/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/sntp/ |
H A D | networking.h | 92 const EVP_MD *digest; /* message digest algorithm */ member in struct:speer
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | md4-internal.c | 32 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx); 52 * This code implements the MD4 message-digest algorithm. 63 * To compute the message digest of a chunk of bytes, declare an 66 * will fill a supplied 16-byte array with the digest. 169 * Final wrapup--call MD4Pad, fill in digest and zero out ctx. 171 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) argument 176 if (digest != NULL) { 178 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
|
H A D | ms_funcs.c | 351 u8 digest[SHA1_MAC_LEN]; local 364 if (sha1_vector(4, addr, len, digest)) 369 os_memcpy(session_key, digest, session_key_len);
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | obj_rsakey.c | 1529 TPM_DIGEST *digest = NULL; local 1545 digest = &rsakey->pcrInfo.info11.digestAtCreation; 1547 digest = &rsakey->pcrInfo.info11.digestAtRelease; 1555 digest = &rsakey->pcrInfo.infolong.digestAtCreation; 1557 digest = &rsakey->pcrInfo.infolong.digestAtRelease; 1578 Trspi_LoadBlob_DIGEST(&offset, *data, digest); 1937 result |= Trspi_HashFinal(&hashCtx, pubDigest->digest); 2011 if (blobSize != sizeof(rsakey->msaApproval.digest)) { 2015 memcpy(rsakey->msaApproval.digest, blob, sizeof(rsakey->msaApproval.digest)); [all...] |
H A D | obj_policy.c | 260 TCPA_DIGEST *digest, TSS_BOOL set) 294 memcpy(policy->Secret, digest, size); 326 TCPA_DIGEST digest; local 331 memset(&digest.digest, 0, sizeof(TCPA_DIGEST)); 336 (BYTE *)&digest.digest))) 344 memcpy(&digest.digest, data, size); 357 &digest, secret_se 259 obj_policy_set_secret_object(TSS_HPOLICY hPolicy, TSS_FLAG mode, UINT32 size, TCPA_DIGEST *digest, TSS_BOOL set) argument 1515 obj_policy_get_delegation_pcr_digest(TSS_HPOLICY hPolicy, UINT32 *digestLength, BYTE **digest) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/pkcs7/ |
H A D | pk7_asn1.c | 76 ADB_ENTRY(NID_pkcs7_digest, ASN1_NDEF_EXP_OPT(PKCS7, d.digest, PKCS7_DIGEST, 0)), 223 ASN1_SIMPLE(PKCS7_DIGEST, digest, ASN1_OCTET_STRING)
|
H A D | pk7_doit.c | 308 xa = p7->d.digest->md; 309 os = PKCS7_get_octet_string(p7->d.digest->contents); 724 /* Add digest */ 804 os=PKCS7_get_octet_string(p7->d.digest->contents); 806 if(PKCS7_type_is_data(p7->d.digest->contents) && p7->detached) 809 p7->d.digest->contents->d.data = NULL; 842 /* If there are attributes, we add the digest 874 OBJ_obj2nid(p7->d.digest->md->algorithm))) 878 M_ASN1_OCTET_STRING_set(p7->d.digest->digest, md_dat [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/ |
H A D | testss.com | 12 $ digest="-md5" 14 $ x509cmd = "mcr ''exe_dir'openssl x509 ''digest'"
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tcs/ |
H A D | tcs_evlog_biosem.c | 110 memcpy(cur->event.rgbPcrValue, event->digest, 20); 238 memcpy(e->rgbPcrValue, event->digest, 20);
|
H A D | tcsi_aik.c | 69 IDLabel_PrivCAHash.digest, idKeyInfoSize, idKeyInfo, pSrkAuth, 208 IDLabel_PrivCAHash.digest, idKeyInfoSize, idKeyInfo, pSrkAuth,
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/rdata/in_1/ |
H A D | kx_36.c | 257 RETERR((digest)(arg, &r1)); 260 return (dns_name_digest(&name, digest, arg));
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/isccc/ |
H A D | cc.c | 215 unsigned char digest[ISC_MD5_DIGESTLENGTH]; local 220 isc_hmacmd5_sign(&ctx, digest); 221 source.rstart = digest; 222 source.rend = digest + ISC_MD5_DIGESTLENGTH; 283 unsigned char digest[ISC_MD5_DIGESTLENGTH]; local 287 * Extract digest. 296 * Compute digest. 300 isc_hmacmd5_sign(&ctx, digest); 301 source.rstart = digest; 302 source.rend = digest [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/ntpd/ |
