/dragonfly/crypto/libressl/crypto/evp/ |
H A D | digest.c | 177 } else if (!ctx->digest) { in EVP_DigestInit_ex() 182 if (ctx->digest != type) { in EVP_DigestInit_ex() 183 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data && in EVP_DigestInit_ex() 188 ctx->digest = type; in EVP_DigestInit_ex() 245 if (ctx->digest->cleanup) { in EVP_DigestFinal_ex() 246 ctx->digest->cleanup(ctx); in EVP_DigestFinal_ex() 277 if (out->digest == in->digest) { in EVP_MD_CTX_copy_ex() 316 if (out->digest->copy) in EVP_MD_CTX_copy_ex() 388 if (ctx->digest && ctx->digest->cleanup && in EVP_MD_CTX_cleanup() 391 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data && in EVP_MD_CTX_cleanup() [all …]
|
/dragonfly/crypto/openssh/ |
H A D | digest-openssl.c | 94 const struct ssh_digest *digest = ssh_digest_by_alg(alg); in ssh_digest_alg_name() local 96 return digest == NULL ? NULL : digest->name; in ssh_digest_alg_name() 102 const struct ssh_digest *digest = ssh_digest_by_alg(alg); in ssh_digest_bytes() local 104 return digest == NULL ? 0 : digest->digest_len; in ssh_digest_bytes() 116 const struct ssh_digest *digest = ssh_digest_by_alg(alg); in ssh_digest_start() local 164 if (digest == NULL || dlen > UINT_MAX) in ssh_digest_final() 166 if (dlen < digest->digest_len) /* No truncation allowed */ in ssh_digest_final() 170 if (l != digest->digest_len) /* sanity */ in ssh_digest_final() 187 const struct ssh_digest *digest = ssh_digest_by_alg(alg); in ssh_digest_memory() local 190 if (digest == NULL) in ssh_digest_memory() [all …]
|
H A D | hmac.c | 33 struct ssh_digest_ctx *digest; member 54 (ret->digest = ssh_digest_start(alg)) == NULL) in ssh_hmac_start() 97 return ssh_digest_update(ctx->digest, m, mlen); in ssh_hmac_update() 103 return ssh_digest_update_buffer(ctx->digest, b); in ssh_hmac_update_buffer() 113 ssh_digest_final(ctx->digest, ctx->buf, len)) in ssh_hmac_final() 118 ssh_digest_final(ctx->digest, d, dlen) < 0) in ssh_hmac_final() 129 ssh_digest_free(ctx->digest); in ssh_hmac_free() 146 u_char digest[16]; in hmac_test() local 152 ssh_hmac_final(ctx, digest, sizeof(digest)) < 0) in hmac_test() 156 if (memcmp(e, digest, elen)) { in hmac_test() [all …]
|
H A D | ssh-ecdsa.c | 56 u_char digest[SSH_DIGEST_MAX_LENGTH]; in ssh_ecdsa_sign() local 74 digest, sizeof(digest))) != 0) in ssh_ecdsa_sign() 77 if ((sig = ECDSA_do_sign(digest, dlen, key->ecdsa)) == NULL) { in ssh_ecdsa_sign() 105 explicit_bzero(digest, sizeof(digest)); in ssh_ecdsa_sign() 121 u_char digest[SSH_DIGEST_MAX_LENGTH]; in ssh_ecdsa_verify() local 174 digest, sizeof(digest))) != 0) in ssh_ecdsa_verify() 177 switch (ECDSA_do_verify(digest, dlen, sig, key->ecdsa)) { in ssh_ecdsa_verify() 190 explicit_bzero(digest, sizeof(digest)); in ssh_ecdsa_verify()
|
H A D | ssh-dss.c | 57 u_char digest[SSH_DIGEST_MAX_LENGTH], sigblob[SIGBLOB_LEN]; in ssh_dss_sign() local 74 digest, sizeof(digest))) != 0) in ssh_dss_sign() 77 if ((sig = DSA_do_sign(digest, dlen, key->dsa)) == NULL) { in ssh_dss_sign() 113 explicit_bzero(digest, sizeof(digest)); in ssh_dss_sign() 126 u_char digest[SSH_DIGEST_MAX_LENGTH], *sigblob = NULL; in ssh_dss_verify() local 181 digest, sizeof(digest))) != 0) in ssh_dss_verify() 184 switch (DSA_do_verify(digest, dlen, sig, key->dsa)) { in ssh_dss_verify() 197 explicit_bzero(digest, sizeof(digest)); in ssh_dss_verify()
|
