/external/dropbear/libtomcrypt/src/hashes/helper/ |
hash_memory.c | 29 hash_state *md; local 45 md = XMALLOC(sizeof(hash_state)); 46 if (md == NULL) { 50 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 53 if ((err = hash_descriptor[hash].process(md, in, inlen)) != CRYPT_OK) { 56 err = hash_descriptor[hash].done(md, out); 60 zeromem(md, sizeof(hash_state)); 62 XFREE(md);
|
hash_memory_multi.c | 31 hash_state *md; local 50 md = XMALLOC(sizeof(hash_state)); 51 if (md == NULL) { 55 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 64 if ((err = hash_descriptor[hash].process(md, curptr, curlen)) != CRYPT_OK) { 74 err = hash_descriptor[hash].done(md, out); 78 zeromem(md, sizeof(hash_state)); 80 XFREE(md);
|
/external/openssh/ |
kexgex.c | 56 EVP_MD_CTX md; local 88 EVP_DigestInit(&md, evp_md); 89 EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b)); 90 EVP_DigestFinal(&md, digest, NULL);
|
kexdh.c | 55 EVP_MD_CTX md; local 77 EVP_DigestInit(&md, evp_md); 78 EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b)); 79 EVP_DigestFinal(&md, digest, NULL);
|
kexecdh.c | 81 EVP_MD_CTX md; local 104 EVP_DigestInit(&md, evp_md); 105 EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b)); 106 EVP_DigestFinal(&md, digest, NULL);
|
ssh-dss.c | 51 EVP_MD_CTX md; local 61 EVP_DigestInit(&md, evp_md); 62 EVP_DigestUpdate(&md, data, datalen); 63 EVP_DigestFinal(&md, digest, &dlen); 114 EVP_MD_CTX md; local 175 EVP_DigestInit(&md, evp_md); 176 EVP_DigestUpdate(&md, data, datalen); 177 EVP_DigestFinal(&md, digest, &dlen);
|
ssh-ecdsa.c | 52 EVP_MD_CTX md; local 63 EVP_DigestInit(&md, evp_md); 64 EVP_DigestUpdate(&md, data, datalen); 65 EVP_DigestFinal(&md, digest, &dlen); 101 EVP_MD_CTX md; local 154 EVP_DigestInit(&md, evp_md); 155 EVP_DigestUpdate(&md, data, datalen); 156 EVP_DigestFinal(&md, digest, &dlen);
|
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_1.c | 36 hash_state *md; local 50 md = XMALLOC(sizeof(hash_state)); 52 if (md == NULL || buf == NULL) { 53 if (md != NULL) { 54 XFREE(md); 63 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) { 69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) { 72 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 93 zeromem(md, sizeof(hash_state)) [all...] |
/libcore/luni/src/test/java/tests/api/javax/security/auth/ |
DestroyableTest.java | 37 myDestroyable md = new myDestroyable(); local 39 assertFalse(md.isDestroyed()); 40 md.destroy(); 41 assertTrue(md.isDestroyed());
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_mgf1.c | 36 hash_state *md; local 51 md = XMALLOC(sizeof(hash_state)); 53 if (md == NULL || buf == NULL) { 54 if (md != NULL) { 55 XFREE(md); 72 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 75 if ((err = hash_descriptor[hash_idx].process(md, seed, seedlen)) != CRYPT_OK) { 78 if ((err = hash_descriptor[hash_idx].process(md, buf, 4)) != CRYPT_OK) { 81 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 95 zeromem(md, sizeof(hash_state)) [all...] |
pkcs_1_pss_decode.c | 40 hash_state md; local 134 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) { 138 if ((err = hash_descriptor[hash_idx].process(&md, mask, 8)) != CRYPT_OK) { 141 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) { 144 if ((err = hash_descriptor[hash_idx].process(&md, DB+x, saltlen)) != CRYPT_OK) { 147 if ((err = hash_descriptor[hash_idx].done(&md, mask)) != CRYPT_OK) {
|
pkcs_1_pss_encode.c | 42 hash_state md; local 95 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) { 99 if ((err = hash_descriptor[hash_idx].process(&md, DB, 8)) != CRYPT_OK) { 102 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) { 105 if ((err = hash_descriptor[hash_idx].process(&md, salt, saltlen)) != CRYPT_OK) { 108 if ((err = hash_descriptor[hash_idx].done(&md, hash)) != CRYPT_OK) {
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/digest/ |
HashForSSH2Types.java | 17 Digest md; field in class:HashForSSH2Types 19 public HashForSSH2Types(Digest md) 21 this.md = md; 28 md = new SHA1(); 32 md = new MD5(); 43 md.update(tmp); 48 md.update(b); 53 md.update((byte) (v >> 24)); 54 md.update((byte) (v >> 16)) [all...] |
HMAC.java | 15 Digest md; field in class:HMAC 23 public HMAC(Digest md, byte[] key, int size) 25 this.md = md; 28 tmp = new byte[md.getDigestLength()]; 37 md.reset(); 38 md.update(key); 39 md.digest(tmp); 51 md.update(k_xor_ipad); 61 md.update(b) [all...] |
/external/dropbear/libtomcrypt/demos/ |
hashsum.c | 21 hash_state md; local 41 hash_descriptor[idx].init(&md); 44 hash_descriptor[idx].process(&md, hash_buffer, x); 46 hash_descriptor[idx].done(&md, hash_buffer);
|
/external/openssl/crypto/mdc2/ |
