/freebsd-11-stable/sys/opencrypto/ |
H A D | rmd160.c | 136 RMD160Final(u_char digest[20], RMD160_CTX *ctx) argument 154 if (digest != NULL) 156 PUT_32BIT_LE(digest + i*4, ctx->state[i]);
|
/freebsd-11-stable/crypto/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 516 const ASN1_OCTET_STRING *digest; local 528 /* Checking message digest algorithm. */ 539 "Message digest algorithm is " 545 /* No message digest takes parameter. */ 548 "Superfluous message digest " 553 /* Checking message digest size. */ 554 digest = TS_MSG_IMPRINT_get_msg(msg_imprint); 555 if (digest->length != EVP_MD_size(md)) { 557 "Bad message digest.");
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | sqlite.c | 717 const char *digest = svn_sqlite__column_text(stmt, column, NULL); local 719 if (digest == NULL) 722 SVN_ERR(svn_checksum_deserialize(checksum, digest,
|
/freebsd-11-stable/sys/cam/scsi/ |
H A D | scsi_xpt.c | 192 u_int8_t digest[16]; member in struct:__anon4231 801 MD5Final(softc->digest, &softc->context); 1629 u_int8_t digest[16]; local 1641 MD5Final(digest, &context); 1642 if (bcmp(softc->digest, digest, 16) == 0)
|
/freebsd-11-stable/sys/dev/cxgbe/crypto/ |
H A D | t4_crypto.c | 95 * | hash digest | ----- For HMAC request with 109 * a copy of the hash in the reply, the hash digest is supplied 743 * 'hashsize' is the length of a full digest. 'authsize' is the 744 * requested digest length for this operation which may be less 1424 char digest[GMAC_DIGEST_LEN]; local 1518 axf->Final(digest, auth_ctx); 1523 sizeof(digest), digest); 1530 if (timingsafe_bcmp(digest, digest2, sizeof(digest)) [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_fs_base/ |
H A D | reps-strings.c | 1182 * Finalize BATON->md5_context and store the resulting digest under 1445 /* MD5 digest */ 1446 const unsigned char *digest; 1524 /* Having processed all the windows, we can query the MD5 digest 1526 digest = svn_txdelta_md5_digest(txdelta_stream); 1527 if (! digest) 1530 _("Failed to calculate MD5 digest for '%s'"), 1439 const unsigned char *digest; local
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_repos/ |
H A D | authz.c | 178 memcpy(result->data, authz_key->digest, authz_size); 180 groups_key->digest, groups_size); 187 memcpy(result->data, authz_key->digest, size);
|
/freebsd-11-stable/contrib/bsnmp/lib/ |
H A D | snmp.c | 641 uint8_t digest[SNMP_USM_AUTH_SIZE]; local 647 if ((code = snmp_pdu_calc_digest(pdu, digest)) != 652 memcmp(digest, pdu->msg_digest, sizeof(pdu->msg_digest)) != 0)
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | s3_cbc.c | 400 * md_out: the digest output. At most EVP_MAX_MD_SIZE bytes will be written. 743 if (EVP_DigestInit_ex(&md_ctx, ctx->digest, NULL /* engine */ ) <= 0) 792 * Minimum digest padding length is 17 for SHA384/SHA512 and 9 794 * Additional header is 13 bytes. To get the number of digest blocks
|
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost_pmeth.c | 493 return mctx->digest->md_ctrl(mctx, EVP_MD_CTRL_SET_KEY, 32, key);
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | crypto_nettle.c | 66 alg->digest(ctx, alg->digest_size, mac);
|
/freebsd-11-stable/usr.sbin/unbound/ |
H A D | config.h | 1347 unsigned char *SHA512(void* data, unsigned int data_len, unsigned char *digest);
|
/freebsd-11-stable/crypto/openssh/openbsd-compat/ |
