/netbsd-6-1-5-RELEASE/dist/pppd/pppd/ |
H A D | chap-new.h | 47 * CHAP digest codes. 68 /* Return the digest alg. ID for the most preferred digest type. */ 75 /* Return the bit flag (lsb set) for our most preferred digest type. */ 78 /* Return the bit flag for a given digest algorithm ID. */ 79 #define CHAP_MDTYPE_D(digest) \ 80 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 81 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 82 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 85 /* Can we do the requested digest [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/libntp/ |
H A D | a_md5encrypt.c | 4 * digest support for NTP, MD5 and with OpenSSL more 21 * MD5authencrypt - generate message digest 23 * Returns length of MAC including key ID and digest. 33 u_char digest[EVP_MAX_MD_SIZE]; local 38 * Compute digest of key concatenated with packet. Note: the 39 * key type and digest type have been verified when the key 46 EVP_DigestFinal(&ctx, digest, &len); 47 memmove((u_char *)pkt + length + 4, digest, len); 55 * Returns one if digest valid, zero if invalid. 66 u_char digest[EVP_MAX_MD_SIZ local 97 u_char digest[20]; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/ |
H A D | hash_test.c | 61 unsigned char digest[ISC_SHA512_DIGESTLENGTH]; local 73 isc_sha1_final(&sha1, digest); 74 print_digest(s, "sha1", digest, ISC_SHA1_DIGESTLENGTH/4); 80 isc_sha1_final(&sha1, digest); 81 print_digest(s, "sha1", digest, ISC_SHA1_DIGESTLENGTH/4); 87 isc_sha224_final(digest, &sha224); 88 print_digest(s, "sha224", digest, ISC_SHA224_DIGESTLENGTH/4); 94 isc_sha224_final(digest, &sha224); 95 print_digest(s, "sha224", digest, ISC_SHA224_DIGESTLENGTH/4); 101 isc_md5_final(&md5, digest); [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | digest.c | 52 krb5_digest_alloc(krb5_context context, krb5_digest *digest) argument 58 *digest = NULL; 62 *digest = d; 68 krb5_digest_free(krb5_digest digest) argument 70 if (digest == NULL) 72 free_DigestInit(&digest->init); 73 free_DigestInitReply(&digest->initReply); 74 free_DigestRequest(&digest->request); 75 free_DigestResponse(&digest->response); 76 memset(digest, 82 krb5_digest_set_server_cb(krb5_context context, krb5_digest digest, const char *type, const char *binding) argument 116 krb5_digest_set_type(krb5_context context, krb5_digest digest, const char *type) argument 133 krb5_digest_set_hostname(krb5_context context, krb5_digest digest, const char *hostname) argument 157 krb5_digest_get_server_nonce(krb5_context context, krb5_digest digest) argument 164 krb5_digest_set_server_nonce(krb5_context context, krb5_digest digest, const char *nonce) argument 181 krb5_digest_get_opaque(krb5_context context, krb5_digest digest) argument 188 krb5_digest_set_opaque(krb5_context context, krb5_digest digest, const char *opaque) argument 205 krb5_digest_get_identifier(krb5_context context, krb5_digest digest) argument 214 krb5_digest_set_identifier(krb5_context context, krb5_digest digest, const char *id) argument 412 krb5_digest_init_request(krb5_context context, krb5_digest digest, krb5_realm realm, krb5_ccache ccache) argument 467 krb5_digest_set_client_nonce(krb5_context context, krb5_digest digest, const char *nonce) argument 493 krb5_digest_set_digest(krb5_context context, krb5_digest digest, const char *dgst) argument 511 krb5_digest_set_username(krb5_context context, krb5_digest digest, const char *username) argument 528 krb5_digest_set_authid(krb5_context context, krb5_digest digest, const char *authid) argument 552 krb5_digest_set_authentication_user(krb5_context context, krb5_digest digest, krb5_principal authentication_user) argument 572 krb5_digest_set_realm(krb5_context context, krb5_digest digest, const char *realm) argument 596 krb5_digest_set_method(krb5_context context, krb5_digest digest, const char *method) argument 621 krb5_digest_set_uri(krb5_context context, krb5_digest digest, const char *uri) argument 645 krb5_digest_set_nonceCount(krb5_context context, krb5_digest digest, const char *nonce_count) argument 671 krb5_digest_set_qop(krb5_context context, krb5_digest digest, const char *qop) argument 695 krb5_digest_set_responseData(krb5_context