mdc2test.c | 96 unsigned char md[MDC2_DIGEST_LENGTH]; local 108 EVP_DigestFinal_ex(&c,&(md[0]),NULL); 110 if (memcmp(md,pad1,MDC2_DIGEST_LENGTH) != 0) 113 printf("%02X",md[i]); 127 EVP_DigestFinal_ex(&c,&(md[0]),NULL); 129 if (memcmp(md,pad2,MDC2_DIGEST_LENGTH) != 0) 132 printf("%02X",md[i]);
|
/external/openssl/crypto/sha/ |
sha256t.c | 58 { unsigned char md[SHA256_DIGEST_LENGTH]; local 64 EVP_Digest ("abc",3,md,NULL,EVP_sha256(),NULL); 65 if (memcmp(md,app_b1,sizeof(app_b1))) 74 "ijkljklm""klmnlmno""mnopnopq",56,md,NULL,EVP_sha256(),NULL); 75 if (memcmp(md,app_b2,sizeof(app_b2))) 92 EVP_DigestFinal_ex (&evp,md,NULL); 95 if (memcmp(md,app_b3,sizeof(app_b3))) 107 EVP_Digest ("abc",3,md,NULL,EVP_sha224(),NULL); 108 if (memcmp(md,addenum_1,sizeof(addenum_1))) 117 "ijkljklm""klmnlmno""mnopnopq",56,md,NULL,EVP_sha224(),NULL) [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest1Test.java | 37 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 38 md.reset(); 39 assertTrue(md.runEngineReset); 46 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 47 md.update((byte) 1); 48 assertTrue(md.runEngineUpdate1); 55 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 57 md.update(bytes, 1, 2); 58 assertTrue(md.runEngineUpdate2); 63 md.update(null, 0, 1) 99 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 109 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 124 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 133 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 143 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 203 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 211 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 219 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 227 MessageDigest md = MessageDigest.getInstance("SHA"); local [all...] |
MessageDigestSpiTest.java | 42 MyMessageDigest md = new MyMessageDigest() { local 56 md.engineDigest(null, 1, DIGEST_LENGTH); 62 md.engineDigest(b, 1, DIGEST_LENGTH - 1); 67 assertEquals("incorrect result", DIGEST_LENGTH, md 71 md = new MyMessageDigest(); 73 md.engineDigest(b, 0, 1); 84 MyMessageDigest md = new MyMessageDigest(); local 85 assertEquals(0, md.engineGetDigestLength()); 92 MyMessageDigest md = new MyMessageDigest(); local 98 md.engineUpdate(buf) 115 MyMessageDigest md = new MyMessageDigest(); local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest1Test.java | 40 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 41 md.reset(); 42 assertTrue(md.runEngineReset); 49 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 50 md.update((byte) 1); 51 assertTrue(md.runEngineUpdate1); 58 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 60 md.update(bytes, 1, 2); 61 assertTrue(md.runEngineUpdate2); 66 md.update(null, 0, 1) 102 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 112 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 127 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 136 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 146 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 214 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 222 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 230 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 238 MessageDigest md = null; local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
SHA1_MessageDigestTest.java | 130 private static MessageDigest md; field in class:SHA1_MessageDigestTest 138 md = MessageDigest.getInstance("SHA-1", "Crypto"); 158 md.update(bytes, 0, LENGTH); 159 clone = (MessageDigest)md.clone(); 160 digest = md.digest(); 186 md.update(b, 0, b.length); 187 bytes = md.digest(); 190 md.reset(); 209 md.update((byte)(j +1)); 211 results = md.digest() [all...] |
/external/dropbear/libtomcrypt/src/prngs/ |
yarrow.c | 137 hash_state md; local 151 if ((err = hash_descriptor[prng->yarrow.hash].init(&md)) != CRYPT_OK) { 157 if ((err = hash_descriptor[prng->yarrow.hash].process(&md, prng->yarrow.pool, 164 if ((err = hash_descriptor[prng->yarrow.hash].process(&md, in, inlen)) != CRYPT_OK) { 170 if ((err = hash_descriptor[prng->yarrow.hash].done(&md, prng->yarrow.pool)) != CRYPT_OK) {
|
/external/openssl/crypto/evp/ |
bio_md.c | 176 EVP_MD *md; local 219 md=ptr; 220 ret = EVP_DigestInit_ex(ctx,md, NULL);
|
m_sigver.c | 141 unsigned char md[EVP_MAX_MD_SIZE]; local 150 r = EVP_DigestFinal_ex(&tmp_ctx,md,&mdlen); 154 if (EVP_PKEY_sign(ctx->pctx, sigret, siglen, md, mdlen) <= 0) 177 unsigned char md[EVP_MAX_MD_SIZE]; local 195 r = EVP_DigestFinal_ex(&tmp_ctx,md,&mdlen); 199 return EVP_PKEY_verify(ctx->pctx, sig, siglen, md, mdlen);
|
/external/openssl/crypto/hmac/ |
hmac.h | 77 const EVP_MD *md; member in struct:hmac_ctx_st 85 #define HMAC_size(e) (EVP_MD_size((e)->md)) 94 const EVP_MD *md); /* deprecated */ 96 const EVP_MD *md, ENGINE *impl); 98 int HMAC_Final(HMAC_CTX *ctx, unsigned char *md, unsigned int *len); 100 const unsigned char *d, size_t n, unsigned char *md,
|