| /src/tests/lib/libc/hash/ | 
| t_sha2.c | 148 digest2string(const uint8_t *digest, char *string, size_t len) 151 		if (*digest / 16 < 10)
 152 			*string++ = '0' + *digest / 16;
 154 			*string++ = 'a' + *digest / 16 - 10;
 155 		if (*digest % 16 < 10)
 156 			*string++ = '0' + *digest % 16;
 158 			*string++ = 'a' + *digest % 16 - 10;
 159 		++digest;
 175 	unsigned char digest[8 + SHA256_DIGEST_LENGTH];  local in function:ATF_TC_BODY
 184 			SHA256_Final(digest + j, &ctx)
 202  unsigned char digest[8 + SHA384_DIGEST_LENGTH];  local in function:ATF_TC_BODY
 229  unsigned char digest[8 + SHA512_DIGEST_LENGTH];  local in function:ATF_TC_BODY
 [all...]
 | 
| /src/sys/netinet/ | 
| sctp_hashdriver.c | 60  * passing a two pointers and two lengths, returning a digest pointer 70     unsigned char *digest)
 131 	MD5Final(digest, &context);		/* finish up 1st pass */
 136 	SHA1Final(digest, &context);		/* finish up 1st pass */
 145 	MD5Update(&context, digest, 16);	/* then results of 1st hash */
 146 	MD5Final(digest, &context);		/* finish up 2nd pass */
 150 	SHA1Update(&context, digest, 20);	/* then results of 1st hash */
 151 	SHA1Final(digest, &context);		/* finish up 2nd pass */
 156     unsigned char *digest)
 234 	MD5Final(digest, &context);		/* finish up 1st pass *
 [all...]
 | 
| /src/lib/libcrypt/ | 
| hmac.c | 37  * HASH_LENGTH the size of the digest (20 for SHA1, 16 for MD5) 69 	   unsigned char *digest)
 124     HASH_Final(digest, &context);
 133     HASH_Update(&context, digest, HASH_LENGTH);
 134     HASH_Final(digest, &context);
 249     unsigned char digest[HASH_LENGTH];  local in function:HMAC_KAT
 262 	HMAC_FUNC(data, strlen(data), key, strlen(key), digest);
 264 	b2x(&dbuf[2], (sizeof dbuf) - 2, digest, HASH_LENGTH);
 290     unsigned char digest[HASH_LENGTH];  local in function:main
 305     HMAC_FUNC(data, data_len, key, key_len, digest);
 [all...]
 | 
| /src/sys/arch/amd64/stand/prekern/ | 
| prng.c | 48 	uint8_t digest[SHA1_DIGEST_LENGTH];  member in struct:__anon3e15344a0108 84 	uint8_t digest[SHA1_DIGEST_LENGTH];  local in function:prng_get_entropy_file
 113 		SHA1Final(digest, &sig);
 114 		if (memcmp(digest, rndsave->digest, sizeof(digest))) {
 160 	uint8_t digest[SHA512_DIGEST_LENGTH];  local in function:prng_init
 181 	SHA512_Final(digest, &ctx);
 183 	memcpy(rng.state, digest, RNGSTATE_SIZE);
 184 	memcpy(rng.data, digest + RNGSTATE_SIZE, RNGDATA_SIZE)
 190  uint8_t digest[SHA512_DIGEST_LENGTH];  local in function:prng_round
 [all...]
 | 
| /src/etc/rc.d/ | 
| iscsid_volumes | 21 	while read host target digest auth user alias; do 26 			case $digest in
 29 			case $digest in
 95 	while read host target digest auth user alias; do
 
 | 
| /src/lib/libc/hash/ | 
| hmac.c | 119     void *digest, size_t dlen) 145 	p = dlen >= h->digsize ? digest : d;
 146 	if (p != digest) {
 147 		memcpy(p, digest, dlen);
 157 	(*h->update)(c, digest, (unsigned int)h->digsize);
 160 	if (p != digest)
 161 		memcpy(digest, p, dlen);
 
 | 
| hashhl.c | 67 	unsigned char digest[HASH_LEN];  local in function:WA 77 	FNPREFIX(Final)(digest, ctx);
 80 		buf[i+i] = hex[(u_int32_t)digest[i] >> 4];
 81 		buf[i+i+1] = hex[digest[i] & 0x0f];
 
