/freebsd-11.0-release/contrib/apr-util/include/ |
H A D | apr_md4.h | 89 * for translating the content before calculating the digest. 100 * MD4 block update operation. Continue an MD4 message-digest operation, 111 * MD4 finalization. Ends an MD4 message-digest operation, writing the 112 * message digest and zeroing the context 113 * @param digest The final MD4 digest 117 unsigned char digest[APR_MD4_DIGESTSIZE], 121 * MD4 digest computation 122 * @param digest The MD4 digest [all...] |
H A D | apr_sha1.h | 57 /** message digest */ 58 apr_uint32_t digest[5]; member in struct:apr_sha1_ctx_t 85 * Initialize the SHA digest 91 * Update the SHA digest 93 * @param input The buffer to add to the SHA digest 100 * Update the SHA digest with binary data 102 * @param input The buffer to add to the SHA digest 110 * Finish computing the SHA digest 111 * @param digest the output buffer in which to store the digest [all...] |
H A D | apr_md5.h | 67 /** The MD5 digest size */ 95 * for translating the content before calculating the digest. 103 * MD5 block update operation. Continue an MD5 message-digest operation, 114 * MD5 finalization. Ends an MD5 message-digest operation, writing the 115 * message digest and zeroing the context 116 * @param digest The final MD5 digest 119 APU_DECLARE(apr_status_t) apr_md5_final(unsigned char digest[APR_MD5_DIGESTSIZE], 124 * @param digest The final MD5 digest [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/asn1/ |
H A D | x_sig.c | 66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
|
/freebsd-11.0-release/contrib/wpa/src/crypto/ |
H A D | md5_i.h | 21 void MD5Final(unsigned char digest[16], struct MD5Context *context);
|
H A D | sha1_i.h | 20 void SHA1Final(unsigned char digest[20], struct SHA1Context *context);
|
/freebsd-11.0-release/kerberos5/libexec/ |
H A D | Makefile | 3 SUBDIR= digest-service ipropd-master ipropd-slave hprop hpropd kadmind kdc \
|
/freebsd-11.0-release/contrib/ipfilter/ |
H A D | md5.h | 64 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon1786
|
/freebsd-11.0-release/usr.bin/mkuzip/ |
H A D | mkuz_blk.h | 35 unsigned char digest[16]; member in struct:mkuz_blk_info
|
/freebsd-11.0-release/contrib/dma/ |
H A D | crypto.c | 183 * digest caller digest to be filled int 187 unsigned char* digest) 241 MD5_Final(digest, &context); /* finish up 1st pass */ 248 MD5_Update(&context, digest, 16); /* then results of 1st 250 MD5_Final(digest, &context); /* finish up 2nd pass */ 259 unsigned char digest[BUF_SIZE]; local 267 memset(digest, 0, sizeof(digest)); 283 (unsigned char *)password, strlen(password), digest); 186 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char* digest) argument [all...] |
/freebsd-11.0-release/crypto/openssh/ |
H A D | hmac.c | 24 #include "digest.h" 31 struct ssh_digest_ctx *digest; member in struct:ssh_hmac_ctx 52 (ret->digest = ssh_digest_start(alg)) == NULL) 87 if (ssh_digest_copy_state(ctx->ictx, ctx->digest) < 0) 95 return ssh_digest_update(ctx->digest, m, mlen); 101 return ssh_digest_update_buffer(ctx->digest, b); 111 ssh_digest_final(ctx->digest, ctx->buf, len)) 114 if (ssh_digest_copy_state(ctx->octx, ctx->digest) < 0 || 115 ssh_digest_update(ctx->digest, ctx->buf, len) < 0 || 116 ssh_digest_final(ctx->digest, 145 u_char digest[16]; local [all...] |
