 EdonRFinal(&ctx, digest); \ in main()
|
/titanic_50/usr/src/uts/common/crypto/api/ |
H A D | kcf_digest.c | 96 crypto_mechanism_t *mech, crypto_data_t *data, crypto_data_t *digest, in crypto_digest_prov() argument 115 data, digest); in crypto_digest_prov() 131 crypto_data_t *digest, crypto_call_req_t *crq) in crypto_digest() argument 154 digest, KCF_SWFP_RHNDL(crq)); in crypto_digest() 163 pd->pd_sid, mech, NULL, data, digest); in crypto_digest() 385 crypto_digest_final(crypto_context_t context, crypto_data_t *digest, in crypto_digest_final() argument 404 error = KCF_PROV_DIGEST_FINAL(pd, ctx, digest, NULL); in crypto_digest_final() 408 ctx->cc_session, NULL, NULL, NULL, digest); in crypto_digest_final() 457 crypto_data_t *digest, crypto_call_req_t *cr) in crypto_digest_single() argument 474 error = KCF_PROV_DIGEST(pd, ctx, data, digest, NULL); in crypto_digest_single() [all …]
|
/titanic_50/usr/src/test/zfs-tests/tests/functional/checksum/sha2/ |
H A D | sha2_test.c | 199 uint8_t digest[diglen / 8]; \ in main() 202 SHA2Final(digest, &ctx); \ in main() 205 if (bcmp(digest, testdigest, diglen / 8) == 0) { \ in main() 217 uint8_t digest[diglen / 8]; \ in main() 228 SHA2Final(digest, &ctx); \ in main()
|
/titanic_50/usr/src/test/zfs-tests/tests/functional/checksum/skein/ |
H A D | skein_test.c | 275 uint8_t digest[diglen / 8]; \ in main() 278 (void) Skein ## mode ## _Final(&ctx, digest); \ in main() 281 if (bcmp(digest, testdigest, diglen / 8) == 0) { \ in main() 293 uint8_t digest[diglen / 8]; \ in main() 306 (void) Skein ## mode ## _Final(&ctx, digest); \ in main()
|
/titanic_50/usr/src/lib/libsqlite/src/ |
H A D | md5.c | 236 static void MD5Final(unsigned char digest[16], MD5Context *pCtx){ in MD5Final() 273 memcpy(digest, ctx->buf, 16); in MD5Final() 283 static void DigestToBase16(unsigned char *digest, char *zBuf){ in DigestToBase16() argument 288 int a = digest[i]; in DigestToBase16() 301 unsigned char digest[16]; in md5_cmd() local 310 MD5Final(digest, &ctx); in md5_cmd() 311 DigestToBase16(digest, interp->result); in md5_cmd() 322 unsigned char digest[16]; in md5file_cmd() local 344 MD5Final(digest, &ctx); in md5file_cmd() 345 DigestToBase16(digest, interp->result); in md5file_cmd() [all …]
|