/external/openssl/crypto/mdc2/ |
mdc2_one.c | 63 unsigned char *MDC2(const unsigned char *d, size_t n, unsigned char *md) 68 if (md == NULL) md=m; 72 MDC2_Final(md,&c); 74 return(md);
|
/external/openssl/crypto/ripemd/ |
rmd_one.c | 65 unsigned char *md) 70 if (md == NULL) md=m; 74 RIPEMD160_Final(md,&c); 76 return(md);
|
/external/openssl/crypto/sha/ |
sha1_one.c | 65 unsigned char *SHA1(const unsigned char *d, size_t n, unsigned char *md) 70 if (md == NULL) md=m; 74 SHA1_Final(md,&c); 76 return(md);
|
/external/qemu/telephony/ |
modem_driver.c | 43 ModemDriver* md = _md; local 46 qemu_chr_write(md->cs, (const uint8_t*)message, len); 52 ModemDriver* md = _md; local 53 int ret = sizeof(md->in_buff) - md->in_pos; 62 ModemDriver* md = _md; local 83 if (md->in_sms) { 87 md->in_buff[ md->in_pos ] = c; 88 md->in_pos++ [all...] |
/external/dropbear/libtomcrypt/src/hashes/ |
md2.c | 60 static void md2_update_chksum(hash_state *md) 64 L = md->md2.chksum[15]; 70 L = (md->md2.chksum[j] ^= PI_SUBST[(int)(md->md2.buf[j] ^ L)] & 255); 74 static void md2_compress(hash_state *md) 81 md->md2.X[16+j] = md->md2.buf[j]; 82 md->md2.X[32+j] = md->md2.X[j] ^ md->md2.X[16+j] [all...] |
sha1.c | 45 static int _sha1_compress(hash_state *md, unsigned char *buf) 47 static int sha1_compress(hash_state *md, unsigned char *buf) 61 a = md->sha1.state[0]; 62 b = md->sha1.state[1]; 63 c = md->sha1.state[2]; 64 d = md->sha1.state[3]; 65 e = md->sha1.state[4]; 141 md->sha1.state[0] = md->sha1.state[0] + a; 142 md->sha1.state[1] = md->sha1.state[1] + b [all...] |
md4.c | 76 static int _md4_compress(hash_state *md, unsigned char *buf) 78 static int md4_compress(hash_state *md, unsigned char *buf) 85 a = md->md4.state[0]; 86 b = md->md4.state[1]; 87 c = md->md4.state[2]; 88 d = md->md4.state[3]; 151 md->md4.state[0] = md->md4.state[0] + a; 152 md->md4.state[1] = md->md4.state[1] + b [all...] |
/external/dropbear/libtomcrypt/src/hashes/helper/ |
hash_memory.c | 29 hash_state *md; local 45 md = XMALLOC(sizeof(hash_state)); 46 if (md == NULL) { 50 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 53 if ((err = hash_descriptor[hash].process(md, in, inlen)) != CRYPT_OK) { 56 err = hash_descriptor[hash].done(md, out); 60 zeromem(md, sizeof(hash_state)); 62 XFREE(md);
|
hash_memory_multi.c | 31 hash_state *md; local 50 md = XMALLOC(sizeof(hash_state)); 51 if (md == NULL) { 55 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 64 if ((err = hash_descriptor[hash].process(md, curptr, curlen)) != CRYPT_OK) { 74 err = hash_descriptor[hash].done(md, out); 78 zeromem(md, sizeof(hash_state)); 80 XFREE(md);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest1Test.java | 40 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 41 md.reset(); 42 assertTrue(md.runEngineReset); 49 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 50 md.update((byte) 1); 51 assertTrue(md.runEngineUpdate1); 58 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 60 md.update(bytes, 1, 2); 61 assertTrue(md.runEngineUpdate2); 66 md.update(null, 0, 1) 102 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 112 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 127 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 136 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 146 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 214 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 222 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 230 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 238 MessageDigest md = null; local [all...] |
/external/dropbear/libtomcrypt/src/hashes/sha2/ |
sha384.c | 36 @param md The hash state you wish to initialize 39 int sha384_init(hash_state * md) 41 LTC_ARGCHK(md != NULL); 43 md->sha512.curlen = 0; 44 md->sha512.length = 0; 45 md->sha512.state[0] = CONST64(0xcbbb9d5dc1059ed8); 46 md->sha512.state[1] = CONST64(0x629a292a367cd507); 47 md->sha512.state[2] = CONST64(0x9159015a3070dd17); 48 md->sha512.state[3] = CONST64(0x152fecd8f70e5939); 49 md->sha512.state[4] = CONST64(0x67332667ffc00b31) [all...] |
sha224.c | 37 @param md The hash state you wish to initialize 40 int sha224_init(hash_state * md) 42 LTC_ARGCHK(md != NULL); 44 md->sha256.curlen = 0; 45 md->sha256.length = 0; 46 md->sha256.state[0] = 0xc1059ed8UL; 47 md->sha256.state[1] = 0x367cd507UL; 48 md->sha256.state[2] = 0x3070dd17UL; 49 md->sha256.state[3] = 0xf70e5939UL; 50 md->sha256.state[4] = 0xffc00b31UL [all...] |
