/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509/ |
H A D | x_all.c | 98 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) argument 101 x->sig_alg, x->signature, x->cert_info,pkey,md)); 104 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) argument 107 x->signature, x->req_info,pkey,md)); 110 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) argument 114 x->sig_alg, x->signature, x->crl,pkey,md)); 117 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) argument 120 x->signature, x->spkac,pkey,md)); 370 int X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, argument 376 return EVP_Digest(key->data, key->length, md, le 379 X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, unsigned int *len) argument 385 X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, unsigned int *len) argument 391 X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, unsigned int *len) argument 397 X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, unsigned int *len) argument 403 PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data, const EVP_MD *type, unsigned char *md, unsigned int *len) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/sha/ |
H A D | sha512.c | 94 int SHA512_Final (unsigned char *md, SHA512_CTX *c) argument 130 if (md==0) return 0; 140 *(md++) = (unsigned char)(t>>56); 141 *(md++) = (unsigned char)(t>>48); 142 *(md++) = (unsigned char)(t>>40); 143 *(md++) = (unsigned char)(t>>32); 144 *(md++) = (unsigned char)(t>>24); 145 *(md++) = (unsigned char)(t>>16); 146 *(md++) = (unsigned char)(t>>8); 147 *(md 172 SHA384_Final(unsigned char *md,SHA512_CTX *c) argument 232 SHA384(const unsigned char *d, size_t n, unsigned char *md) argument 245 SHA512(const unsigned char *d, size_t n, unsigned char *md) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/ |
H A D | passwd.c | 316 EVP_MD_CTX md,md2; local 331 EVP_MD_CTX_init(&md); 332 EVP_DigestInit_ex(&md,EVP_md5(), NULL); 333 EVP_DigestUpdate(&md, passwd, passwd_len); 334 EVP_DigestUpdate(&md, "$", 1); 335 EVP_DigestUpdate(&md, magic, strlen(magic)); 336 EVP_DigestUpdate(&md, "$", 1); 337 EVP_DigestUpdate(&md, salt_out, salt_len); 347 EVP_DigestUpdate(&md, buf, sizeof buf); 348 EVP_DigestUpdate(&md, bu [all...] |
H A D | dgst.c | 90 const EVP_MD *md=NULL,*m; local 130 md=EVP_get_digestbyname(pname); 205 md=m; 212 if (md == NULL) 213 md=EVP_md5(); 355 /* we use md as a filter, reading from 'in' */ 356 if (!BIO_set_md(bmd,md)) 359 EVP_MD_name(md)); 374 name=OBJ_nid2sn(md->type); 431 EVP_MD *md; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | passwd.c | 317 EVP_MD_CTX md,md2; local 332 EVP_MD_CTX_init(&md); 333 EVP_DigestInit_ex(&md,EVP_md5(), NULL); 334 EVP_DigestUpdate(&md, passwd, passwd_len); 335 EVP_DigestUpdate(&md, "$", 1); 336 EVP_DigestUpdate(&md, magic, strlen(magic)); 337 EVP_DigestUpdate(&md, "$", 1); 338 EVP_DigestUpdate(&md, salt_out, salt_len); 348 EVP_DigestUpdate(&md, buf, sizeof buf); 349 EVP_DigestUpdate(&md, bu [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/ |
H A D | s3_enc.c | 202 EVP_MD_CTX md; local 309 EVP_MD_CTX_init(&md); 316 EVP_DigestInit_ex(&md,EVP_md5(), NULL); 317 EVP_DigestUpdate(&md,key,j); 318 EVP_DigestUpdate(&md,er1,SSL3_RANDOM_SIZE); 319 EVP_DigestUpdate(&md,er2,SSL3_RANDOM_SIZE); 320 EVP_DigestFinal_ex(&md,&(exp_key[0]),NULL); 325 EVP_DigestInit_ex(&md,EVP_md5(), NULL); 326 EVP_DigestUpdate(&md,er1,SSL3_RANDOM_SIZE); 327 EVP_DigestUpdate(&md,er 567 ssl3_mac(SSL *ssl, unsigned char *md, int send) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_enc.c | 203 EVP_MD_CTX md; local 321 EVP_MD_CTX_init(&md); 328 EVP_DigestInit_ex(&md,EVP_md5(), NULL); 329 EVP_DigestUpdate(&md,key,j); 330 EVP_DigestUpdate(&md,er1,SSL3_RANDOM_SIZE); 331 EVP_DigestUpdate(&md,er2,SSL3_RANDOM_SIZE); 332 EVP_DigestFinal_ex(&md,&(exp_key[0]),NULL); 337 EVP_DigestInit_ex(&md,EVP_md5(), NULL); 338 EVP_DigestUpdate(&md,er1,SSL3_RANDOM_SIZE); 339 EVP_DigestUpdate(&md,er 581 ssl3_mac(SSL *ssl, unsigned char *md, int send) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/evp/ |
H A D | digest.c | 152 static int bad_final(EVP_MD_CTX *ctx,unsigned char *md) argument 262 int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) argument 265 ret = EVP_DigestFinal_ex(ctx, md, size); 271 int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) argument 276 ret=ctx->digest->final(ctx,md); 334 unsigned char *md, unsigned int *size, const EVP_MD *type, ENGINE *impl) 343 && EVP_DigestFinal_ex(&ctx, md, size); 333 EVP_Digest(void *data, unsigned int count, unsigned char *md, unsigned int *size, const EVP_MD *type, ENGINE *impl) argument
