/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/scsi/ |
H A D | libiscsi_tcp.h | 44 unsigned char digest[ISCSI_DIGEST_SIZE]; member in struct:iscsi_segment 118 /* digest helpers */ 121 unsigned char digest[ISCSI_DIGEST_SIZE]);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | crypto.c | 449 kt->digest = md_kt_get (authname); 450 kt->hmac_length = md_kt_size (kt->digest); 486 if (kt->digest && kt->hmac_length > 0) 489 hmac_ctx_init (ctx->hmac, key->hmac, kt->hmac_length, kt->digest); 493 prefix, md_kt_size(kt->digest) * 8, md_kt_name(kt->digest)); 500 md_kt_size(kt->digest), 642 if (kt->digest && kt->hmac_length > 0 && kt->hmac_length <= hmac_len) 789 kt.digest, 1027 const md_kt_t *digest, 1026 read_passphrase_hash(const char *passphrase_file, const md_kt_t *digest, uint8_t *output, int len) argument 1418 uint8_t digest[MD5_DIGEST_LENGTH]; local 1448 md5_digest_clear(struct md5_digest *digest) argument 1454 md5_digest_defined(const struct md5_digest *digest) argument [all...] |
H A D | crypto_openssl.c | 338 PACKAGE_NAME ". A message digest is used in conjunction with\n" 340 "You can specify a message digest as parameter to\n" 346 const EVP_MD *digest = EVP_get_digestbynid (nid); local 347 if (digest) 349 printf ("%s %d bit digest size\n", 350 OBJ_nid2sn (nid), EVP_MD_size (digest) * 8); 623 * Generic message digest information functions 629 md_kt_get (const char *digest) argument 632 ASSERT (digest); 633 md = EVP_get_digestbyname (digest); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | pssr.cpp | 58 SecByteBlock digest(digestSize), salt(saltSize); 59 hash.Final(digest); 68 hash.Update(digest, digestSize); 97 SecByteBlock digest(digestSize); 98 hash.Final(digest); 133 hash.Update(digest, digestSize);
|
H A D | dlltest.cpp | 81 byte digest[20]; local 85 sha.Final(digest); 87 if (memcmp(digest, expectedDigest, 20) != 0)
|
H A D | ripemd.cpp | 46 void RIPEMD160::Transform (word32 *digest, const word32 *X) argument 49 a1 = a2 = digest[0]; 50 b1 = b2 = digest[1]; 51 c1 = c2 = digest[2]; 52 d1 = d2 = digest[3]; 53 e1 = e2 = digest[4]; 225 c1 = digest[1] + c1 + d2; 226 digest[1] = digest[2] + d1 + e2; 227 digest[ 249 Transform(word32 *digest, const word32 *X) argument 472 Transform(word32 *digest, const word32 *X) argument 637 Transform(word32 *digest, const word32 *X) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/block/drbd/ |
H A D | drbd_worker.c | 283 void drbd_csum_ee(struct drbd_conf *mdev, struct crypto_hash *tfm, struct drbd_epoch_entry *e, void *digest) argument 307 crypto_hash_final(&desc, digest); 310 void drbd_csum_bio(struct drbd_conf *mdev, struct crypto_hash *tfm, struct bio *bio, void *digest) argument 327 crypto_hash_final(&desc, digest); 334 void *digest; local 346 digest = kmalloc(digest_size, GFP_NOIO); 347 if (digest) { 348 drbd_csum_ee(mdev, mdev->csums_tfm, e, digest); 354 digest, 357 kfree(digest); 920 void *digest = NULL; local 979 void *digest; local 1025 void *digest; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/ |
H A D | aaa.c | 371 unsigned char digest[MD_SIG_SIZE]; local 395 MD5Final (digest, &t->chal_them.md5); 404 log (LOG_DEBUG, "%s: The digest to be XOR'ed\n", __FUNCTION__); 405 bufferDump (digest, MD_SIG_SIZE); 411 *ptr = *ptr ^ digest[cnt]; 423 MD5Final (digest, &t->chal_them.md5); 436 char digest[MD_SIG_SIZE]; local 461 MD5Final (digest, &t->chal_us.md5); 466 print_md5 (digest); 476 MD5Final (digest, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/missing/crypto/sha2/ |
