/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/ |
H A D | md4.c | 47 md4->buffLen = 0; in wc_InitMd4() 48 md4->loLen = 0; in wc_InitMd4() 49 md4->hiLen = 0; in wc_InitMd4() 177 md4->buffLen += MD4_BLOCK_SIZE - md4->buffLen; in wc_Md4Final() 180 ByteReverseWords(md4->buffer, md4->buffer, MD4_BLOCK_SIZE); in wc_Md4Final() 185 XMEMSET(&local[md4->buffLen], 0, MD4_PAD_SIZE - md4->buffLen); in wc_Md4Final() 188 md4->hiLen = (md4->loLen >> (8*sizeof(md4->loLen) - 3)) + in wc_Md4Final() 190 md4->loLen = md4->loLen << 3; in wc_Md4Final() 194 ByteReverseWords(md4->buffer, md4->buffer, MD4_BLOCK_SIZE); in wc_Md4Final() 200 Transform(md4); in wc_Md4Final() [all …]
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | md4.c | 47 md4->buffLen = 0; in wc_InitMd4() 48 md4->loLen = 0; in wc_InitMd4() 49 md4->hiLen = 0; in wc_InitMd4() 177 md4->buffLen += MD4_BLOCK_SIZE - md4->buffLen; in wc_Md4Final() 180 ByteReverseWords(md4->buffer, md4->buffer, MD4_BLOCK_SIZE); in wc_Md4Final() 185 XMEMSET(&local[md4->buffLen], 0, MD4_PAD_SIZE - md4->buffLen); in wc_Md4Final() 188 md4->hiLen = (md4->loLen >> (8*sizeof(md4->loLen) - 3)) + in wc_Md4Final() 190 md4->loLen = md4->loLen << 3; in wc_Md4Final() 194 ByteReverseWords(md4->buffer, md4->buffer, MD4_BLOCK_SIZE); in wc_Md4Final() 200 Transform(md4); in wc_Md4Final() [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | md4.c | 47 md4->buffLen = 0; in wc_InitMd4() 48 md4->loLen = 0; in wc_InitMd4() 49 md4->hiLen = 0; in wc_InitMd4() 177 md4->buffLen += MD4_BLOCK_SIZE - md4->buffLen; in wc_Md4Final() 180 ByteReverseWords(md4->buffer, md4->buffer, MD4_BLOCK_SIZE); in wc_Md4Final() 185 XMEMSET(&local[md4->buffLen], 0, MD4_PAD_SIZE - md4->buffLen); in wc_Md4Final() 188 md4->hiLen = (md4->loLen >> (8*sizeof(md4->loLen) - 3)) + in wc_Md4Final() 190 md4->loLen = md4->loLen << 3; in wc_Md4Final() 194 ByteReverseWords(md4->buffer, md4->buffer, MD4_BLOCK_SIZE); in wc_Md4Final() 200 Transform(md4); in wc_Md4Final() [all …]
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | md4.c | 47 md4->buffLen = 0; in wc_InitMd4() 48 md4->loLen = 0; in wc_InitMd4() 49 md4->hiLen = 0; in wc_InitMd4() 177 md4->buffLen += MD4_BLOCK_SIZE - md4->buffLen; in wc_Md4Final() 180 ByteReverseWords(md4->buffer, md4->buffer, MD4_BLOCK_SIZE); in wc_Md4Final() 185 XMEMSET(&local[md4->buffLen], 0, MD4_PAD_SIZE - md4->buffLen); in wc_Md4Final() 188 md4->hiLen = (md4->loLen >> (8*sizeof(md4->loLen) - 3)) + in wc_Md4Final() 190 md4->loLen = md4->loLen << 3; in wc_Md4Final() 194 ByteReverseWords(md4->buffer, md4->buffer, MD4_BLOCK_SIZE); in wc_Md4Final() 200 Transform(md4); in wc_Md4Final() [all …]
