/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rand/ |
H A D | rand_win.c | 779 unsigned char md[MD_DIGEST_LENGTH]; local 788 MD(bmbits,size,md); 791 RAND_add(md, MD_DIGEST_LENGTH, 0);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ts/ |
H A D | ts_conf.c | 390 const EVP_MD *md; local 391 if (!(md = EVP_get_digestbyname(extval))) 396 if (!TS_RESP_CTX_add_md(ctx, md))
|
H A D | ts_rsp_verify.c | 588 const EVP_MD *md; local 600 if (!(md = EVP_get_digestbyobj((*md_alg)->algorithm))) 607 length = EVP_MD_size(md); 617 EVP_DigestInit(&md_ctx, md);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_smime.c | 206 CMS_ContentInfo *CMS_digest_create(BIO *in, const EVP_MD *md, argument 210 if (!md) 211 md = EVP_sha1(); 212 cms = cms_DigestedData_create(md);
|
H A D | cms.h | 153 CMS_ContentInfo *CMS_digest_create(BIO *in, const EVP_MD *md, 243 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/md2/ |
H A D | md2_dgst.c | 203 int MD2_Final(unsigned char *md, MD2_CTX *c) argument 223 md[i]=(UCHAR)(p1[i]&0xff);
|
/barrelfish-2018-10-04/usr/eclipseclp/Kernel/src/ |
H A D | read.c | 1920 macro_desc *md; local 1945 md = (macro_desc *) prop->val.ptr; 1946 *tr_flags = md->flags; 1948 if ((md->flags & flags) != (md->flags & TR_TYPE)) 1956 Gbl_Tg += DidArity(md->trans_function) + 4; 1963 (pw+2)->val.did = md->module; 1965 (pw+3)->val.did = md->trans_function; 1969 switch (DidArity(md->trans_function)) 1989 Gbl_Tg = Gbl_Tg - DidArity(md [all...] |
H A D | bip_db.c | 1547 macro_desc *md; local 1618 md = (macro_desc *) hg_alloc(sizeof(macro_desc)); 1620 prop->val.ptr = (pword *) md; 1622 md->trans_function = dt; 1623 md->module = lookup_module; 1624 md->flags = flag; 1794 macro_desc *md; local 1811 md = (macro_desc *) pwd->val.ptr; 1817 pwd[1].val.did = add_dict(md->trans_function, 0); 1819 pwd[2].val.nint = DidArity(md [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ssl/ |
H A D | ssl_ciph.c | 462 const EVP_MD **md, int *mac_pkey_type, int *mac_secret_size,SSL_COMP **comp) 488 if ((enc == NULL) || (md == NULL)) return(0); 563 *md=NULL; 570 *md=ssl_digest_methods[i]; 575 if ((*enc != NULL) && (*md != NULL) && (!mac_pkey_type||*mac_pkey_type != NID_undef)) 581 int ssl_get_handshake_digest(int idx, long *mask, const EVP_MD **md) argument 589 *md = ssl_digest_methods[idx]; 461 ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc, const EVP_MD **md, int *mac_pkey_type, int *mac_secret_size,SSL_COMP **comp) argument
|
H A D | ssl_locl.h | 805 const EVP_MD **md,int *mac_pkey_type,int *mac_secret_size, SSL_COMP **comp); 806 int ssl_get_handshake_digest(int i,long *mask,const EVP_MD **md); 877 int n_ssl3_mac(SSL *ssl, unsigned char *md, int send_data); 1032 int tls1_mac(SSL *ssl, unsigned char *md, int snd); 1068 EVP_MD_CTX* ssl_replace_hash(EVP_MD_CTX **hash,const EVP_MD *md) ;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | asn_mime.c | 204 const EVP_MD *md; local 214 md = EVP_get_digestbynid(md_nid); 215 if (md && md->md_ctrl) 219 rv = md->md_ctrl(NULL, EVP_MD_CTRL_MICALG, 0, &micstr);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/engines/ccgost/ |
