/src/lib/libc/md/ |
mdXhl.c | 49 unsigned char digest[16]; local in function:WA 59 MDNAME(Final)(digest, ctx); 62 buf[i+i] = hex[(u_int32_t)digest[i] >> 4]; 63 buf[i+i+1] = hex[digest[i] & 0x0f];
|
/src/sys/opencrypto/ |
aesxcbcmac.c | 129 uint8_t digest[AES_BLOCKSIZE]; local in function:aes_xcbc_mac_result 140 aes_enc(&ctx->r_k1s, ctx->buf, digest, ctx->r_nr); 148 aes_enc(&ctx->r_k1s, ctx->buf, digest, ctx->r_nr); 151 memcpy(addr, digest, sizeof(digest));
|
cryptosoft.c | 930 unsigned char digest[SHA1_DIGEST_LENGTH]; local in function:swcr_newsession 953 axf->Final(digest, (*swd)->sw_ictx);
|
/src/tests/crypto/opencrypto/ |
h_md5.c | 44 unsigned char digest[16]; member in struct:__anon247742bf0108 55 { 14, "message digest", 101 if (memcmp(co.mac, tests[i].digest, sizeof(tests[i].digest)))
|
/src/tests/lib/libc/hash/ |
t_sha2.c | 148 digest2string(const uint8_t *digest, char *string, size_t len) 151 if (*digest / 16 < 10) 152 *string++ = '0' + *digest / 16; 154 *string++ = 'a' + *digest / 16 - 10; 155 if (*digest % 16 < 10) 156 *string++ = '0' + *digest % 16; 158 *string++ = 'a' + *digest % 16 - 10; 159 ++digest; 175 unsigned char digest[8 + SHA256_DIGEST_LENGTH]; local in function:ATF_TC_BODY 184 SHA256_Final(digest + j, &ctx) 202 unsigned char digest[8 + SHA384_DIGEST_LENGTH]; local in function:ATF_TC_BODY 229 unsigned char digest[8 + SHA512_DIGEST_LENGTH]; local in function:ATF_TC_BODY [all...] |
/src/lib/libc/hash/ |
hashhl.c | 67 unsigned char digest[HASH_LEN]; local in function:WA 77 FNPREFIX(Final)(digest, ctx); 80 buf[i+i] = hex[(u_int32_t)digest[i] >> 4]; 81 buf[i+i+1] = hex[digest[i] & 0x0f];
|
/src/tests/crypto/libcrypto/ |
t_sha512trunc.c | 50 unsigned char *buf, *digest, *p0, *p1; local in function:check 61 digest = buf + 1; 75 REQUIRE(EVP_DigestFinal_ex(ctx, digest, &digestlen1)); 81 ATF_CHECK_MSG(memcmp(digest, C->out, digestlen) == 0,
|
/src/sys/arch/amd64/stand/prekern/ |
prng.c | 48 uint8_t digest[SHA1_DIGEST_LENGTH]; member in struct:__anon3e15344a0108 84 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:prng_get_entropy_file 113 SHA1Final(digest, &sig); 114 if (memcmp(digest, rndsave->digest, sizeof(digest))) { 160 uint8_t digest[SHA512_DIGEST_LENGTH]; local in function:prng_init 181 SHA512_Final(digest, &ctx); 183 memcpy(rng.state, digest, RNGSTATE_SIZE); 184 memcpy(rng.data, digest + RNGSTATE_SIZE, RNGDATA_SIZE) 190 uint8_t digest[SHA512_DIGEST_LENGTH]; local in function:prng_round [all...] |
/src/sys/netinet6/ |
in6_ifattach.c | 136 u_int8_t digest[16]; local in function:get_rand_ifid 148 MD5Final(digest, &ctxt); 150 /* assumes sizeof(digest) > sizeof(ifid) */ 151 memcpy(&in6->s6_addr[8], digest, 8); 508 u_int8_t digest[16]; local in function:in6_nigroup 533 MD5Final(digest, &ctxt); 540 memcpy(&sa6->sin6_addr.s6_addr32[3], digest,
|
/src/lib/libcrypt/ |
hmac.c | 37 * HASH_LENGTH the size of the digest (20 for SHA1, 16 for MD5) 69 unsigned char *digest) 124 HASH_Final(digest, &context); 133 HASH_Update(&context, digest, HASH_LENGTH); 134 HASH_Final(digest, &context); 249 unsigned char digest[HASH_LENGTH]; local in function:HMAC_KAT 262 HMAC_FUNC(data, strlen(data), key, strlen(key), digest); 264 b2x(&dbuf[2], (sizeof dbuf) - 2, digest, HASH_LENGTH); 290 unsigned char digest[HASH_LENGTH]; local in function:main 305 HMAC_FUNC(data, data_len, key, key_len, digest); [all...] |
/src/lib/libresolv/ |
hmac_link.c | 68 * context the context to be used in this digest 175 u_char digest[MD5_LEN]; local in function:dst_hmac_md5_verify 178 MD5Final(digest, ctx); 183 MD5Update(ctx, digest, MD5_LEN); 184 MD5Final(digest, ctx); 187 if (memcmp(digest, signature, MD5_LEN) != 0)
|
/src/sys/dev/marvell/ |
