/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/rand/ |
H A D | rand_lcl.h | 127 # error No message digest algorithm available
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/ |
H A D | testss | 3 digest='-sha1' 5 x509cmd="../util/shlib_wrap.sh ../apps/openssl x509 $digest"
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | testss | 3 digest='-sha1' 5 x509cmd="../util/shlib_wrap.sh ../apps/openssl x509 $digest"
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/ |
H A D | testss | 3 digest='-sha1' 5 x509cmd="../util/shlib_wrap.sh ../apps/openssl x509 $digest"
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | crl.c | 118 const EVP_MD *md_alg,*digest=EVP_sha1(); local 212 digest=md_alg; 313 if (!X509_CRL_digest(x,digest,md,&n)) 319 OBJ_nid2sn(EVP_MD_type(digest)));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/rand/ |
H A D | rand_lcl.h | 128 #error No message digest algorithm available
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/ |
H A D | endpointola.c | 73 ep->digest = kzalloc(SCTP_SIGNATURE_SIZE, gfp); 74 if (!ep->digest) 184 kfree(ep->digest); 256 /* Free the digest buffer */ 257 kfree(ep->digest);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/rand/ |
H A D | rand_lcl.h | 127 # error No message digest algorithm available
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | n_pkey.c | 154 enckey->enckey->digest->length = pkeylen; 189 enckey->enckey->digest->data = zz; 216 zz = enckey->enckey->digest->data; 268 if ((ret = d2i_RSA_NET_2(a, enckey->enckey->digest, cb, sgckey)) == NULL)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | x509.c | 144 " -md2/-md5/-sha1/-mdc2 - digest to use\n", 161 const EVP_MD *digest, CONF *conf, char *section); 162 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, 212 const EVP_MD *md_alg, *digest = NULL; local 488 digest = md_alg; 892 const EVP_MD *fdig = digest; 921 if (!sign(x, Upkey, days, clrext, digest, extconf, extsect)) 934 if (!x509_certify(ctx, CAfile, digest, x, xca, 956 rq = X509_to_X509_REQ(x, pk, digest); 1095 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, argument 1213 sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *digest, CONF *conf, char *section) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/radius/ |
H A D | radius.c | 76 struct chap_digest_type *digest, 85 struct chap_digest_type *digest, 321 * digest -- points to the structure representing the digest type 333 struct chap_digest_type *digest, 361 if ((digest->code != CHAP_MD5) 363 && (digest->code != CHAP_MICROSOFT) 364 && (digest->code != CHAP_MICROSOFT_V2) 367 error("RADIUS: Challenge type %u unsupported", digest->code); 395 switch (digest 332 radius_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 535 radius_setparams(VALUE_PAIR *vp, char *msg, REQUEST_INFO *req_info, struct chap_digest_type *digest, unsigned char *challenge, char *message, int message_space) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | x509.c | 144 " -md2/-md5/-sha1/-mdc2 - digest to use\n", 161 const EVP_MD *digest, CONF *conf, char *section); 162 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, 212 const EVP_MD *md_alg, *digest = NULL; local 488 digest = md_alg; 892 const EVP_MD *fdig = digest; 921 if (!sign(x, Upkey, days, clrext, digest, extconf, extsect)) 934 if (!x509_certify(ctx, CAfile, digest, x, xca, 956 rq = X509_to_X509_REQ(x, pk, digest); 1095 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, argument 1213 sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *digest, CONF *conf, char *section) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 84 const EVP_MD *digest, int keylen, unsigned char *out) 91 mdlen = EVP_MD_size(digest); 102 if (!HMAC_Init_ex(&hctx_tpl, pass, passlen, digest, NULL)) { 82 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | p5_crpt2.c | 84 const EVP_MD *digest, int keylen, unsigned char *out) 91 mdlen = EVP_MD_size(digest); 102 if (!HMAC_Init_ex(&hctx_tpl, pass, passlen, digest, NULL)) { 82 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | cryptlib.h | 555 /*! \pre size of digest == DigestSize(). */ 556 virtual void Final(byte *digest) argument 557 {TruncatedFinal(digest, DigestSize());} 563 //! size of the hash/digest/MAC returned by Final() 580 virtual void CalculateDigest(byte *digest, const byte *input, size_t length) argument 581 {Update(input, length); Final(digest);} 583 //! verify that digest is a valid digest for the current message, then reinitialize the object 585 between its output and digest. */ 586 virtual bool Verify(const byte *digest) argument 590 VerifyDigest(const byte *digest, const byte *input, size_t length) argument 597 CalculateTruncatedDigest(byte *digest, size_t digestSize, const byte *input, size_t length) argument 604 VerifyTruncatedDigest(const byte *digest, size_t digestLength, const byte *input, size_t length) argument 1354 TruncatedFinal(byte *digest, size_t digestSize) argument [all...] |
