Home
last modified time | relevance | path

Searched refs:digest (Results 1 – 25 of 131) sorted by relevance

123456

/dragonfly/crypto/libressl/crypto/evp/
H A Ddigest.c177 } else if (!ctx->digest) { in EVP_DigestInit_ex()
182 if (ctx->digest != type) { in EVP_DigestInit_ex()
183 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data && in EVP_DigestInit_ex()
188 ctx->digest = type; in EVP_DigestInit_ex()
245 if (ctx->digest->cleanup) { in EVP_DigestFinal_ex()
246 ctx->digest->cleanup(ctx); in EVP_DigestFinal_ex()
277 if (out->digest == in->digest) { in EVP_MD_CTX_copy_ex()
316 if (out->digest->copy) in EVP_MD_CTX_copy_ex()
388 if (ctx->digest && ctx->digest->cleanup && in EVP_MD_CTX_cleanup()
391 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data && in EVP_MD_CTX_cleanup()
[all …]
/dragonfly/crypto/openssh/
H A Ddigest-openssl.c94 const struct ssh_digest *digest = ssh_digest_by_alg(alg); in ssh_digest_alg_name() local
96 return digest == NULL ? NULL : digest->name; in ssh_digest_alg_name()
102 const struct ssh_digest *digest = ssh_digest_by_alg(alg); in ssh_digest_bytes() local
104 return digest == NULL ? 0 : digest->digest_len; in ssh_digest_bytes()
116 const struct ssh_digest *digest = ssh_digest_by_alg(alg); in ssh_digest_start() local
164 if (digest == NULL || dlen > UINT_MAX) in ssh_digest_final()
166 if (dlen < digest->digest_len) /* No truncation allowed */ in ssh_digest_final()
170 if (l != digest->digest_len) /* sanity */ in ssh_digest_final()
187 const struct ssh_digest *digest = ssh_digest_by_alg(alg); in ssh_digest_memory() local
190 if (digest == NULL) in ssh_digest_memory()
[all …]
H A Dhmac.c33 struct ssh_digest_ctx *digest; member
54 (ret->digest = ssh_digest_start(alg)) == NULL) in ssh_hmac_start()
97 return ssh_digest_update(ctx->digest, m, mlen); in ssh_hmac_update()
103 return ssh_digest_update_buffer(ctx->digest, b); in ssh_hmac_update_buffer()
113 ssh_digest_final(ctx->digest, ctx->buf, len)) in ssh_hmac_final()
118 ssh_digest_final(ctx->digest, d, dlen) < 0) in ssh_hmac_final()
129 ssh_digest_free(ctx->digest); in ssh_hmac_free()
146 u_char digest[16]; in hmac_test() local
152 ssh_hmac_final(ctx, digest, sizeof(digest)) < 0) in hmac_test()
156 if (memcmp(e, digest, elen)) { in hmac_test()
[all …]
H A Dssh-ecdsa.c56 u_char digest[SSH_DIGEST_MAX_LENGTH]; in ssh_ecdsa_sign() local
74 digest, sizeof(digest))) != 0) in ssh_ecdsa_sign()
77 if ((sig = ECDSA_do_sign(digest, dlen, key->ecdsa)) == NULL) { in ssh_ecdsa_sign()
105 explicit_bzero(digest, sizeof(digest)); in ssh_ecdsa_sign()
121 u_char digest[SSH_DIGEST_MAX_LENGTH]; in ssh_ecdsa_verify() local
174 digest, sizeof(digest))) != 0) in ssh_ecdsa_verify()
177 switch (ECDSA_do_verify(digest, dlen, sig, key->ecdsa)) { in ssh_ecdsa_verify()
190 explicit_bzero(digest, sizeof(digest)); in ssh_ecdsa_verify()
H A Dssh-dss.c57 u_char digest[SSH_DIGEST_MAX_LENGTH], sigblob[SIGBLOB_LEN]; in ssh_dss_sign() local
74 digest, sizeof(digest))) != 0) in ssh_dss_sign()
77 if ((sig = DSA_do_sign(digest, dlen, key->dsa)) == NULL) { in ssh_dss_sign()
113 explicit_bzero(digest, sizeof(digest)); in ssh_dss_sign()
126 u_char digest[SSH_DIGEST_MAX_LENGTH], *sigblob = NULL; in ssh_dss_verify() local
181 digest, sizeof(digest))) != 0) in ssh_dss_verify()
184 switch (DSA_do_verify(digest, dlen, sig, key->dsa)) { in ssh_dss_verify()
197 explicit_bzero(digest, sizeof(digest)); in ssh_dss_verify()
H A Dssh-rsa.c168 u_char digest[SSH_DIGEST_MAX_LENGTH], *sig = NULL; in ssh_rsa_sign() local
