HomeSort by: relevance | last modified time | path
    Searched refs:digest (Results 1 - 25 of 36) sorted by relevancy

1 2

  /src/tests/lib/libc/hash/
t_sha2.c 148 digest2string(const uint8_t *digest, char *string, size_t len)
151 if (*digest / 16 < 10)
152 *string++ = '0' + *digest / 16;
154 *string++ = 'a' + *digest / 16 - 10;
155 if (*digest % 16 < 10)
156 *string++ = '0' + *digest % 16;
158 *string++ = 'a' + *digest % 16 - 10;
159 ++digest;
175 unsigned char digest[8 + SHA256_DIGEST_LENGTH]; local in function:ATF_TC_BODY
184 SHA256_Final(digest + j, &ctx)
202 unsigned char digest[8 + SHA384_DIGEST_LENGTH]; local in function:ATF_TC_BODY
229 unsigned char digest[8 + SHA512_DIGEST_LENGTH]; local in function:ATF_TC_BODY
    [all...]
  /src/sys/netinet/
sctp_hashdriver.c 60 * passing a two pointers and two lengths, returning a digest pointer
70 unsigned char *digest)
131 MD5Final(digest, &context); /* finish up 1st pass */
136 SHA1Final(digest, &context); /* finish up 1st pass */
145 MD5Update(&context, digest, 16); /* then results of 1st hash */
146 MD5Final(digest, &context); /* finish up 2nd pass */
150 SHA1Update(&context, digest, 20); /* then results of 1st hash */
151 SHA1Final(digest, &context); /* finish up 2nd pass */
156 unsigned char *digest)
234 MD5Final(digest, &context); /* finish up 1st pass *
    [all...]
  /src/lib/libcrypt/
hmac.c 37 * HASH_LENGTH the size of the digest (20 for SHA1, 16 for MD5)
69 unsigned char *digest)
124 HASH_Final(digest, &context);
133 HASH_Update(&context, digest, HASH_LENGTH);
134 HASH_Final(digest, &context);
249 unsigned char digest[HASH_LENGTH]; local in function:HMAC_KAT
262 HMAC_FUNC(data, strlen(data), key, strlen(key), digest);
264 b2x(&dbuf[2], (sizeof dbuf) - 2, digest, HASH_LENGTH);
290 unsigned char digest[HASH_LENGTH]; local in function:main
305 HMAC_FUNC(data, data_len, key, key_len, digest);
    [all...]
  /src/sys/arch/amd64/stand/prekern/
prng.c 48 uint8_t digest[SHA1_DIGEST_LENGTH]; member in struct:__anon3e15344a0108
84 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:prng_get_entropy_file
113 SHA1Final(digest, &sig);
114 if (memcmp(digest, rndsave->digest, sizeof(digest))) {
160 uint8_t digest[SHA512_DIGEST_LENGTH]; local in function:prng_init
181 SHA512_Final(digest, &ctx);
183 memcpy(rng.state, digest, RNGSTATE_SIZE);
184 memcpy(rng.data, digest + RNGSTATE_SIZE, RNGDATA_SIZE)
190 uint8_t digest[SHA512_DIGEST_LENGTH]; local in function:prng_round
    [all...]
  /src/etc/rc.d/
iscsid_volumes 21 while read host target digest auth user alias; do
26 case $digest in
29 case $digest in
95 while read host target digest auth user alias; do
  /src/lib/libc/hash/
hmac.c 119 void *digest, size_t dlen)
145 p = dlen >= h->digsize ? digest : d;
146 if (p != digest) {
147 memcpy(p, digest, dlen);
157 (*h->update)(c, digest, (unsigned int)h->digsize);
160 if (p != digest)
161 memcpy(digest, p, dlen);
hashhl.c 67 unsigned char digest[HASH_LEN]; local in function:WA
77 FNPREFIX(Final)(digest, ctx);
80 buf[i+i] = hex[(u_int32_t)digest[i] >> 4];
81 buf[i+i+1] = hex[digest[i] & 0x0f];
  /src/lib/libc/md/
mdXhl.c 49 unsigned char digest[16]; local in function:WA
59 MDNAME(Final)(digest, ctx);
62 buf[i+i] = hex[(u_int32_t)digest[i] >> 4];
63 buf[i+i+1] = hex[digest[i] & 0x0f];
  /src/sys/opencrypto/
aesxcbcmac.c 129 uint8_t digest[AES_BLOCKSIZE]; local in function:aes_xcbc_mac_result
140 aes_enc(&ctx->r_k1s, ctx->buf, digest, ctx->r_nr);
148 aes_enc(&ctx->r_k1s, ctx->buf, digest, ctx->r_nr);
151 memcpy(addr, digest, sizeof(digest));
gmac.c 172 AES_GMAC_Final(uint8_t digest[GMAC_DIGEST_LEN], AES_GMAC_CTX *ctx)
181 d = digest;
  /src/tests/crypto/opencrypto/
h_md5.c 44 unsigned char digest[16]; member in struct:__anon247742bf0108
55 { 14, "message digest",
101 if (memcmp(co.mac, tests[i].digest, sizeof(tests[i].digest)))
  /src/lib/libc/hash/md2/
md2.c 159 MD2Final(unsigned char digest[16], MD2_CTX *context)
163 _DIAGASSERT(digest != 0);
175 /* copy out final digest */
176 memcpy(digest, &context->X[0], (size_t)16);
  /src/tests/crypto/libcrypto/
t_sha512trunc.c 50 unsigned char *buf, *digest, *p0, *p1; local in function:check
61 digest = buf + 1;
75 REQUIRE(EVP_DigestFinal_ex(ctx, digest, &digestlen1));
81 ATF_CHECK_MSG(memcmp(digest, C->out, digestlen) == 0,
  /src/lib/libresolv/
hmac_link.c 68 * context the context to be used in this digest
