Searched refs:digest (Results 1 - 25 of 57) sorted by relevance

123

/barrelfish-master/include/lwip2/netif/ppp/
H A Dchap-new.h53 * CHAP digest codes.
83 /* Return the digest alg. ID for the most preferred digest type. */
95 /* Return the bit flag (lsb set) for our most preferred digest type. */
98 /* Return the bit flag for a given digest algorithm ID. */
100 #define CHAP_MDTYPE_D(digest) \
101 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \
102 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \
103 ((digest) == CHAP_MD5)? MDTYPE_MD5: \
106 #define CHAP_MDTYPE_D(digest) \
155 const struct chap_digest_type *digest; member in struct:chap_client_state
164 const struct chap_digest_type *digest; member in struct:chap_server_state
[all...]
H A Dchap-new.c55 const struct chap_digest_type *digest,
96 const struct chap_digest_type *digest,
111 /* List of digest types that we know about */
176 ppp_fatal("CHAP digest 0x%x requested but not available",
179 pcb->chap_server.digest = dp;
209 ppp_fatal("CHAP digest 0x%x requested but not available",
212 pcb->chap_client.digest = dp;
264 pcb->chap_server.digest->generate_challenge(pcb, p);
328 ok = (*verifier)(name, pcb->chap_server.name, id, pcb->chap_server.digest,
332 ok = chap_verify_response(pcb, name, pcb->chap_server.name, id, pcb->chap_server.digest,
411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/
H A Ddigest.c1 /* crypto/evp/digest.c */
149 if (ctx->engine && ctx->digest && (!type ||
150 (type && (type->type == ctx->digest->type))))
181 /* We'll use the ENGINE's private digest definition */
192 if(!ctx->digest)
198 if (ctx->digest != type)
200 if (ctx->digest && ctx->digest->ctx_size)
202 ctx->digest=type;
228 return ctx->digest
[all...]
H A Dp_verify.c78 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE)
87 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0)
97 v=ctx->digest->required_pkey_type[i];
110 if (ctx->digest->verify == NULL)
116 return(ctx->digest->verify(ctx->digest->type,m,m_len,
H A Dp_sign.c92 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE)
102 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0)
115 v=ctx->digest->required_pkey_type[i];
129 if (ctx->digest->sign == NULL)
134 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
H A Dbio_ok.c90 with it's length and suffixed with it's digest. So you need only
92 it's digest.
96 1) the digest of the block is computed over the whole stream
103 *) digest is initialized with random seed instead of
107 of the digest is also written to output.
110 and then compare the digest output.
418 *ppmd=ctx->md.digest;
466 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return;
468 EVP_DigestInit_ex(md, md->digest, NULL);
472 RAND_pseudo_bytes(md->md_data, md->digest
[all...]
H A Dbio_md.c65 /* BIO_put and BIO_get both add to the digest,
66 * BIO_gets returns the digest */
79 BIO_TYPE_MD,"message digest",
182 ret = EVP_DigestInit_ex(ctx,ctx->digest, NULL);
192 *ppmd=ctx->digest;
254 if (size < ctx->digest->md_size)
H A Dp5_crpt2.c81 const EVP_MD *digest,
89 mdlen = EVP_MD_size(digest);
113 HMAC_Init_ex(&hctx, pass, passlen, digest, NULL);
120 HMAC(digest, pass, passlen,
79 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs12/
H A Dp12_p8e.c84 M_ASN1_OCTET_STRING_free(p8->digest);
85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO),
87 if(!p8->digest) {
H A Dp12_p8d.c66 passlen, p8->digest, 1);
H A Dp12_mutl.c121 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length)
122 || memcmp (mac, p12->mac->dinfo->digest->data, maclen)) return 0;
144 if (!(M_ASN1_OCTET_STRING_set (p12->mac->dinfo->digest, mac, maclen))) {
H A Dp12_npas.c162 ASN1_OCTET_STRING_free(p12->mac->dinfo->digest);
163 p12->mac->dinfo->digest = macnew;
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/
H A Dx_sig.c66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
/barrelfish-master/lib/openssl-1.0.0d/crypto/rsa/
H A Drsa_sign.c79 ASN1_OCTET_STRING digest; local
110 sig.digest= &digest;
111 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */
112 sig.digest->length=m_len;
244 if (md && (EVP_MD_size(md) != sig->digest->length))
249 memcpy(rm, sig->digest->data,
250 sig->digest->length);
251 *prm_len = sig->digest->length;
255 else if (((unsigned int)sig->digest
[all...]
/barrelfish-master/lib/openssl-1.0.0d/engines/ccgost/
H A Dgost_eng.c21 /* Symmetric cipher and digest function registrar */
26 static int gost_digests(ENGINE *e, const EVP_MD **digest,
156 static int gost_digests(ENGINE *e, const EVP_MD **digest, argument
160 if (!digest)
168 *digest = &digest_gost;
172 *digest = &imit_gost_cpa;
177 *digest = NULL;
