/titanic_50/usr/src/lib/libsasl/include/ |
H A D | hmac-md5.h | 45 void _sasl_hmac_md5_init(HMAC_MD5_CTX *hmac, 50 void _sasl_hmac_md5_precalc(HMAC_MD5_STATE *hmac, 55 void _sasl_hmac_md5_import(HMAC_MD5_CTX *hmac, HMAC_MD5_STATE *state); 57 #define _sasl_hmac_md5_update(hmac, text, text_len) _sasl_MD5Update(&(hmac)->ictx, (text), (text_le… argument 62 HMAC_MD5_CTX *hmac);
|
/titanic_50/usr/src/cmd/cmd-inet/etc/ |
H A D | ipsecalgs | 44 ALG|2|2|hmac-md5,md5|CKM_MD5_HMAC_GENERAL|128|12 45 ALG|2|3|hmac-sha1,sha,sha1,sha-1,hmac-sha,hmac-sha-1|CKM_SHA_1_HMAC_GENERAL|160|12 46 ALG|2|5|hmac-sha256,sha256,sha-256,hmac-sha-256|CKM_SHA256_HMAC_GENERAL|256|16 47 ALG|2|6|hmac-sha384,sha384,sha-384,hmac-sha-384|CKM_SHA384_HMAC_GENERAL|384|24 48 ALG|2|7|hmac-sha512,sha512,sha-512,hmac-sha-512|CKM_SHA512_HMAC_GENERAL|512|32
|
/titanic_50/usr/src/lib/libsasl/lib/ |
H A D | md5.c | 366 void _sasl_hmac_md5_init(HMAC_MD5_CTX *hmac, in _sasl_hmac_md5_init() argument 414 _sasl_MD5Init(&hmac->ictx); /* init inner context */ in _sasl_hmac_md5_init() 415 _sasl_MD5Update(&hmac->ictx, k_ipad, 64); /* apply inner pad */ in _sasl_hmac_md5_init() 417 _sasl_MD5Init(&hmac->octx); /* init outer context */ in _sasl_hmac_md5_init() 418 _sasl_MD5Update(&hmac->octx, k_opad, 64); /* apply outer pad */ in _sasl_hmac_md5_init() 440 HMAC_MD5_CTX hmac; in _sasl_hmac_md5_precalc() local 443 _sasl_hmac_md5_init(&hmac, key, key_len); in _sasl_hmac_md5_precalc() 445 state->istate[lupe] = htonl(hmac.ictx.state[lupe]); in _sasl_hmac_md5_precalc() 446 state->ostate[lupe] = htonl(hmac.octx.state[lupe]); in _sasl_hmac_md5_precalc() 448 MD5_memset(&hmac, 0, sizeof(hmac)); in _sasl_hmac_md5_precalc() [all …]
|
/titanic_50/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSoftCommon.c | 170 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ in do_soft_hmac_sign() local 178 (pSignature != NULL ? hmac : NULL), pulSignatureLen, B_TRUE); in do_soft_hmac_sign() 181 (void) memcpy(pSignature, hmac, *pulSignatureLen); in do_soft_hmac_sign() 198 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ in do_soft_hmac_verify() local 209 ulDataLen, hmac, &len, B_FALSE); in do_soft_hmac_verify() 216 if (memcmp(hmac, pSignature, len) != 0) { in do_soft_hmac_verify()
|
/titanic_50/usr/src/cmd/cmd-inet/usr.lib/wanboot/ |
H A D | Makefile | 35 hmac \ 43 MSGFILES= encr/encr.c hmac/hmac.c ickey/ickey.c keygen/keygen.c \
|
/titanic_50/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softVerifyUtil.c | 154 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ in soft_verify() local 161 ulDataLen, hmac, &len, B_FALSE); in soft_verify() 168 if (memcmp(hmac, pSignature, len) != 0) { in soft_verify() 345 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; in soft_verify_final() local 352 hmac, &len, B_FALSE); in soft_verify_final() 359 if (memcmp(hmac, pSignature, len) != 0) { in soft_verify_final()