H A D | complete.conf | 15 crypto digest md5 host myhostname ident wedent pw cryptopass randfile /.rnd
|
/netbsd-6-1-5-RELEASE/sys/dev/iscsi/ |
H A D | iscsi_rcv.c | 154 * -1 if the data digest was incorrect (PDU must be ignored) 161 uint32_t len, digest; local 232 digest = gen_digest_2(data, len, pad_bytes, pad); 234 if (digest != pdu->data_digest) { 236 digest, pdu->data_digest)); 1011 uint32_t MaxCmdSN, digest; local 1015 digest = gen_digest(&pdu->pdu, BHS_SIZE); 1016 if (digest != pdu->pdu.HeaderDigest) { 1018 digest, pdu->pdu.HeaderDigest)); 1200 /* Check again for header digest */ [all...] |
/netbsd-6-1-5-RELEASE/sys/opencrypto/ |
H A D | gmac.c | 159 AES_GMAC_Final(uint8_t digest[GMAC_DIGEST_LEN], AES_GMAC_CTX *ctx) argument 168 d = digest;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/ |
H A D | t1_lib.c | 2507 /* Set preferred digest for each key type */ 2521 c->pkeys[SSL_PKEY_DSA_SIGN].digest = NULL; 2522 c->pkeys[SSL_PKEY_RSA_SIGN].digest = NULL; 2523 c->pkeys[SSL_PKEY_RSA_ENC].digest = NULL; 2524 c->pkeys[SSL_PKEY_ECC].digest = NULL; 2551 if (c->pkeys[idx].digest == NULL) 2556 c->pkeys[idx].digest = md; 2558 c->pkeys[SSL_PKEY_RSA_ENC].digest = md; 2569 if (!c->pkeys[SSL_PKEY_DSA_SIGN].digest) 2570 c->pkeys[SSL_PKEY_DSA_SIGN].digest [all...] |
/netbsd-6-1-5-RELEASE/dist/ipf/ |
H A D | md5.c | 48 ** Message-digest routines: ** 49 ** To form the message digest for a message M ** 53 ** The message digest is now in mdContext->digest[0...15] ** 109 /* The routine MD5Init initializes the message-digest context 125 /* The routine MD5Update updates the message-digest context to 127 in the message whose digest is being computed. 162 /* The routine MD5Final terminates the message-digest computation and 163 ends with the desired message digest in mdContext->digest[ [all...] |
/netbsd-6-1-5-RELEASE/sys/kern/ |
H A D | kern_rndq.c | 1047 uint8_t digest[SHA1_DIGEST_LENGTH]; local 1059 SHA1Final(digest, &s); 1061 if (memcmp(digest, boot_rsp->digest, sizeof(digest))) {
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/isc/ |
H A D | sha1.c | 75 isc_sha1_final(isc_sha1_t *context, unsigned char *digest) { argument 76 INSIST(digest != 0); 79 EVP_DigestFinal(context, digest, NULL); 320 * Add padding and return the message digest. 327 isc_sha1_final(isc_sha1_t *context, unsigned char *digest) { argument 331 INSIST(digest != 0); 347 if (digest) { 349 digest[i] = (unsigned char)
|
/netbsd-6-1-5-RELEASE/sys/ipkdb/ |
H A D | ipkdb_ipkdb.c | 696 * This code implements the MD5 message-digest algorithm. 911 static u_char digest[16]; local 943 setNl(digest, ctx->buf[0]); 944 setNl(digest + 4, ctx->buf[1]); 945 setNl(digest + 8, ctx->buf[2]); 946 setNl(digest + 12, ctx->buf[3]); 948 return digest; 1023 u_char *digest; local 1046 digest = ipkdb_MD5Final(&context); 1051 ipkdb_MD5Update(&context, digest, 1 [all...] |
/netbsd-6-1-5-RELEASE/common/lib/libc/md/ |
H A D | md4c.c | 147 * MD4 block update operation. Continues an MD4 message-digest 189 * MD4 finalization. Ends an MD4 message-digest operation, writing the 190 * message digest and zeroing the context. 193 MD4Final (unsigned char digest[16], /* message digest */ argument 199 _DIAGASSERT(digest != 0); 213 /* Store state in digest */ 214 Encode(digest, context->state, 16);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/rdata/generic/ |
H A D | soa_6.c | 395 RETERR(dns_name_digest(&name, digest, arg)); 400 RETERR(dns_name_digest(&name, digest, arg)); 403 return ((digest)(arg, &r));
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | rsa.c | 368 di.digest.data = rk_UNCONST(from); 369 di.digest.length = flen; 432 if (flen != di.digest.length || memcmp(di.digest.data, from, flen) != 0) {
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | evp_lib.c | 285 return ctx->digest;
|
H A D | m_sigver.c | 166 int s = EVP_MD_size(ctx->digest);
|