Searched refs:digest (Results 201 - 225 of 349) sorted by relevance

1234567891011>>

/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/sntp/
H A Dnetworking.h92 const EVP_MD *digest; /* message digest algorithm */ member in struct:speer
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/
H A Dmd4-internal.c32 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx);
52 * This code implements the MD4 message-digest algorithm.
63 * To compute the message digest of a chunk of bytes, declare an
66 * will fill a supplied 16-byte array with the digest.
169 * Final wrapup--call MD4Pad, fill in digest and zero out ctx.
171 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) argument
176 if (digest != NULL) {
178 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
H A Dms_funcs.c351 u8 digest[SHA1_MAC_LEN]; local
364 if (sha1_vector(4, addr, len, digest))
369 os_memcpy(session_key, digest, session_key_len);
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/
H A Dobj_rsakey.c1529 TPM_DIGEST *digest = NULL; local
1545 digest = &rsakey->pcrInfo.info11.digestAtCreation;
1547 digest = &rsakey->pcrInfo.info11.digestAtRelease;
1555 digest = &rsakey->pcrInfo.infolong.digestAtCreation;
1557 digest = &rsakey->pcrInfo.infolong.digestAtRelease;
1578 Trspi_LoadBlob_DIGEST(&offset, *data, digest);
1937 result |= Trspi_HashFinal(&hashCtx, pubDigest->digest);
2011 if (blobSize != sizeof(rsakey->msaApproval.digest)) {
2015 memcpy(rsakey->msaApproval.digest, blob, sizeof(rsakey->msaApproval.digest));
[all...]
H A Dobj_policy.c260 TCPA_DIGEST *digest, TSS_BOOL set)
294 memcpy(policy->Secret, digest, size);
326 TCPA_DIGEST digest; local
331 memset(&digest.digest, 0, sizeof(TCPA_DIGEST));
336 (BYTE *)&digest.digest)))
344 memcpy(&digest.digest, data, size);
357 &digest, secret_se
259 obj_policy_set_secret_object(TSS_HPOLICY hPolicy, TSS_FLAG mode, UINT32 size, TCPA_DIGEST *digest, TSS_BOOL set) argument
1515 obj_policy_get_delegation_pcr_digest(TSS_HPOLICY hPolicy, UINT32 *digestLength, BYTE **digest) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/pkcs7/
H A Dpk7_asn1.c76 ADB_ENTRY(NID_pkcs7_digest, ASN1_NDEF_EXP_OPT(PKCS7, d.digest, PKCS7_DIGEST, 0)),
223 ASN1_SIMPLE(PKCS7_DIGEST, digest, ASN1_OCTET_STRING)
H A Dpk7_doit.c308 xa = p7->d.digest->md;
309 os = PKCS7_get_octet_string(p7->d.digest->contents);
724 /* Add digest */
804 os=PKCS7_get_octet_string(p7->d.digest->contents);
806 if(PKCS7_type_is_data(p7->d.digest->contents) && p7->detached)
809 p7->d.digest->contents->d.data = NULL;
842 /* If there are attributes, we add the digest
874 OBJ_obj2nid(p7->d.digest->md->algorithm)))
878 M_ASN1_OCTET_STRING_set(p7->d.digest->digest, md_dat
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/
H A Dtestss.com12 $ digest="-md5"
14 $ x509cmd = "mcr ''exe_dir'openssl x509 ''digest'"
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tcs/
H A Dtcs_evlog_biosem.c110 memcpy(cur->event.rgbPcrValue, event->digest, 20);
238 memcpy(e->rgbPcrValue, event->digest, 20);
H A Dtcsi_aik.c69 IDLabel_PrivCAHash.digest, idKeyInfoSize, idKeyInfo, pSrkAuth,
208 IDLabel_PrivCAHash.digest, idKeyInfoSize, idKeyInfo, pSrkAuth,
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/rdata/in_1/
H A Dkx_36.c257 RETERR((digest)(arg, &r1));
260 return (dns_name_digest(&name, digest, arg));
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/isccc/
H A Dcc.c215 unsigned char digest[ISC_MD5_DIGESTLENGTH]; local
220 isc_hmacmd5_sign(&ctx, digest);
221 source.rstart = digest;
222 source.rend = digest + ISC_MD5_DIGESTLENGTH;
283 unsigned char digest[ISC_MD5_DIGESTLENGTH]; local
287 * Extract digest.
296 * Compute digest.
300 isc_hmacmd5_sign(&ctx, digest);
301 source.rstart = digest;
302 source.rend = digest
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/ntpd/
