/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/integrity/ima/ |
H A D | ima_api.c | 44 memset(entry->digest, 0, sizeof(entry->digest)); 51 entry->digest); 143 memset(iint->digest, 0, IMA_DIGEST_SIZE); 144 result = ima_calc_hash(file, iint->digest); 183 memcpy(entry->template.digest, iint->digest, IMA_DIGEST_SIZE);
|
H A D | ima_crypto.c | 43 * Calculate the MD5/SHA1 file digest 45 int ima_calc_hash(struct file *file, char *digest) argument 82 rc = crypto_hash_final(&desc, digest); 91 int ima_calc_template_hash(int template_len, void *template, char *digest) argument 104 rc = crypto_hash_final(&desc, digest); 121 int __init ima_calc_boot_aggregate(char *digest) argument 140 crypto_hash_final(&desc, digest);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/src/ |
H A D | tool_metalink.c | 134 static void MD5_Final(unsigned char digest[16], MD5_CTX *ctx) argument 136 md5_digest(ctx, 16, digest); 152 static void SHA1_Final(unsigned char digest[20], SHA_CTX *ctx) argument 154 sha1_digest(ctx, 20, digest); 170 static void SHA256_Final(unsigned char digest[32], SHA256_CTX *ctx) argument 172 sha256_digest(ctx, 32, digest); 190 static void MD5_Final(unsigned char digest[16], MD5_CTX *ctx) argument 192 memcpy(digest, gcry_md_read(*ctx, 0), 16); 209 static void SHA1_Final(unsigned char digest[20], SHA_CTX *ctx) argument 211 memcpy(digest, gcry_md_rea 228 SHA256_Final(unsigned char digest[32], SHA256_CTX *ctx) argument 282 MD5_Final(unsigned char digest[16], MD5_CTX *pctx) argument 299 SHA1_Final(unsigned char digest[20], SHA_CTX *pctx) argument 316 SHA256_Final(unsigned char digest[32], SHA256_CTX *pctx) argument 323 win32_crypto_final(struct win32_crypto_hash *ctx, unsigned char *digest, unsigned int digestLen) argument 353 MD5_Final(unsigned char digest[16], MD5_CTX *ctx) argument 374 SHA1_Final(unsigned char digest[20], SHA_CTX *ctx) argument 395 SHA256_Final(unsigned char digest[32], SHA256_CTX *ctx) argument 536 check_hash(const char *filename, const metalink_digest_def *digest_def, const unsigned char *digest, FILE *error) argument 617 unsigned char *digest; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/tcpdump-4.4.0/ |
H A D | signature.c | 13 * Functions for signature and digest verification. 53 unsigned int key_len, u_int8_t *digest) 103 MD5_Final(digest, &context); /* finish up 1st pass */ 110 MD5_Update(&context, digest, 16); /* then results of 1st hash */ 111 MD5_Final(digest, &context); /* finish up 2nd pass */ 52 signature_compute_hmac_md5(const u_int8_t *text, int text_len, unsigned char *key, unsigned int key_len, u_int8_t *digest) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | md4.h | 17 static void Transform(word32 *digest, const word32 *data);
|
H A D | md5.h | 15 static void Transform(word32 *digest, const word32 *data);
|
H A D | lubyrack.h | 39 digest.New(S); 49 mutable SecByteBlock buffer, digest; member in class:LR::Base 79 this->hm.Final(this->digest); 80 xorbuf(BR, this->digest, this->S); 84 this->hm.Final(this->digest); 85 xorbuf(BL, this->digest, this->S); 111 this->hm.Final(this->digest); 112 xorbuf(BL, this->digest, this->S); 116 this->hm.Final(this->digest); 117 xorbuf(BR, this->digest, thi [all...] |
H A D | md4.cpp | 33 void MD4::Transform (word32 *digest, const word32 *in) argument 42 A=digest[0]; 43 B=digest[1]; 44 C=digest[2]; 45 D=digest[3]; 103 digest[0]+=A; 104 digest[1]+=B; 105 digest[2]+=C; 106 digest[3]+=D;
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/shared/ |
H A D | opencrypto.h | 40 int key_len, unsigned char *digest);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_p8e.c | 91 M_ASN1_OCTET_STRING_free(p8->digest); 92 p8->digest = 95 if (!p8->digest) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_p8e.c | 91 M_ASN1_OCTET_STRING_free(p8->digest); 92 p8->digest = 95 if (!p8->digest) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/rsa/ |
H A D | rsa_sign.c | 79 ASN1_OCTET_STRING digest; local 114 sig.digest = &digest; 115 sig.digest->data = (unsigned char *)m; /* TMP UGLY CAST */ 116 sig.digest->length = m_len; 269 if (md && (EVP_MD_size(md) != sig->digest->length)) 272 memcpy(rm, sig->digest->data, sig->digest->length); 273 *prm_len = sig->digest->length; 276 } else if (((unsigned int)sig->digest [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 79 ASN1_OCTET_STRING digest; local 114 sig.digest = &digest; 115 sig.digest->data = (unsigned char *)m; /* TMP UGLY CAST */ 116 sig.digest->length = m_len; 269 if (md && (EVP_MD_size(md) != sig->digest->length)) 272 memcpy(rm, sig->digest->data, sig->digest->length); 273 *prm_len = sig->digest->length; 276 } else if (((unsigned int)sig->digest [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/hmac/ |