H A D | ssh-rsa.c | 168 u_char digest[SSH_DIGEST_MAX_LENGTH], *sig = NULL; in ssh_rsa_sign() local 198 digest, sizeof(digest))) != 0) in ssh_rsa_sign() 206 if (RSA_sign(nid, digest, dlen, sig, &len, key->rsa) != 1) { in ssh_rsa_sign() 238 explicit_bzero(digest, sizeof(digest)); in ssh_rsa_sign() 254 u_char digest[SSH_DIGEST_MAX_LENGTH], *osigblob, *sigblob = NULL; in ssh_rsa_verify() local 318 digest, sizeof(digest))) != 0) in ssh_rsa_verify() 321 ret = openssh_RSA_verify(hash_alg, digest, dlen, sigblob, len, in ssh_rsa_verify() 327 explicit_bzero(digest, sizeof(digest)); in ssh_rsa_verify()
|
H A D | dns.c | 82 u_char **digest, size_t *digest_len, struct sshkey *key) in dns_read_key() argument 119 if ((r = sshkey_fingerprint_raw(key, fp_alg, digest, in dns_read_key() 124 *digest = NULL; in dns_read_key() 136 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) in dns_read_rdata() argument 149 *digest = xmalloc(*digest_len); in dns_read_rdata() 150 memcpy(*digest, rdata + 2, *digest_len); in dns_read_rdata() 152 *digest = (u_char *)xstrdup(""); in dns_read_rdata()
|
/dragonfly/crypto/libressl/ssl/ |
H A D | tls13_key_schedule.c | 52 tls13_secrets_create(const EVP_MD *digest, int resumption) in tls13_secrets_create() argument 59 hash_length = EVP_MD_size(digest); in tls13_secrets_create() 104 if (!EVP_DigestInit_ex(mdctx, digest, NULL)) in tls13_secrets_create() 116 secrets->digest = digest; in tls13_secrets_create() 168 const EVP_MD *digest, const struct tls13_secret *secret, in tls13_hkdf_expand_label_with_length() argument 194 ret = HKDF_expand(out->data, out->len, digest, secret->data, in tls13_hkdf_expand_label_with_length() 250 secrets->digest, &secrets->extracted_early, "derived", in tls13_derive_early_secrets() 272 &secrets->extracted_handshake.len, secrets->digest, in tls13_derive_handshake_secrets() 317 &secrets->extracted_master.len, secrets->digest, in tls13_derive_application_secrets() 367 secrets->digest, &secrets->client_application_traffic, in tls13_update_client_traffic_secret() [all …]
|
/dragonfly/sbin/iscontrol/ |
H A D | auth_subr.c | 53 chapMD5(char id, char *cp, char *chapSecret, unsigned char *digest) in chapMD5() argument 79 MD5_Final(digest, &ctx); in chapMD5() 86 chapSHA1(char id, char *cp, char *chapSecret, unsigned char *digest) in chapSHA1() argument 112 SHA1_Final(digest, &ctx); in chapSHA1() 128 unsigned char digest[20]; in chapDigest() local 134 if(strcmp(ap, "5") == 0 && chapMD5(id, cp, chapSecret, digest) == 0) in chapDigest() 142 return bin2str(encoding, digest, len); in chapDigest() 179 char *p, *ap, *ip, *cp, *chapSecret, *digest; in main() local 193 if((digest = chapDigest(ap, ip, cp, chapSecret)) != NULL) { in main() 194 len = str2bin(digest, &cp); in main() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | fips_prf_wolfssl.c | 22 sha.digest[0] = state[0]; in sha1_transform() 23 sha.digest[1] = state[1]; in sha1_transform() 24 sha.digest[2] = state[2]; in sha1_transform() 25 sha.digest[3] = state[3]; in sha1_transform() 26 sha.digest[4] = state[4]; in sha1_transform() 28 state[0] = sha.digest[0]; in sha1_transform() 29 state[1] = sha.digest[1]; in sha1_transform() 30 state[2] = sha.digest[2]; in sha1_transform() 31 state[3] = sha.digest[3]; in sha1_transform() 32 state[4] = sha.digest[4]; in sha1_transform()
|
H A D | sha1-pbkdf2.c | 16 u8 *digest) in pbkdf2_sha1_f() argument 43 os_memcpy(digest, tmp, SHA1_MAC_LEN); in pbkdf2_sha1_f() 51 digest[j] ^= tmp2[j]; in pbkdf2_sha1_f() 78 unsigned char digest[SHA1_MAC_LEN]; in pbkdf2_sha1() local 83 count, digest)) in pbkdf2_sha1() 86 os_memcpy(pos, digest, plen); in pbkdf2_sha1()
|
/dragonfly/sys/crypto/ |
