/external/openssl/crypto/mdc2/ |
mdc2_one.c | 63 unsigned char *MDC2(const unsigned char *d, size_t n, unsigned char *md) 68 if (md == NULL) md=m; 72 MDC2_Final(md,&c); 74 return(md);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest1Test.java | 37 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 38 md.reset(); 39 assertTrue(md.runEngineReset); 46 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 47 md.update((byte) 1); 48 assertTrue(md.runEngineUpdate1); 55 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 57 md.update(bytes, 1, 2); 58 assertTrue(md.runEngineUpdate2); 63 md.update(null, 0, 1) 99 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 109 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 124 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 133 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 143 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 203 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 211 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 219 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 227 MessageDigest md = MessageDigest.getInstance("SHA"); local [all...] |
/external/openssl/crypto/ripemd/ |
rmd_one.c | 65 unsigned char *md) 70 if (md == NULL) md=m; 74 RIPEMD160_Final(md,&c); 76 return(md);
|
/external/openssl/crypto/sha/ |
sha1_one.c | 65 unsigned char *SHA1(const unsigned char *d, size_t n, unsigned char *md) 70 if (md == NULL) md=m; 74 SHA1_Final(md,&c); 76 return(md);
|
/external/qemu/telephony/ |
modem_driver.c | 43 ModemDriver* md = _md; local 46 qemu_chr_write(md->cs, (const uint8_t*)message, len); 52 ModemDriver* md = _md; local 53 int ret = sizeof(md->in_buff) - md->in_pos; 62 ModemDriver* md = _md; local 83 if (md->in_sms) { 87 md->in_buff[ md->in_pos ] = c; 88 md->in_pos++ [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha256-internal.c | 27 static void sha256_init(struct sha256_state *md); 28 static int sha256_process(struct sha256_state *md, const unsigned char *in, 30 static int sha256_done(struct sha256_state *md, unsigned char *out); 97 static int sha256_compress(struct sha256_state *md, unsigned char *buf) 105 S[i] = md->state[i]; 133 md->state[i] = md->state[i] + S[i]; 140 static void sha256_init(struct sha256_state *md) 142 md->curlen = 0; 143 md->length = 0 [all...] |
/external/dropbear/libtomcrypt/src/hashes/ |
md2.c | 60 static void md2_update_chksum(hash_state *md) 64 L = md->md2.chksum[15]; 70 L = (md->md2.chksum[j] ^= PI_SUBST[(int)(md->md2.buf[j] ^ L)] & 255); 74 static void md2_compress(hash_state *md) 81 md->md2.X[16+j] = md->md2.buf[j]; 82 md->md2.X[32+j] = md->md2.X[j] ^ md->md2.X[16+j] [all...] |
sha1.c | 45 static int _sha1_compress(hash_state *md, unsigned char *buf) 47 static int sha1_compress(hash_state *md, unsigned char *buf) 61 a = md->sha1.state[0]; 62 b = md->sha1.state[1]; 63 c = md->sha1.state[2]; 64 d = md->sha1.state[3]; 65 e = md->sha1.state[4]; 141 md->sha1.state[0] = md->sha1.state[0] + a; 142 md->sha1.state[1] = md->sha1.state[1] + b [all...] |
/external/dropbear/libtomcrypt/src/hashes/helper/ |
hash_memory.c | 29 hash_state *md; local 45 md = XMALLOC(sizeof(hash_state)); 46 if (md == NULL) { 50 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 53 if ((err = hash_descriptor[hash].process(md, in, inlen)) != CRYPT_OK) { 56 err = hash_descriptor[hash].done(md, out); 60 zeromem(md, sizeof(hash_state)); 62 XFREE(md);
|
hash_memory_multi.c | 31 hash_state *md; local 50 md = XMALLOC(sizeof(hash_state)); 51 if (md == NULL) { 55 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 64 if ((err = hash_descriptor[hash].process(md, curptr, curlen)) != CRYPT_OK) { 74 err = hash_descriptor[hash].done(md, out); 78 zeromem(md, sizeof(hash_state)); 80 XFREE(md);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest1Test.java | 40 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 41 md.reset(); 42 assertTrue(md.runEngineReset); 49 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 50 md.update((byte) 1); 51 assertTrue(md.runEngineUpdate1); 58 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 60 md.update(bytes, 1, 2); 61 assertTrue(md.runEngineUpdate2); 66 md.update(null, 0, 1) 102 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 112 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 127 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 136 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 146 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 214 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 222 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 230 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 238 MessageDigest md = null; local [all...] |
/external/dropbear/libtomcrypt/src/hashes/sha2/ |
sha384.c | 36 @param md The hash state you wish to initialize 39 int sha384_init(hash_state * md) 41 LTC_ARGCHK(md != NULL); 43 md->sha512.curlen = 0; 44 md->sha512.length = 0; 45 md->sha512.state[0] = CONST64(0xcbbb9d5dc1059ed8); 46 md->sha512.state[1] = CONST64(0x629a292a367cd507); 47 md->sha512.state[2] = CONST64(0x9159015a3070dd17); 48 md->sha512.state[3] = CONST64(0x152fecd8f70e5939); 49 md->sha512.state[4] = CONST64(0x67332667ffc00b31) [all...] |