H A Dcomplete.conf15 crypto digest md5 host myhostname ident wedent pw cryptopass randfile /.rnd
/netbsd-6-1-5-RELEASE/sys/dev/iscsi/
H A Discsi_rcv.c154 * -1 if the data digest was incorrect (PDU must be ignored)
161 uint32_t len, digest; local
232 digest = gen_digest_2(data, len, pad_bytes, pad);
234 if (digest != pdu->data_digest) {
236 digest, pdu->data_digest));
1011 uint32_t MaxCmdSN, digest; local
1015 digest = gen_digest(&pdu->pdu, BHS_SIZE);
1016 if (digest != pdu->pdu.HeaderDigest) {
1018 digest, pdu->pdu.HeaderDigest));
1200 /* Check again for header digest */
[all...]
/netbsd-6-1-5-RELEASE/sys/opencrypto/
H A Dgmac.c159 AES_GMAC_Final(uint8_t digest[GMAC_DIGEST_LEN], AES_GMAC_CTX *ctx) argument
168 d = digest;
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/
H A Dt1_lib.c2507 /* Set preferred digest for each key type */
2521 c->pkeys[SSL_PKEY_DSA_SIGN].digest = NULL;
2522 c->pkeys[SSL_PKEY_RSA_SIGN].digest = NULL;
2523 c->pkeys[SSL_PKEY_RSA_ENC].digest = NULL;
2524 c->pkeys[SSL_PKEY_ECC].digest = NULL;
2551 if (c->pkeys[idx].digest == NULL)
2556 c->pkeys[idx].digest = md;
2558 c->pkeys[SSL_PKEY_RSA_ENC].digest = md;
2569 if (!c->pkeys[SSL_PKEY_DSA_SIGN].digest)
2570 c->pkeys[SSL_PKEY_DSA_SIGN].digest
[all...]
/netbsd-6-1-5-RELEASE/dist/ipf/
H A Dmd5.c48 ** Message-digest routines: **
49 ** To form the message digest for a message M **
53 ** The message digest is now in mdContext->digest[0...15] **
109 /* The routine MD5Init initializes the message-digest context
125 /* The routine MD5Update updates the message-digest context to
127 in the message whose digest is being computed.
162 /* The routine MD5Final terminates the message-digest computation and
163 ends with the desired message digest in mdContext->digest[
[all...]
/netbsd-6-1-5-RELEASE/sys/kern/
H A Dkern_rndq.c1047 uint8_t digest[SHA1_DIGEST_LENGTH]; local
1059 SHA1Final(digest, &s);
1061 if (memcmp(digest, boot_rsp->digest, sizeof(digest))) {
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/isc/
H A Dsha1.c75 isc_sha1_final(isc_sha1_t *context, unsigned char *digest) { argument
76 INSIST(digest != 0);
79 EVP_DigestFinal(context, digest, NULL);
320 * Add padding and return the message digest.
327 isc_sha1_final(isc_sha1_t *context, unsigned char *digest) { argument
331 INSIST(digest != 0);
347 if (digest) {
349 digest[i] = (unsigned char)
/netbsd-6-1-5-RELEASE/sys/ipkdb/
H A Dipkdb_ipkdb.c696 * This code implements the MD5 message-digest algorithm.
911 static u_char digest[16]; local
943 setNl(digest, ctx->buf[0]);
944 setNl(digest + 4, ctx->buf[1]);
945 setNl(digest + 8, ctx->buf[2]);
946 setNl(digest + 12, ctx->buf[3]);
948 return digest;
1023 u_char *digest; local
1046 digest = ipkdb_MD5Final(&context);
1051 ipkdb_MD5Update(&context, digest, 1
[all...]
/netbsd-6-1-5-RELEASE/common/lib/libc/md/
H A Dmd4c.c147 * MD4 block update operation. Continues an MD4 message-digest
189 * MD4 finalization. Ends an MD4 message-digest operation, writing the
190 * message digest and zeroing the context.
193 MD4Final (unsigned char digest[16], /* message digest */ argument
199 _DIAGASSERT(digest != 0);
213 /* Store state in digest */
214 Encode(digest, context->state, 16);
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/rdata/generic/
H A Dsoa_6.c395 RETERR(dns_name_digest(&name, digest, arg));
400 RETERR(dns_name_digest(&name, digest, arg));
403 return ((digest)(arg, &r));
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hcrypto/
H A Drsa.c368 di.digest.data = rk_UNCONST(from);
369 di.digest.length = flen;
432 if (flen != di.digest.length || memcmp(di.digest.data, from, flen) != 0) {
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/evp/
H A Devp_lib.c285 return ctx->digest;
H A Dm_sigver.c166 int s = EVP_MD_size(ctx->digest);

Completed in 327 milliseconds

1234567891011>>