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | md4.c | 47 md4->buffLen = 0; in wc_InitMd4() 48 md4->loLen = 0; in wc_InitMd4() 49 md4->hiLen = 0; in wc_InitMd4() 177 md4->buffLen += MD4_BLOCK_SIZE - md4->buffLen; in wc_Md4Final() 180 ByteReverseWords(md4->buffer, md4->buffer, MD4_BLOCK_SIZE); in wc_Md4Final() 185 XMEMSET(&local[md4->buffLen], 0, MD4_PAD_SIZE - md4->buffLen); in wc_Md4Final() 188 md4->hiLen = (md4->loLen >> (8*sizeof(md4->loLen) - 3)) + in wc_Md4Final() 190 md4->loLen = md4->loLen << 3; in wc_Md4Final() 194 ByteReverseWords(md4->buffer, md4->buffer, MD4_BLOCK_SIZE); in wc_Md4Final() 200 Transform(md4); in wc_Md4Final() [all …]
|
/dports/security/p5-CryptX/CryptX-0.075/t/ |
H A D | digest_md4.t | 18 is( md4("A","A","A"), pack("H*","17c3b38c112ac61c1f0d46555f379f14"), 'md4 (raw/tripple_A)'); 19 is( md4_hex("A","A","A"), "17c3b38c112ac61c1f0d46555f379f14", 'md4 (hex/tripple_A)'); 20 is( md4_b64("A","A","A"), "F8OzjBEqxhwfDUZVXzefFA==", 'md4 (base64/tripple_A)'); 21 is( md4_b64u("A","A","A"), "F8OzjBEqxhwfDUZVXzefFA", 'md4 (base64url/tripple_A)'); 30 is( md4(""), pack("H*","31d6cfe0d16ae931b73c59d7e0c089c0"), 'md4 (raw/1)'); 31 is( md4_hex(""), "31d6cfe0d16ae931b73c59d7e0c089c0", 'md4 (hex/1)'); 32 is( md4_b64(""), "MdbP4NFq6TG3PFnX4MCJwA==", 'md4 (base64/1)'); 39 is( md4("123"), pack("H*","c58cda49f00748a3bc0fcfa511d516cb"), 'md4 (raw/2)'); 40 is( md4_hex("123"), "c58cda49f00748a3bc0fcfa511d516cb", 'md4 (hex/2)'); 41 is( md4_b64("123"), "xYzaSfAHSKO8D8+lEdUWyw==", 'md4 (base64/2)'); [all …]
|
/dports/devel/tcllib/tcllib-1.20/modules/md4/ |
H A D | md4.test | 15 useLocal md4.tcl md4 35 variable ::md4::accel 41 variable ::md4::accel 72 test md4-$impl-1.$n "md4 RFC test strings ($impl impl)" { 73 list [catch {::md4::md4 -hex $txt} r] $r 239 test md4-$impl-2.$n "md4 block size checks: length $n ($impl)" { 241 ::md4::md4 -hex [string repeat a $n] 251 list [catch {::md4::md4 -hex -hello} msg] $msg 255 list [catch {::md4::md4 -hex -- -hello} msg] $msg 259 list [catch {::md4::md4 -hex --} msg] $msg [all …]
|
H A D | ChangeLog | 67 * md4.tcl: 95 * md4.h: 128 * md4.man: release. 140 * md4.man: of md4 to reflect its changes, to 1.0.2. 164 * md4.h: into the md4 module directory. We want to keep the 166 * md4.tcl, md4.man, pkgIndex.tcl: Hiked version to 1.0.1 185 * c_src/md4.h: The md4 implementation from RFC1320 186 * c_src/md4.c: 205 * md4.test: 206 * md4.tcl: [all …]
|
H A D | md4.tcllib.man | 2 [manpage_begin md4 n [vset VERSION]] 6 [keywords md4] 40 [call [cmd "::md4::md4"] \ 62 [call [cmd "::md4::hmac"] \ 71 for the [cmd "::md4::md4"] command. 122 % md4::md4 -hex "Tcl does MD4" 132 % set tok [md4::MD4Init] 133 ::md4::1 136 % md4::MD4Update $tok "MD4" 137 % md4::Hex [md4::MD4Final $tok] [all …]
|
/dports/devel/tcllibc/tcllib-1.20/modules/md4/ |
