/macosx-10.10/OpenSSL098-52/src/crypto/evp/ |
H A D | digest.c | 1 /* crypto/evp/digest.c */ 241 /* We'll use the ENGINE's private digest definition */ 252 if(!ctx->digest) 271 ctx->digest = &bad_md; 280 if (ctx->engine && ctx->digest && (!type || 281 (type && (type->type == ctx->digest->type)))) 286 if (ctx->digest != type) 295 ctx->digest = &bad_md; 300 if (ctx->digest && ctx->digest [all...] |
H A D | p_sign.c | 89 v=ctx->digest->required_pkey_type[i]; 102 if (ctx->digest->sign == NULL) 109 if (ctx->digest->flags & EVP_MD_FLAG_SVCTX) 114 i = ctx->digest->sign(ctx->digest->type, 120 i = ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
|
H A D | p_verify.c | 75 v=ctx->digest->required_pkey_type[i]; 88 if (ctx->digest->verify == NULL) 96 if (ctx->digest->flags & EVP_MD_FLAG_SVCTX) 101 i = ctx->digest->verify(ctx->digest->type, 107 i = ctx->digest->verify(ctx->digest->type,m,m_len,
|
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | chap-new.h | 72 * CHAP digest codes. 96 /* Return the digest alg. ID for the most preferred digest type. */ 103 /* Return the bit flag (lsb set) for our most preferred digest type. */ 106 /* Return the bit flag for a given digest algorithm ID. */ 107 #define CHAP_MDTYPE_D(digest) \ 108 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 109 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 110 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 113 /* Can we do the requested digest [all...] |
H A D | md5.h | 79 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon11959
|
H A D | chap.h | 68 #define MD5_SIGNATURE_SIZE 16 /* 16 bytes in a MD5 message digest */ 88 /* Return the digest alg. ID for the most preferred digest type. */ 95 /* Return the bit flag (lsb set) for our most preferred digest type. */ 98 /* Return the bit flag for a given digest algorithm ID. */ 99 #define CHAP_MDTYPE_D(digest) \ 100 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 101 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 102 ((digest) == CHAP_DIGEST_MD5)? MDTYPE_MD5: \ 105 /* Can we do the requested digest [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/SecurityTool/ |
H A D | digest_calc.c | 42 unsigned char *digest = NULL; local 72 digest = malloc(di->output_size); 73 require_quiet(digest, exit); 89 ccdigest_final(di, ctx, digest); 92 printf("%02x", digest[j]); 98 if (digest) 99 free(digest);
|
/macosx-10.10/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSDigestVector.h | 49 #define SOSDigestVectorInit { .digest = NULL, .count = 0, .capacity = 0, .unsorted = false } 52 uint8_t (*digest)[SOSDigestSize]; member in struct:SOSDigestVector 58 typedef void (^SOSDigestVectorApplyBlock)(const uint8_t digest[SOSDigestSize], bool *stop); variable 61 void SOSDigestVectorAppend(struct SOSDigestVector *dv, const uint8_t *digest); 66 size_t SOSDigestVectorIndexOf(struct SOSDigestVector *dv, const uint8_t *digest); 67 size_t SOSDigestVectorIndexOfSorted(const struct SOSDigestVector *dv, const uint8_t *digest); 68 bool SOSDigestVectorContains(struct SOSDigestVector *dv, const uint8_t *digest); 69 bool SOSDigestVectorContainsSorted(const struct SOSDigestVector *dv, const uint8_t *digest); 70 void SOSDigestVectorReplaceAtIndex(struct SOSDigestVector *dv, size_t ix, const uint8_t *digest);
|
/macosx-10.10/ntp-92/lib/isc/include/isc/ |
H A D | hmacmd5.h | 53 isc_hmacmd5_sign(isc_hmacmd5_t *ctx, unsigned char *digest); 56 isc_hmacmd5_verify(isc_hmacmd5_t *ctx, unsigned char *digest); 59 isc_hmacmd5_verify2(isc_hmacmd5_t *ctx, unsigned char *digest, size_t len);
|
/macosx-10.10/ntp-92/libntp/ |