context, krb5_digest digest, const char *response) argument 708 krb5_digest_request(krb5_context context, krb5_digest digest, krb5_realm realm, krb5_ccache ccache) argument 769 krb5_digest_rep_get_status(krb5_context context, krb5_digest digest) argument 776 krb5_digest_get_rsp(krb5_context context, krb5_digest digest) argument 785 krb5_digest_get_tickets(krb5_context context, krb5_digest digest, Ticket **tickets) argument 795 krb5_digest_get_client_binding(krb5_context context, krb5_digest digest, char **type, char **binding) argument 817 krb5_digest_get_session_key(krb5_context context, krb5_digest digest, krb5_data *data) argument [all...] |
/netbsd-6-1-5-RELEASE/external/cddl/osnet/include/ |
H A D | sha2.h | 12 SHA256Final(void *digest, SHA256_CTX *ctx) argument 17 memcpy(digest, &tmp, sizeof(tmp));
|
/netbsd-6-1-5-RELEASE/external/cddl/osnet/sys/sys/ |
H A D | sha2.h | 11 SHA2Final(void *digest, SHA2_CTX *ctx) argument 16 memcpy(digest, &tmp, sizeof(tmp));
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/libraries/liblutil/ |
H A D | hash.c | 71 lutil_HASHFinal( unsigned char *digest, struct lutil_HASHContext *ctx ) argument 75 digest[0] = h & 0xffU; 76 digest[1] = (h>>8) & 0xffU; 77 digest[2] = (h>>16) & 0xffU; 78 digest[3] = (h>>24) & 0xffU;
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | tsp_ek.c | 35 TPM_DIGEST digest; local 49 if ((result |= Trspi_HashFinal(&hashCtx, digest.digest))) 53 hPolicy, FALSE, &digest, &ownerAuth))) 65 if ((result |= Trspi_HashFinal(&hashCtx, digest.digest))) 68 if ((result = obj_policy_validate_auth_oiap(hPolicy, &digest, &ownerAuth))) 74 if ((result |= Trspi_HashFinal(&hashCtx, digest.digest))) 78 &digest, [all...] |
H A D | tsp_get_flags.c | 33 TCPA_DIGEST digest; local 46 if ((result |= Trspi_HashFinal(&hashCtx, digest.digest))) 50 &digest, &auth))) 63 if ((result |= Trspi_HashFinal(&hashCtx, digest.digest))) 66 return obj_policy_validate_auth_oiap(hPolicy, &digest, &auth);
|
H A D | obj_migdata.c | 322 TPM_DIGEST *digest; local 330 count = msaListSize / sizeof(digest->digest); 331 size = count * sizeof(*digest); 340 digest = migdata->msaList.migAuthDigest; 342 memcpy(digest->digest, msaList, sizeof(digest->digest)); 343 msaList += sizeof(digest 362 TPM_DIGEST *digest; local 398 TPM_DIGEST *digest; local 428 obj_migdata_set_msa_digest(TSS_HMIGDATA hMigData, UINT32 digestSize, BYTE *digest) argument 452 obj_migdata_get_msa_digest(TSS_HMIGDATA hMigData, UINT32 *digestSize, BYTE **digest) argument 585 obj_migdata_set_ma_digest(TSS_HMIGDATA hMigData, UINT32 digestSize, BYTE *digest) argument 611 obj_migdata_get_ma_digest(TSS_HMIGDATA hMigData, UINT32 *digestSize, BYTE **digest) argument 663 obj_migdata_set_dest_digest(TSS_HMIGDATA hMigData, UINT32 digestSize, BYTE *digest) argument 689 obj_migdata_get_dest_digest(TSS_HMIGDATA hMigData, UINT32 *digestSize, BYTE **digest) argument 741 obj_migdata_set_src_digest(TSS_HMIGDATA hMigData, UINT32 digestSize, BYTE *digest) argument 767 obj_migdata_get_src_digest(TSS_HMIGDATA hMigData, UINT32 *digestSize, BYTE **digest) argument 1086 obj_migdata_calc_pubkey_digest(UINT32 blobSize, BYTE *blob, TPM_DIGEST *digest) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | digest.c | 1 /* crypto/evp/digest.c */ 153 if (ctx->engine && ctx->digest && (!type || 154 (type && (type->type == ctx->digest->type)))) 185 /* We'll use the ENGINE's private digest definition */ 196 if(!ctx->digest) 202 if (ctx->digest != type) 204 if (ctx->digest && ctx->digest->ctx_size) 206 ctx->digest=type; 242 return ctx->digest [all...] |
H A D | p_verify.c | 81 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) 89 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0) 99 v=ctx->digest->required_pkey_type[i]; 112 if (ctx->digest->verify == NULL) 118 return(ctx->digest->verify(ctx->digest->type,m,m_len,
|
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/lib/isc/include/isc/ |
H A D | hmacmd5.h | 55 isc_hmacmd5_sign(isc_hmacmd5_t *ctx, unsigned char *digest); 58 isc_hmacmd5_verify(isc_hmacmd5_t *ctx, unsigned char *digest); 61 isc_hmacmd5_verify2(isc_hmacmd5_t *ctx, unsigned char *digest, size_t len);