H A D | md4.test | 15 useLocal md4.tcl md4 35 variable ::md4::accel 41 variable ::md4::accel 72 test md4-$impl-1.$n "md4 RFC test strings ($impl impl)" { 73 list [catch {::md4::md4 -hex $txt} r] $r 239 test md4-$impl-2.$n "md4 block size checks: length $n ($impl)" { 241 ::md4::md4 -hex [string repeat a $n] 251 list [catch {::md4::md4 -hex -hello} msg] $msg 255 list [catch {::md4::md4 -hex -- -hello} msg] $msg 259 list [catch {::md4::md4 -hex --} msg] $msg [all …]
|
H A D | ChangeLog | 67 * md4.tcl: 95 * md4.h: 128 * md4.man: release. 140 * md4.man: of md4 to reflect its changes, to 1.0.2. 164 * md4.h: into the md4 module directory. We want to keep the 166 * md4.tcl, md4.man, pkgIndex.tcl: Hiked version to 1.0.1 185 * c_src/md4.h: The md4 implementation from RFC1320 186 * c_src/md4.c: 205 * md4.test: 206 * md4.tcl: [all …]
|
H A D | md4.tcllib.man | 2 [manpage_begin md4 n [vset VERSION]] 6 [keywords md4] 40 [call [cmd "::md4::md4"] \ 62 [call [cmd "::md4::hmac"] \ 71 for the [cmd "::md4::md4"] command. 122 % md4::md4 -hex "Tcl does MD4" 132 % set tok [md4::MD4Init] 133 ::md4::1 136 % md4::MD4Update $tok "MD4" 137 % md4::Hex [md4::MD4Final $tok] [all …]
|
/dports/net/p5-File-RsyncP/File-RsyncP-0.76/Digest/t/ |
H A D | fileDigest.t | 49 $md4->reset; 65 $md4->reset; 76 $md4->reset; 84 $md4->reset; 92 $md4->reset; 100 $md4->reset; 108 $md4->reset; 116 $md4->reset; 127 $md4->reset; 135 $md4->reset; [all …]
|
/dports/net/samba412/samba-4.12.15/lib/crypto/ |
H A D | md4test.c | 36 const char *md4; in torture_local_crypto_md4() member 40 .md4 = "31d6cfe0d16ae931b73c59d7e0c089c0" in torture_local_crypto_md4() 43 .md4 = "bde52cb31de33e46245e05fbdbd6fb24" in torture_local_crypto_md4() 46 .md4 = "a448017aaf21d8525fc10ae87aa6729d" in torture_local_crypto_md4() 49 .md4 = "d9130a8164549fe818874806e1c7014b" in torture_local_crypto_md4() 52 .md4 = "d79e1c308aa5bbcdeea8ed63df412da9" in torture_local_crypto_md4() 55 .md4 = "043f8582f241db351ce627e153e7f0e4" in torture_local_crypto_md4() 63 uint8_t md4[16]; in torture_local_crypto_md4() local 71 mdfour(md4, data.data, data.length); in torture_local_crypto_md4() 73 e = memcmp(md4blob.data, md4, MIN(md4blob.length, sizeof(md4))); in torture_local_crypto_md4() [all …]
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/lib/crypto/ |
H A D | md4test.c | 35 const char *md4; in torture_local_crypto_md4() member 39 .md4 = "31d6cfe0d16ae931b73c59d7e0c089c0" in torture_local_crypto_md4() 42 .md4 = "bde52cb31de33e46245e05fbdbd6fb24" in torture_local_crypto_md4() 45 .md4 = "a448017aaf21d8525fc10ae87aa6729d" in torture_local_crypto_md4() 48 .md4 = "d9130a8164549fe818874806e1c7014b" in torture_local_crypto_md4() 51 .md4 = "d79e1c308aa5bbcdeea8ed63df412da9" in torture_local_crypto_md4() 54 .md4 = "043f8582f241db351ce627e153e7f0e4" in torture_local_crypto_md4() 62 uint8_t md4[16]; in torture_local_crypto_md4() local 70 mdfour(md4, data.data, data.length); in torture_local_crypto_md4() 72 e = memcmp(md4blob.data, md4, MIN(md4blob.length, sizeof(md4))); in torture_local_crypto_md4() [all …]
