/cts/tools/tradefed-host/src/com/android/cts/tradefed/testtype/ |
TestPackageDef.java | 367 MessageDigest md = MessageDigest.getInstance(algorithm); local 368 d = new DigestInputStream(fileStream, md); 371 return toHexString(md.digest());
|
/external/libpcap/ |
pcap-snit.c | 108 *ps = p->md.stat; 164 ++p->md.stat.ps_recv; 176 p->md.stat.ps_drop = ndp->nh_drops;
|
pcap-snoop.c | 127 ++p->md.stat.ps_recv; 183 p->md.stat.ps_drop = 192 *ps = p->md.stat;
|
pcap-int.h | 166 struct pcap_md md; member in struct:pcap
|
/external/openssl/apps/ |
crl.c | 328 unsigned char md[EVP_MAX_MD_SIZE]; local 330 if (!X509_CRL_digest(x,digest,md,&n)) 339 BIO_printf(bio_out,"%02X%c",md[j],
|
enc.c | 115 char *md=NULL; local 279 else if (strcmp(*argv,"-md") == 0) 282 md= *(++argv); 304 BIO_printf(bio_err,"%-14s the next argument is the md to use to create a key\n","-md"); 331 if (md && (dgst=EVP_get_digestbyname(md)) == NULL) 333 BIO_printf(bio_err,"%s is an unsupported message digest type\n",md);
|
/external/openssl/crypto/x509/ |
x509.h | 662 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); 663 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md); 664 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md); 665 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md); 668 unsigned char *md, unsigned int *len); 670 unsigned char *md, unsigned int *len); 672 unsigned char *md, unsigned int *len); 674 unsigned char *md, unsigned int *len); 676 unsigned char *md, unsigned int *len); 784 X509_REQ * X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); [all...] |
x509_req.c | 70 X509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) 101 if (!X509_REQ_sign(ret,pkey,md))
|
/external/openssl/include/openssl/ |
x509.h | 662 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); 663 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md); 664 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md); 665 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md); 668 unsigned char *md, unsigned int *len); 670 unsigned char *md, unsigned int *len); 672 unsigned char *md, unsigned int *len); 674 unsigned char *md, unsigned int *len); 676 unsigned char *md, unsigned int *len); 784 X509_REQ * X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); [all...] |
/sdk/ddms/libs/ddmuilib/src/com/android/ddmuilib/logcat/ |
LogPanel.java | [all...] |
/external/sonivox/jet_tools/JetCreator/ |
JetDialogs.py | 514 self.md = evt.data
515 if self.md.err == 0:
516 self.je.ctrls[JetDefs.F_END].SetMaxMbt(self.md.maxMeasures+1,self.md.maxBeats,self.md.maxTicks)
518 self.je.ctrls[JetDefs.F_END].SetValue((self.md.maxMeasures,0,0))
519 self.je.ctrls[JetDefs.F_START].SetMaxMbt(self.md.maxMeasures+1,self.md.maxBeats,self.md.maxTicks)
522 for track in self.md.trackList: [all...] |
midifile.py | [all...] |
/external/markdown/markdown/ |
treeprocessors.py | 39 def __init__ (self, md): 45 self.markdown = md
|
/external/openssl/crypto/engine/ |
eng_openssl.c | 323 static int test_sha1_final(EVP_MD_CTX *ctx,unsigned char *md) 328 return SHA1_Final(md,ctx->md_data);
|
/external/openssl/crypto/ |
md32_common.h | 347 int HASH_FINAL (unsigned char *md, HASH_CTX *c) 379 HASH_MAKE_STRING(c,md);
|
/external/pcre/ |
RunTest.bat | 15 if not exist testout md testout
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_i.h | 208 static inline int wpa_sm_update_ft_ies(struct wpa_sm *sm, const u8 *md, 212 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len);
|
/libcore/luni/src/main/java/java/util/ |
UUID.java | 148 MessageDigest md = MessageDigest.getInstance("MD5"); local 149 return makeUuid(md.digest(name), 3);
|
/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 163 MessageDigest md = MessageDigest.getInstance(sigInfo.getDigestAlgorithm()); local 164 byte[] computedDigest = md.digest(sfBytes); 166 throw new SecurityException("Incorrect MD");
|
/external/openssl/crypto/jpake/ |
jpake.c | 165 unsigned char md[SHA_DIGEST_LENGTH]; local 178 SHA1_Final(md, &sha); 179 BN_bin2bn(md, SHA_DIGEST_LENGTH, h); 444 static void quickhashbn(unsigned char *md, const BIGNUM *bn) 450 SHA1_Final(md, &sha);
|
/external/openssl/crypto/pkcs7/ |
pk7_lib.c | 442 int PKCS7_set_digest(PKCS7 *p7, const EVP_MD *md) 446 if(!(p7->d.digest->md->parameter = ASN1_TYPE_new())) 451 p7->d.digest->md->parameter->type = V_ASN1_NULL; 452 p7->d.digest->md->algorithm = OBJ_nid2obj(EVP_MD_nid(md));
|
/external/guava/src/com/google/common/io/ |
ByteStreams.java | 724 * @param md the digest object 730 final MessageDigest md) throws IOException { 733 md.update(buf, off, len); 738 return md.digest();
|
/external/openssl/crypto/evp/ |
pmeth_lib.c | 375 const EVP_MD *md; local 376 if (!value || !(md = EVP_get_digestbyname(value))) 382 return EVP_PKEY_CTX_set_signature_md(ctx, md);
|
/external/openssl/crypto/rand/ |
rand_win.c | 779 unsigned char md[MD_DIGEST_LENGTH]; local 788 MD(bmbits,size,md); 791 RAND_add(md, MD_DIGEST_LENGTH, 0);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 488 static int wpa_supplicant_update_ft_ies(void *ctx, const u8 *md, 493 return ieee80211_sta_update_ft_ies(wpa_s, md, ies, ies_len); 495 return sme_update_ft_ies(wpa_s, md, ies, ies_len); 496 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len);
|