H A D | gost_crypt.c | 74 static int gost_imit_final(EVP_MD_CTX *ctx,unsigned char *md); 560 int gost_imit_final(EVP_MD_CTX *ctx,unsigned char *md) argument 576 get_mac(c->buffer,32,md);
|
H A D | gost_pmeth.c | 84 pctx->md = (EVP_MD *)p2; 456 data->md = (EVP_MD *)p2;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/engines/zencod/ |
H A D | hw_zencod.c | 1192 static int engine_sha1_final ( EVP_MD_CTX *ctx, unsigned char *md ) ; 1197 static int engine_md5_final ( EVP_MD_CTX *ctx, unsigned char *md ) ; 1419 static int engine_sha1_final ( EVP_MD_CTX *ctx, unsigned char *md ) 1427 output.data = md ; 1471 static int engine_md5_final ( EVP_MD_CTX *ctx, unsigned char *md ) 1479 output.data = md ;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | pk7_smime.c | 162 EVP_PKEY *pkey, const EVP_MD *md, 174 if (!(si = PKCS7_add_signature(p7,signcert,pkey, md))) 161 PKCS7_sign_add_signer(PKCS7 *p7, X509 *signcert, EVP_PKEY *pkey, const EVP_MD *md, int flags) argument
|
H A D | pk7_asn1.c | 221 ASN1_SIMPLE(PKCS7_DIGEST, md, X509_ALGOR),
|
/barrelfish-2018-10-04/include/arch/arm/machine/ |
H A D | pmap-v4.h | 83 #define pmap_page_get_memattr(m) ((m)->md.pv_memattr) 84 #define pmap_page_is_mapped(m) (!TAILQ_EMPTY(&(m)->md.pv_list))
|
/barrelfish-2018-10-04/include/openssl/ |
H A D | cms.h | 153 CMS_ContentInfo *CMS_digest_create(BIO *in, const EVP_MD *md, 243 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
|
H A D | pem.h | 145 EVP_MD_CTX md; member in struct:PEM_Encode_Seal_st 189 EVP_MD *md; /* signature type */ member in struct:pem_ctx_st 191 int md_enc; /* is the md encrypted or not? */
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/evp/ |
H A D | p5_crpt2.c | 168 ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, 167 PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de) argument
|
/barrelfish-2018-10-04/lib/lua/src/ |
H A D | liolib.c | 230 const char *md = mode; /* to traverse/check mode */ local 231 luaL_argcheck(L, lua_checkmode(md), 2, "invalid mode");
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/ |
H A D | ca.c | 160 " -md arg - md to use, one of md2, md5, sha or sha1\n", 263 char *md=NULL; local 385 else if (strcmp(*argv,"-md") == 0) 388 md= *(++argv); 1024 if ((md == NULL) && ((md=NCONF_get_string(conf, 1031 if (!strcmp(md, "default")) 1039 md = (char *)OBJ_nid2sn(def_nid); 1042 if ((dgst=EVP_get_digestbyname(md)) [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pem/ |
H A D | pem.h | 145 EVP_MD_CTX md; member in struct:PEM_Encode_Seal_st 189 EVP_MD *md; /* signature type */ member in struct:pem_ctx_st 191 int md_enc; /* is the md encrypted or not? */
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/engine/ |
H A D | eng_cryptodev.c | 745 static int cryptodev_digest_final(EVP_MD_CTX *ctx, unsigned char *md) argument 753 if (!md || state->d_fd < 0) { 767 cryp.mac = (capaddr_t)md; 777 memcpy(md, state->digest_res, ctx->digest->md_size);
|
/barrelfish-2018-10-04/include/arch/x86_64/machine/ |
H A D | pmap.h | 386 #define pmap_page_get_memattr(m) ((vm_memattr_t)(m)->md.pat_mode)
|