|
/dports/net/p5-File-RsyncP/File-RsyncP-0.76/Digest/ |
H A D | rsync_lib.c | 81 RsyncMD4_CTX md4; in rsync_checksum() local 82 RsyncMD4Init(&md4); in rsync_checksum() 83 RsyncMD4Update(&md4, buf, thisLen); in rsync_checksum() 85 RsyncMD4Update(&md4, seedBytes, 4); in rsync_checksum() 99 RsyncMD4FinalRsync(digest, &md4); in rsync_checksum() 106 RsyncMD4FinalRsync(md4Digest, &md4); in rsync_checksum() 145 RsyncMD4_CTX md4; in rsync_checksum_update() local 152 RsyncMD4Init(&md4); in rsync_checksum_update() 156 md4.count[0] = blockSize << 3; in rsync_checksum_update() 157 md4.count[1] = blockSize >> 29; in rsync_checksum_update() [all …]
|
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/src/hashes/ |
H A D | md4.c | 83 a = md->md4.state[0]; in _md4_compress() 149 md->md4.state[0] = md->md4.state[0] + a; in _md4_compress() 150 md->md4.state[1] = md->md4.state[1] + b; in _md4_compress() 151 md->md4.state[2] = md->md4.state[2] + c; in _md4_compress() 152 md->md4.state[3] = md->md4.state[3] + d; in _md4_compress() 206 if (md->md4.curlen >= sizeof(md->md4.buf)) { in md4_done() 211 md->md4.length += md->md4.curlen * 8; in md4_done() 214 md->md4.buf[md->md4.curlen++] = (unsigned char)0x80; in md4_done() 222 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done() 230 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done() [all …]
|
/dports/security/libtomcrypt/libtomcrypt-1.18.2/src/hashes/ |
H A D | md4.c | 83 a = md->md4.state[0]; in _md4_compress() 149 md->md4.state[0] = md->md4.state[0] + a; in _md4_compress() 150 md->md4.state[1] = md->md4.state[1] + b; in _md4_compress() 151 md->md4.state[2] = md->md4.state[2] + c; in _md4_compress() 152 md->md4.state[3] = md->md4.state[3] + d; in _md4_compress() 206 if (md->md4.curlen >= sizeof(md->md4.buf)) { in md4_done() 211 md->md4.length += md->md4.curlen * 8; in md4_done() 214 md->md4.buf[md->md4.curlen++] = (unsigned char)0x80; in md4_done() 222 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done() 230 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done() [all …]
|
/dports/lang/sagittarius-scheme/sagittarius-0.9.8/ext/crypto/libtomcrypt/src/hashes/ |
H A D | md4.c | 85 a = md->md4.state[0]; in _md4_compress() 151 md->md4.state[0] = md->md4.state[0] + a; in _md4_compress() 152 md->md4.state[1] = md->md4.state[1] + b; in _md4_compress() 153 md->md4.state[2] = md->md4.state[2] + c; in _md4_compress() 154 md->md4.state[3] = md->md4.state[3] + d; in _md4_compress() 208 if (md->md4.curlen >= sizeof(md->md4.buf)) { in md4_done() 213 md->md4.length += md->md4.curlen * 8; in md4_done() 216 md->md4.buf[md->md4.curlen++] = (unsigned char)0x80; in md4_done() 224 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done() 232 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done() [all …]
