/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/ |
H A D | ssl_cert.c | 165 /* Set digest values to defaults */ 167 cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_sha1(); 170 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1(); 171 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); 174 cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1();
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/ |
H A D | cms-examples.pl | 95 [ "6.0.bin" => "encode, digest, cont" ], 163 if ( $tlist =~ /digest/ ) {
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/tpm-tools/dist/src/tpm_mgmt/ |
H A D | tpm_nvinfo.c | 103 logMsg("%02x", tpis->digestAtRelease.digest[i]);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/include/dns/ |
H A D | rdata.h | 620 dns_rdata_digest(dns_rdata_t *rdata, dns_digestfunc_t digest, void *arg); 622 * Send 'rdata' in DNSSEC canonical form to 'digest'. 625 *\li 'digest' may be called more than once by dns_rdata_digest(). The 627 * to 'digest', will be the DNSSEC canonical form of 'rdata'. 633 *\li 'digest' is a valid dns_digestfunc_t. 638 * DNSSEC canonical form, to 'digest'. 640 *\li If digest() returns something other than ISC_R_SUCCESS, that result
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/rdata/generic/ |
H A D | null_10.c | 162 return ((digest)(arg, &r));
|
H A D | proforma.c | 145 return ((digest)(arg, &r));
|
H A D | unspec_103.c | 163 return ((digest)(arg, &r));
|
H A D | afsdb_18.c | 270 RETERR((digest)(arg, &r1)); 274 return (dns_name_digest(&name, digest, arg));
|
H A D | minfo_14.c | 276 result = dns_name_digest(&name, digest, arg); 283 return (dns_name_digest(&name, digest, arg));
|
H A D | mx_15.c | 283 RETERR((digest)(arg, &r1)); 286 return (dns_name_digest(&name, digest, arg));
|
H A D | nxt_30.c | 298 result = dns_name_digest(&name, digest, arg); 303 return ((digest)(arg, &r));
|
H A D | rp_17.c | 274 RETERR(dns_name_digest(&name, digest, arg)); 280 return (dns_name_digest(&name, digest, arg));
|
H A D | rt_21.c | 271 result = (digest)(arg, &r1); 276 return (dns_name_digest(&name, digest, arg));
|
/netbsd-6-1-5-RELEASE/external/bsd/pkg_install/dist/lib/ |
H A D | pkg_signature.c | 84 unsigned char digest[SHA512_DIGEST_LENGTH]; local 90 SHA512_Final(digest, &hash_ctx); 94 c = digest[i] / 16; 100 c = digest[i] % 16;
|
H A D | vulnerabilities-file.c | 144 unsigned char digest[SHA512_DIGEST_LENGTH]; local 148 SHA512_Final(digest, hash_ctx); 152 c = digest[i] / 16; 158 c = digest[i] % 16;
|
/netbsd-6-1-5-RELEASE/sys/sys/ |
H A D | rnd.h | 64 uint8_t digest[SHA1_DIGEST_LENGTH]; member in struct:__anon9593
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | cms.c | 1127 * @param digest_alg digest algorithm to use, use NULL to get the 1131 * like what digest algorithm to use. 1195 AlgorithmIdentifier digest; local 1202 memset(&digest, 0, sizeof(digest)); 1212 ret = copy_AlgorithmIdentifier(sigctx->digest_alg, &digest); 1218 sigctx->peer, &digest); 1250 ret = copy_AlgorithmIdentifier(&digest, &signer_info->digestAlgorithm); 1272 &digest, 1402 free_AlgorithmIdentifier(&digest); [all...] |
H A D | revoke.c | 862 const AlgorithmIdentifier *digest; member in struct:ocsp_add_ctx 910 ret = copy_AlgorithmIdentifier(ctx->digest, &one->reqCert.hashAlgorithm); 959 * @param digest the signing algorithm in the request, if NULL use the 974 const AlgorithmIdentifier *digest, 986 if (digest == NULL) 987 digest = _hx509_crypto_default_digest_alg; 991 ctx.digest = digest; 970 hx509_ocsp_request(hx509_context context, hx509_certs reqcerts, hx509_certs pool, hx509_cert signer, const AlgorithmIdentifier *digest, heim_octet_string *request, heim_octet_string *nonce) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | evp_test.c | 261 static int test_digest(const char *digest, argument 270 d=EVP_get_digestbyname(digest); 274 printf("Testing digest %s\n",EVP_MD_name(d)); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tcs/ |
H A D | tcsi_changeauth.c | 317 LoadBlob(&offset, 20, txBlob, newAuthLink.digest); 347 UnloadBlob(&offset, 20, txBlob, changeProof->digest);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/rdata/ch_3/ |
H A D | a_1.c | 281 RETERR(dns_name_digest(&name, digest, arg)); 282 return ((digest)(arg, &r));
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/rdata/in_1/ |
H A D | srv_33.c | 333 RETERR((digest)(arg, &r1)); 336 return (dns_name_digest(&name, digest, arg));
|
/netbsd-6-1-5-RELEASE/external/bsd/tcpdump/dist/ |
H A D | print-rsvp.c | 312 u_int8_t digest[16]; member in struct:rsvp_obj_integrity_t 1676 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->digest), 1677 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->digest+4), 1678 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->digest+8), 1679 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->digest+12)); 1683 rsvp_obj_integrity->digest);
|
/netbsd-6-1-5-RELEASE/sys/arch/acorn26/acorn26/ |
H A D | pmap.c | 767 unsigned char digest[16]; local 776 pmap_md4_page(digest, VM_PAGE_TO_PHYS(page)); 777 if (memcmp(digest, pv_table[ppn].pv_md4sum, 16) != 0) { 786 printf("%02x", digest[i]); 1072 pmap_md4_page(unsigned char digest[16], paddr_t pa) argument 1080 MD4Final(digest, &context);
|
/netbsd-6-1-5-RELEASE/common/lib/libc/md/ |
H A D | md5c.c | 193 * MD5 block update operation. Continues an MD5 message-digest 235 * MD5 finalization. Ends an MD5 message-digest operation, writing the 236 * message digest and zeroing the context. 239 MD5Final(unsigned char digest[16], /* message digest */ argument 245 _DIAGASSERT(digest != 0); 259 /* Store state in digest */ 260 Encode(digest, context->state, 16);
|