sha512.c | 94 static int _sha512_compress(hash_state * md, unsigned char *buf) 96 static int sha512_compress(hash_state * md, unsigned char *buf) 104 S[i] = md->sha512.state[i]; 153 md->sha512.state[i] = md->sha512.state[i] + S[i]; 161 static int sha512_compress(hash_state * md, unsigned char *buf) 164 err = _sha512_compress(md, buf); 172 @param md The hash state you wish to initialize 175 int sha512_init(hash_state * md) 177 LTC_ARGCHK(md != NULL) [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_hash.h | 196 int chc_init(hash_state * md); 197 int chc_process(hash_state * md, const unsigned char *in, unsigned long inlen); 198 int chc_done(hash_state * md, unsigned char *hash); 204 int whirlpool_init(hash_state * md); 205 int whirlpool_process(hash_state * md, const unsigned char *in, unsigned long inlen); 206 int whirlpool_done(hash_state * md, unsigned char *hash); 212 int sha512_init(hash_state * md); 213 int sha512_process(hash_state * md, const unsigned char *in, unsigned long inlen); 214 int sha512_done(hash_state * md, unsigned char *hash); 223 int sha384_init(hash_state * md); [all...] |
/external/dropbear/libtomcrypt/src/hashes/chc/ |
chc.c | 84 @param md The hash state you wish to initialize 87 int chc_init(hash_state *md) 93 LTC_ARGCHK(md != NULL); 116 cipher_descriptor[cipher_idx].ecb_encrypt(buf, md->chc.state, key); 119 md->chc.length = 0; 120 md->chc.curlen = 0; 121 zeromem(md->chc.buf, sizeof(md->chc.buf)); 132 static int chc_compress(hash_state *md, unsigned char *buf) 141 if ((err = cipher_descriptor[cipher_idx].setup(md->chc.state, cipher_blocksize, 0, key)) != CRYPT_OK) 256 md[MAXBLOCKSIZE]; member in struct:__anon3449 268 hash_state md; local [all...] |
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_1.c | 36 hash_state *md; local 50 md = XMALLOC(sizeof(hash_state)); 52 if (md == NULL || buf == NULL) { 53 if (md != NULL) { 54 XFREE(md); 63 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) { 69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) { 72 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 93 zeromem(md, sizeof(hash_state)) [all...] |
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_mgf1.c | 36 hash_state *md; local 51 md = XMALLOC(sizeof(hash_state)); 53 if (md == NULL || buf == NULL) { 54 if (md != NULL) { 55 XFREE(md); 72 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 75 if ((err = hash_descriptor[hash_idx].process(md, seed, seedlen)) != CRYPT_OK) { 78 if ((err = hash_descriptor[hash_idx].process(md, buf, 4)) != CRYPT_OK) { 81 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 95 zeromem(md, sizeof(hash_state)) [all...] |
/external/wpa_supplicant/ |
sha256.c | 165 static void sha256_init(struct sha256_state *md); 166 static int sha256_process(struct sha256_state *md, const unsigned char *in, 168 static int sha256_done(struct sha256_state *md, unsigned char *out); 231 static int sha256_compress(struct sha256_state *md, unsigned char *buf) 239 S[i] = md->state[i]; 267 md->state[i] = md->state[i] + S[i]; 274 static void sha256_init(struct sha256_state *md) 276 md->curlen = 0; 277 md->length = 0 [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha256.c | 168 static void sha256_init(struct sha256_state *md); 169 static int sha256_process(struct sha256_state *md, const unsigned char *in, 171 static int sha256_done(struct sha256_state *md, unsigned char *out); 234 static int sha256_compress(struct sha256_state *md, unsigned char *buf) 242 S[i] = md->state[i]; 270 md->state[i] = md->state[i] + S[i]; 277 static void sha256_init(struct sha256_state *md) 279 md->curlen = 0; 280 md->length = 0 [all...] |
/external/openssl/crypto/md4/ |
md4test.c | 96 static char *pt(unsigned char *md); 102 unsigned char md[MD4_DIGEST_LENGTH]; local 109 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_md4(), NULL); 110 p=pt(md); 127 static char *pt(unsigned char *md) 133 sprintf(&(buf[i*2]),"%02x",md[i]);
|
md4_one.c | 68 unsigned char *MD4(const unsigned char *d, size_t n, unsigned char *md) 73 if (md == NULL) md=m; 93 MD4_Final(md,&c); 95 return(md);
|
/external/openssl/crypto/md5/ |
md5_one.c | 68 unsigned char *MD5(const unsigned char *d, size_t n, unsigned char *md) 73 if (md == NULL) md=m; 93 MD5_Final(md,&c); 95 return(md);
|
/external/openssl/crypto/evp/ |
bio_ok.c | 153 EVP_MD_CTX md; member in struct:ok_struct 193 EVP_MD_CTX_init(&ctx->md); 204 EVP_MD_CTX_cleanup(&((BIO_OK_CTX *)a->ptr)->md); 347 EVP_MD *md; local 410 md=ptr; 411 EVP_DigestInit_ex(&ctx->md, md, NULL); 418 *ppmd=ctx->md.digest; 461 EVP_MD_CTX *md; local 464 md=&ctx->md 487 EVP_MD_CTX *md; local 524 EVP_MD_CTX *md; local 544 EVP_MD_CTX *md; local [all...] |
/bionic/libc/kernel/common/linux/raid/ |
xor.h | 15 #include <linux/raid/md.h>
|
/development/ndk/platforms/android-3/include/linux/raid/ |
xor.h | 15 #include <linux/raid/md.h>
|