H A D | rmd160.c | 156 RMD160Final(u_int8_t digest[RMD160_DIGEST_LENGTH], RMD160_CTX *ctx) argument 162 PUT_32BIT_LE(digest + i*4, ctx->state[i]);
|
/freebsd-11-stable/crypto/openssh/ |
H A D | pkcs11.h | 864 unsigned char *digest, 873 unsigned char *digest,
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ref/ |
H A D | pkcs11.h | 866 unsigned char *digest, 875 unsigned char *digest,
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | Makefile.am | 145 digest.c \
|
/freebsd-11-stable/crypto/openssl/util/ |
H A D | mk1mf.pl | 110 no-md2 no-md4 no-md5 no-sha no-mdc2 - Skip this digest 116 just-ssl - remove all non-ssl keys/digest
|
/freebsd-11-stable/sys/net/ |
H A D | if_spppsubr.c | 3980 u_char *value, *name, digest[AUTHKEYLEN], dsize; local 4035 MD5Final(digest, &ctx); 4036 dsize = sizeof digest; 4040 sizeof digest, digest, 4153 MD5Final(digest, &ctx); 4158 if (value_len != sizeof digest || 4159 bcmp(digest, value, value_len) != 0) {
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_fs_x/ |
H A D | fs_x.c | 841 temp.digest = noderev->data_rep->md5_digest; 848 temp.digest = noderev->data_rep->sha1_digest;
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_fs_fs/ |
H A D | cached_data.c | 320 * the MD5 digest and only report a mismatch if the MD5 has actually 324 checksum.digest = rep->md5_digest; 339 checksum.digest = rep->sha1_digest; 2189 expected.digest = rb->md5_digest; 3511 apr_uint32_t digest; 3524 digest = svn__fnv1a_32x4(text->data, text->len); 3527 if (entry->fnv1_checksum == digest) 3535 plain_digest = htonl(digest); 3510 apr_uint32_t digest; local
|
H A D | transaction.c | 65 checksum.digest = sha1; 1893 fnv1a_checksum_finalize(apr_uint32_t *digest, 1901 *digest = ntohl(*(const apr_uint32_t *)(checksum->digest)); 2277 revision, those can be passed in REPS_HASH (maps a sha1 digest onto 2301 checksum.digest = rep->sha1_digest; 2500 memcpy(rep->md5_digest, checksum->digest, svn_checksum_size(checksum)); 2505 memcpy(rep->sha1_digest, checksum->digest, svn_checksum_size(checksum)); 2878 total size and the md5 digest in REP and add the representation of type 1892 fnv1a_checksum_finalize(apr_uint32_t *digest, svn_checksum_ctx_t *context, apr_pool_t *scratch_pool) argument
|
H A D | fs_fs.c | 1686 temp.digest = noderev->data_rep->md5_digest; 1693 temp.digest = noderev->data_rep->sha1_digest; 2366 memcpy(rep->sha1_digest, checksum->digest, APR_SHA1_DIGESTSIZE);
|
/freebsd-11-stable/crypto/openssl/engines/ |
H A D | e_capi.c | 176 static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen, 970 static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen, argument 1004 if (!CryptSetHashParam(hash, HP_HASHVAL, (unsigned char *)digest, 0)) {
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | evp.h | 191 /* digest can only handle a single block */ 195 * digest is a "clone" digest used 269 const EVP_MD *digest; member in struct:env_md_ctx_st 270 ENGINE *engine; /* functional reference if 'digest' is 282 # define EVP_MD_CTX_FLAG_ONESHOT 0x0001/* digest update will be 294 * digest in FIPS mode */ 297 * The following PAD options are also currently ignored in 1.0.0, digest 923 int EVP_add_digest(const EVP_MD *digest); 1028 const EVP_MD *digest, in [all...] |
/freebsd-11-stable/sbin/ping6/ |
H A D | ping6.c | 2697 u_int8_t digest[16]; local 2724 MD5Final(digest, &ctxt); 2738 bcopy(digest, &in6.s6_addr[12], 4); 2741 bcopy(digest, &in6.s6_addr[13], 3);
|