175 u_char digest[MD5_LEN]; local in function:dst_hmac_md5_verify
178 MD5Final(digest, ctx);
183 MD5Update(ctx, digest, MD5_LEN);
184 MD5Final(digest, ctx);
187 if (memcmp(digest, signature, MD5_LEN) != 0)
  /src/sys/dev/marvell/
mvcesa.c 431 uint32_t alg, *iv = NULL, digest[512 / 8 / 4], dlen; local in function:mvcesa_process
449 alg, iv, digest, bits, crd->crd_skip, crd->crd_len,
457 ses, alg, ses->ses_hmouter, digest,
458 512 + dlen, 0, dlen, (char *)digest, NULL,
465 memcpy(buf + crd->crd_inject, digest, dlen / 8);
468 digest);
470 memcpy(crp->crp_mac, digest, dlen / 8);
486 uint32_t alg, uint32_t *iv, uint32_t *digest,
603 if (digest != NULL) {
604 /* Read digest */
    [all...]
  /src/sbin/rndctl/
rndctl.c 205 SHA1Final(rs.digest, &s);
284 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:do_load
337 SHA1Final(digest, &s);
338 if (!consttime_memequal(digest, rs.digest, sizeof(digest))) {
  /src/sys/netinet6/
in6_ifattach.c 136 u_int8_t digest[16]; local in function:get_rand_ifid
148 MD5Final(digest, &ctxt);
150 /* assumes sizeof(digest) > sizeof(ifid) */
151 memcpy(&in6->s6_addr[8], digest, 8);
508 u_int8_t digest[16]; local in function:in6_nigroup
533 MD5Final(digest, &ctxt);
540 memcpy(&sa6->sin6_addr.s6_addr32[3], digest,
  /src/common/lib/libc/hash/sha2/
sha2.c 515 SHA224_256_Final(uint8_t digest[], SHA256_CTX *context, size_t len)
520 /* If no digest buffer is passed, we don't bother doing this: */
521 if (digest != NULL) {
564 be32enc(digest + 4 * i, context->state[i]);
575 SHA256_Final(uint8_t digest[SHA256_DIGEST_LENGTH], SHA256_CTX *context)
577 return SHA224_256_Final(digest, context, SHA256_DIGEST_LENGTH);
609 SHA224_Final(uint8_t digest[SHA224_DIGEST_LENGTH], SHA224_CTX *context)
611 return SHA224_256_Final(digest, (SHA256_CTX *)context,
902 SHA512_Final(uint8_t digest[SHA512_DIGEST_LENGTH], SHA512_CTX *context)
906 /* If no digest buffer is passed, we don't bother doing this: *
    [all...]
  /src/usr.bin/xinstall/
xinstall.c 147 static char *digest; variable in typeref:typename:char *
240 digest = optarg;
333 if (digest) {
335 } else if (strcmp(digest, "none") == 0) {
337 } else if (strcmp(digest, "md5") == 0) {
339 } else if (strcmp(digest, "rmd160") == 0) {
341 } else if (strcmp(digest, "sha1") == 0) {
343 } else if (strcmp(digest, "sha256") == 0) {
345 } else if (strcmp(digest, "sha384") == 0) {
347 } else if (strcmp(digest, "sha512") == 0)
    [all...]
  /src/sys/crypto/blake2/
blake2s.c 162 /* Record the digest length. */
174 * Set the parameters. We support only variable digest and key
232 blake2s_final(struct blake2s *B, void *digest)
234 uint8_t *d = digest;
265 blake2s(void *digest, size_t dlen, const void *key, size_t keylen,
272 blake2s_final(&ctx, digest);
  /src/sys/sys/
rndio.h 49 uint8_t digest[SHA1_DIGEST_LENGTH]; member in struct:__anon55e960fb0108
  /src/sys/dev/iscsi/
iscsi_rcv.c 186 * -1 if the data digest was incorrect (PDU must be ignored)
193 uint32_t len, digest; local in function:read_pdu_data
256 digest = gen_digest_2(data, len, pad_bytes, pad);
258 if (digest != pdu->pdu_data_digest) {
259 DEBOUT(("Data Digest Error: comp = %08x, rx = %08x\n",
260 digest, pdu->pdu_data_digest));
1063 uint32_t MaxCmdSN, ExpCmdSN, digest; local in function:receive_pdu
1067 digest = gen_digest(&pdu->pdu_hdr, BHS_SIZE);
1068 if (digest != pdu->pdu_hdr.pduh_HeaderDigest) {
1069 DEBOUT(("Header Digest Error: comp = %08x, rx = %08x\n"
    [all...]
  /src/common/lib/libc/md/
md4c.c 4 * This file is derived from the RSA Data Security, Inc. MD4 Message-Digest
13 * is identified as the "RSA Data Security, Inc. MD4 Message-Digest
19 * Security, Inc. MD4 Message-Digest Algorithm" in all material
147 * MD4 block update operation. Continues an MD4 message-digest
189 * MD4 finalization. Ends an MD4 message-digest operation, writing the
190 * message digest and zeroing the context.
193 MD4Final (unsigned char digest[16], /* message digest */
199 _DIAGASSERT(digest != 0);
213 /* Store state in digest */
    [all...]
  /src/sys/net/
if_spppvar.h 98 char digest[16]; member in struct:schap
  /src/sys/kern/
kern_entropy.c 579 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:entropy_seed
595 SHA1Final(digest, &ctx);
596 CTASSERT(sizeof(seed->digest) == sizeof(digest));
597 if (!consttime_memequal(digest, seed->digest, sizeof(digest))) {
602 explicit_memset(digest, 0, sizeof digest);

Completed in 29 milliseconds

1 2