/src/tests/lib/libc/hash/ |
t_sha2.c | 148 digest2string(const uint8_t *digest, char *string, size_t len) 151 if (*digest / 16 < 10) 152 *string++ = '0' + *digest / 16; 154 *string++ = 'a' + *digest / 16 - 10; 155 if (*digest % 16 < 10) 156 *string++ = '0' + *digest % 16; 158 *string++ = 'a' + *digest % 16 - 10; 159 ++digest; 175 unsigned char digest[8 + SHA256_DIGEST_LENGTH]; local in function:ATF_TC_BODY 184 SHA256_Final(digest + j, &ctx) 202 unsigned char digest[8 + SHA384_DIGEST_LENGTH]; local in function:ATF_TC_BODY 229 unsigned char digest[8 + SHA512_DIGEST_LENGTH]; local in function:ATF_TC_BODY [all...] |
/src/sys/netinet/ |
sctp_hashdriver.c | 60 * passing a two pointers and two lengths, returning a digest pointer 70 unsigned char *digest) 131 MD5Final(digest, &context); /* finish up 1st pass */ 136 SHA1Final(digest, &context); /* finish up 1st pass */ 145 MD5Update(&context, digest, 16); /* then results of 1st hash */ 146 MD5Final(digest, &context); /* finish up 2nd pass */ 150 SHA1Update(&context, digest, 20); /* then results of 1st hash */ 151 SHA1Final(digest, &context); /* finish up 2nd pass */ 156 unsigned char *digest) 234 MD5Final(digest, &context); /* finish up 1st pass * [all...] |
/src/lib/libcrypt/ |
hmac.c | 37 * HASH_LENGTH the size of the digest (20 for SHA1, 16 for MD5) 69 unsigned char *digest) 124 HASH_Final(digest, &context); 133 HASH_Update(&context, digest, HASH_LENGTH); 134 HASH_Final(digest, &context); 249 unsigned char digest[HASH_LENGTH]; local in function:HMAC_KAT 262 HMAC_FUNC(data, strlen(data), key, strlen(key), digest); 264 b2x(&dbuf[2], (sizeof dbuf) - 2, digest, HASH_LENGTH); 290 unsigned char digest[HASH_LENGTH]; local in function:main 305 HMAC_FUNC(data, data_len, key, key_len, digest); [all...] |
/src/sys/arch/amd64/stand/prekern/ |
prng.c | 48 uint8_t digest[SHA1_DIGEST_LENGTH]; member in struct:__anon3e15344a0108 84 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:prng_get_entropy_file 113 SHA1Final(digest, &sig); 114 if (memcmp(digest, rndsave->digest, sizeof(digest))) { 160 uint8_t digest[SHA512_DIGEST_LENGTH]; local in function:prng_init 181 SHA512_Final(digest, &ctx); 183 memcpy(rng.state, digest, RNGSTATE_SIZE); 184 memcpy(rng.data, digest + RNGSTATE_SIZE, RNGDATA_SIZE) 190 uint8_t digest[SHA512_DIGEST_LENGTH]; local in function:prng_round [all...] |
/src/etc/rc.d/ |
iscsid_volumes | 21 while read host target digest auth user alias; do 26 case $digest in 29 case $digest in 95 while read host target digest auth user alias; do
|
/src/lib/libc/hash/ |
hmac.c | 119 void *digest, size_t dlen) 145 p = dlen >= h->digsize ? digest : d; 146 if (p != digest) { 147 memcpy(p, digest, dlen); 157 (*h->update)(c, digest, (unsigned int)h->digsize); 160 if (p != digest) 161 memcpy(digest, p, dlen);
|
hashhl.c | 67 unsigned char digest[HASH_LEN]; local in function:WA 77 FNPREFIX(Final)(digest, ctx); 80 buf[i+i] = hex[(u_int32_t)digest[i] >> 4]; 81 buf[i+i+1] = hex[digest[i] & 0x0f];