H A D | sha1.c | 245 u_int8_t *digest; in sha1_result() local 252 digest[0] = ctxt->h.b8[3]; digest[1] = ctxt->h.b8[2]; in sha1_result() 253 digest[2] = ctxt->h.b8[1]; digest[3] = ctxt->h.b8[0]; in sha1_result() 254 digest[4] = ctxt->h.b8[7]; digest[5] = ctxt->h.b8[6]; in sha1_result() 255 digest[6] = ctxt->h.b8[5]; digest[7] = ctxt->h.b8[4]; in sha1_result() 256 digest[8] = ctxt->h.b8[11]; digest[9] = ctxt->h.b8[10]; in sha1_result() 257 digest[10] = ctxt->h.b8[9]; digest[11] = ctxt->h.b8[8]; in sha1_result() 258 digest[12] = ctxt->h.b8[15]; digest[13] = ctxt->h.b8[14]; in sha1_result() 259 digest[14] = ctxt->h.b8[13]; digest[15] = ctxt->h.b8[12]; in sha1_result() 260 digest[16] = ctxt->h.b8[19]; digest[17] = ctxt->h.b8[18]; in sha1_result() [all …]
|
/dragonfly/usr.sbin/mtree/ |
H A D | hash.c | 56 unsigned char digest[HEX_DIGEST_LENGTH]; in dohash() local 141 MD5_Final(digest, ctx); in dohash() 143 RIPEMD160_Final(digest, ctx); in dohash() 145 SHA1_Final(digest, ctx); in dohash() 147 SHA256_Final(digest, ctx); in dohash() 149 SHA384_Final(digest, ctx); in dohash() 151 SHA512_Final(digest, ctx); in dohash() 154 buf[2*i] = hex[digest[i] >> 4]; in dohash() 155 buf[2*i+1] = hex[digest[i] & 0x0f]; in dohash()
|
/dragonfly/crypto/libressl/crypto/hkdf/ |
H A D | hkdf.c | 29 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF() argument 36 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF() 39 if (!HKDF_expand(out_key, out_len, digest, prk, prk_len, info, in HKDF() 49 const EVP_MD *digest, const uint8_t *secret, size_t secret_len, in HKDF_extract() argument 58 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == in HKDF_extract() 70 const EVP_MD *digest, const uint8_t *prk, size_t prk_len, in HKDF_expand() argument 73 const size_t digest_len = EVP_MD_size(digest); in HKDF_expand() 88 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) in HKDF_expand()
|
/dragonfly/usr.bin/dsynth/ |
H A D | repo.c | 585 uint8_t digest[MD5_DIGEST_LENGTH]; in md5lkfile() local 597 MD5(mstr, strlen(mstr), digest); in md5lkfile() 605 digest[0], digest[1], digest[2], digest[3], in md5lkfile() 606 digest[4], digest[5], digest[6], digest[7], in md5lkfile() 607 digest[8], digest[9], digest[10], digest[11], in md5lkfile() 608 digest[12], digest[13], digest[14], digest[15]); in md5lkfile()
|
/dragonfly/libexec/dma/ |
H A D | crypto.c | 226 unsigned char* digest) in hmac_md5() argument 280 MD5_Final(digest, &context); /* finish up 1st pass */ in hmac_md5() 287 MD5_Update(&context, digest, 16); /* then results of 1st in hmac_md5() 289 MD5_Final(digest, &context); /* finish up 2nd pass */ in hmac_md5() 298 unsigned char digest[BUF_SIZE]; in smtp_auth_md5() local 306 memset(digest, 0, sizeof(digest)); in smtp_auth_md5() 322 (unsigned char *)password, strlen(password), digest); in smtp_auth_md5() 327 ascii_digest[2*i] = hextab[digest[i] >> 4]; in smtp_auth_md5() 328 ascii_digest[2*i+1] = hextab[digest[i] & 15]; in smtp_auth_md5()
|
/dragonfly/contrib/dhcpcd/compat/crypt/ |
H A D | hmac.c | 146 void *digest, size_t dlen) in hmac() argument 172 p = dlen >= h->digsize ? digest : d; in hmac() 173 if (p != digest) { in hmac() 174 memcpy(p, digest, dlen); in hmac() 184 (*h->update)(c, digest, (unsigned int)h->digsize); in hmac() 187 if (p != digest) in hmac() 188 memcpy(digest, p, dlen); in hmac()