|
/netbsd-6-1-5-RELEASE/tests/lib/libc/hash/ |
H A D | t_sha2.c | 148 digest2string(const uint8_t *digest, char *string, size_t len) argument 151 if (*digest / 16 < 10) 152 *string++ = '0' + *digest / 16; 154 *string++ = 'a' + *digest / 16 - 10; 155 if (*digest % 16 < 10) 156 *string++ = '0' + *digest % 16; 158 *string++ = 'a' + *digest % 16 - 10; 159 ++digest; 175 unsigned char digest[8 + SHA256_DIGEST_LENGTH]; local 184 SHA256_Final(digest 202 unsigned char digest[8 + SHA384_DIGEST_LENGTH]; local 229 unsigned char digest[8 + SHA512_DIGEST_LENGTH]; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/libexec/ |
H A D | Makefile | 8 digest-service \
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
H A D | p12_p8d.c | 66 passlen, p8->digest, 1);
|
/netbsd-6-1-5-RELEASE/dist/ipf/ |
H A D | md5.h | 57 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon824
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/rdata/generic/ |
H A D | dlv_32769.h | 32 unsigned char *digest; member in struct:dns_rdata_dlv
|
H A D | ds_43.h | 34 unsigned char *digest; member in struct:dns_rdata_ds
|
H A D | sshfp_44.h | 34 unsigned char *digest; member in struct:dns_rdata_sshfp
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/libsaslc/dist/src/ |
H A D | mech_crammd5.c | 74 char *digest, *name; local 95 digest = saslc__crypto_hmac_md5_hex((const unsigned char *)passwd, 97 if (digest == NULL) { 101 if ((len = asprintf(&name, "%s %s", authcid, digest)) == -1) { 110 memset(digest, 0, HMAC_MD5_DIGEST_LENGTH); 111 free(digest);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | sha1-pbkdf2.c | 24 u8 *digest) 51 os_memcpy(digest, tmp, SHA1_MAC_LEN); 59 digest[j] ^= tmp2[j]; 86 unsigned char digest[SHA1_MAC_LEN]; local 91 count, digest)) 94 os_memcpy(pos, digest, plen); 22 pbkdf2_sha1_f(const char *passphrase, const char *ssid, size_t ssid_len, int iterations, unsigned int count, u8 *digest) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/libsaslc/dist/test/ |
H A D | t_crypto.c | 151 const char *digest; local 155 digest = saslc__crypto_hmac_md5_hex(hmac_md5_test_cases[i].key, 158 ATF_CHECK_STREQ_MSG(digest, hmac_md5_test_cases[i].out, 160 hmac_md5_test_cases[i].in, hmac_md5_test_cases[i].key, digest, 162 free((void *)digest); 174 const char *digest; local 178 digest = saslc__crypto_md5_hex(md5_test_cases[i].in, 180 ATF_CHECK_STREQ_MSG(digest, md5_test_cases[i].out, 182 md5_test_cases[i].in, digest, md5_test_cases[i].out); 183 free((void *)digest); [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/isc/ |
H A D | hmacmd5.c | 59 isc_hmacmd5_sign(isc_hmacmd5_t *ctx, unsigned char *digest) { argument 60 HMAC_Final(ctx, digest, NULL); 71 * Start HMAC-MD5 process. Initialize an md5 context and digest the key. 117 isc_hmacmd5_sign(isc_hmacmd5_t *ctx, unsigned char *digest) { argument 121 isc_md5_final(&ctx->md5ctx, digest); 129 isc_md5_update(&ctx->md5ctx, digest, ISC_MD5_DIGESTLENGTH); 130 isc_md5_final(&ctx->md5ctx, digest); 137 * compare to the supplied digest. 140 isc_hmacmd5_verify(isc_hmacmd5_t *ctx, unsigned char *digest) { argument 141 return (isc_hmacmd5_verify2(ctx, digest, ISC_MD5_DIGESTLENGT 145 isc_hmacmd5_verify2(isc_hmacmd5_t *ctx, unsigned char *digest, size_t len) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/isc/include/isc/ |
H A D | hmacsha.h | 92 isc_hmacsha1_sign(isc_hmacsha1_t *ctx, unsigned char *digest, size_t len); 95 isc_hmacsha1_verify(isc_hmacsha1_t *ctx, unsigned char *digest, size_t len); 110 isc_hmacsha224_sign(isc_hmacsha224_t *ctx, unsigned char *digest, size_t len); 113 isc_hmacsha224_verify(isc_hmacsha224_t *ctx, unsigned char *digest, size_t len); 128 isc_hmacsha256_sign(isc_hmacsha256_t *ctx, unsigned char *digest, size_t len); 131 isc_hmacsha256_verify(isc_hmacsha256_t *ctx, unsigned char *digest, size_t len); 146 isc_hmacsha384_sign(isc_hmacsha384_t *ctx, unsigned char *digest, size_t len); 149 isc_hmacsha384_verify(isc_hmacsha384_t *ctx, unsigned char *digest, size_t len); 164 isc_hmacsha512_sign(isc_hmacsha512_t *ctx, unsigned char *digest, size_t len); 167 isc_hmacsha512_verify(isc_hmacsha512_t *ctx, unsigned char *digest, size_ [all...] |