HomeSort by relevance Sort by last modified time
    Searched refs:md (Results 1 - 25 of 253) sorted by null

1 2 3 4 5 6 7 8 91011

  /external/openssl/crypto/mdc2/
mdc2_one.c 63 unsigned char *MDC2(const unsigned char *d, size_t n, unsigned char *md)
68 if (md == NULL) md=m;
72 MDC2_Final(md,&c);
74 return(md);
  /external/openssl/crypto/ripemd/
rmd_one.c 65 unsigned char *md)
70 if (md == NULL) md=m;
74 RIPEMD160_Final(md,&c);
76 return(md);
  /external/openssl/crypto/sha/
sha1_one.c 65 unsigned char *SHA1(const unsigned char *d, size_t n, unsigned char *md)
70 if (md == NULL) md=m;
74 SHA1_Final(md,&c);
76 return(md);
  /external/qemu/telephony/
modem_driver.c 43 ModemDriver* md = _md; local
46 qemu_chr_write(md->cs, (const uint8_t*)message, len);
52 ModemDriver* md = _md; local
53 int ret = sizeof(md->in_buff) - md->in_pos;
62 ModemDriver* md = _md; local
83 if (md->in_sms) {
87 md->in_buff[ md->in_pos ] = c;
88 md->in_pos++
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/
md2.c 60 static void md2_update_chksum(hash_state *md)
64 L = md->md2.chksum[15];
70 L = (md->md2.chksum[j] ^= PI_SUBST[(int)(md->md2.buf[j] ^ L)] & 255);
74 static void md2_compress(hash_state *md)
81 md->md2.X[16+j] = md->md2.buf[j];
82 md->md2.X[32+j] = md->md2.X[j] ^ md->md2.X[16+j]
    [all...]
sha1.c 45 static int _sha1_compress(hash_state *md, unsigned char *buf)
47 static int sha1_compress(hash_state *md, unsigned char *buf)
61 a = md->sha1.state[0];
62 b = md->sha1.state[1];
63 c = md->sha1.state[2];
64 d = md->sha1.state[3];
65 e = md->sha1.state[4];
141 md->sha1.state[0] = md->sha1.state[0] + a;
142 md->sha1.state[1] = md->sha1.state[1] + b
    [all...]
md4.c 76 static int _md4_compress(hash_state *md, unsigned char *buf)
78 static int md4_compress(hash_state *md, unsigned char *buf)
85 a = md->md4.state[0];
86 b = md->md4.state[1];
87 c = md->md4.state[2];
88 d = md->md4.state[3];
151 md->md4.state[0] = md->md4.state[0] + a;
152 md->md4.state[1] = md->md4.state[1] + b
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/helper/
hash_memory.c 29 hash_state *md; local
45 md = XMALLOC(sizeof(hash_state));
46 if (md == NULL) {
50 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) {
53 if ((err = hash_descriptor[hash].process(md, in, inlen)) != CRYPT_OK) {
56 err = hash_descriptor[hash].done(md, out);
60 zeromem(md, sizeof(hash_state));
62 XFREE(md);
hash_memory_multi.c 31 hash_state *md; local
50 md = XMALLOC(sizeof(hash_state));
51 if (md == NULL) {
55 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) {
64 if ((err = hash_descriptor[hash].process(md, curptr, curlen)) != CRYPT_OK) {
74 err = hash_descriptor[hash].done(md, out);
78 zeromem(md, sizeof(hash_state));
80 XFREE(md);
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
MessageDigest1Test.java 40 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
41 md.reset();
42 assertTrue(md.runEngineReset);
49 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
50 md.update((byte) 1);
51 assertTrue(md.runEngineUpdate1);
58 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
60 md.update(bytes, 1, 2);
61 assertTrue(md.runEngineUpdate2);
66 md.update(null, 0, 1)
102 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
112 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
127 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
136 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
146 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
214 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
222 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
230 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
238 MessageDigest md = null; local
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/sha2/
sha384.c 36 @param md The hash state you wish to initialize
39 int sha384_init(hash_state * md)
41 LTC_ARGCHK(md != NULL);
43 md->sha512.curlen = 0;
44 md->sha512.length = 0;
45 md->sha512.state[0] = CONST64(0xcbbb9d5dc1059ed8);
46 md->sha512.state[1] = CONST64(0x629a292a367cd507);
47 md->sha512.state[2] = CONST64(0x9159015a3070dd17);
48 md->sha512.state[3] = CONST64(0x152fecd8f70e5939);
49 md->sha512.state[4] = CONST64(0x67332667ffc00b31)
    [all...]
sha224.c 37 @param md The hash state you wish to initialize
40 int sha224_init(hash_state * md)
42 LTC_ARGCHK(md != NULL);
44 md->sha256.curlen = 0;
45 md->sha256.length = 0;
46 md->sha256.state[0] = 0xc1059ed8UL;
47 md->sha256.state[1] = 0x367cd507UL;
48 md->sha256.state[2] = 0x3070dd17UL;
49 md->sha256.state[3] = 0xf70e5939UL;
50 md->sha256.state[4] = 0xffc00b31UL
    [all...]
sha512.c 94 static int _sha512_compress(hash_state * md, unsigned char *buf)
96 static int sha512_compress(hash_state * md, unsigned char *buf)