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | ts.c | 125 char *digest; member 232 .opt.arg = &ts_config.digest, 443 ts_config.digest == NULL) || in ts_main() 445 ts_config.digest == NULL) || in ts_main() 447 ts_config.digest != NULL)) && in ts_main() 549 if (digest == NULL && in query_command() 553 query = create_query(data_bio, digest, md, in query_command() 717 *md_value = string_to_hex(digest, &digest_len); in create_digest() 1125 if (data != NULL || digest != NULL) { in create_verify_ctx() 1136 } else if (digest != NULL) { in create_verify_ctx() [all …]
|
/dragonfly/sys/crypto/sha2/ |
H A D | sha2.c | 565 if (digest != NULL) { in SHA256_Final() 621 sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest; in SHA256_End() local 628 SHA256_Final(digest, context); in SHA256_End() 639 bzero(digest, SHA256_DIGEST_LENGTH); in SHA256_End() 648 return SHA256_End(&context, digest); in SHA256_Data() 927 if (digest != NULL) { in SHA512_Final() 950 sha2_byte digest[SHA512_DIGEST_LENGTH], *d = digest; in SHA512_End() local 957 SHA512_Final(digest, context); in SHA512_End() 1002 if (digest != NULL) { in SHA384_Final() 1025 sha2_byte digest[SHA384_DIGEST_LENGTH], *d = digest; in SHA384_End() local [all …]
|
/dragonfly/libexec/ftpd/ |
H A D | site_md5.c | 41 unsigned char digest[MD5_DIGEST_LENGTH]; in sitemd5() local 82 MD5_Final(digest, &ctx); in sitemd5() 84 buf[2*i] = hex[digest[i] >> 4]; in sitemd5() 85 buf[2*i+1] = hex[digest[i] & 0x0f]; in sitemd5()
|
/dragonfly/sys/kern/ |
H A D | subr_csprng.c | 181 uint8_t digest[SHA256_DIGEST_LENGTH]; in csprng_reseed() local 212 SHA256_Final(digest, &pool->hash_ctx); in csprng_reseed() 219 csprng_pool_init(pool, digest, sizeof(digest)); in csprng_reseed() 225 SHA256_Update(&hash_ctx, digest, sizeof(digest)); in csprng_reseed()
|
/dragonfly/usr.sbin/ppp/ |
H A D | chap.c | 132 char *result, *digest; in chap_BuildAnswer() local 151 memset(digest + 24, '\0', 25); in chap_BuildAnswer() 154 memset(digest, '\0', 25); in chap_BuildAnswer() 155 digest += 24; in chap_BuildAnswer() 168 MD4_Final(digest, &MD4context); in chap_BuildAnswer() 175 mschap_NT(digest, challenge + 1); in chap_BuildAnswer() 196 digest = result; in chap_BuildAnswer() 235 digest = result; in chap_BuildAnswer() 236 *digest++ = 16; /* value size */ in chap_BuildAnswer() 242 MD5_Final(digest, &MD5context); in chap_BuildAnswer() [all …]
|
/dragonfly/crypto/libressl/crypto/rsa/ |
H A D | rsa_sign.c | 94 ASN1_OCTET_STRING digest; in encode_pkcs1() local 112 sig.digest = &digest; in encode_pkcs1() 113 sig.digest->data = (unsigned char *)m; /* TMP UGLY CAST */ in encode_pkcs1() 114 sig.digest->length = m_len; in encode_pkcs1()
|
/dragonfly/contrib/tcpdump/ |
H A D | signature.c | 51 unsigned int key_len, uint8_t *digest) in signature_compute_hmac_md5() argument 101 MD5_Final(digest, &context); /* finish up 1st pass */ in signature_compute_hmac_md5() 108 MD5_Update(&context, digest, 16); /* then results of 1st hash */ in signature_compute_hmac_md5() 109 MD5_Final(digest, &context); /* finish up 2nd pass */ in signature_compute_hmac_md5()
|
/dragonfly/contrib/ldns/ |
H A D | sha2.c | 558 sha2_word32 *d = (sha2_word32*)digest; in ldns_sha256_final() 566 if (digest != (sha2_byte*)0) { in ldns_sha256_final() 629 ldns_sha256_final(digest, &ctx); in ldns_sha256() 630 return digest; in ldns_sha256() 909 sha2_word64 *d = (sha2_word64*)digest; in ldns_sha512_final() 915 if (digest != (sha2_byte*)0) { in ldns_sha512_final() 943 ldns_sha512_final(digest, &ctx); in ldns_sha512() 944 return digest; in ldns_sha512() 968 if (digest != (sha2_byte*)0) { in ldns_sha384_final() 996 ldns_sha384_final(digest, &ctx); in ldns_sha384() [all …]
|