Searched refs:digest (Results 1 - 25 of 349) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavformat/
H A Dhttpauth.c43 DigestParams *digest = &state->digest_params; local
49 *dest = digest->nonce;
50 *dest_len = sizeof(digest->nonce);
52 *dest = digest->opaque;
53 *dest_len = sizeof(digest->opaque);
55 *dest = digest->algorithm;
56 *dest_len = sizeof(digest->algorithm);
58 *dest = digest->qop;
59 *dest_len = sizeof(digest->qop);
66 DigestParams *digest local
134 DigestParams *digest = &state->digest_params; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/
H A Dmd5.h50 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon20268
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/
H A Dchap-new.h45 * CHAP digest codes.
66 /* Return the digest alg. ID for the most preferred digest type. */
73 /* Return the bit flag (lsb set) for our most preferred digest type. */
76 /* Return the bit flag for a given digest algorithm ID. */
77 #define CHAP_MDTYPE_D(digest) \
78 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \
79 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \
80 ((digest) == CHAP_MD5)? MDTYPE_MD5: \
83 /* Can we do the requested digest
[all...]
H A Dmd5.h57 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon5053
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/integrity/ima/
H A Dima_queue.c41 /* lookup up the digest value in the hash table, and return the entry */
52 rc = memcmp(qe->entry->digest, digest_value, IMA_DIGEST_SIZE);
83 key = ima_hash_key(entry->digest);
107 u8 digest[IMA_DIGEST_SIZE]; local
114 memcpy(digest, entry->digest, sizeof digest);
115 if (ima_lookup_digest_entry(digest)) {
129 memset(digest, 0xff, sizeof digest);
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/
H A Dhttpauth.c43 DigestParams *digest = &state->digest_params; local
49 *dest = digest->nonce;
50 *dest_len = sizeof(digest->nonce);
52 *dest = digest->opaque;
53 *dest_len = sizeof(digest->opaque);
55 *dest = digest->algorithm;
56 *dest_len = sizeof(digest->algorithm);
58 *dest = digest->qop;
59 *dest_len = sizeof(digest->qop);
61 *dest = digest
69 DigestParams *digest = &state->digest_params; local
141 DigestParams *digest = &state->digest_params; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/
H A Ddigest.c1 /* crypto/evp/digest.c */
148 if (ctx->engine && ctx->digest && (!type ||
149 (type && (type->type == ctx->digest->type))))
179 /* We'll use the ENGINE's private digest definition */
190 if(!ctx->digest)
196 if (ctx->digest != type)
198 if (ctx->digest && ctx->digest->ctx_size)
200 ctx->digest=type;
207 return ctx->digest
[all...]
H A Dp_verify.c75 v=ctx->digest->required_pkey_type[i];
92 if (ctx->digest->verify == NULL)
98 return(ctx->digest->verify(ctx->digest->type,m,m_len,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/
H A Ddigest.c1 /* crypto/evp/digest.c */
167 if (ctx->engine && ctx->digest && (!type ||
170 ctx->digest->type))))
197 /* We'll use the ENGINE's private digest definition */
207 if (!ctx->digest) {
211 type = ctx->digest;
214 if (ctx->digest != type) {
215 if (ctx->digest && ctx->digest->ctx_size) {
219 ctx->digest
[all...]
H A Dp_verify.c81 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) {
88 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0)
97 v = ctx->digest->required_pkey_type[i];
109 if (ctx->digest->verify == NULL) {
114 return (ctx->digest->verify(ctx->digest->type, m, m_len,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/
H A Ddigest.c1 /* crypto/evp/digest.c */
167 if (ctx->engine && ctx->digest && (!type ||
170 ctx->digest->type))))
197 /* We'll use the ENGINE's private digest definition */
207 if (!ctx->digest) {
211 type = ctx->digest;
214 if (ctx->digest != type) {
215 if (ctx->digest && ctx->digest->ctx_size) {
219 ctx->digest
[all...]
H A Dp_verify.c81 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) {
88 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0)
97 v = ctx->digest->required_pkey_type[i];
109 if (ctx->digest->verify == NULL) {
114 return (ctx->digest->verify(ctx->digest->type, m, m_len,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/
H A Dtestmgr.h33 char *digest; member in struct:hash_testvec
95 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31"
100 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46"
105 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52"
108 .plaintext = "message digest",
110 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8"
115 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd"
122 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35"
128 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19"
140 .digest
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/
H A Dp12_p8d.c69 passlen, p8->digest, 1);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dripemd.h14 static void Transform(word32 *digest, const word32 *data);
23 static void Transform(word32 *digest, const word32 *data);
33 static void Transform(word32 *digest, const word32 *data);
43 static void Transform(word32 *digest, const word32 *data);
H A Dtrunhash.h13 void TruncatedFinal(byte *digest, size_t digestSize) {} argument
14 bool TruncatedVerify(const byte *digest, size_t digestLength) {return true;} argument
34 void TruncatedFinal(byte *digest, size_t digestSize) argument
35 {m_hm.TruncatedFinal(digest, digestSize);}
36 bool TruncatedVerify(const byte *digest, size_t digestLength) argument
37 {return m_hm.TruncatedVerify(digest, digestLength);}
H A Dsha.h13 static void CRYPTOPP_API Transform(word32 *digest, const word32 *data);
27 static void CRYPTOPP_API Transform(word32 *digest, const word32 *data);
39 static void CRYPTOPP_API Transform(word32 *digest, const word32 *data) {SHA256::Transform(digest, data);} argument
48 static void CRYPTOPP_API Transform(word64 *digest, const word64 *data);
57 static void CRYPTOPP_API Transform(word64 *digest, const word64 *data) {SHA512::Transform(digest, data);} argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Dcryptohash.h9 void sha_transform(__u32 *digest, const char *data, __u32 *W);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dp12_p8d.c66 passlen, p8->digest, 1);
H A Dp12_p8e.c84 M_ASN1_OCTET_STRING_free(p8->digest);
85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO),
87 if(!p8->digest) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/include/libavutil/
H A Dsha1.h32 void av_sha1_final(struct AVSHA1* context, uint8_t digest[20]);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/
H A Dp12_p8d.c69 passlen, p8->digest, 1);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/lib/
H A Dsha1.c26 * @digest: 160 bit digest to update
30 * This function generates a SHA1 digest for a single 512-bit block.
31 * Be warned, it does not handle padding and message digest, do not
32 * confuse it with the full FIPS 180-1 digest algorithm for variable
39 void sha_transform(__u32 *digest, const char *in, __u32 *W) argument
49 a = digest[0];
50 b = digest[1];
51 c = digest[2];
52 d = digest[
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Dcurl_sasl.c228 unsigned char digest[MD5_DIGEST_LEN]; local
234 /* Compute the digest using the password as the key */
241 /* Update the digest with the given challenge */
246 /* Finalise the digest */
247 Curl_HMAC_final(ctxt, digest);
252 userp, digest[0], digest[1], digest[2], digest[3], digest[
361 unsigned char digest[MD5_DIGEST_LEN]; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/
H A Dhash-common.c32 /* Run a selftest for hash algorithm ALGO. If the resulting digest
51 unsigned char *digest; local
54 return "digest size does not match expected size";
84 digest = _gcry_md_read (hd, algo);
86 if ( memcmp (digest, expect, expectlen) )
87 result = "digest mismatch";

Completed in 284 milliseconds

1234567891011>>