H A D | fipstest.cpp | 127 void KnownAnswerTest(HashTransformation &hash, const char *message, const char *digest) argument 130 StringSource(digest, true, new HexDecoder(new ChannelSwitch(comparison, "1"))); 138 void SecureHashKnownAnswerTest(const char *message, const char *digest, HASH *dummy = NULL) argument 141 KnownAnswerTest(hash, message, digest); 145 void MAC_KnownAnswerTest(const char *key, const char *message, const char *digest, MAC *dummy = NULL) argument 151 KnownAnswerTest(mac, message, digest);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavformat/ |
H A D | rtmpproto.c | 81 #define PLAYER_KEY_OPEN_PART_LEN 30 ///< length of partial key used for first client digest signing 82 /** Client key used for digest signing */ 92 #define SERVER_KEY_OPEN_PART_LEN 36 ///< length of partial key used for first server digest signing 93 /** Key used for RTMP server digest signing */ 365 * Calculate HMAC-SHA2 digest for RTMP handshake packets. 370 * when calculating digest (since it will be used to store that digest) 371 * @param key digest key 372 * @param keylen digest key length 373 * @param dst buffer where calculated digest wil 444 uint8_t digest[32]; local 479 uint8_t digest[32]; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/engines/rsaref/ |
H A D | rsaref.c | 85 * Symetric cipher and digest function registrars 89 static int rsaref_digests(ENGINE *e, const EVP_MD **digest, 513 * Symetric cipher and digest function registrars 544 static int rsaref_digests(ENGINE *e, const EVP_MD **digest, argument 548 if (!digest) { 554 /* We are being asked for a specific digest */ 557 *digest = &digest_md2; 560 *digest = &digest_md5; 564 *digest = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/libs/common/ |
H A D | MD5Sum.cpp | 64 unsigned char digest[16]; local 68 MD5Final (digest, &context); 73 sT = CFormat(wxT("%02x")) % digest[i]; 77 memcpy(m_rawhash, digest, 16); 153 /* MD5 block update operation. Continues an MD5 message-digest 190 /* MD5 finalization. Ends an MD5 message-digest operation, writing the 191 * the message digest and zeroizing the context. 193 void MD5Final (unsigned char digest[16], MD5_CTX *context) argument 212 /* Store state in digest */ 213 Encode (digest, contex [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/engines/rsaref/ |
H A D | rsaref.c | 84 * Symetric cipher and digest function registrars 88 static int rsaref_digests(ENGINE *e, const EVP_MD **digest, 498 * Symetric cipher and digest function registrars 526 static int rsaref_digests(ENGINE *e, const EVP_MD **digest, argument 530 if(!digest) 536 /* We are being asked for a specific digest */ 540 *digest = &digest_md2; break; 542 *digest = &digest_md5; break; 545 *digest = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/engines/rsaref/ |
H A D | rsaref.c | 85 * Symetric cipher and digest function registrars 89 static int rsaref_digests(ENGINE *e, const EVP_MD **digest, 513 * Symetric cipher and digest function registrars 544 static int rsaref_digests(ENGINE *e, const EVP_MD **digest, argument 548 if (!digest) { 554 /* We are being asked for a specific digest */ 557 *digest = &digest_md2; 560 *digest = &digest_md5; 564 *digest = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/ |
H A D | chap.c | 145 ChapAuthWithPeer(unit, our_name, digest) 148 int digest; 153 cstate->resp_type = digest; 175 ChapAuthPeer(unit, our_name, digest) 178 int digest; 183 cstate->chal_type = digest; 479 CHAPDEBUG(("unknown digest type %d", cstate->resp_type)); 578 CHAPDEBUG(("unknown digest type %d", cstate->chal_type));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | http_digest.c | 141 d = &data->state.digest; 250 /* else not a digest, get out */ 326 It converts digest text to ASCII so the MD5 will be correct for 344 d = &data->state.digest; 418 A2 = Method ":" digest-uri-value 422 A2 = Method ":" digest-uri-value ":" H(entity-body) 597 digest_cleanup_one(&data->state.digest);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/sta/ |
H A D | wpa.c | 216 u8 digest[20] = { 0 }; local 218 digest, SHA1_DIGEST_SIZE); 219 NdisMoveMemory(Mic, digest, LEN_KEY_DESC_MIC);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/crypto/ |
H A D | hash.h | 45 int (*digest)(struct ahash_request *req); member in struct:ahash_alg 68 int (*digest)(struct shash_desc *desc, const u8 *data, member in struct:shash_alg 90 int (*digest)(struct ahash_request *req); member in struct:crypto_ahash
|