|
H A D | openbsd_hw.c | 279 unsigned char md[EVP_MAX_MD_SIZE]; 316 static int do_digest(int ses,unsigned char *md,const void *data,int len) 328 memcpy(md,md5zero,16); 338 cryp.mac=(caddr_t)md; 377 return do_digest(md_data->sess.ses,md_data->md,data,len); 386 static int dev_crypto_md5_final(EVP_MD_CTX *ctx,unsigned char *md) 393 memcpy(md,md_data->md,MD5_DIGEST_LENGTH); 398 ret=do_digest(md_data->sess.ses,md,md_data->data,md_data->len);
|
H A D | evp_key.c | 110 int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, argument 129 EVP_DigestInit_ex(&c,md, NULL); 139 EVP_DigestInit_ex(&c,md, NULL);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/rc4/ |
H A D | rc4test.c | 202 unsigned char md[SHA_DIGEST_LENGTH]; local 214 SHA1_Final(md,&c); 216 if (memcmp(md,expected,sizeof(md))) { 219 for (j=0; j<sizeof(md); j++) 220 printf(" %02x",md[j]); 223 for (j=0; j<sizeof(md); j++)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | rc4test.c | 202 unsigned char md[SHA_DIGEST_LENGTH]; local 214 SHA1_Final(md,&c); 216 if (memcmp(md,expected,sizeof(md))) { 219 for (j=0; j<sizeof(md); j++) 220 printf(" %02x",md[j]); 223 for (j=0; j<sizeof(md); j++)
|
H A D | hmactest.c | 123 static char *pt(unsigned char *md); 165 static char *pt(unsigned char *md) argument 171 sprintf(&(buf[i*2]),"%02x",md[i]);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | openbsd_hw.c | 279 unsigned char md[EVP_MAX_MD_SIZE]; 316 static int do_digest(int ses,unsigned char *md,const void *data,int len) 328 memcpy(md,md5zero,16); 338 cryp.mac=(caddr_t)md; 377 return do_digest(md_data->sess.ses,md_data->md,data,len); 386 static int dev_crypto_md5_final(EVP_MD_CTX *ctx,unsigned char *md) 393 memcpy(md,md_data->md,MD5_DIGEST_LENGTH); 398 ret=do_digest(md_data->sess.ses,md,md_data->data,md_data->len);
|
H A D | evp_key.c | 110 int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, argument 129 if (!EVP_DigestInit_ex(&c,md, NULL)) 140 EVP_DigestInit_ex(&c,md, NULL);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/fips/sha1/ |
H A D | fips_sha1test.c | 94 unsigned char md[20]; local 141 SHA1(buf,bit/8,md); 142 dump(md,20);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/test/ |
H A D | fips_sha1test.c | 94 unsigned char md[20]; local 141 SHA1(buf,bit/8,md); 142 dump(md,20);
|
H A D | hmactest.c | 123 static char *pt(unsigned char *md); 165 static char *pt(unsigned char *md) argument 171 sprintf(&(buf[i*2]),"%02x",md[i]);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/hmac/ |
H A D | hmactest.c | 123 static char *pt(unsigned char *md); 165 static char *pt(unsigned char *md) argument 171 sprintf(&(buf[i*2]),"%02x",md[i]);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/hmac/ |
H A D | hmactest.c | 123 static char *pt(unsigned char *md); 165 static char *pt(unsigned char *md) argument 171 sprintf(&(buf[i*2]),"%02x",md[i]);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavformat/ |
H A D | cutils.c | 70 int md[] = { 31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31 }; local 86 md[1] = ISLEAP(y)?29:28; 87 for (m=0; days >= md[m]; m++) 88 days -= md[m];
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/include/ |
H A D | pcap-int.h | 76 struct pcap_md md; member in struct:pcap
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/md/ |
H A D | dm-hw-handler.h | 19 struct mapped_device *md; member in struct:hw_handler
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/fips/dsa/ |
H A D | fips_dsa_gen.c | 116 unsigned char md[SHA_DIGEST_LENGTH]; local 196 EVP_Digest(seed,SHA_DIGEST_LENGTH,md,NULL,HASH, NULL); 199 md[i]^=buf2[i]; 202 md[0]|=0x80; 203 md[SHA_DIGEST_LENGTH-1]|=0x01; 204 if (!BN_bin2bn(md,SHA_DIGEST_LENGTH,q)) goto err; 244 EVP_Digest(buf,SHA_DIGEST_LENGTH,md,NULL,HASH, NULL); 247 if (!BN_bin2bn(md,SHA_DIGEST_LENGTH,r0))
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/ia64/hp/sim/boot/ |
H A D | fw-emu.c | 246 efi_memory_desc_t *efi_memmap, *md; local 255 md = efi_memmap + i++; \ 256 md->type = typ; \ 257 md->pad = 0; \ 258 md->phys_addr = start; \ 259 md->virt_addr = 0; \ 260 md->num_pages = (end - start) >> 12; \ 261 md->attribute = attr; \
|