mvcesa.c | 431 uint32_t alg, *iv = NULL, digest[512 / 8 / 4], dlen; local in function:mvcesa_process 449 alg, iv, digest, bits, crd->crd_skip, crd->crd_len, 457 ses, alg, ses->ses_hmouter, digest, 458 512 + dlen, 0, dlen, (char *)digest, NULL, 465 memcpy(buf + crd->crd_inject, digest, dlen / 8); 468 digest); 470 memcpy(crp->crp_mac, digest, dlen / 8); 486 uint32_t alg, uint32_t *iv, uint32_t *digest, 603 if (digest != NULL) { 604 /* Read digest */ [all...] |
/src/sbin/rndctl/ |
rndctl.c | 205 SHA1Final(rs.digest, &s); 284 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:do_load 337 SHA1Final(digest, &s); 338 if (!consttime_memequal(digest, rs.digest, sizeof(digest))) {
|
/src/sys/dev/iscsi/ |
iscsi_rcv.c | 186 * -1 if the data digest was incorrect (PDU must be ignored) 193 uint32_t len, digest; local in function:read_pdu_data 256 digest = gen_digest_2(data, len, pad_bytes, pad); 258 if (digest != pdu->pdu_data_digest) { 259 DEBOUT(("Data Digest Error: comp = %08x, rx = %08x\n", 260 digest, pdu->pdu_data_digest)); 1063 uint32_t MaxCmdSN, ExpCmdSN, digest; local in function:receive_pdu 1067 digest = gen_digest(&pdu->pdu_hdr, BHS_SIZE); 1068 if (digest != pdu->pdu_hdr.pduh_HeaderDigest) { 1069 DEBOUT(("Header Digest Error: comp = %08x, rx = %08x\n" [all...] |
/src/sys/sys/ |
rndio.h | 49 uint8_t digest[SHA1_DIGEST_LENGTH]; member in struct:__anon55e960fb0108
|
/src/sys/kern/ |
kern_veriexec.c | 487 u_char *digest; local in function:veriexec_fp_status 490 digest = kmem_zalloc(hash_len, KM_SLEEP); 492 error = veriexec_fp_calc(l, vp, file_lock_state, vfe, digest); 497 if (veriexec_fp_cmp(vfe->ops, vfe->fp, digest) == 0) 503 kmem_free(digest, hash_len);
|
kern_entropy.c | 579 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:entropy_seed 595 SHA1Final(digest, &ctx); 596 CTASSERT(sizeof(seed->digest) == sizeof(digest)); 597 if (!consttime_memequal(digest, seed->digest, sizeof(digest))) { 602 explicit_memset(digest, 0, sizeof digest);
|
/src/sys/dist/pf/net/ |
pf_ioctl.c | 1218 u_int8_t digest[PF_MD5_DIGEST_LENGTH]; local in function:pf_setup_pfsync_matching 1247 MD5Final(digest, &ctx); 1248 memcpy(pf_status.pf_chksum, digest, sizeof(pf_status.pf_chksum));
|
/src/sys/net/ |
if_spppvar.h | 98 char digest[16]; member in struct:schap
|
if_spppsubr.c | 4580 * - RCR+: receive CHAP_RESPONSE containing correct digest 4581 * - RCR-: receive CHAP_RESPONSE containing wrong digest 4597 u_char *value, *name, digest[sizeof(sp->chap.challenge)]; local in function:sppp_chap_input 4665 MD5Final(sp->chap.digest, &ctx); 4666 sp->chap.digest_len = sizeof(sp->chap.digest); 4701 memset(sp->chap.digest, 0, sizeof(sp->chap.digest)); 4742 memset(sp->chap.digest, 0, sizeof(sp->chap.digest)); 4817 value_len == sizeof(sp->chap.digest)) { [all...] |
/src/usr.sbin/syslogd/ |
tls.c | 330 const EVP_MD *digest; local in function:get_fingerprint 367 if (!(digest = (const EVP_MD *) EVP_get_digestbyname( 369 DPRINTF(D_TLS, "unknown digest algorithm %s\n", 373 if (!X509_digest(cert, digest, md, &len)) { 374 DPRINTF(D_TLS, "cannot get %s digest\n", openssl_algname); 379 alg_name = openssl_algname = OBJ_nid2sn(EVP_MD_type(digest)); 547 DPRINTF(D_TLS, "cannot get %s digest\n", alg);
|
/src/usr.bin/xinstall/ |
xinstall.c | 147 static char *digest; variable in typeref:typename:char * 240 digest = optarg; 333 if (digest) { 335 } else if (strcmp(digest, "none") == 0) { 337 } else if (strcmp(digest, "md5") == 0) { 339 } else if (strcmp(digest, "rmd160") == 0) { 341 } else if (strcmp(digest, "sha1") == 0) { 343 } else if (strcmp(digest, "sha256") == 0) { 345 } else if (strcmp(digest, "sha384") == 0) { 347 } else if (strcmp(digest, "sha512") == 0) [all...] |
/src/sbin/ping6/ |
ping6.c | 2464 u_int8_t digest[16]; local in function:nigroup 2490 MD5Final(digest, &ctxt); 2494 bcopy(digest, &in6.s6_addr[12], 4);
|
/src/usr.sbin/sysinst/ |
util.c | 1171 uint8_t digest[SHA256_DIGEST_LENGTH]; local in function:entropy_add_manual 1193 SHA256_Final(digest, &ctx); 1199 entropy_write_to_kernel(digest, sizeof digest);
|