|
/src/lib/libc/md/ |
mdXhl.c | 49 unsigned char digest[16]; local in function:WA 59 MDNAME(Final)(digest, ctx); 62 buf[i+i] = hex[(u_int32_t)digest[i] >> 4]; 63 buf[i+i+1] = hex[digest[i] & 0x0f];
|
/src/sys/opencrypto/ |
aesxcbcmac.c | 129 uint8_t digest[AES_BLOCKSIZE]; local in function:aes_xcbc_mac_result 140 aes_enc(&ctx->r_k1s, ctx->buf, digest, ctx->r_nr); 148 aes_enc(&ctx->r_k1s, ctx->buf, digest, ctx->r_nr); 151 memcpy(addr, digest, sizeof(digest));
|
gmac.c | 172 AES_GMAC_Final(uint8_t digest[GMAC_DIGEST_LEN], AES_GMAC_CTX *ctx) 181 d = digest;
|
/src/tests/crypto/opencrypto/ |
h_md5.c | 44 unsigned char digest[16]; member in struct:__anon247742bf0108 55 { 14, "message digest", 101 if (memcmp(co.mac, tests[i].digest, sizeof(tests[i].digest)))
|
/src/lib/libc/hash/md2/ |
md2.c | 159 MD2Final(unsigned char digest[16], MD2_CTX *context) 163 _DIAGASSERT(digest != 0); 175 /* copy out final digest */ 176 memcpy(digest, &context->X[0], (size_t)16);
|
/src/tests/crypto/libcrypto/ |
t_sha512trunc.c | 50 unsigned char *buf, *digest, *p0, *p1; local in function:check 61 digest = buf + 1; 75 REQUIRE(EVP_DigestFinal_ex(ctx, digest, &digestlen1)); 81 ATF_CHECK_MSG(memcmp(digest, C->out, digestlen) == 0,
|
/src/lib/libresolv/ |
hmac_link.c | 68 * context the context to be used in this digest 175 u_char digest[MD5_LEN]; local in function:dst_hmac_md5_verify 178 MD5Final(digest, ctx); 183 MD5Update(ctx, digest, MD5_LEN); 184 MD5Final(digest, ctx); 187 if (memcmp(digest, signature, MD5_LEN) != 0)
|
/src/sys/dev/marvell/ |
mvcesa.c | 431 uint32_t alg, *iv = NULL, digest[512 / 8 / 4], dlen; local in function:mvcesa_process 449 alg, iv, digest, bits, crd->crd_skip, crd->crd_len, 457 ses, alg, ses->ses_hmouter, digest, 458 512 + dlen, 0, dlen, (char *)digest, NULL, 465 memcpy(buf + crd->crd_inject, digest, dlen / 8); 468 digest); 470 memcpy(crp->crp_mac, digest, dlen / 8); 486 uint32_t alg, uint32_t *iv, uint32_t *digest, 603 if (digest != NULL) { 604 /* Read digest */ [all...] |
/src/sbin/rndctl/ |
rndctl.c | 205 SHA1Final(rs.digest, &s); 284 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:do_load 337 SHA1Final(digest, &s); 338 if (!consttime_memequal(digest, rs.digest, sizeof(digest))) {
|
/src/sys/netinet6/ |
in6_ifattach.c | 136 u_int8_t digest[16]; local in function:get_rand_ifid 148 MD5Final(digest, &ctxt); 150 /* assumes sizeof(digest) > sizeof(ifid) */ 151 memcpy(&in6->s6_addr[8], digest, 8); 508 u_int8_t digest[16]; local in function:in6_nigroup 533 MD5Final(digest, &ctxt); 540 memcpy(&sa6->sin6_addr.s6_addr32[3], digest,
|
/src/common/lib/libc/hash/sha2/ |
