Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 19 of 19) sorted by relevance

/titanic_50/usr/src/lib/libsasl/include/
H A Dhmac-md5.h45 void _sasl_hmac_md5_init(HMAC_MD5_CTX *hmac,
50 void _sasl_hmac_md5_precalc(HMAC_MD5_STATE *hmac,
55 void _sasl_hmac_md5_import(HMAC_MD5_CTX *hmac, HMAC_MD5_STATE *state);
57 #define _sasl_hmac_md5_update(hmac, text, text_len) _sasl_MD5Update(&(hmac)->ictx, (text), (text_le… argument
62 HMAC_MD5_CTX *hmac);
/titanic_50/usr/src/cmd/cmd-inet/etc/
H A Dipsecalgs44 ALG|2|2|hmac-md5,md5|CKM_MD5_HMAC_GENERAL|128|12
45 ALG|2|3|hmac-sha1,sha,sha1,sha-1,hmac-sha,hmac-sha-1|CKM_SHA_1_HMAC_GENERAL|160|12
46 ALG|2|5|hmac-sha256,sha256,sha-256,hmac-sha-256|CKM_SHA256_HMAC_GENERAL|256|16
47 ALG|2|6|hmac-sha384,sha384,sha-384,hmac-sha-384|CKM_SHA384_HMAC_GENERAL|384|24
48 ALG|2|7|hmac-sha512,sha512,sha-512,hmac-sha-512|CKM_SHA512_HMAC_GENERAL|512|32
/titanic_50/usr/src/lib/libsasl/lib/
H A Dmd5.c366 void _sasl_hmac_md5_init(HMAC_MD5_CTX *hmac, in _sasl_hmac_md5_init() argument
414 _sasl_MD5Init(&hmac->ictx); /* init inner context */ in _sasl_hmac_md5_init()
415 _sasl_MD5Update(&hmac->ictx, k_ipad, 64); /* apply inner pad */ in _sasl_hmac_md5_init()
417 _sasl_MD5Init(&hmac->octx); /* init outer context */ in _sasl_hmac_md5_init()
418 _sasl_MD5Update(&hmac->octx, k_opad, 64); /* apply outer pad */ in _sasl_hmac_md5_init()
440 HMAC_MD5_CTX hmac; in _sasl_hmac_md5_precalc() local
443 _sasl_hmac_md5_init(&hmac, key, key_len); in _sasl_hmac_md5_precalc()
445 state->istate[lupe] = htonl(hmac.ictx.state[lupe]); in _sasl_hmac_md5_precalc()
446 state->ostate[lupe] = htonl(hmac.octx.state[lupe]); in _sasl_hmac_md5_precalc()
448 MD5_memset(&hmac, 0, sizeof(hmac)); in _sasl_hmac_md5_precalc()
[all …]
/titanic_50/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelSoftCommon.c170 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ in do_soft_hmac_sign() local
178 (pSignature != NULL ? hmac : NULL), pulSignatureLen, B_TRUE); in do_soft_hmac_sign()
181 (void) memcpy(pSignature, hmac, *pulSignatureLen); in do_soft_hmac_sign()
198 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ in do_soft_hmac_verify() local
209 ulDataLen, hmac, &len, B_FALSE); in do_soft_hmac_verify()
216 if (memcmp(hmac, pSignature, len) != 0) { in do_soft_hmac_verify()
/titanic_50/usr/src/cmd/cmd-inet/usr.lib/wanboot/
H A DMakefile35 hmac \
43 MSGFILES= encr/encr.c hmac/hmac.c ickey/ickey.c keygen/keygen.c \
/titanic_50/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftVerifyUtil.c154 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ in soft_verify() local
161 ulDataLen, hmac, &len, B_FALSE); in soft_verify()
168 if (memcmp(hmac, pSignature, len) != 0) { in soft_verify()
345 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; in soft_verify_final() local
352 hmac, &len, B_FALSE); in soft_verify_final()
359 if (memcmp(hmac, pSignature, len) != 0) { in soft_verify_final()
H A DsoftSignUtil.c152 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ in soft_sign() local
157 ulDataLen, hmac, pulSignatureLen, B_TRUE); in soft_sign()
165 (void) memcpy(pSignature, hmac, *pulSignatureLen); in soft_sign()
333 CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */ in soft_sign_final() local
338 0, hmac, pulSignatureLen, B_TRUE); in soft_sign_final()
346 (void) memcpy(pSignature, hmac, *pulSignatureLen); in soft_sign_final()
H A DsoftKeystoreUtil.c1252 CK_BYTE hmac[OBJ_HMAC_SIZE], *decrypted_buf = NULL, *buf = NULL; in reencrypt_obj() local
1368 encrypted_len, hmac, &hmac_len) != CKR_OK) { in reencrypt_obj()
1380 if (writen_nointr(new_fd, (char *)hmac, OBJ_HMAC_SIZE) in reencrypt_obj()
/titanic_50/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dmech_sha.c222 CK_BYTE hmac[SHA1_DIGEST_LENGTH]; in sha1_hmac_verify() local
241 len = sizeof (hmac); in sha1_hmac_verify()
243 in_data, in_data_len, hmac, &len); in sha1_hmac_verify()
252 if (memcmp(hmac, signature, hmac_len) != 0) { in sha1_hmac_verify()
H A Dmech_md5.c492 CK_BYTE hmac[MD5_DIGEST_LENGTH]; in md5_hmac_verify() local
513 len = sizeof (hmac); in md5_hmac_verify()
515 in_data, in_data_len, hmac, &len); in md5_hmac_verify()
524 if (memcmp(hmac, signature, hmac_len) != 0) { in md5_hmac_verify()
/titanic_50/usr/src/cmd/cmd-inet/usr.lib/wanboot/hmac/
H A DMakefile31 PROG= hmac
/titanic_50/usr/src/pkg/manifests/
H A Dsystem-boot-wanboot.mf43 file path=usr/lib/inet/wanboot/hmac mode=0555
/titanic_50/usr/src/uts/common/io/
H A Dcryptmod.c977 char *hmac, int hmaclen) in kef_decr_hmac() argument
989 ASSERT(hmac != NULL); in kef_decr_hmac()
997 v1.iov_base = hmac; in kef_decr_hmac()
1046 char *hmac, int hmaclen) in kef_encr_hmac() argument
1058 ASSERT(hmac != NULL); in kef_encr_hmac()
1066 v1.iov_base = hmac; in kef_encr_hmac()
1182 char *hmac, int hmaclen) in do_hmac() argument
1203 vmac.iov_base = hmac; in do_hmac()
/titanic_50/usr/src/cmd/krb5/kadmin/kdcmgr/
H A Dkdcmgr.sh652 ENCTYPE=aes128-cts-hmac-sha1-96
/titanic_50/usr/src/lib/gss_mechs/mech_krb5/
H A DMakefile.com49 prng.o block_size.o make_checksum.o checksum_length.o hmac.o \
/titanic_50/usr/src/cmd/ssh/doc/
H A DChangeLog166 hmac->mac
894 [deattack.c dispatch.c dsa.c fingerprint.c fingerprint.h getput.h hmac.c]
1453 - [kex.h kex.c hmac.h hmac.c dsa.c dsa.h]
/titanic_50/usr/src/uts/common/
H A DMakefile.files1657 checksum_length.o hmac.o default_state.o mandatory_sumtype.o
/titanic_50/exception_lists/
H A Dcstyle788 usr/src/uts/common/gssapi/mechs/krb5/crypto/hmac.c
/titanic_50/
H A D.gitignore320 usr/src/cmd/cmd-inet/usr.lib/wanboot/hmac/hmac