H A D | ssh-dss.c | 42 #include "digest.h" 54 u_char digest[SSH_DIGEST_MAX_LENGTH], sigblob[SIGBLOB_LEN]; local 71 digest, sizeof(digest))) != 0) 74 if ((sig = DSA_do_sign(digest, dlen, key->dsa)) == NULL) { 122 explicit_bzero(digest, sizeof(digest)); 135 u_char digest[SSH_DIGEST_MAX_LENGTH], *sigblob = NULL; local 192 digest, sizeof(digest))) ! [all...] |
/freebsd-11.0-release/sys/geom/eli/ |
H A D | g_eli_hmac.c | 89 u_char digest[SHA512_MDLEN]; local 92 SHA512_Final(digest, &ctx->shactx); 97 SHA512_Update(&lctx, digest, sizeof(digest)); 98 SHA512_Final(digest, &lctx); 103 bcopy(digest, md, mdsize); 104 bzero(digest, sizeof(digest));
|
/freebsd-11.0-release/contrib/tcpdump/ |
H A D | signature.c | 13 * Functions for signature and digest verification. 50 unsigned int key_len, uint8_t *digest) 100 MD5_Final(digest, &context); /* finish up 1st pass */ 107 MD5_Update(&context, digest, 16); /* then results of 1st hash */ 108 MD5_Final(digest, &context); /* finish up 2nd pass */ 49 signature_compute_hmac_md5(const uint8_t *text, int text_len, unsigned char *key, unsigned int key_len, uint8_t *digest) argument
|
/freebsd-11.0-release/contrib/subversion/subversion/svnfsfs/ |
H A D | dump-index-cmd.c | 39 apr_uint32_t digest = htonl(fnv1); local 40 checksum.digest = (const unsigned char *)&digest; 42 /* Convert the digest to hex. */
|
/freebsd-11.0-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_p8e.c | 91 M_ASN1_OCTET_STRING_free(p8->digest); 92 p8->digest = 95 if (!p8->digest) {
|
/freebsd-11.0-release/contrib/ldns/ldns/ |
H A D | sha2.h | 17 * - Added ldns_shaX(data, len, digest) functions 110 * Convenience function to digest a fixed block of data at once. 112 * \param[in] data the data to digest 114 * \param[out] digest the length of data in bytes 117 * \return the SHA1 digest of the given data 119 unsigned char *ldns_sha256(unsigned char *data, unsigned int data_len, unsigned char *digest); 122 * Convenience function to digest a fixed block of data at once. 124 * \param[in] data the data to digest 126 * \param[out] digest the length of data in bytes 129 * \return the SHA1 digest o [all...] |
/freebsd-11.0-release/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/ |
H A D | edonr_zfs.c | 40 uint8_t digest[EDONR_MODE / 8]; local 46 EdonRFinal(&ctx, digest); 47 bcopy(digest, zcp->zc_word, sizeof (zcp->zc_word));
|
/freebsd-11.0-release/sys/crypto/skein/ |
H A D | skein_freebsd.h | 60 void SKEIN256_Final(unsigned char digest[static SKEIN256_DIGEST_LENGTH], SKEIN256_CTX *ctx); 61 void SKEIN512_Final(unsigned char digest[static SKEIN512_DIGEST_LENGTH], SKEIN512_CTX *ctx); 62 void SKEIN1024_Final(unsigned char digest[static SKEIN1024_DIGEST_LENGTH], SKEIN1024_CTX *ctx);
|
/freebsd-11.0-release/contrib/ntp/lib/isc/ |
H A D | hmacsha.c | 58 isc_hmacsha1_sign(isc_hmacsha1_t *ctx, unsigned char *digest, size_t len) { argument 65 memcpy(digest, newdigest, len); 89 isc_hmacsha224_sign(isc_hmacsha224_t *ctx, unsigned char *digest, size_t len) { argument 96 memcpy(digest, newdigest, len); 120 isc_hmacsha256_sign(isc_hmacsha256_t *ctx, unsigned char *digest, size_t len) { argument 127 memcpy(digest, newdigest, len); 151 isc_hmacsha384_sign(isc_hmacsha384_t *ctx, unsigned char *digest, size_t len) { argument 158 memcpy(digest, newdigest, len); 182 isc_hmacsha512_sign(isc_hmacsha512_t *ctx, unsigned char *digest, size_t len) { argument 189 memcpy(digest, newdiges 245 