sha2.c | 515 SHA224_256_Final(uint8_t digest[], SHA256_CTX *context, size_t len) 520 /* If no digest buffer is passed, we don't bother doing this: */ 521 if (digest != NULL) { 564 be32enc(digest + 4 * i, context->state[i]); 575 SHA256_Final(uint8_t digest[SHA256_DIGEST_LENGTH], SHA256_CTX *context) 577 return SHA224_256_Final(digest, context, SHA256_DIGEST_LENGTH); 609 SHA224_Final(uint8_t digest[SHA224_DIGEST_LENGTH], SHA224_CTX *context) 611 return SHA224_256_Final(digest, (SHA256_CTX *)context, 902 SHA512_Final(uint8_t digest[SHA512_DIGEST_LENGTH], SHA512_CTX *context) 906 /* If no digest buffer is passed, we don't bother doing this: * [all...] |
/src/usr.bin/xinstall/ |
xinstall.c | 147 static char *digest; variable in typeref:typename:char * 240 digest = optarg; 333 if (digest) { 335 } else if (strcmp(digest, "none") == 0) { 337 } else if (strcmp(digest, "md5") == 0) { 339 } else if (strcmp(digest, "rmd160") == 0) { 341 } else if (strcmp(digest, "sha1") == 0) { 343 } else if (strcmp(digest, "sha256") == 0) { 345 } else if (strcmp(digest, "sha384") == 0) { 347 } else if (strcmp(digest, "sha512") == 0) [all...] |
/src/sys/crypto/blake2/ |
blake2s.c | 162 /* Record the digest length. */ 174 * Set the parameters. We support only variable digest and key 232 blake2s_final(struct blake2s *B, void *digest) 234 uint8_t *d = digest; 265 blake2s(void *digest, size_t dlen, const void *key, size_t keylen, 272 blake2s_final(&ctx, digest);
|
/src/sys/sys/ |
rndio.h | 49 uint8_t digest[SHA1_DIGEST_LENGTH]; member in struct:__anon55e960fb0108
|
/src/sys/dev/iscsi/ |
iscsi_rcv.c | 186 * -1 if the data digest was incorrect (PDU must be ignored) 193 uint32_t len, digest; local in function:read_pdu_data 256 digest = gen_digest_2(data, len, pad_bytes, pad); 258 if (digest != pdu->pdu_data_digest) { 259 DEBOUT(("Data Digest Error: comp = %08x, rx = %08x\n", 260 digest, pdu->pdu_data_digest)); 1063 uint32_t MaxCmdSN, ExpCmdSN, digest; local in function:receive_pdu 1067 digest = gen_digest(&pdu->pdu_hdr, BHS_SIZE); 1068 if (digest != pdu->pdu_hdr.pduh_HeaderDigest) { 1069 DEBOUT(("Header Digest Error: comp = %08x, rx = %08x\n" [all...] |
/src/common/lib/libc/md/ |
md4c.c | 4 * This file is derived from the RSA Data Security, Inc. MD4 Message-Digest 13 * is identified as the "RSA Data Security, Inc. MD4 Message-Digest 19 * Security, Inc. MD4 Message-Digest Algorithm" in all material 147 * MD4 block update operation. Continues an MD4 message-digest 189 * MD4 finalization. Ends an MD4 message-digest operation, writing the 190 * message digest and zeroing the context. 193 MD4Final (unsigned char digest[16], /* message digest */ 199 _DIAGASSERT(digest != 0); 213 /* Store state in digest */ [all...] |
/src/sys/net/ |
if_spppvar.h | 98 char digest[16]; member in struct:schap
|
/src/sys/kern/ |
kern_entropy.c | 579 uint8_t digest[SHA1_DIGEST_LENGTH]; local in function:entropy_seed 595 SHA1Final(digest, &ctx); 596 CTASSERT(sizeof(seed->digest) == sizeof(digest)); 597 if (!consttime_memequal(digest, seed->digest, sizeof(digest))) { 602 explicit_memset(digest, 0, sizeof digest);
|