198 digest, sizeof(digest))) != 0) in ssh_rsa_sign()
206 if (RSA_sign(nid, digest, dlen, sig, &len, key->rsa) != 1) { in ssh_rsa_sign()
238 explicit_bzero(digest, sizeof(digest)); in ssh_rsa_sign()
254 u_char digest[SSH_DIGEST_MAX_LENGTH], *osigblob, *sigblob = NULL; in ssh_rsa_verify() local
318 digest, sizeof(digest))) != 0) in ssh_rsa_verify()
321 ret = openssh_RSA_verify(hash_alg, digest, dlen, sigblob, len, in ssh_rsa_verify()
327 explicit_bzero(digest, sizeof(digest)); in ssh_rsa_verify()
H A Ddns.c82 u_char **digest, size_t *digest_len, struct sshkey *key) in dns_read_key() argument
119 if ((r = sshkey_fingerprint_raw(key, fp_alg, digest, in dns_read_key()
124 *digest = NULL; in dns_read_key()
136 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) in dns_read_rdata() argument
149 *digest = xmalloc(*digest_len); in dns_read_rdata()
150 memcpy(*digest, rdata + 2, *digest_len); in dns_read_rdata()
152 *digest = (u_char *)xstrdup(""); in dns_read_rdata()
/dragonfly/crypto/libressl/ssl/
H A Dtls13_key_schedule.c52 tls13_secrets_create(const EVP_MD *digest, int resumption) in tls13_secrets_create() argument
59 hash_length = EVP_MD_size(digest); in tls13_secrets_create()
104 if (!EVP_DigestInit_ex(mdctx, digest, NULL)) in tls13_secrets_create()
116 secrets->digest = digest; in tls13_secrets_create()
168 const EVP_MD *digest, const struct tls13_secret *secret, in tls13_hkdf_expand_label_with_length() argument
194 ret = HKDF_expand(out->data, out->len, digest, secret->data, in tls13_hkdf_expand_label_with_length()
250 secrets->digest, &secrets->extracted_early, "derived", in tls13_derive_early_secrets()
272 &secrets->extracted_handshake.len, secrets->digest, in tls13_derive_handshake_secrets()
317 &secrets->extracted_master.len, secrets->digest, in tls13_derive_application_secrets()
367 secrets->digest, &secrets->client_application_traffic, in tls13_update_client_traffic_secret()
[all …]
/dragonfly/sbin/iscontrol/
H A Dauth_subr.c53 chapMD5(char id, char *cp, char *chapSecret, unsigned char *digest) in chapMD5() argument
79 MD5_Final(digest, &ctx); in chapMD5()
86 chapSHA1(char id, char *cp, char *chapSecret, unsigned char *digest) in chapSHA1() argument
112 SHA1_Final(digest, &ctx); in chapSHA1()
128 unsigned char digest[20]; in chapDigest() local
134 if(strcmp(ap, "5") == 0 && chapMD5(id, cp, chapSecret, digest) == 0) in chapDigest()
142 return bin2str(encoding, digest, len); in chapDigest()
179 char *p, *ap, *ip, *cp, *chapSecret, *digest; in main() local
193 if((digest = chapDigest(ap, ip, cp, chapSecret)) != NULL) { in main()
194 len = str2bin(digest, &cp); in main()
[all …]
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dfips_prf_wolfssl.c22 sha.digest[0] = state[0]; in sha1_transform()
23 sha.digest[1] = state[1]; in sha1_transform()
24 sha.digest[2] = state[2]; in sha1_transform()
25 sha.digest[3] = state[3]; in sha1_transform()
26 sha.digest[4] = state[4]; in sha1_transform()
28 state[0] = sha.digest[0]; in sha1_transform()
29 state[1] = sha.digest[1]; in sha1_transform()
30 state[2] = sha.digest[2]; in sha1_transform()
31 state[3] = sha.digest[3]; in sha1_transform()
32 state[4] = sha.digest[4]; in sha1_transform()
H A Dsha1-pbkdf2.c16 u8 *digest) in pbkdf2_sha1_f() argument
43 os_memcpy(digest, tmp, SHA1_MAC_LEN); in pbkdf2_sha1_f()
51 digest[j] ^= tmp2[j]; in pbkdf2_sha1_f()
78 unsigned char digest[SHA1_MAC_LEN]; in pbkdf2_sha1() local
83 count, digest)) in pbkdf2_sha1()