|
H A D | softSignUtil.c | 152 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ in soft_sign() local 157 ulDataLen, hmac, pulSignatureLen, B_TRUE); in soft_sign() 165 (void) memcpy(pSignature, hmac, *pulSignatureLen); in soft_sign() 333 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ in soft_sign_final() local 338 0, hmac, pulSignatureLen, B_TRUE); in soft_sign_final() 346 (void) memcpy(pSignature, hmac, *pulSignatureLen); in soft_sign_final()
|
H A D | softKeystoreUtil.c | 1252 CK_BYTE hmac[OBJ_HMAC_SIZE], *decrypted_buf = NULL, *buf = NULL; in reencrypt_obj() local 1368 encrypted_len, hmac, &hmac_len) != CKR_OK) { in reencrypt_obj() 1380 if (writen_nointr(new_fd, (char *)hmac, OBJ_HMAC_SIZE) in reencrypt_obj()
|
/titanic_50/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_sha.c | 222 CK_BYTE hmac[SHA1_DIGEST_LENGTH]; in sha1_hmac_verify() local 241 len = sizeof (hmac); in sha1_hmac_verify() 243 in_data, in_data_len, hmac, &len); in sha1_hmac_verify() 252 if (memcmp(hmac, signature, hmac_len) != 0) { in sha1_hmac_verify()
|
H A D | mech_md5.c | 492 CK_BYTE hmac[MD5_DIGEST_LENGTH]; in md5_hmac_verify() local 513 len = sizeof (hmac); in md5_hmac_verify() 515 in_data, in_data_len, hmac, &len); in md5_hmac_verify() 524 if (memcmp(hmac, signature, hmac_len) != 0) { in md5_hmac_verify()
|
/titanic_50/usr/src/cmd/cmd-inet/usr.lib/wanboot/hmac/ |
H A D | Makefile | 31 PROG= hmac
|
/titanic_50/usr/src/pkg/manifests/ |
H A D | system-boot-wanboot.mf | 43 file path=usr/lib/inet/wanboot/hmac mode=0555
|
/titanic_50/usr/src/uts/common/io/ |
H A D | cryptmod.c | 977 char *hmac, int hmaclen) in kef_decr_hmac() argument 989 ASSERT(hmac != NULL); in kef_decr_hmac() 997 v1.iov_base = hmac; in kef_decr_hmac() 1046 char *hmac, int hmaclen) in kef_encr_hmac() argument 1058 ASSERT(hmac != NULL); in kef_encr_hmac() 1066 v1.iov_base = hmac; in kef_encr_hmac() 1182 char *hmac, int hmaclen) in do_hmac() argument 1203 vmac.iov_base = hmac; in do_hmac()
|
/titanic_50/usr/src/cmd/krb5/kadmin/kdcmgr/ |
H A D | kdcmgr.sh | 652 ENCTYPE=aes128-cts-hmac-sha1-96
|
/titanic_50/usr/src/lib/gss_mechs/mech_krb5/ |
H A D | Makefile.com | 49 prng.o block_size.o make_checksum.o checksum_length.o hmac.o \
|
/titanic_50/usr/src/cmd/ssh/doc/ |
H A D | ChangeLog | 166 hmac->mac 894 [deattack.c dispatch.c dsa.c fingerprint.c fingerprint.h getput.h hmac.c] 1453 - [kex.h kex.c hmac.h hmac.c dsa.c dsa.h]
|
/titanic_50/usr/src/uts/common/ |
H A D | Makefile.files | 1657 checksum_length.o hmac.o default_state.o mandatory_sumtype.o
|
/titanic_50/exception_lists/ |
H A D | cstyle | 788 usr/src/uts/common/gssapi/mechs/krb5/crypto/hmac.c
|
/titanic_50/ |
H A D | .gitignore | 320 usr/src/cmd/cmd-inet/usr.lib/wanboot/hmac/hmac
|