H A D | a_md5encrypt.c | 2 * digest support for NTP, MD5 and with OpenSSL more 19 * MD5authencrypt - generate message digest 21 * Returns length of MAC including key ID and digest. 31 u_char digest[EVP_MAX_MD_SIZE]; local 40 * Compute digest of key concatenated with packet. Note: the 41 * key type and digest type have been verified when the key 49 EVP_DigestFinal(&ctx, digest, &len); 54 MD5Final(digest, &md5); 57 memmove((u_char *)pkt + length + 4, digest, len); 65 * Returns one if digest vali 76 u_char digest[EVP_MAX_MD_SIZE]; local 118 u_char digest[20]; local [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/pkcs12/ |
H A D | p12_p8d.c | 66 passlen, p8->digest, 1);
|
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | singlediskrep.cpp | 56 SHA1::Digest digest; local 57 hash.finish(digest); 58 return makeCFData(digest, sizeof(digest));
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | SHA1_MD5_Object.cpp | 54 void *digest) 59 CC_MD5_Final((unsigned char *)digest, &mCtx); 91 void *digest) 93 CC_SHA1_Final((unsigned char *)digest, &mCtx); 53 digestFinal( void *digest) argument 90 digestFinal( void *digest) argument
|
H A D | DigestContext.h | 37 DigestObject &digest) : 38 AppleCSPContext(session), mDigest(digest) { } 35 DigestContext( AppleCSPSession &session, DigestObject &digest) argument
|
H A D | MD2Object.cpp | 42 void *digest) 47 CC_MD2_Final((unsigned char *)digest, &mCtx); 41 digestFinal( void *digest) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | singlediskrep.cpp | 56 SHA1::Digest digest; local 57 hash.finish(digest); 58 return makeCFData(digest, sizeof(digest));
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/threadTest/ |
H A D | digestClient.cpp | 33 Digest *digest = new Digest(*csp, CSSM_ALGID_SHA1); local 36 digest->digest(ptext, dig); 38 printf("***digest length error\n"); 41 delete digest;
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/ |
H A D | dlv_32769.h | 30 unsigned char *digest; member in struct:dns_rdata_dlv
|
H A D | ds_43.h | 32 unsigned char *digest; member in struct:dns_rdata_ds
|
H A D | sshfp_44.h | 32 unsigned char *digest; member in struct:dns_rdata_sshfp
|
/macosx-10.10/ruby-106/ruby/test/openssl/ |
H A D | test_digest.rb | 18 assert_equal(@md.digest, @d1.digest) 23 assert_equal(@md.digest, @d1.digest) 25 assert_equal(@d1.digest, @d2.digest) 27 assert_equal(@md.digest, OpenSSL::Digest::MD5.digest(@data)) 47 assert_equal(@d1.digest, @d1.clone.digest, "clon [all...] |
/macosx-10.10/WebCore-7600.1.25/crypto/mac/ |
H A D | CryptoAlgorithmRSASSA_PKCS1_v1_5Mac.cpp | 47 std::unique_ptr<CryptoDigest> digest = CryptoDigest::create(parameters.hash); local 48 if (!digest) { 53 digest->addBytes(data.first, data.second); 55 Vector<uint8_t> digestData = digest->computeHash(); 78 std::unique_ptr<CryptoDigest> digest = CryptoDigest::create(parameters.hash); local 79 if (!digest) { 84 digest->addBytes(data.first, data.second); 86 Vector<uint8_t> digestData = digest->computeHash();
|
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | fr_sha1.h | 15 void fr_SHA1Final(uint8_t digest[20], fr_SHA1_CTX* context); 22 void fr_SHA1FinalNoLen(uint8_t digest[20], fr_SHA1_CTX* context);
|
/macosx-10.10/ruby-106/ruby/lib/rubygems/package/ |
H A D | digest_io.rb | 17 # Wraps +io+ and updates digest for each of the digest algorithms in 56 @digests.each do |_, digest| 57 digest << data
|
/macosx-10.10/apr-32/apr-util/apr-util/test/ |
H A D | testmd4.c | 52 * MD4 ("message digest") = d9130a8164549fe818874806e1c7014b 64 {"message digest", 81 unsigned char digest[APR_MD4_DIGESTSIZE]; 86 apr_md4_final(digest, &context); 87 return (memcmp(digest, sum, APR_MD4_DIGESTSIZE)); 95 unsigned char digest[APR_MD4_DIGESTSIZE]; local 105 ABTS_ASSERT(tc, "apr_md4_final", (apr_md4_final(digest, &context) ==0)); 106 ABTS_ASSERT(tc, "check for correct md4 digest", 107 (memcmp(digest, sum, APR_MD4_DIGESTSIZE) == 0));
|