104 S[i] = md->sha512.state[i];
153 md->sha512.state[i] = md->sha512.state[i] + S[i];
161 static int sha512_compress(hash_state * md, unsigned char *buf)
164 err = _sha512_compress(md, buf);
172 @param md The hash state you wish to initialize
175 int sha512_init(hash_state * md)
177 LTC_ARGCHK(md != NULL)
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_hash.h 196 int chc_init(hash_state * md);
197 int chc_process(hash_state * md, const unsigned char *in, unsigned long inlen);
198 int chc_done(hash_state * md, unsigned char *hash);
204 int whirlpool_init(hash_state * md);
205 int whirlpool_process(hash_state * md, const unsigned char *in, unsigned long inlen);
206 int whirlpool_done(hash_state * md, unsigned char *hash);
212 int sha512_init(hash_state * md);
213 int sha512_process(hash_state * md, const unsigned char *in, unsigned long inlen);
214 int sha512_done(hash_state * md, unsigned char *hash);
223 int sha384_init(hash_state * md);
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/chc/
chc.c 84 @param md The hash state you wish to initialize
87 int chc_init(hash_state *md)
93 LTC_ARGCHK(md != NULL);
116 cipher_descriptor[cipher_idx].ecb_encrypt(buf, md->chc.state, key);
119 md->chc.length = 0;
120 md->chc.curlen = 0;
121 zeromem(md->chc.buf, sizeof(md->chc.buf));
132 static int chc_compress(hash_state *md, unsigned char *buf)
141 if ((err = cipher_descriptor[cipher_idx].setup(md->chc.state, cipher_blocksize, 0, key)) != CRYPT_OK)
256 md[MAXBLOCKSIZE]; member in struct:__anon3449
268 hash_state md; local
    [all...]
  /external/dropbear/libtomcrypt/src/misc/pkcs5/
pkcs_5_1.c 36 hash_state *md; local
50 md = XMALLOC(sizeof(hash_state));
52 if (md == NULL || buf == NULL) {
53 if (md != NULL) {
54 XFREE(md);
63 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) {
66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) {
72 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) {
93 zeromem(md, sizeof(hash_state))
    [all...]
  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_mgf1.c 36 hash_state *md; local
51 md = XMALLOC(sizeof(hash_state));
53 if (md == NULL || buf == NULL) {
54 if (md != NULL) {
55 XFREE(md);
72 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) {
75 if ((err = hash_descriptor[hash_idx].process(md, seed, seedlen)) != CRYPT_OK) {
78 if ((err = hash_descriptor[hash_idx].process(md, buf, 4)) != CRYPT_OK) {
81 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) {
95 zeromem(md, sizeof(hash_state))
    [all...]
  /external/wpa_supplicant/
sha256.c 165 static void sha256_init(struct sha256_state *md);
166 static int sha256_process(struct sha256_state *md, const unsigned char *in,
168 static int sha256_done(struct sha256_state *md, unsigned char *out);
231 static int sha256_compress(struct sha256_state *md, unsigned char *buf)
239 S[i] = md->state[i];
267 md->state[i] = md->state[i] + S[i];
274 static void sha256_init(struct sha256_state *md)
276 md->curlen = 0;
277 md->length = 0
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
sha256.c 168 static void sha256_init(struct sha256_state *md);
169 static int sha256_process(struct sha256_state *md, const unsigned char *in,
171 static int sha256_done(struct sha256_state *md, unsigned char *out);
234 static int sha256_compress(struct sha256_state *md, unsigned char *buf)
242 S[i] = md->state[i];
270 md->state[i] = md->state[i] + S[i];
277 static void sha256_init(struct sha256_state *md)
279 md->curlen = 0;
280 md->length = 0
    [all...]
  /external/openssl/crypto/md4/
md4test.c 96 static char *pt(unsigned char *md);
102 unsigned char md[MD4_DIGEST_LENGTH]; local
109 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_md4(), NULL);
110 p=pt(md);
127 static char *pt(unsigned char *md)
133 sprintf(&(buf[i*2]),"%02x",md[i]);
md4_one.c 68 unsigned char *MD4(const unsigned char *d, size_t n, unsigned char *md)
73 if (md == NULL) md=m;
93 MD4_Final(md,&c);
95 return(md);
  /external/openssl/crypto/md5/
md5_one.c 68 unsigned char *MD5(const unsigned char *d, size_t n, unsigned char *md)
73 if (md == NULL) md=m;
93 MD5_Final(md,&c);
95 return(md);
  /external/openssl/crypto/evp/
bio_ok.c 153 EVP_MD_CTX md; member in struct:ok_struct
193 EVP_MD_CTX_init(&ctx->md);
204 EVP_MD_CTX_cleanup(&((BIO_OK_CTX *)a->ptr)->md);
347 EVP_MD *md; local
410 md=ptr;
411 EVP_DigestInit_ex(&ctx->md, md, NULL);
418 *ppmd=ctx->md.digest;
461 EVP_MD_CTX *md; local
464 md=&ctx->md
487 EVP_MD_CTX *md; local
524 EVP_MD_CTX *md; local
544 EVP_MD_CTX *md; local
    [all...]
  /bionic/libc/kernel/common/linux/raid/
xor.h 15 #include <linux/raid/md.h>
  /development/ndk/platforms/android-3/include/linux/raid/
xor.h 15 #include <linux/raid/md.h>

Completed in 188 milliseconds

1 2 3 4 5 6 7 8 91011