sha224.c | 37 @param md The hash state you wish to initialize 40 int sha224_init(hash_state * md) 42 LTC_ARGCHK(md != NULL); 44 md->sha256.curlen = 0; 45 md->sha256.length = 0; 46 md->sha256.state[0] = 0xc1059ed8UL; 47 md->sha256.state[1] = 0x367cd507UL; 48 md->sha256.state[2] = 0x3070dd17UL; 49 md->sha256.state[3] = 0xf70e5939UL; 50 md->sha256.state[4] = 0xffc00b31UL [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_hash.h | 196 int chc_init(hash_state * md); 197 int chc_process(hash_state * md, const unsigned char *in, unsigned long inlen); 198 int chc_done(hash_state * md, unsigned char *hash); 204 int whirlpool_init(hash_state * md); 205 int whirlpool_process(hash_state * md, const unsigned char *in, unsigned long inlen); 206 int whirlpool_done(hash_state * md, unsigned char *hash); 212 int sha512_init(hash_state * md); 213 int sha512_process(hash_state * md, const unsigned char *in, unsigned long inlen); 214 int sha512_done(hash_state * md, unsigned char *hash); 223 int sha384_init(hash_state * md); [all...] |
/external/dropbear/libtomcrypt/src/hashes/chc/ |
chc.c | 84 @param md The hash state you wish to initialize 87 int chc_init(hash_state *md) 93 LTC_ARGCHK(md != NULL); 116 cipher_descriptor[cipher_idx].ecb_encrypt(buf, md->chc.state, key); 119 md->chc.length = 0; 120 md->chc.curlen = 0; 121 zeromem(md->chc.buf, sizeof(md->chc.buf)); 132 static int chc_compress(hash_state *md, unsigned char *buf) 141 if ((err = cipher_descriptor[cipher_idx].setup(md->chc.state, cipher_blocksize, 0, key)) != CRYPT_OK) 256 md[MAXBLOCKSIZE]; member in struct:__anon5538 268 hash_state md; local [all...] |
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_1.c | 36 hash_state *md; local 50 md = XMALLOC(sizeof(hash_state)); 52 if (md == NULL || buf == NULL) { 53 if (md != NULL) { 54 XFREE(md); 63 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) { 69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) { 72 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 93 zeromem(md, sizeof(hash_state)) [all...] |
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_mgf1.c | 36 hash_state *md; local 51 md = XMALLOC(sizeof(hash_state)); 53 if (md == NULL || buf == NULL) { 54 if (md != NULL) { 55 XFREE(md); 72 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 75 if ((err = hash_descriptor[hash_idx].process(md, seed, seedlen)) != CRYPT_OK) { 78 if ((err = hash_descriptor[hash_idx].process(md, buf, 4)) != CRYPT_OK) { 81 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 95 zeromem(md, sizeof(hash_state)) [all...] |
/external/wpa_supplicant/ |
sha256.c | 165 static void sha256_init(struct sha256_state *md); 166 static int sha256_process(struct sha256_state *md, const unsigned char *in, 168 static int sha256_done(struct sha256_state *md, unsigned char *out); 231 static int sha256_compress(struct sha256_state *md, unsigned char *buf) 239 S[i] = md->state[i]; 267 md->state[i] = md->state[i] + S[i]; 274 static void sha256_init(struct sha256_state *md) 276 md->curlen = 0; 277 md->length = 0 [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha256.c | 168 static void sha256_init(struct sha256_state *md); 169 static int sha256_process(struct sha256_state *md, const unsigned char *in, 171 static int sha256_done(struct sha256_state *md, unsigned char *out); 234 static int sha256_compress(struct sha256_state *md, unsigned char *buf) 242 S[i] = md->state[i]; 270 md->state[i] = md->state[i] + S[i]; 277 static void sha256_init(struct sha256_state *md) 279 md->curlen = 0; 280 md->length = 0 [all...] |
/external/openssl/crypto/hmac/ |
hmac.c | 65 const EVP_MD *md, ENGINE *impl) 70 if (md != NULL) 73 ctx->md=md; 76 md=ctx->md; 81 j=EVP_MD_block_size(md); 85 if (!EVP_DigestInit_ex(&ctx->md_ctx,md, impl)) 108 if (!EVP_DigestInit_ex(&ctx->i_ctx,md, impl)) 110 if (!EVP_DigestUpdate(&ctx->i_ctx,pad,EVP_MD_block_size(md))) [all...] |
/external/openssl/crypto/md4/ |
md4test.c | 96 static char *pt(unsigned char *md); 102 unsigned char md[MD4_DIGEST_LENGTH]; local 109 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_md4(), NULL); 110 p=pt(md); 127 static char *pt(unsigned char *md) 133 sprintf(&(buf[i*2]),"%02x",md[i]);
|
md4_one.c | 68 unsigned char *MD4(const unsigned char *d, size_t n, unsigned char *md) 73 if (md == NULL) md=m; 93 MD4_Final(md,&c); 95 return(md);
|
/external/pcre/ |
pcre_exec.c | 49 #define NLBLOCK md /* Block containing newline information */ 85 md->mark = markptr; \ 113 is_subject TRUE if printing from within md->start_subject 114 md pointer to matching data block, if is_subject is TRUE 120 pchars(const uschar *p, int length, BOOL is_subject, match_data *md) 123 if (is_subject && length > md->end_subject - p) length = md->end_subject - p; 142 md points to match data block 149 match_ref(int offset, register USPTR eptr, int length, match_data *md, 152 USPTR p = md->start_subject + md->offset_vector[offset] 5616 match_data *md = &match_block; local [all...] |
/libcore/luni/src/test/java/tests/api/javax/security/auth/ |
DestroyableTest.java | 37 myDestroyable md = new myDestroyable(); local 39 assertFalse(md.isDestroyed()); 40 md.destroy(); 41 assertTrue(md.isDestroyed());
|
/external/markdown/markdown/extensions/ |
extra.py | 44 def extendMarkdown(self, md, md_globals): 46 md.registerExtensions(extensions, self.config)
|