86 os_memcpy(pos, digest, plen); in pbkdf2_sha1()
/dragonfly/sys/crypto/
H A Dsha1.c245 u_int8_t *digest; in sha1_result() local
252 digest[0] = ctxt->h.b8[3]; digest[1] = ctxt->h.b8[2]; in sha1_result()
253 digest[2] = ctxt->h.b8[1]; digest[3] = ctxt->h.b8[0]; in sha1_result()
254 digest[4] = ctxt->h.b8[7]; digest[5] = ctxt->h.b8[6]; in sha1_result()
255 digest[6] = ctxt->h.b8[5]; digest[7] = ctxt->h.b8[4]; in sha1_result()
256 digest[8] = ctxt->h.b8[11]; digest[9] = ctxt->h.b8[10]; in sha1_result()
257 digest[10] = ctxt->h.b8[9]; digest[11] = ctxt->h.b8[8]; in sha1_result()
258 digest[12] = ctxt->h.b8[15]; digest[13] = ctxt->h.b8[14]; in sha1_result()
259 digest[14] = ctxt->h.b8[13]; digest[15] = ctxt->h.b8[12]; in sha1_result()
260 digest[16] = ctxt->h.b8[19]; digest[17] = ctxt->h.b8[18]; in sha1_result()
[all …]
/dragonfly/usr.sbin/mtree/
H A Dhash.c56 unsigned char digest[HEX_DIGEST_LENGTH]; in dohash() local
141 MD5_Final(digest, ctx); in dohash()
143 RIPEMD160_Final(digest, ctx); in dohash()
145 SHA1_Final(digest, ctx); in dohash()
147 SHA256_Final(digest, ctx); in dohash()
149 SHA384_Final(digest, ctx); in dohash()
151 SHA512_Final(digest, ctx); in dohash()
154 buf[2*i] = hex[digest[i] >> 4]; in dohash()
155 buf[2*i+1] = hex[digest[i] & 0x0f]; in dohash()
/dragonfly/crypto/libressl/crypto/hkdf/
H A Dhkdf.c29 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF() argument
36 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF()
39 if (!HKDF_expand(out_key, out_len, digest, prk, prk_len, info, in HKDF()
49 const EVP_MD *digest, const uint8_t *secret, size_t secret_len, in HKDF_extract() argument
58 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == in HKDF_extract()
70 const EVP_MD *digest, const uint8_t *prk, size_t prk_len, in HKDF_expand() argument
73 const size_t digest_len = EVP_MD_size(digest); in HKDF_expand()
88 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) in HKDF_expand()
/dragonfly/usr.bin/dsynth/
H A Drepo.c585 uint8_t digest[MD5_DIGEST_LENGTH]; in md5lkfile() local
597 MD5(mstr, strlen(mstr), digest); in md5lkfile()
605 digest[0], digest[1], digest[2], digest[3], in md5lkfile()
606 digest[4], digest[5], digest[6], digest[7], in md5lkfile()
607 digest[8], digest[9], digest[10], digest[11], in md5lkfile()
608 digest[12], digest[13], digest[14], digest[15]); in md5lkfile()
/dragonfly/libexec/dma/
H A Dcrypto.c226 unsigned char* digest) in hmac_md5() argument
280 MD5_Final(digest, &context); /* finish up 1st pass */ in hmac_md5()
287 MD5_Update(&context, digest, 16); /* then results of 1st in hmac_md5()
289 MD5_Final(digest, &context); /* finish up 2nd pass */ in hmac_md5()
298 unsigned char digest[BUF_SIZE]; in smtp_auth_md5() local
306 memset(digest, 0, sizeof(digest)); in smtp_auth_md5()
322 (unsigned char *)password, strlen(password), digest); in smtp_auth_md5()
327 ascii_digest[2*i] = hextab[digest[i] >> 4]; in smtp_auth_md5()
328 ascii_digest[2*i+1] = hextab[digest[i] & 15]; in smtp_auth_md5()
/dragonfly/contrib/dhcpcd/compat/crypt/
H A Dhmac.c146 void *digest, size_t dlen) in hmac() argument
172 p = dlen >= h->digsize ? digest : d; in hmac()
173 if (p != digest) { in hmac()
174 memcpy(p, digest, dlen); in hmac()
184 (*h->update)(c, digest, (unsigned int)h->digsize); in hmac()
187 if (p != digest) in hmac()
188 memcpy(digest, p, dlen); in hmac()
/dragonfly/crypto/libressl/apps/openssl/
H A Dts.c125 char *digest; member
232 .opt.arg = &ts_config.digest,
