HomeSort by: relevance | last modified time | path
    Searched defs:digest (Results 1 - 24 of 24) sorted by relevancy

  /src/lib/libc/md/
mdXhl.c 49 unsigned char digest[16]; local in function:WA
59 MDNAME(Final)(digest, ctx);
62 buf[i+i] = hex[(u_int32_t)digest[i] >> 4];
63 buf[i+i+1] = hex[digest[i] & 0x0f];
  /src/sys/opencrypto/
aesxcbcmac.c 129 uint8_t digest[AES_BLOCKSIZE]; local in function:aes_xcbc_mac_result
140 aes_enc(&ctx->r_k1s, ctx->buf, digest, ctx->r_nr);
148 aes_enc(&ctx->r_k1s, ctx->buf, digest, ctx->r_nr);
151 memcpy(addr, digest, sizeof(digest));
cryptosoft.c 930 unsigned char digest[SHA1_DIGEST_LENGTH]; local in function:swcr_newsession
953 axf->Final(digest, (*swd)->sw_ictx);
  /src/tests/crypto/opencrypto/
h_md5.c 44 unsigned char digest[16]; member in struct:__anon247742bf0108
55 { 14, "message digest",
101 if (memcmp(co.mac, tests[i].digest, sizeof(tests[i].digest)))
  /src/tests/lib/libc/hash/
t_sha2.c 148 digest2string(const uint8_t *digest, char *string, size_t len)
151 if (*digest / 16 < 10)
152 *string++ = '0' + *digest / 16;
154 *string++ = 'a' + *digest / 16 - 10;
155 if (*digest % 16 < 10)
156 *string++ = '0' + *digest % 16;
158 *string++ = 'a' + *digest % 16 - 10;
159 ++digest;
175 unsigned char digest[8 + SHA256_DIGEST_LENGTH]; local in function:ATF_TC_BODY
184 SHA256_Final(digest + j, &ctx)
202 unsigned char digest[8 + SHA384_DIGEST_LENGTH]; local in function:ATF_TC_BODY
229 unsigned char digest[8 + SHA512_DIGEST_LENGTH]; local in function:ATF_TC_BODY
    [all...]
  /src/lib/libc/hash/
hashhl.c 67 unsigned char digest[HASH_LEN]; local in function:WA
77 FNPREFIX(Final)(digest, ctx);
80 buf[i+i] = hex[(u_int32_t)digest[i] >> 4];
81 buf[i+i+1] = hex[digest[i] & 0x0f];
  /src/tests/crypto/libcrypto/
t_sha512trunc.c 50 unsigned char *buf, *digest, *p0, *p1; local in function:check
61 digest = buf + 1;
75 REQUIRE(EVP_DigestFinal_ex(ctx, digest, &digestlen1));
81 ATF_CHECK_MSG(memcmp(digest, C->out, digestlen) == 0,
  /src/sys/arch/amd64/stand/prekern/
prng.c 48 uint8_t digest[SHA1_DIGEST_LENGTH]; member in struct:__anon3e15344a0108
84 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:prng_get_entropy_file
113 SHA1Final(digest, &sig);
114 if (memcmp(digest, rndsave->digest, sizeof(digest))) {
160 uint8_t digest[SHA512_DIGEST_LENGTH]; local in function:prng_init
181 SHA512_Final(digest, &ctx);
183 memcpy(rng.state, digest, RNGSTATE_SIZE);
184 memcpy(rng.data, digest + RNGSTATE_SIZE, RNGDATA_SIZE)
190 uint8_t digest[SHA512_DIGEST_LENGTH]; local in function:prng_round
    [all...]
  /src/sys/netinet6/
in6_ifattach.c 136 u_int8_t digest[16]; local in function:get_rand_ifid
148 MD5Final(digest, &ctxt);
150 /* assumes sizeof(digest) > sizeof(ifid) */
151 memcpy(&in6->s6_addr[8], digest, 8);
508 u_int8_t digest[16]; local in function:in6_nigroup
533 MD5Final(digest, &ctxt);
540 memcpy(&sa6->sin6_addr.s6_addr32[3], digest,
  /src/lib/libcrypt/
hmac.c 37 * HASH_LENGTH the size of the digest (20 for SHA1, 16 for MD5)
69 unsigned char *digest)
124 HASH_Final(digest, &context);
133 HASH_Update(&context, digest, HASH_LENGTH);
134 HASH_Final(digest, &context);
249 unsigned char digest[HASH_LENGTH]; local in function:HMAC_KAT
262 HMAC_FUNC(data, strlen(data), key, strlen(key), digest);
264 b2x(&dbuf[2], (sizeof dbuf) - 2, digest, HASH_LENGTH);
290 unsigned char digest[HASH_LENGTH]; local in function:main
305 HMAC_FUNC(data, data_len, key, key_len, digest);
    [all...]