|
/dports/security/p5-CryptX/CryptX-0.075/src/ltc/hashes/ |
H A D | md4.c | 77 a = md->md4.state[0]; in ss_md4_compress() 143 md->md4.state[0] = md->md4.state[0] + a; in ss_md4_compress() 144 md->md4.state[1] = md->md4.state[1] + b; in ss_md4_compress() 145 md->md4.state[2] = md->md4.state[2] + c; in ss_md4_compress() 146 md->md4.state[3] = md->md4.state[3] + d; in ss_md4_compress() 200 if (md->md4.curlen >= sizeof(md->md4.buf)) { in md4_done() 205 md->md4.length += md->md4.curlen * 8; in md4_done() 208 md->md4.buf[md->md4.curlen++] = (unsigned char)0x80; in md4_done() 216 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done() 224 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done() [all …]
|
/dports/misc/rump/buildrump.sh-b914579/src/lib/libc/md/ |
H A D | Makefile.inc | 10 MAN+= md4.3 md5.3 12 MLINKS+=md4.3 MD4Init.3 md4.3 MD4Update.3 md4.3 MD4Final.3 13 MLINKS+=md4.3 MD4End.3 md4.3 MD4File.3 md4.3 MD4Data.3 20 md4.3: mdX.3 22 cat ${>:H}/md4.copyright >> $@
|
/dports/devel/bglibs/bglibs-2.04/doc/latex/ |
H A D | structmd4__ctx.tex | 1 \section{md4\+\_\+ctx Struct Reference} 2 \label{structmd4__ctx}\index{md4\+\_\+ctx@{md4\+\_\+ctx}} 7 md4\+\_\+uint32 {\bfseries A} 10 md4\+\_\+uint32 {\bfseries B} 13 md4\+\_\+uint32 {\bfseries C} 16 md4\+\_\+uint32 {\bfseries D} 19 md4\+\_\+uint32 {\bfseries total} \mbox{[}2\mbox{]} 22 md4\+\_\+uint32 {\bfseries buflen} 31 md4.\+h\end{DoxyCompactItemize}
|
/dports/devel/tcllibc/tcllib-1.20/embedded/md/tcllib/files/modules/md4/ |
H A D | md4.md | 16 md4 \- MD4 Message\-Digest Algorithm 47 package require md4 ?1\.0\.7? 51 [__::md4::MD4Init__](#3) 54 [__::md4::HMACInit__ *key*](#6) 92 __::md4::md4__ command\. 135 % md4::md4 -hex "Tcl does MD4" 141 % set tok [md4::MD4Init] 142 ::md4::1 145 % md4::MD4Update $tok "MD4" 146 % md4::Hex [md4::MD4Final $tok] [all …]
|
/dports/devel/tcllib/tcllib-1.20/embedded/md/tcllib/files/modules/md4/ |
H A D | md4.md | 16 md4 \- MD4 Message\-Digest Algorithm 47 package require md4 ?1\.0\.7? 51 [__::md4::MD4Init__](#3) 54 [__::md4::HMACInit__ *key*](#6) 92 __::md4::md4__ command\. 135 % md4::md4 -hex "Tcl does MD4" 141 % set tok [md4::MD4Init] 142 ::md4::1 145 % md4::MD4Update $tok "MD4" 146 % md4::Hex [md4::MD4Final $tok] [all …]
|
/dports/editors/emacs-devel/emacs-4d1968b/test/lisp/ |
H A D | md4-tests.el | 28 (require 'md4) 38 (equal (md4-tests-digest->hex (md4 "" 0)) 41 (equal (md4-tests-digest->hex (md4 "a" 1)) 44 (equal (md4-tests-digest->hex (md4 "abc" 3)) 47 (equal (md4-tests-digest->hex (md4 "message digest" 14)) 50 (equal (md4-tests-digest->hex (md4 "abcdefghijklmnopqrstuvwxyz" 26)) 54 (md4 "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789" 62)) 58 … (md4 "12345678901234567890123456789012345678901234567890123456789012345678901234567890" 80))
|