/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | chap-new.h | 53 * CHAP digest codes. 83 /* Return the digest alg. ID for the most preferred digest type. */ 95 /* Return the bit flag (lsb set) for our most preferred digest type. */ 98 /* Return the bit flag for a given digest algorithm ID. */ 100 #define CHAP_MDTYPE_D(digest) \ 101 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 102 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 103 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 106 #define CHAP_MDTYPE_D(digest) \ 155 const struct chap_digest_type *digest; member in struct:chap_client_state 164 const struct chap_digest_type *digest; member in struct:chap_server_state [all...] |
H A D | chap-new.c | 55 const struct chap_digest_type *digest, 96 const struct chap_digest_type *digest, 111 /* List of digest types that we know about */ 176 ppp_fatal("CHAP digest 0x%x requested but not available", 179 pcb->chap_server.digest = dp; 209 ppp_fatal("CHAP digest 0x%x requested but not available", 212 pcb->chap_client.digest = dp; 264 pcb->chap_server.digest->generate_challenge(pcb, p); 328 ok = (*verifier)(name, pcb->chap_server.name, id, pcb->chap_server.digest, 332 ok = chap_verify_response(pcb, name, pcb->chap_server.name, id, pcb->chap_server.digest, 411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/ |
H A D | digest.c | 1 /* crypto/evp/digest.c */ 149 if (ctx->engine && ctx->digest && (!type || 150 (type && (type->type == ctx->digest->type)))) 181 /* We'll use the ENGINE's private digest definition */ 192 if(!ctx->digest) 198 if (ctx->digest != type) 200 if (ctx->digest && ctx->digest->ctx_size) 202 ctx->digest=type; 228 return ctx->digest [all...] |
H A D | p_verify.c | 78 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) 87 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0) 97 v=ctx->digest->required_pkey_type[i]; 110 if (ctx->digest->verify == NULL) 116 return(ctx->digest->verify(ctx->digest->type,m,m_len,
|
H A D | p_sign.c | 92 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) 102 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0) 115 v=ctx->digest->required_pkey_type[i]; 129 if (ctx->digest->sign == NULL) 134 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
|
H A D | bio_ok.c | 90 with it's length and suffixed with it's digest. So you need only 92 it's digest. 96 1) the digest of the block is computed over the whole stream 103 *) digest is initialized with random seed instead of 107 of the digest is also written to output. 110 and then compare the digest output. 418 *ppmd=ctx->md.digest; 466 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return; 468 EVP_DigestInit_ex(md, md->digest, NULL); 472 RAND_pseudo_bytes(md->md_data, md->digest [all...] |
H A D | bio_md.c | 65 /* BIO_put and BIO_get both add to the digest, 66 * BIO_gets returns the digest */ 79 BIO_TYPE_MD,"message digest", 182 ret = EVP_DigestInit_ex(ctx,ctx->digest, NULL); 192 *ppmd=ctx->digest; 254 if (size < ctx->digest->md_size)
|
H A D | p5_crpt2.c | 81 const EVP_MD *digest, 89 mdlen = EVP_MD_size(digest); 113 HMAC_Init_ex(&hctx, pass, passlen, digest, NULL); 120 HMAC(digest, pass, passlen, 79 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs12/ |
H A D | p12_p8e.c | 84 M_ASN1_OCTET_STRING_free(p8->digest); 85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), 87 if(!p8->digest) {
|
H A D | p12_p8d.c | 66 passlen, p8->digest, 1);
|
H A D | p12_mutl.c | 121 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length) 122 || memcmp (mac, p12->mac->dinfo->digest->data, maclen)) return 0; 144 if (!(M_ASN1_OCTET_STRING_set (p12->mac->dinfo->digest, mac, maclen))) {
|
H A D | p12_npas.c | 162 ASN1_OCTET_STRING_free(p12->mac->dinfo->digest); 163 p12->mac->dinfo->digest = macnew;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | x_sig.c | 66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_sign.c | 79 ASN1_OCTET_STRING digest; local 110 sig.digest= &digest; 111 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */ 112 sig.digest->length=m_len; 244 if (md && (EVP_MD_size(md) != sig->digest->length)) 249 memcpy(rm, sig->digest->data, 250 sig->digest->length); 251 *prm_len = sig->digest->length; 255 else if (((unsigned int)sig->digest [all...] |
/barrelfish-master/lib/openssl-1.0.0d/engines/ccgost/ |
H A D | gost_eng.c | 21 /* Symmetric cipher and digest function registrar */ 26 static int gost_digests(ENGINE *e, const EVP_MD **digest, 156 static int gost_digests(ENGINE *e, const EVP_MD **digest, argument 160 if (!digest) 168 *digest = &digest_gost; 172 *digest = &imit_gost_cpa; 177 *digest = NULL;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_dd.c | 123 if (mdlen != (unsigned int)dd->digest->length) 130 if (memcmp(md, dd->digest->data, mdlen)) 138 if (!ASN1_STRING_set(dd->digest, md, mdlen))