  /src/lib/libresolv/
hmac_link.c 68 * context the context to be used in this digest
175 u_char digest[MD5_LEN]; local in function:dst_hmac_md5_verify
178 MD5Final(digest, ctx);
183 MD5Update(ctx, digest, MD5_LEN);
184 MD5Final(digest, ctx);
187 if (memcmp(digest, signature, MD5_LEN) != 0)
  /src/sys/dev/marvell/
mvcesa.c 431 uint32_t alg, *iv = NULL, digest[512 / 8 / 4], dlen; local in function:mvcesa_process
449 alg, iv, digest, bits, crd->crd_skip, crd->crd_len,
457 ses, alg, ses->ses_hmouter, digest,
458 512 + dlen, 0, dlen, (char *)digest, NULL,
465 memcpy(buf + crd->crd_inject, digest, dlen / 8);
468 digest);
470 memcpy(crp->crp_mac, digest, dlen / 8);
486 uint32_t alg, uint32_t *iv, uint32_t *digest,
603 if (digest != NULL) {
604 /* Read digest */
    [all...]
  /src/sbin/rndctl/
rndctl.c 205 SHA1Final(rs.digest, &s);
284 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:do_load
337 SHA1Final(digest, &s);
338 if (!consttime_memequal(digest, rs.digest, sizeof(digest))) {
  /src/sys/dev/iscsi/
iscsi_rcv.c 186 * -1 if the data digest was incorrect (PDU must be ignored)
193 uint32_t len, digest; local in function:read_pdu_data
256 digest = gen_digest_2(data, len, pad_bytes, pad);
258 if (digest != pdu->pdu_data_digest) {
259 DEBOUT(("Data Digest Error: comp = %08x, rx = %08x\n",
260 digest, pdu->pdu_data_digest));
1063 uint32_t MaxCmdSN, ExpCmdSN, digest; local in function:receive_pdu
1067 digest = gen_digest(&pdu->pdu_hdr, BHS_SIZE);
1068 if (digest != pdu->pdu_hdr.pduh_HeaderDigest) {
1069 DEBOUT(("Header Digest Error: comp = %08x, rx = %08x\n"
    [all...]
  /src/sys/sys/
rndio.h 49 uint8_t digest[SHA1_DIGEST_LENGTH]; member in struct:__anon55e960fb0108
  /src/sys/kern/
kern_veriexec.c 487 u_char *digest; local in function:veriexec_fp_status
490 digest = kmem_zalloc(hash_len, KM_SLEEP);
492 error = veriexec_fp_calc(l, vp, file_lock_state, vfe, digest);
497 if (veriexec_fp_cmp(vfe->ops, vfe->fp, digest) == 0)
503 kmem_free(digest, hash_len);
kern_entropy.c 579 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:entropy_seed
595 SHA1Final(digest, &ctx);
596 CTASSERT(sizeof(seed->digest) == sizeof(digest));
597 if (!consttime_memequal(digest, seed->digest, sizeof(digest))) {
602 explicit_memset(digest, 0, sizeof digest);
  /src/sys/dist/pf/net/
pf_ioctl.c 1218 u_int8_t digest[PF_MD5_DIGEST_LENGTH]; local in function:pf_setup_pfsync_matching
1247 MD5Final(digest, &ctx);
1248 memcpy(pf_status.pf_chksum, digest, sizeof(pf_status.pf_chksum));
  /src/sys/net/
if_spppvar.h 98 char digest[16]; member in struct:schap
if_spppsubr.c 4580 * - RCR+: receive CHAP_RESPONSE containing correct digest
4581 * - RCR-: receive CHAP_RESPONSE containing wrong digest
4597 u_char *value, *name, digest[sizeof(sp->chap.challenge)]; local in function:sppp_chap_input
4665 MD5Final(sp->chap.digest, &ctx);
4666 sp->chap.digest_len = sizeof(sp->chap.digest);
4701 memset(sp->chap.digest, 0, sizeof(sp->chap.digest));
4742 memset(sp->chap.digest, 0, sizeof(sp->chap.digest));
4817 value_len == sizeof(sp->chap.digest)) {
    [all...]
  /src/usr.sbin/syslogd/
tls.c 330 const EVP_MD *digest; local in function:get_fingerprint
367 if (!(digest = (const EVP_MD *) EVP_get_digestbyname(
369 DPRINTF(D_TLS, "unknown digest algorithm %s\n",
373 if (!X509_digest(cert, digest, md, &len)) {
374 DPRINTF(D_TLS, "cannot get %s digest\n", openssl_algname);
379 alg_name = openssl_algname = OBJ_nid2sn(EVP_MD_type(digest));
547 DPRINTF(D_TLS, "cannot get %s digest\n", alg);
  /src/usr.bin/xinstall/
xinstall.c 147 static char *digest; variable in typeref:typename:char *
240 digest = optarg;
333 if (digest) {
335 } else if (strcmp(digest, "none") == 0) {
337 } else if (strcmp(digest, "md5") == 0) {
339 } else if (strcmp(digest, "rmd160") == 0) {
341 } else if (strcmp(digest, "sha1") == 0) {
343 } else if (strcmp(digest, "sha256") == 0) {
345 } else if (strcmp(digest, "sha384") == 0) {
347 } else if (strcmp(digest, "sha512") == 0)
    [all...]
  /src/sbin/ping6/
ping6.c 2464 u_int8_t digest[16]; local in function:nigroup
2490 MD5Final(digest, &ctxt);
2494 bcopy(digest, &in6.s6_addr[12], 4);
  /src/usr.sbin/sysinst/
util.c 1171 uint8_t digest[SHA256_DIGEST_LENGTH]; local in function:entropy_add_manual
1193 SHA256_Final(digest, &ctx);
1199 entropy_write_to_kernel(digest, sizeof digest);

Completed in 31 milliseconds