 | 
| /src/lib/libc/md/ | 
| mdXhl.c | 49 	unsigned char digest[16];  local in function:WA 59 	MDNAME(Final)(digest, ctx);
 62 		buf[i+i] = hex[(u_int32_t)digest[i] >> 4];
 63 		buf[i+i+1] = hex[digest[i] & 0x0f];
 
 | 
| /src/sys/opencrypto/ | 
| aesxcbcmac.c | 129 	uint8_t digest[AES_BLOCKSIZE];  local in function:aes_xcbc_mac_result 140 		aes_enc(&ctx->r_k1s, ctx->buf, digest, ctx->r_nr);
 148 		aes_enc(&ctx->r_k1s, ctx->buf, digest, ctx->r_nr);
 151 	memcpy(addr, digest, sizeof(digest));
 
 | 
| gmac.c | 172 AES_GMAC_Final(uint8_t digest[GMAC_DIGEST_LEN], AES_GMAC_CTX *ctx) 181 	d = digest;
 
 | 
| /src/tests/crypto/opencrypto/ | 
| h_md5.c | 44 	unsigned char digest[16];  member in struct:__anon247742bf0108 55 	{ 14, "message digest",
 101 		if (memcmp(co.mac, tests[i].digest, sizeof(tests[i].digest)))
 
 | 
| /src/lib/libc/hash/md2/ | 
| md2.c | 159 MD2Final(unsigned char digest[16], MD2_CTX *context) 163 	_DIAGASSERT(digest != 0);
 175 	/* copy out final digest */
 176 	memcpy(digest, &context->X[0], (size_t)16);
 
 | 
| /src/tests/crypto/libcrypto/ | 
| t_sha512trunc.c | 50 	unsigned char *buf, *digest, *p0, *p1;  local in function:check 61 	digest = buf + 1;
 75 		REQUIRE(EVP_DigestFinal_ex(ctx, digest, &digestlen1));
 81 		ATF_CHECK_MSG(memcmp(digest, C->out, digestlen) == 0,
 
 | 
| /src/lib/libresolv/ | 
| hmac_link.c | 68  *     context   the context to be used in this digest 175 		u_char digest[MD5_LEN];  local in function:dst_hmac_md5_verify
 178 		MD5Final(digest, ctx);
 183 		MD5Update(ctx, digest, MD5_LEN);
 184 		MD5Final(digest, ctx);
 187 		if (memcmp(digest, signature, MD5_LEN) != 0)
 
 | 
| /src/sys/dev/marvell/ | 
| mvcesa.c | 431 			uint32_t alg, *iv = NULL, digest[512 / 8 / 4], dlen;  local in function:mvcesa_process 449 			    alg, iv, digest, bits, crd->crd_skip, crd->crd_len,
 457 				    ses, alg, ses->ses_hmouter, digest,
 458 				    512 + dlen, 0, dlen, (char *)digest, NULL,
 465 				memcpy(buf + crd->crd_inject, digest, dlen / 8);
 468 				    digest);
 470 				memcpy(crp->crp_mac, digest, dlen / 8);
 486 		      uint32_t alg, uint32_t *iv, uint32_t *digest,
 603 	if (digest != NULL) {
 604 		/* Read digest */
 [all...]
 | 
| /src/sbin/rndctl/ | 
| rndctl.c | 205 	SHA1Final(rs.digest, &s); 284 	uint8_t digest[SHA1_DIGEST_LENGTH];  local in function:do_load
 337 	SHA1Final(digest, &s);
 338 	if (!consttime_memequal(digest, rs.digest, sizeof(digest))) {
 
 | 
| /src/sys/netinet6/ | 
| in6_ifattach.c | 136 	u_int8_t digest[16];  local in function:get_rand_ifid 148 	MD5Final(digest, &ctxt);
 150 	/* assumes sizeof(digest) > sizeof(ifid) */
 151 	memcpy(&in6->s6_addr[8], digest, 8);
 508 	u_int8_t digest[16];  local in function:in6_nigroup
 533 	MD5Final(digest, &ctxt);
 540 	memcpy(&sa6->sin6_addr.s6_addr32[3], digest,
 