isc_hmacsha1_sign(isc_hmacsha1_t *ctx, unsigned char *digest, size_t len) argument 312 isc_hmacsha224_sign(isc_hmacsha224_t *ctx, unsigned char *digest, size_t len) argument 378 isc_hmacsha256_sign(isc_hmacsha256_t *ctx, unsigned char *digest, size_t len) argument 444 isc_hmacsha384_sign(isc_hmacsha384_t *ctx, unsigned char *digest, size_t len) argument 510 isc_hmacsha512_sign(isc_hmacsha512_t *ctx, unsigned char *digest, size_t len) argument 536 isc_hmacsha1_verify(isc_hmacsha1_t *ctx, unsigned char *digest, size_t len) argument 549 isc_hmacsha224_verify(isc_hmacsha224_t *ctx, unsigned char *digest, size_t len) argument 562 isc_hmacsha256_verify(isc_hmacsha256_t *ctx, unsigned char *digest, size_t len) argument 575 isc_hmacsha384_verify(isc_hmacsha384_t *ctx, unsigned char *digest, size_t len) argument 588 isc_hmacsha512_verify(isc_hmacsha512_t *ctx, unsigned char *digest, size_t len) argument [all...] |
/freebsd-11.0-release/sbin/md5/ |
H A D | md5.c | 161 unsigned digest; local 169 for (digest = 0; digest < sizeof(Algorithm)/sizeof(*Algorithm); digest++) 170 if (strcasecmp(Algorithm[digest].progname, progname) == 0) 173 if (digest == sizeof(Algorithm)/sizeof(*Algorithm)) 174 digest = 0; 185 MDFilter(&Algorithm[digest], 1); 195 MDString(&Algorithm[digest], optarg); 198 MDTimeTrial(&Algorithm[digest]); [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 79 ASN1_OCTET_STRING digest; local 114 sig.digest = &digest; 115 sig.digest->data = (unsigned char *)m; /* TMP UGLY CAST */ 116 sig.digest->length = m_len; 269 if (md && (EVP_MD_size(md) != sig->digest->length)) 272 memcpy(rm, sig->digest->data, sig->digest->length); 273 *prm_len = sig->digest->length; 276 } else if (((unsigned int)sig->digest [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/hmac/ |
H A D | hmactest.c | 87 unsigned char *digest; member in struct:test_st 165 if (strcmp(p, (char *)test[i].digest) != 0) { 167 printf("got %s instead of %s\n", p, test[i].digest); 231 if (strcmp(p, (char *)test[4].digest) != 0) { 233 printf("got %s instead of %s\n", p, test[4].digest); 258 if (strcmp(p, (char *)test[5].digest) != 0) { 260 printf("got %s instead of %s\n", p, test[5].digest); 280 if (strcmp(p, (char *)test[6].digest) != 0) { 282 printf("got %s instead of %s\n", p, test[6].digest); 311 if (strcmp(p, (char *)test[7].digest) ! [all...] |
/freebsd-11.0-release/contrib/ntp/sntp/ |
H A D | crypto.c | 16 void * digest 35 EVP_DigestFinal(ctx, digest, &len); 42 /* Generates a md5 digest of the key specified in keyid concatenated with the 43 * ntp packet (exluding the MAC) and compares this digest to the digest in 57 char digest[20]; local 59 if (mac_size > (int)sizeof(digest)) 62 hash_len = make_mac(pkt_ptr, pkt_size, sizeof(digest), cmp_key, 63 digest); 71 authentic = !memcmp(digest, (cons [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/evp/ |
H A D | bio_ok.c | 90 with it's length and suffixed with it's digest. So you need only 92 it's digest. 96 1) the digest of the block is computed over the whole stream 103 *) digest is initialized with random seed instead of 107 of the digest is also written to output. 110 and then compare the digest output. 432 *ppmd = ctx->md.digest; 485 if (ctx->buf_len + 2 * md->digest->md_size > OK_BLOCK_SIZE) 488 if (!EVP_DigestInit_ex(md, md->digest, NULL)) 494 if (RAND_bytes(md->md_data, md->digest [all...] |