Searched refs:digest (Results 151 - 175 of 349) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/rand/
H A Drand_lcl.h127 # error No message digest algorithm available
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/
H A Dtestss3 digest='-sha1'
5 x509cmd="../util/shlib_wrap.sh ../apps/openssl x509 $digest"
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/
H A Dtestss3 digest='-sha1'
5 x509cmd="../util/shlib_wrap.sh ../apps/openssl x509 $digest"
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/
H A Dtestss3 digest='-sha1'
5 x509cmd="../util/shlib_wrap.sh ../apps/openssl x509 $digest"
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dcrl.c118 const EVP_MD *md_alg,*digest=EVP_sha1(); local
212 digest=md_alg;
313 if (!X509_CRL_digest(x,digest,md,&n))
319 OBJ_nid2sn(EVP_MD_type(digest)));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/rand/
H A Drand_lcl.h128 #error No message digest algorithm available
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/
H A Dendpointola.c73 ep->digest = kzalloc(SCTP_SIGNATURE_SIZE, gfp);
74 if (!ep->digest)
184 kfree(ep->digest);
256 /* Free the digest buffer */
257 kfree(ep->digest);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/rand/
H A Drand_lcl.h127 # error No message digest algorithm available
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/
H A Dn_pkey.c154 enckey->enckey->digest->length = pkeylen;
189 enckey->enckey->digest->data = zz;
216 zz = enckey->enckey->digest->data;
268 if ((ret = d2i_RSA_NET_2(a, enckey->enckey->digest, cb, sgckey)) == NULL)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dx509.c144 " -md2/-md5/-sha1/-mdc2 - digest to use\n",
161 const EVP_MD *digest, CONF *conf, char *section);
162 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
212 const EVP_MD *md_alg, *digest = NULL; local
488 digest = md_alg;
892 const EVP_MD *fdig = digest;
921 if (!sign(x, Upkey, days, clrext, digest, extconf, extsect))
934 if (!x509_certify(ctx, CAfile, digest, x, xca,
956 rq = X509_to_X509_REQ(x, pk, digest);
1095 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, argument
1213 sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *digest, CONF *conf, char *section) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/radius/
H A Dradius.c76 struct chap_digest_type *digest,
85 struct chap_digest_type *digest,
321 * digest -- points to the structure representing the digest type
333 struct chap_digest_type *digest,
361 if ((digest->code != CHAP_MD5)
363 && (digest->code != CHAP_MICROSOFT)
364 && (digest->code != CHAP_MICROSOFT_V2)
367 error("RADIUS: Challenge type %u unsupported", digest->code);
395 switch (digest
332 radius_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
535 radius_setparams(VALUE_PAIR *vp, char *msg, REQUEST_INFO *req_info, struct chap_digest_type *digest, unsigned char *challenge, char *message, int message_space) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dx509.c144 " -md2/-md5/-sha1/-mdc2 - digest to use\n",
161 const EVP_MD *digest, CONF *conf, char *section);
162 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
212 const EVP_MD *md_alg, *digest = NULL; local
488 digest = md_alg;
892 const EVP_MD *fdig = digest;
921 if (!sign(x, Upkey, days, clrext, digest, extconf, extsect))
934 if (!x509_certify(ctx, CAfile, digest, x, xca,
956 rq = X509_to_X509_REQ(x, pk, digest);
1095 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, argument
1213 sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *digest, CONF *conf, char *section) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/
H A Dp5_crpt2.c84 const EVP_MD *digest, int keylen, unsigned char *out)
91 mdlen = EVP_MD_size(digest);
102 if (!HMAC_Init_ex(&hctx_tpl, pass, passlen, digest, NULL)) {
82 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/
H A Dp5_crpt2.c84 const EVP_MD *digest, int keylen, unsigned char *out)
91 mdlen = EVP_MD_size(digest);
102 if (!HMAC_Init_ex(&hctx_tpl, pass, passlen, digest, NULL)) {
82 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dcryptlib.h555 /*! \pre size of digest == DigestSize(). */
556 virtual void Final(byte *digest) argument
557 {TruncatedFinal(digest, DigestSize());}
563 //! size of the hash/digest/MAC returned by Final()
580 virtual void CalculateDigest(byte *digest, const byte *input, size_t length) argument
581 {Update(input, length); Final(digest);}
583 //! verify that digest is a valid digest for the current message, then reinitialize the object
585 between its output and digest. */
586 virtual bool Verify(const byte *digest) argument
590 VerifyDigest(const byte *digest, const byte *input, size_t length) argument
597 CalculateTruncatedDigest(byte *digest, size_t digestSize, const byte *input, size_t length) argument
604 VerifyTruncatedDigest(const byte *digest, size_t digestLength, const byte *input, size_t length) argument
1354 TruncatedFinal(byte *digest, size_t digestSize) argument
[all...]