443 ts_config.digest == NULL) || in ts_main()
445 ts_config.digest == NULL) || in ts_main()
447 ts_config.digest != NULL)) && in ts_main()
549 if (digest == NULL && in query_command()
553 query = create_query(data_bio, digest, md, in query_command()
717 *md_value = string_to_hex(digest, &digest_len); in create_digest()
1125 if (data != NULL || digest != NULL) { in create_verify_ctx()
1136 } else if (digest != NULL) { in create_verify_ctx()
[all …]
/dragonfly/sys/crypto/sha2/
H A Dsha2.c565 if (digest != NULL) { in SHA256_Final()
621 sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest; in SHA256_End() local
628 SHA256_Final(digest, context); in SHA256_End()
639 bzero(digest, SHA256_DIGEST_LENGTH); in SHA256_End()
648 return SHA256_End(&context, digest); in SHA256_Data()
927 if (digest != NULL) { in SHA512_Final()
950 sha2_byte digest[SHA512_DIGEST_LENGTH], *d = digest; in SHA512_End() local
957 SHA512_Final(digest, context); in SHA512_End()
1002 if (digest != NULL) { in SHA384_Final()
1025 sha2_byte digest[SHA384_DIGEST_LENGTH], *d = digest; in SHA384_End() local
[all …]
/dragonfly/libexec/ftpd/
H A Dsite_md5.c41 unsigned char digest[MD5_DIGEST_LENGTH]; in sitemd5() local
82 MD5_Final(digest, &ctx); in sitemd5()
84 buf[2*i] = hex[digest[i] >> 4]; in sitemd5()
85 buf[2*i+1] = hex[digest[i] & 0x0f]; in sitemd5()
/dragonfly/sys/kern/
H A Dsubr_csprng.c181 uint8_t digest[SHA256_DIGEST_LENGTH]; in csprng_reseed() local
212 SHA256_Final(digest, &pool->hash_ctx); in csprng_reseed()
219 csprng_pool_init(pool, digest, sizeof(digest)); in csprng_reseed()
225 SHA256_Update(&hash_ctx, digest, sizeof(digest)); in csprng_reseed()
/dragonfly/usr.sbin/ppp/
H A Dchap.c132 char *result, *digest; in chap_BuildAnswer() local
151 memset(digest + 24, '\0', 25); in chap_BuildAnswer()
154 memset(digest, '\0', 25); in chap_BuildAnswer()
155 digest += 24; in chap_BuildAnswer()
168 MD4_Final(digest, &MD4context); in chap_BuildAnswer()
175 mschap_NT(digest, challenge + 1); in chap_BuildAnswer()
196 digest = result; in chap_BuildAnswer()
235 digest = result; in chap_BuildAnswer()
236 *digest++ = 16; /* value size */ in chap_BuildAnswer()
242 MD5_Final(digest, &MD5context); in chap_BuildAnswer()
[all …]
/dragonfly/crypto/libressl/crypto/rsa/
H A Drsa_sign.c94 ASN1_OCTET_STRING digest; in encode_pkcs1() local
112 sig.digest = &digest; in encode_pkcs1()
113 sig.digest->data = (unsigned char *)m; /* TMP UGLY CAST */ in encode_pkcs1()
114 sig.digest->length = m_len; in encode_pkcs1()
/dragonfly/contrib/tcpdump/
H A Dsignature.c51 unsigned int key_len, uint8_t *digest) in signature_compute_hmac_md5() argument
101 MD5_Final(digest, &context); /* finish up 1st pass */ in signature_compute_hmac_md5()
108 MD5_Update(&context, digest, 16); /* then results of 1st hash */ in signature_compute_hmac_md5()
109 MD5_Final(digest, &context); /* finish up 2nd pass */ in signature_compute_hmac_md5()
/dragonfly/contrib/ldns/
H A Dsha2.c558 sha2_word32 *d = (sha2_word32*)digest; in ldns_sha256_final()
566 if (digest != (sha2_byte*)0) { in ldns_sha256_final()
629 ldns_sha256_final(digest, &ctx); in ldns_sha256()
630 return digest; in ldns_sha256()
909 sha2_word64 *d = (sha2_word64*)digest; in ldns_sha512_final()
915 if (digest != (sha2_byte*)0) { in ldns_sha512_final()
943 ldns_sha512_final(digest, &ctx); in ldns_sha512()
944 return digest; in ldns_sha512()
968 if (digest != (sha2_byte*)0) { in ldns_sha384_final()
996 ldns_sha384_final(digest, &ctx); in ldns_sha384()
[all …]

123456