H A D | sha2.c | 309 * digest to a readable hexadecimal character string: 547 void SHA256_Final(sha2_byte digest[], SHA256_CTX* context) { argument 548 sha2_word32 *d = (sha2_word32*)digest; 554 /* If no digest buffer is passed, we don't bother doing this: */ 555 if (digest != (sha2_byte*)0) { 611 sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest; local 618 SHA256_Final(digest, context); 629 bzero(digest, SHA256_DIGEST_LENGTH); 633 char* SHA256_Data(const sha2_byte* data, size_t len, char digest[SHA256_DIGEST_STRING_LENGT argument 910 SHA512_Final(sha2_byte digest[], SHA512_CTX* context) argument 940 sha2_byte digest[SHA512_DIGEST_LENGTH], *d = digest; local 962 SHA512_Data(const sha2_byte* data, size_t len, char digest[SHA512_DIGEST_STRING_LENGTH]) argument 985 SHA384_Final(sha2_byte digest[], SHA384_CTX* context) argument 1015 sha2_byte digest[SHA384_DIGEST_LENGTH], *d = digest; local 1037 SHA384_Data(const sha2_byte* data, size_t len, char digest[SHA384_DIGEST_STRING_LENGTH]) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/src/ |
H A D | hmac256.c | 281 /* Store the digest into hd->buf. */ 301 this key; with KEY given as NULL, a plain SHA-256 digest is 381 /* Update the message digest with the contents of BUFFER containing 424 /* Finalize an operation and return the digest. If R_DLEN is not NULL 425 the length of the digest will be stored at that address. The 469 const unsigned char *digest; 505 digest = _gcry_hmac256_finalize (hd, &digestlen); 506 if (!digest) 518 memcpy (result, digest, digestlen); 620 const unsigned char *digest; 468 const unsigned char *digest; local 619 const unsigned char *digest; local 654 const unsigned char *digest; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/src/ |
H A D | hmac256.c | 281 /* Store the digest into hd->buf. */ 301 this key; with KEY given as NULL, a plain SHA-256 digest is 381 /* Update the message digest with the contents of BUFFER containing 424 /* Finalize an operation and return the digest. If R_DLEN is not NULL 425 the length of the digest will be stored at that address. The 469 const unsigned char *digest; 505 digest = _gcry_hmac256_finalize (hd, &digestlen); 506 if (!digest) 518 memcpy (result, digest, digestlen); 620 const unsigned char *digest; 468 const unsigned char *digest; local 619 const unsigned char *digest; local 654 const unsigned char *digest; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/engine/ |
H A D | eng_openssl.c | 117 static int openssl_digests(ENGINE *e, const EVP_MD **digest, 345 static int openssl_digests(ENGINE *e, const EVP_MD **digest, argument 348 if(!digest) 354 /* We are being asked for a specific digest */ 356 *digest = &test_sha_md; 363 *digest = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/engine/ |
H A D | eng_openssl.c | 119 static int openssl_digests(ENGINE *e, const EVP_MD **digest, 363 static int openssl_digests(ENGINE *e, const EVP_MD **digest, argument 366 if (!digest) { 371 /* We are being asked for a specific digest */ 373 *digest = &test_sha_md; 379 *digest = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/engine/ |
H A D | eng_openssl.c | 119 static int openssl_digests(ENGINE *e, const EVP_MD **digest, 363 static int openssl_digests(ENGINE *e, const EVP_MD **digest, argument 366 if (!digest) { 371 /* We are being asked for a specific digest */ 373 *digest = &test_sha_md; 379 *digest = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | x509.c | 137 " -md2/-md5/-sha1/-mdc2 - digest to use\n", 150 static int sign (X509 *x, EVP_PKEY *pkey,int days,int clrext, const EVP_MD *digest, 152 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest, 191 const EVP_MD *md_alg,*digest=EVP_sha1(); local 447 digest=md_alg; 889 if (!X509_digest(x,digest,md,&n)) 895 OBJ_nid2sn(EVP_MD_type(digest))); 