 | 
| /src/common/lib/libc/hash/sha2/ | 
| sha2.c | 515 SHA224_256_Final(uint8_t digest[], SHA256_CTX *context, size_t len) 520 	/* If no digest buffer is passed, we don't bother doing this: */
 521 	if (digest != NULL) {
 564 			be32enc(digest + 4 * i, context->state[i]);
 575 SHA256_Final(uint8_t digest[SHA256_DIGEST_LENGTH], SHA256_CTX *context)
 577 	return SHA224_256_Final(digest, context, SHA256_DIGEST_LENGTH);
 609 SHA224_Final(uint8_t digest[SHA224_DIGEST_LENGTH], SHA224_CTX *context)
 611 	return SHA224_256_Final(digest, (SHA256_CTX *)context,
 902 SHA512_Final(uint8_t digest[SHA512_DIGEST_LENGTH], SHA512_CTX *context)
 906 	/* If no digest buffer is passed, we don't bother doing this: *
 [all...]
 | 
| /src/usr.bin/xinstall/ | 
| xinstall.c | 147 static char	*digest;  variable in typeref:typename:char * 240 			digest = optarg;
 333 	if (digest) {
 335 		} else if (strcmp(digest, "none") == 0) {
 337 		} else if (strcmp(digest, "md5") == 0) {
 339 		} else if (strcmp(digest, "rmd160") == 0) {
 341 		} else if (strcmp(digest, "sha1") == 0) {
 343 		} else if (strcmp(digest, "sha256") == 0) {
 345 		} else if (strcmp(digest, "sha384") == 0) {
 347 		} else if (strcmp(digest, "sha512") == 0)
 [all...]
 | 
| /src/sys/crypto/blake2/ | 
| blake2s.c | 162 	/* Record the digest length.  */ 174 	 * Set the parameters.  We support only variable digest and key
 232 blake2s_final(struct blake2s *B, void *digest)
 234 	uint8_t *d = digest;
 265 blake2s(void *digest, size_t dlen, const void *key, size_t keylen,
 272 	blake2s_final(&ctx, digest);
 
 | 
| /src/sys/sys/ | 
| rndio.h | 49 	uint8_t digest[SHA1_DIGEST_LENGTH];  member in struct:__anon55e960fb0108 
 | 
| /src/sys/dev/iscsi/ | 
| iscsi_rcv.c | 186  *                -1 if the data digest was incorrect (PDU must be ignored) 193 	uint32_t len, digest;  local in function:read_pdu_data
 256 		digest = gen_digest_2(data, len, pad_bytes, pad);
 258 		if (digest != pdu->pdu_data_digest) {
 259 			DEBOUT(("Data Digest Error: comp = %08x, rx = %08x\n",
 260 					digest, pdu->pdu_data_digest));
 1063 	uint32_t MaxCmdSN, ExpCmdSN, digest;  local in function:receive_pdu
 1067 		digest = gen_digest(&pdu->pdu_hdr, BHS_SIZE);
 1068 		if (digest != pdu->pdu_hdr.pduh_HeaderDigest) {
 1069 			DEBOUT(("Header Digest Error: comp = %08x, rx = %08x\n"
 [all...]
 | 
| /src/common/lib/libc/md/ | 
| md4c.c | 4  * This file is derived from the RSA Data Security, Inc. MD4 Message-Digest 13  * is identified as the "RSA Data Security, Inc. MD4 Message-Digest
 19  * Security, Inc. MD4 Message-Digest Algorithm" in all material
 147  * MD4 block update operation.  Continues an MD4 message-digest
 189  * MD4 finalization.  Ends an MD4 message-digest operation, writing the
 190  * message digest and zeroing the context.
 193 MD4Final (unsigned char digest[16],	/* message digest */
 199 	_DIAGASSERT(digest != 0);
 213 	/* Store state in digest */
 [all...]
 | 
| /src/sys/net/ | 
| if_spppvar.h | 98 	char	 digest[16];  member in struct:schap 
 | 
| /src/sys/kern/ | 
| kern_entropy.c | 579 	uint8_t digest[SHA1_DIGEST_LENGTH];  local in function:entropy_seed 595 	SHA1Final(digest, &ctx);
 596 	CTASSERT(sizeof(seed->digest) == sizeof(digest));
 597 	if (!consttime_memequal(digest, seed->digest, sizeof(digest))) {
 602 	explicit_memset(digest, 0, sizeof digest);
 
 |