H A Dfipstest.cpp127 void KnownAnswerTest(HashTransformation &hash, const char *message, const char *digest) argument
130 StringSource(digest, true, new HexDecoder(new ChannelSwitch(comparison, "1")));
138 void SecureHashKnownAnswerTest(const char *message, const char *digest, HASH *dummy = NULL) argument
141 KnownAnswerTest(hash, message, digest);
145 void MAC_KnownAnswerTest(const char *key, const char *message, const char *digest, MAC *dummy = NULL) argument
151 KnownAnswerTest(mac, message, digest);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavformat/
H A Drtmpproto.c81 #define PLAYER_KEY_OPEN_PART_LEN 30 ///< length of partial key used for first client digest signing
82 /** Client key used for digest signing */
92 #define SERVER_KEY_OPEN_PART_LEN 36 ///< length of partial key used for first server digest signing
93 /** Key used for RTMP server digest signing */
365 * Calculate HMAC-SHA2 digest for RTMP handshake packets.
370 * when calculating digest (since it will be used to store that digest)
371 * @param key digest key
372 * @param keylen digest key length
373 * @param dst buffer where calculated digest wil
444 uint8_t digest[32]; local
479 uint8_t digest[32]; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/engines/rsaref/
H A Drsaref.c85 * Symetric cipher and digest function registrars
89 static int rsaref_digests(ENGINE *e, const EVP_MD **digest,
513 * Symetric cipher and digest function registrars
544 static int rsaref_digests(ENGINE *e, const EVP_MD **digest, argument
548 if (!digest) {
554 /* We are being asked for a specific digest */
557 *digest = &digest_md2;
560 *digest = &digest_md5;
564 *digest = NULL;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/libs/common/
H A DMD5Sum.cpp64 unsigned char digest[16]; local
68 MD5Final (digest, &context);
73 sT = CFormat(wxT("%02x")) % digest[i];
77 memcpy(m_rawhash, digest, 16);
153 /* MD5 block update operation. Continues an MD5 message-digest
190 /* MD5 finalization. Ends an MD5 message-digest operation, writing the
191 * the message digest and zeroizing the context.
193 void MD5Final (unsigned char digest[16], MD5_CTX *context) argument
212 /* Store state in digest */
213 Encode (digest, contex
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/engines/rsaref/
H A Drsaref.c84 * Symetric cipher and digest function registrars
88 static int rsaref_digests(ENGINE *e, const EVP_MD **digest,
498 * Symetric cipher and digest function registrars
526 static int rsaref_digests(ENGINE *e, const EVP_MD **digest, argument
530 if(!digest)
536 /* We are being asked for a specific digest */
540 *digest = &digest_md2; break;
542 *digest = &digest_md5; break;
545 *digest = NULL;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/engines/rsaref/
H A Drsaref.c85 * Symetric cipher and digest function registrars
89 static int rsaref_digests(ENGINE *e, const EVP_MD **digest,
513 * Symetric cipher and digest function registrars
544 static int rsaref_digests(ENGINE *e, const EVP_MD **digest, argument
548 if (!digest) {
554 /* We are being asked for a specific digest */
557 *digest = &digest_md2;
560 *digest = &digest_md5;
564 *digest = NULL;
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/
H A Dchap.c145 ChapAuthWithPeer(unit, our_name, digest)
148 int digest;
153 cstate->resp_type = digest;
175 ChapAuthPeer(unit, our_name, digest)
178 int digest;
183 cstate->chal_type = digest;
479 CHAPDEBUG(("unknown digest type %d", cstate->resp_type));
578 CHAPDEBUG(("unknown digest type %d", cstate->chal_type));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Dhttp_digest.c141 d = &data->state.digest;
250 /* else not a digest, get out */
326 It converts digest text to ASCII so the MD5 will be correct for
344 d = &data->state.digest;
418 A2 = Method ":" digest-uri-value
422 A2 = Method ":" digest-uri-value ":" H(entity-body)
597 digest_cleanup_one(&data->state.digest);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/sta/
H A Dwpa.c216 u8 digest[20] = { 0 }; local
218 digest, SHA1_DIGEST_SIZE);
219 NdisMoveMemory(Mic, digest, LEN_KEY_DESC_MIC);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/crypto/
H A Dhash.h45 int (*digest)(struct ahash_request *req); member in struct:ahash_alg
68 int (*digest)(struct shash_desc *desc, const u8 *data, member in struct:shash_alg
90 int (*digest)(struct ahash_request *req); member in struct:crypto_ahash

Completed in 294 milliseconds

1234567891011>>