/external/dropbear/libtomcrypt/src/hashes/helper/ |
hash_memory.c | 29 hash_state *md; local 45 md = XMALLOC(sizeof(hash_state)); 46 if (md == NULL) { 50 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 53 if ((err = hash_descriptor[hash].process(md, in, inlen)) != CRYPT_OK) { 56 err = hash_descriptor[hash].done(md, out); 60 zeromem(md, sizeof(hash_state)); 62 XFREE(md);
|
hash_memory_multi.c | 31 hash_state *md; local 50 md = XMALLOC(sizeof(hash_state)); 51 if (md == NULL) { 55 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 64 if ((err = hash_descriptor[hash].process(md, curptr, curlen)) != CRYPT_OK) { 74 err = hash_descriptor[hash].done(md, out); 78 zeromem(md, sizeof(hash_state)); 80 XFREE(md);
|
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_1.c | 36 hash_state *md; local 50 md = XMALLOC(sizeof(hash_state)); 52 if (md == NULL || buf == NULL) { 53 if (md != NULL) { 54 XFREE(md); 63 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) { 69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) { 72 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 93 zeromem(md, sizeof(hash_state)) [all...] |
/libcore/luni/src/test/java/tests/api/javax/security/auth/ |
DestroyableTest.java | 57 myDestroyable md = new myDestroyable(); local 59 assertFalse(md.isDestroyed()); 60 md.destroy(); 61 assertTrue(md.isDestroyed());
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_mgf1.c | 36 hash_state *md; local 51 md = XMALLOC(sizeof(hash_state)); 53 if (md == NULL || buf == NULL) { 54 if (md != NULL) { 55 XFREE(md); 72 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 75 if ((err = hash_descriptor[hash_idx].process(md, seed, seedlen)) != CRYPT_OK) { 78 if ((err = hash_descriptor[hash_idx].process(md, buf, 4)) != CRYPT_OK) { 81 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 95 zeromem(md, sizeof(hash_state)) [all...] |
pkcs_1_pss_decode.c | 40 hash_state md; local 134 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) { 138 if ((err = hash_descriptor[hash_idx].process(&md, mask, 8)) != CRYPT_OK) { 141 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) { 144 if ((err = hash_descriptor[hash_idx].process(&md, DB+x, saltlen)) != CRYPT_OK) { 147 if ((err = hash_descriptor[hash_idx].done(&md, mask)) != CRYPT_OK) {
|
pkcs_1_pss_encode.c | 42 hash_state md; local 95 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) { 99 if ((err = hash_descriptor[hash_idx].process(&md, DB, 8)) != CRYPT_OK) { 102 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) { 105 if ((err = hash_descriptor[hash_idx].process(&md, salt, saltlen)) != CRYPT_OK) { 108 if ((err = hash_descriptor[hash_idx].done(&md, hash)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/demos/ |
hashsum.c | 21 hash_state md; local 41 hash_descriptor[idx].init(&md); 44 hash_descriptor[idx].process(&md, hash_buffer, x); 46 hash_descriptor[idx].done(&md, hash_buffer);
|
/external/openssl/crypto/mdc2/ |
mdc2test.c | 96 unsigned char md[MDC2_DIGEST_LENGTH]; local 108 EVP_DigestFinal_ex(&c,&(md[0]),NULL); 110 if (memcmp(md,pad1,MDC2_DIGEST_LENGTH) != 0) 113 printf("%02X",md[i]); 127 EVP_DigestFinal_ex(&c,&(md[0]),NULL); 129 if (memcmp(md,pad2,MDC2_DIGEST_LENGTH) != 0) 132 printf("%02X",md[i]);
|
/external/openssl/crypto/sha/ |
sha256t.c | 58 { unsigned char md[SHA256_DIGEST_LENGTH]; local 64 EVP_Digest ("abc",3,md,NULL,EVP_sha256(),NULL); 65 if (memcmp(md,app_b1,sizeof(app_b1))) 74 "ijkljklm""klmnlmno""mnopnopq",56,md,NULL,EVP_sha256(),NULL); 75 if (memcmp(md,app_b2,sizeof(app_b2))) 92 EVP_DigestFinal_ex (&evp,md,NULL); 95 if (memcmp(md,app_b3,sizeof(app_b3))) 107 EVP_Digest ("abc",3,md,NULL,EVP_sha224(),NULL); 108 if (memcmp(md,addenum_1,sizeof(addenum_1))) 117 "ijkljklm""klmnlmno""mnopnopq",56,md,NULL,EVP_sha224(),NULL) [all...] |