917 digest=EVP_dss1(); 921 digest=EVP_ecdsa(); 925 if (!sign(x,Upkey,days,clrext,digest, 1120 x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, X509 *x, X509 *xca, EVP_PKEY *pkey, char *serialfile, int create, int days, int clrext, CONF *conf, char *section, ASN1_INTEGER *sno) argument 1222 sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *digest, CONF *conf, char *section) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_mutl.c | 126 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length) 127 || CRYPTO_memcmp(mac, p12->mac->dinfo->digest->data, maclen)) 151 if (!(M_ASN1_OCTET_STRING_set(p12->mac->dinfo->digest, mac, maclen))) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | bio_md.c | 65 /* BIO_put and BIO_get both add to the digest, 66 * BIO_gets returns the digest */ 79 BIO_TYPE_MD,"message digest", 179 ret = EVP_DigestInit_ex(ctx,ctx->digest, NULL); 189 *ppmd=ctx->digest; 255 if (size < ctx->digest->md_size)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_mutl.c | 117 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length) 118 || memcmp (mac, p12->mac->dinfo->digest->data, maclen)) return 0; 140 if (!(M_ASN1_OCTET_STRING_set (p12->mac->dinfo->digest, mac, maclen))) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | bio_md.c | 66 * BIO_put and BIO_get both add to the digest, BIO_gets returns the digest 81 BIO_TYPE_MD, "message digest", 187 ret = EVP_DigestInit_ex(ctx, ctx->digest, NULL); 196 *ppmd = ctx->digest; 257 if (size < ctx->digest->md_size)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 126 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length) 127 || CRYPTO_memcmp(mac, p12->mac->dinfo->digest->data, maclen)) 151 if (!(M_ASN1_OCTET_STRING_set(p12->mac->dinfo->digest, mac, maclen))) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | bio_md.c | 66 * BIO_put and BIO_get both add to the digest, BIO_gets returns the digest 81 BIO_TYPE_MD, "message digest", 187 ret = EVP_DigestInit_ex(ctx, ctx->digest, NULL); 196 *ppmd = ctx->digest; 257 if (size < ctx->digest->md_size)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/integrity/ima/ |
H A D | ima_fs.c | 111 * char[20]=template digest 136 /* 2nd: template digest */ 137 ima_putc(m, e->digest, IMA_DIGEST_SIZE); 171 static void ima_print_digest(struct seq_file *m, u8 *digest) argument 176 seq_printf(m, "%02x", *(digest + i)); 186 ima_print_digest(m, entry->digest); 190 ima_putc(m, entry->digest, IMA_DIGEST_SIZE); 216 ima_print_digest(m, e->digest);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/ |
H A D | digest.c | 70 static void digest(struct crypto_tfm *tfm, function 99 ops->dit_digest = digest;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | pk7_doit.c | 187 xa = p7->d.digest->md; 188 os = PKCS7_get_octet_string(p7->d.digest->contents); 646 os=PKCS7_get_octet_string(p7->d.digest->contents); 648 if(PKCS7_type_is_data(p7->d.digest->contents) && p7->detached) 651 p7->d.digest->contents->d.data = NULL; 689 /* If there are attributes, we add the digest 695 ASN1_OCTET_STRING *digest; local 718 /* Add digest */ 721 if (!(digest=M_ASN1_OCTET_STRING_new())) 727 if (!M_ASN1_OCTET_STRING_set(digest,md_dat [all...] |
H A D | pk7_lib.c | 141 if (p7->d.digest->contents != NULL) 142 PKCS7_free(p7->d.digest->contents); 143 p7->d.digest->contents=p7_data; 214 if ((p7->d.digest=PKCS7_DIGEST_new()) 216 if (!ASN1_INTEGER_set(p7->d.digest->version,0)) 260 /* If the digest is not currently listed, add it */ 460 if(!(p7->d.digest->md->parameter = ASN1_TYPE_new())) 465 p7->d.digest->md->parameter->type = V_ASN1_NULL; 466 p7->d.digest->md->algorithm = OBJ_nid2obj(EVP_MD_nid(md));
|