/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavformat/ |
H A D | httpauth.c | 43 DigestParams *digest = &state->digest_params; local 49 *dest = digest->nonce; 50 *dest_len = sizeof(digest->nonce); 52 *dest = digest->opaque; 53 *dest_len = sizeof(digest->opaque); 55 *dest = digest->algorithm; 56 *dest_len = sizeof(digest->algorithm); 58 *dest = digest->qop; 59 *dest_len = sizeof(digest->qop); 66 DigestParams *digest local 134 DigestParams *digest = &state->digest_params; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/ |
H A D | md5.h | 50 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon20268
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/ |
H A D | chap-new.h | 45 * CHAP digest codes. 66 /* Return the digest alg. ID for the most preferred digest type. */ 73 /* Return the bit flag (lsb set) for our most preferred digest type. */ 76 /* Return the bit flag for a given digest algorithm ID. */ 77 #define CHAP_MDTYPE_D(digest) \ 78 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 79 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 80 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 83 /* Can we do the requested digest [all...] |
H A D | md5.h | 57 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon5053
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/integrity/ima/ |
H A D | ima_queue.c | 41 /* lookup up the digest value in the hash table, and return the entry */ 52 rc = memcmp(qe->entry->digest, digest_value, IMA_DIGEST_SIZE); 83 key = ima_hash_key(entry->digest); 107 u8 digest[IMA_DIGEST_SIZE]; local 114 memcpy(digest, entry->digest, sizeof digest); 115 if (ima_lookup_digest_entry(digest)) { 129 memset(digest, 0xff, sizeof digest); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/ |
H A D | httpauth.c | 43 DigestParams *digest = &state->digest_params; local 49 *dest = digest->nonce; 50 *dest_len = sizeof(digest->nonce); 52 *dest = digest->opaque; 53 *dest_len = sizeof(digest->opaque); 55 *dest = digest->algorithm; 56 *dest_len = sizeof(digest->algorithm); 58 *dest = digest->qop; 59 *dest_len = sizeof(digest->qop); 61 *dest = digest 69 DigestParams *digest = &state->digest_params; local 141 DigestParams *digest = &state->digest_params; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | digest.c | 1 /* crypto/evp/digest.c */ 148 if (ctx->engine && ctx->digest && (!type || 149 (type && (type->type == ctx->digest->type)))) 179 /* We'll use the ENGINE's private digest definition */ 190 if(!ctx->digest) 196 if (ctx->digest != type) 198 if (ctx->digest && ctx->digest->ctx_size) 200 ctx->digest=type; 207 return ctx->digest [all...] |
H A D | p_verify.c | 75 v=ctx->digest->required_pkey_type[i]; 92 if (ctx->digest->verify == NULL) 98 return(ctx->digest->verify(ctx->digest->type,m,m_len,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | digest.c | 1 /* crypto/evp/digest.c */ 167 if (ctx->engine && ctx->digest && (!type || 170 ctx->digest->type)))) 197 /* We'll use the ENGINE's private digest definition */ 207 if (!ctx->digest) { 211 type = ctx->digest; 214 if (ctx->digest != type) { 215 if (ctx->digest && ctx->digest->ctx_size) { 219 ctx->digest [all...] |
H A D | p_verify.c | 81 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) { 88 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0) 97 v = ctx->digest->required_pkey_type[i]; 109 if (ctx->digest->verify == NULL) { 114 return (ctx->digest->verify(ctx->digest->type, m, m_len,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | digest.c | 1 /* crypto/evp/digest.c */ 167 if (ctx->engine && ctx->digest && (!type || 170 ctx->digest->type)))) 197 /* We'll use the ENGINE's private digest definition */ 207 if (!ctx->digest) { 211 type = ctx->digest; 214 if (ctx->digest != type) { 215 if (ctx->digest && ctx->digest->ctx_size) { 219 ctx->digest [all...] |
H A D | p_verify.c | 81 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) { 88 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0) 97 v = ctx->digest->required_pkey_type[i]; 109 if (ctx->digest->verify == NULL) { 114 return (ctx->digest->verify(ctx->digest->type, m, m_len,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | testmgr.h | 33 char *digest; member in struct:hash_testvec 95 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 100 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 105 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 108 .plaintext = "message digest", 110 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" 115 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" 122 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" 128 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" 140 .digest [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_p8d.c | 69 passlen, p8->digest, 1);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | ripemd.h | 14 static void Transform(word32 *digest, const word32 *data); 23 static void Transform(word32 *digest, const word32 *data); 33 static void Transform(word32 *digest, const word32 *data); 43 static void Transform(word32 *digest, const word32 *data);
|
H A D | trunhash.h | 13 void TruncatedFinal(byte *digest, size_t digestSize) {} argument 14 bool TruncatedVerify(const byte *digest, size_t digestLength) {return true;} argument 34 void TruncatedFinal(byte *digest, size_t digestSize) argument 35 {m_hm.TruncatedFinal(digest, digestSize);} 36 bool TruncatedVerify(const byte *digest, size_t digestLength) argument 37 {return m_hm.TruncatedVerify(digest, digestLength);}
|
H A D | sha.h | 13 static void CRYPTOPP_API Transform(word32 *digest, const word32 *data); 27 static void CRYPTOPP_API Transform(word32 *digest, const word32 *data); 39 static void CRYPTOPP_API Transform(word32 *digest, const word32 *data) {SHA256::Transform(digest, data);} argument 48 static void CRYPTOPP_API Transform(word64 *digest, const word64 *data); 57 static void CRYPTOPP_API Transform(word64 *digest, const word64 *data) {SHA512::Transform(digest, data);} argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | cryptohash.h | 9 void sha_transform(__u32 *digest, const char *data, __u32 *W);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_p8d.c | 66 passlen, p8->digest, 1);
|
H A D | p12_p8e.c | 84 M_ASN1_OCTET_STRING_free(p8->digest); 85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), 87 if(!p8->digest) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/include/libavutil/ |
H A D | sha1.h | 32 void av_sha1_final(struct AVSHA1* context, uint8_t digest[20]);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_p8d.c | 69 passlen, p8->digest, 1);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/lib/ |
H A D | sha1.c | 26 * @digest: 160 bit digest to update 30 * This function generates a SHA1 digest for a single 512-bit block. 31 * Be warned, it does not handle padding and message digest, do not 32 * confuse it with the full FIPS 180-1 digest algorithm for variable 39 void sha_transform(__u32 *digest, const char *in, __u32 *W) argument 49 a = digest[0]; 50 b = digest[1]; 51 c = digest[2]; 52 d = digest[ [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | curl_sasl.c | 228 unsigned char digest[MD5_DIGEST_LEN]; local 234 /* Compute the digest using the password as the key */ 241 /* Update the digest with the given challenge */ 246 /* Finalise the digest */ 247 Curl_HMAC_final(ctxt, digest); 252 userp, digest[0], digest[1], digest[2], digest[3], digest[ 361 unsigned char digest[MD5_DIGEST_LEN]; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | hash-common.c | 32 /* Run a selftest for hash algorithm ALGO. If the resulting digest 51 unsigned char *digest; local 54 return "digest size does not match expected size"; 84 digest = _gcry_md_read (hd, algo); 86 if ( memcmp (digest, expect, expectlen) ) 87 result = "digest mismatch";
|