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ecdsa/ |
H A D | ecdsatest.c | 186 unsigned char digest[20]; local 194 /* get the message digest */ 197 EVP_DigestFinal(&md_ctx, digest, &dgst_len); 208 signature = ECDSA_do_sign(digest, 20, key); 224 if (ECDSA_do_verify(digest, 20, signature, key) != 1) 290 unsigned char digest[20], wrong_digest[20]; local 295 /* fill digest values with some random data */ 296 if (!RAND_pseudo_bytes(digest, 20) || 385 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 393 if (ECDSA_verify(0, digest, 2 [all...] |
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | ecdsatest.c | 186 unsigned char digest[20]; local 194 /* get the message digest */ 197 EVP_DigestFinal(&md_ctx, digest, &dgst_len); 208 signature = ECDSA_do_sign(digest, 20, key); 224 if (ECDSA_do_verify(digest, 20, signature, key) != 1) 290 unsigned char digest[20], wrong_digest[20]; local 295 /* fill digest values with some random data */ 296 if (!RAND_pseudo_bytes(digest, 20) || 385 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 393 if (ECDSA_verify(0, digest, 2 [all...] |
H A D | hmactest.c | 88 unsigned char *digest; member in struct:test_st 150 if (strcmp(p,(char *)test[i].digest) != 0) 153 printf("got %s instead of %s\n",p,test[i].digest);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/hmac/ |
H A D | hmactest.c | 88 unsigned char *digest; member in struct:test_st 150 if (strcmp(p,(char *)test[i].digest) != 0) 153 printf("got %s instead of %s\n",p,test[i].digest);
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | ts.c | 85 static int query_command(const char *data, char *digest, 90 static TS_REQ *create_query(BIO *data_bio, char *digest, const EVP_MD *md, 92 static int create_digest(BIO *input, char *digest, 111 static int verify_command(char *data, char *digest, char *queryfile, 114 static TS_VERIFY_CTX *create_verify_ctx(char *data, char *digest, 134 char *digest = NULL; local 193 else if (strcmp(*argv, "-digest") == 0) 196 digest = *++argv; 329 ret = data != NULL && digest != NULL; 333 ret = !query_command(data, digest, m 466 query_command(const char *data, char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert, const char *in, const char *out, int text) argument 533 create_query(BIO *data_bio, char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert) argument 598 create_digest(BIO *input, char *digest, const EVP_MD *md, unsigned char **md_value) argument 961 verify_command(char *data, char *digest, char *queryfile, char *in, int token_in, char *ca_path, char *ca_file, char *untrusted) argument 1010 create_verify_ctx(char *data, char *digest, char *queryfile, char *ca_path, char *ca_file, char *untrusted) argument [all...] |
/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | chap-new.c | 55 const struct chap_digest_type *digest, 96 const struct chap_digest_type *digest, 111 /* List of digest types that we know about */ 176 ppp_fatal("CHAP digest 0x%x requested but not available", 179 pcb->chap_server.digest = dp; 209 ppp_fatal("CHAP digest 0x%x requested but not available", 212 pcb->chap_client.digest = dp; 264 pcb->chap_server.digest->generate_challenge(pcb, p); 328 ok = (*verifier)(name, pcb->chap_server.name, id, pcb->chap_server.digest, 332 ok = chap_verify_response(pcb, name, pcb->chap_server.name, id, pcb->chap_server.digest, 411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/engine/ |
H A D | eng_openssl.c | 117 static int openssl_digests(ENGINE *e, const EVP_MD **digest, 345 static int openssl_digests(ENGINE *e, const EVP_MD **digest, argument 348 if(!digest) 354 /* We are being asked for a specific digest */ 356 *digest = &test_sha_md; 363 *digest = NULL;
|
/barrelfish-master/lib/openssl-1.0.0d/engines/ |
H A D | e_4758cca.c | 638 ASN1_OCTET_STRING digest; local 666 sig.digest = &digest; 667 sig.digest->data = (unsigned char*)m; 668 sig.digest->length = m_len; 763 ASN1_OCTET_STRING digest; local 791 sig.digest = &digest; 792 sig.digest->data = (unsigned char*)m; 793 sig.digest [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | pk7_lib.c | 142 if (p7->d.digest->contents != NULL) 143 PKCS7_free(p7->d.digest->contents); 144 p7->d.digest->contents=p7_data; 215 if ((p7->d.digest=PKCS7_DIGEST_new()) 217 if (!ASN1_INTEGER_set(p7->d.digest->version,0)) 261 /* If the digest is not currently listed, add it */ 446 if(!(p7->d.digest->md->parameter = ASN1_TYPE_new())) 451 p7->d.digest->md->parameter->type = V_ASN1_NULL; 452 p7->d.digest->md->algorithm = OBJ_nid2obj(EVP_MD_nid(md));
|