sha.c | 66 void pt(unsigned char *md); 99 unsigned char md[SHA_DIGEST_LENGTH]; local 112 SHA_Final(&(md[0]),&c); 113 pt(md); 116 void pt(unsigned char *md) 121 printf("%02x",md[i]);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest1Test.java | 40 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 41 md.reset(); 42 assertTrue(md.runEngineReset); 49 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 50 md.update((byte) 1); 51 assertTrue(md.runEngineUpdate1); 58 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 60 md.update(bytes, 1, 2); 61 assertTrue(md.runEngineUpdate2); 66 md.update(null, 0, 1) 102 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 112 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 127 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 136 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 146 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 214 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 222 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 230 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 238 MessageDigest md = null; local [all...] |
/external/dropbear/libtomcrypt/src/prngs/ |
yarrow.c | 137 hash_state md; local 151 if ((err = hash_descriptor[prng->yarrow.hash].init(&md)) != CRYPT_OK) { 157 if ((err = hash_descriptor[prng->yarrow.hash].process(&md, prng->yarrow.pool, 164 if ((err = hash_descriptor[prng->yarrow.hash].process(&md, in, inlen)) != CRYPT_OK) { 170 if ((err = hash_descriptor[prng->yarrow.hash].done(&md, prng->yarrow.pool)) != CRYPT_OK) {
|
/external/openssl/crypto/evp/ |
bio_md.c | 172 EVP_MD *md; local 215 md=ptr; 216 ret = EVP_DigestInit_ex(ctx,md, NULL);
|
m_sigver.c | 141 unsigned char md[EVP_MAX_MD_SIZE]; local 150 r = EVP_DigestFinal_ex(&tmp_ctx,md,&mdlen); 154 if (EVP_PKEY_sign(ctx->pctx, sigret, siglen, md, mdlen) <= 0) 177 unsigned char md[EVP_MAX_MD_SIZE]; local 195 r = EVP_DigestFinal_ex(&tmp_ctx,md,&mdlen); 199 return EVP_PKEY_verify(ctx->pctx, sig, siglen, md, mdlen);
|
/external/openssl/crypto/hmac/ |
hmac.h | 77 const EVP_MD *md; member in struct:hmac_ctx_st 85 #define HMAC_size(e) (EVP_MD_size((e)->md)) 94 const EVP_MD *md); /* deprecated */ 96 const EVP_MD *md, ENGINE *impl); 98 int HMAC_Final(HMAC_CTX *ctx, unsigned char *md, unsigned int *len); 100 const unsigned char *d, size_t n, unsigned char *md,
|
/external/openssl/crypto/md4/ |
md4.c | 66 void pt(unsigned char *md); 102 unsigned char md[MD4_DIGEST_LENGTH]; local 115 MD4_Final(&(md[0]),&c); 116 pt(md); 119 void pt(unsigned char *md) 124 printf("%02x",md[i]);
|
md4test.c | 96 static char *pt(unsigned char *md); 102 unsigned char md[MD4_DIGEST_LENGTH]; local 109 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_md4(), NULL); 110 p=pt(md); 127 static char *pt(unsigned char *md) 133 sprintf(&(buf[i*2]),"%02x",md[i]);
|
/external/openssl/crypto/md5/ |
md5.c | 66 void pt(unsigned char *md); 102 unsigned char md[MD5_DIGEST_LENGTH]; local 115 MD5_Final(&(md[0]),&c); 116 pt(md); 119 void pt(unsigned char *md) 124 printf("%02x",md[i]);
|
md5test.c | 96 static char *pt(unsigned char *md); 102 unsigned char md[MD5_DIGEST_LENGTH]; local 109 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_md5(), NULL); 110 p=pt(md); 131 static char *pt(unsigned char *md) 137 sprintf(&(buf[i*2]),"%02x",md[i]);
|
/external/openssl/crypto/rc4/ |
rc4.c | 82 unsigned char md[MD5_DIGEST_LENGTH]; local 166 EVP_Digest((unsigned char *)keystr,strlen(keystr),md,NULL,EVP_md5(),NULL); 168 RC4_set_key(&key,MD5_DIGEST_LENGTH,md);
|
rc4test.c | 202 unsigned char md[SHA_DIGEST_LENGTH]; local 214 SHA1_Final(md,&c); 216 if (memcmp(md,expected,sizeof(md))) { 219 for (j=0; j<(int)sizeof(md); j++) 220 printf(" %02x",md[j]); 223 for (j=0; j<(int)sizeof(md); j++)
|
/external/openssl/crypto/ripemd/ |
rmd160.c | 66 void pt(unsigned char *md); 102 unsigned char md[RIPEMD160_DIGEST_LENGTH]; local 115 RIPEMD160_Final(&(md[0]),&c); 116 pt(md); 119 void pt(unsigned char *md) 124 printf("%02x",md[i]);
|
rmdtest.c | 102 static char *pt(unsigned char *md); 108 unsigned char md[RIPEMD160_DIGEST_LENGTH]; local 118 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_ripemd160(), NULL); 119 p=pt(md); 136 static char *pt(unsigned char *md) 142 sprintf(&(buf[i*2]),"%02x",md[i]);
|
/external/openssl/crypto/rsa/ |
rsa_sign.c | 242 const EVP_MD *md; local 243 md = EVP_get_digestbynid(dtype); 244 if (md && (EVP_MD_size(md) != sig->digest->length))
|