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/
H A Dcms_dd.c123 if (mdlen != (unsigned int)dd->digest->length)
130 if (memcmp(md, dd->digest->data, mdlen))
138 if (!ASN1_STRING_set(dd->digest, md, mdlen))
/barrelfish-master/lib/openssl-1.0.0d/crypto/ecdsa/
H A Decdsatest.c186 unsigned char digest[20]; local
194 /* get the message digest */
197 EVP_DigestFinal(&md_ctx, digest, &dgst_len);
208 signature = ECDSA_do_sign(digest, 20, key);
224 if (ECDSA_do_verify(digest, 20, signature, key) != 1)
290 unsigned char digest[20], wrong_digest[20]; local
295 /* fill digest values with some random data */
296 if (!RAND_pseudo_bytes(digest, 20) ||
385 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey))
393 if (ECDSA_verify(0, digest, 2
[all...]
/barrelfish-master/lib/openssl-1.0.0d/test/
H A Decdsatest.c186 unsigned char digest[20]; local
194 /* get the message digest */
197 EVP_DigestFinal(&md_ctx, digest, &dgst_len);
208 signature = ECDSA_do_sign(digest, 20, key);
224 if (ECDSA_do_verify(digest, 20, signature, key) != 1)
290 unsigned char digest[20], wrong_digest[20]; local
295 /* fill digest values with some random data */
296 if (!RAND_pseudo_bytes(digest, 20) ||
385 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey))
393 if (ECDSA_verify(0, digest, 2
[all...]
H A Dhmactest.c88 unsigned char *digest; member in struct:test_st
150 if (strcmp(p,(char *)test[i].digest) != 0)
153 printf("got %s instead of %s\n",p,test[i].digest);
/barrelfish-master/lib/openssl-1.0.0d/crypto/hmac/
H A Dhmactest.c88 unsigned char *digest; member in struct:test_st
150 if (strcmp(p,(char *)test[i].digest) != 0)
153 printf("got %s instead of %s\n",p,test[i].digest);
/barrelfish-master/lib/openssl-1.0.0d/apps/
H A Dts.c85 static int query_command(const char *data, char *digest,
90 static TS_REQ *create_query(BIO *data_bio, char *digest, const EVP_MD *md,
92 static int create_digest(BIO *input, char *digest,
111 static int verify_command(char *data, char *digest, char *queryfile,
114 static TS_VERIFY_CTX *create_verify_ctx(char *data, char *digest,
134 char *digest = NULL; local
193 else if (strcmp(*argv, "-digest") == 0)
196 digest = *++argv;
329 ret = data != NULL && digest != NULL;
333 ret = !query_command(data, digest, m
466 query_command(const char *data, char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert, const char *in, const char *out, int text) argument
533 create_query(BIO *data_bio, char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert) argument
598 create_digest(BIO *input, char *digest, const EVP_MD *md, unsigned char **md_value) argument
961 verify_command(char *data, char *digest, char *queryfile, char *in, int token_in, char *ca_path, char *ca_file, char *untrusted) argument
1010 create_verify_ctx(char *data, char *digest, char *queryfile, char *ca_path, char *ca_file, char *untrusted) argument
[all...]
/barrelfish-master/lib/lwip2/src/netif/ppp/
H A Dchap-new.c55 const struct chap_digest_type *digest,
96 const struct chap_digest_type *digest,
111 /* List of digest types that we know about */
176 ppp_fatal("CHAP digest 0x%x requested but not available",
179 pcb->chap_server.digest = dp;
209 ppp_fatal("CHAP digest 0x%x requested but not available",
212 pcb->chap_client.digest = dp;
264 pcb->chap_server.digest->generate_challenge(pcb, p);
328 ok = (*verifier)(name, pcb->chap_server.name, id, pcb->chap_server.digest,
332 ok = chap_verify_response(pcb, name, pcb->chap_server.name, id, pcb->chap_server.digest,
411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/engine/
H A Deng_openssl.c117 static int openssl_digests(ENGINE *e, const EVP_MD **digest,
345 static int openssl_digests(ENGINE *e, const EVP_MD **digest, argument
348 if(!digest)
354 /* We are being asked for a specific digest */
356 *digest = &test_sha_md;
363 *digest = NULL;
/barrelfish-master/lib/openssl-1.0.0d/engines/
H A De_4758cca.c638 ASN1_OCTET_STRING digest; local
666 sig.digest = &digest;
667 sig.digest->data = (unsigned char*)m;
668 sig.digest->length = m_len;
763 ASN1_OCTET_STRING digest; local
791 sig.digest = &digest;
792 sig.digest->data = (unsigned char*)m;
793 sig.digest
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/
H A Dpk7_lib.c142 if (p7->d.digest->contents != NULL)
143 PKCS7_free(p7->d.digest->contents);
144 p7->d.digest->contents=p7_data;
215 if ((p7->d.digest=PKCS7_DIGEST_new())
217 if (!ASN1_INTEGER_set(p7->d.digest->version,0))
261 /* If the digest is not currently listed, add it */
446 if(!(p7->d.digest->md->parameter = ASN1_TYPE_new()))
451 p7->d.digest->md->parameter->type = V_ASN1_NULL;
452 p7->d.digest->md->algorithm = OBJ_nid2obj(EVP_MD_nid(md));

Completed in 154 milliseconds

123