H A D | hmactest.c | 87 unsigned char *digest; member in struct:test_st 165 if (strcmp(p, (char *)test[i].digest) != 0) { 167 printf("got %s instead of %s\n", p, test[i].digest); 231 if (strcmp(p, (char *)test[4].digest) != 0) { 233 printf("got %s instead of %s\n", p, test[4].digest); 258 if (strcmp(p, (char *)test[5].digest) != 0) { 260 printf("got %s instead of %s\n", p, test[5].digest); 280 if (strcmp(p, (char *)test[6].digest) != 0) { 282 printf("got %s instead of %s\n", p, test[6].digest); 311 if (strcmp(p, (char *)test[7].digest) ! [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/hmac/ |
H A D | hmactest.c | 87 unsigned char *digest; member in struct:test_st 165 if (strcmp(p, (char *)test[i].digest) != 0) { 167 printf("got %s instead of %s\n", p, test[i].digest); 231 if (strcmp(p, (char *)test[4].digest) != 0) { 233 printf("got %s instead of %s\n", p, test[4].digest); 258 if (strcmp(p, (char *)test[5].digest) != 0) { 260 printf("got %s instead of %s\n", p, test[5].digest); 280 if (strcmp(p, (char *)test[6].digest) != 0) { 282 printf("got %s instead of %s\n", p, test[6].digest); 311 if (strcmp(p, (char *)test[7].digest) ! [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/rsa/ |
H A D | rsa_sign.c | 78 ASN1_OCTET_STRING digest; local 109 sig.digest= &digest; 110 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */ 111 sig.digest->length=m_len; 232 if ( ((unsigned int)sig->digest->length != m_len) || 233 (memcmp(m,sig->digest->data,m_len) != 0))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | bio_ok.c | 90 with it's length and suffixed with it's digest. So you need only 92 it's digest. 96 1) the digest of the block is computed over the whole stream 103 *) digest is initialized with random seed instead of 107 of the digest is also written to output. 110 and then compare the digest output. 418 *ppmd=ctx->md.digest; 466 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return; 468 EVP_DigestInit_ex(md, md->digest, NULL); 472 RAND_pseudo_bytes(md->md_data, md->digest [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | bio_ok.c | 90 with it's length and suffixed with it's digest. So you need only 92 it's digest. 96 1) the digest of the block is computed over the whole stream 103 *) digest is initialized with random seed instead of 107 of the digest is also written to output. 110 and then compare the digest output. 432 *ppmd = ctx->md.digest; 485 if (ctx->buf_len + 2 * md->digest->md_size > OK_BLOCK_SIZE) 488 if (!EVP_DigestInit_ex(md, md->digest, NULL)) 494 if (RAND_pseudo_bytes(md->md_data, md->digest [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | bio_ok.c | 90 with it's length and suffixed with it's digest. So you need only 92 it's digest. 96 1) the digest of the block is computed over the whole stream 103 *) digest is initialized with random seed instead of 107 of the digest is also written to output. 110 and then compare the digest output. 432 *ppmd = ctx->md.digest; 485 if (ctx->buf_len + 2 * md->digest->md_size > OK_BLOCK_SIZE) 488 if (!EVP_DigestInit_ex(md, md->digest, NULL)) 494 if (RAND_pseudo_bytes(md->md_data, md->digest [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ccgost/ |
H A D | gost_eng.c | 22 /* Symmetric cipher and digest function registrar */ 27 static int gost_digests(ENGINE *e, const EVP_MD **digest, 164 static int gost_digests(ENGINE *e, const EVP_MD **digest, argument 168 if (!digest) { 176 *digest = &digest_gost; 178 *digest = &imit_gost_cpa; 181 *digest = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ccgost/ |
H A D | gost_eng.c | 22 /* Symmetric cipher and digest function registrar */ 27 static int gost_digests(ENGINE *e, const EVP_MD **digest, 164 static int gost_digests(ENGINE *e, const EVP_MD **digest, argument 168 if (!digest) { 176 *digest = &digest_gost; 178 *digest = &imit_gost_cpa; 181 *digest = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/ |
H A D | cms_dd.c | 123 if (mdlen != (unsigned int)dd->digest->length) { 129 if (memcmp(md, dd->digest->data, mdlen)) 135 if (!ASN1_STRING_set(dd->digest, md, mdlen))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/ |
H A D | cms_dd.c | 123 if (mdlen != (unsigned int)dd->digest->length) { 129 if (memcmp(md, dd->digest->data, mdlen)) 135 if (!ASN1_STRING_set(dd->digest, md, mdlen))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/dbus/ |
H A D | dbus-sha.h | 39 dbus_uint32_t digest[5]; /**< Message digest */ member in struct:DBusSHAContext
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavutil/ |
H A D | random_seed.c | 69 unsigned char digest[20]; local 102 av_sha_final(sha, digest); 103 return AV_RB32(digest) + AV_RB32(digest + 16);
|