/external/openssl/crypto/conf/ |
conf_mod.c | 110 static void module_free(CONF_MODULE *md); 209 CONF_MODULE *md; local 212 md = module_find(name); 215 if (!md && !(flags & CONF_MFLAGS_NO_DSO)) 216 md = module_load_dso(cnf, name, value, flags); 218 if (!md) 228 ret = module_init(md, name, value, cnf); 253 CONF_MODULE *md; local 275 md = module_add(dso, name, ifunc, ffunc); 277 if (!md) 425 CONF_MODULE *md; local [all...] |
/external/openssl/crypto/evp/ |
bio_ok.c | 153 EVP_MD_CTX md; member in struct:ok_struct 193 EVP_MD_CTX_init(&ctx->md); 204 EVP_MD_CTX_cleanup(&((BIO_OK_CTX *)a->ptr)->md); 366 EVP_MD *md; local 430 md=ptr; 431 if (!EVP_DigestInit_ex(&ctx->md, md, NULL)) 439 *ppmd=ctx->md.digest; 482 EVP_MD_CTX *md; local 485 md=&ctx->md 515 EVP_MD_CTX *md; local 559 EVP_MD_CTX *md; local 586 EVP_MD_CTX *md; local [all...] |
e_aes_cbc_hmac_sha1.c | 78 SHA_CTX head,tail,md; member in struct:__anon10031 127 key->md = key->head; 184 sha_off = SHA_CBLOCK-key->md.num; 199 SHA1_Update(&key->md,in+iv,sha_off); 202 ctx->iv,&key->md,in+iv+sha_off); 206 key->md.Nh += blocks>>29; 207 key->md.Nl += blocks<<=3; 208 if (key->md.Nl<(unsigned int)blocks) key->md.Nh++; 214 SHA1_Update(&key->md,in+sha_off,plen-sha_off) [all...] |
pmeth_lib.c | 428 const EVP_MD *md; local 429 if (!value || !(md = EVP_get_digestbyname(value))) 435 return EVP_PKEY_CTX_set_signature_md(ctx, md);
|
/external/openssl/crypto/jpake/ |
jpake.c | 165 unsigned char md[SHA_DIGEST_LENGTH]; local 178 SHA1_Final(md, &sha); 179 BN_bin2bn(md, SHA_DIGEST_LENGTH, h); 444 static void quickhashbn(unsigned char *md, const BIGNUM *bn) 450 SHA1_Final(md, &sha);
|
/external/openssl/crypto/rand/ |
md_rand.c | 141 static unsigned char md[MD_DIGEST_LENGTH]; variable 186 OPENSSL_cleanse(md,MD_DIGEST_LENGTH); 207 * is the current 'md', the same number of bytes from the 'state' 211 * The result of this is kept in 'md' and also xored into the 238 memcpy(local_md, md, sizeof md); 312 /* Don't just copy back local_md into md -- this could mean that 315 * much entropy as fits into md. */ 316 for (k = 0; k < (int)sizeof(md); k++) 318 md[k] ^= local_md[k] [all...] |
/external/openssl/crypto/rsa/ |
rsa_ameth.c | 466 const EVP_MD *mgf1md = NULL, *md = NULL; local 509 md = EVP_get_digestbyobj(pss->hashAlgorithm->algorithm); 510 if (md == NULL) 517 md = EVP_sha1(); 546 if (!EVP_DigestVerifyInit(ctx, &pkctx, md, NULL, pkey))
|
/external/openssl/ssl/ |
s3_pkt.c | 291 unsigned char md[EVP_MAX_MD_SIZE]; local 486 i=s->method->ssl3_enc->mac(s,md,0); 487 if (i < 0 || mac == NULL || memcmp(md, mac, (size_t)mac_size) != 0) [all...] |
d1_pkt.c | 384 unsigned char md[EVP_MAX_MD_SIZE]; local 465 i=s->method->ssl3_enc->mac(s,md,0); 466 if (i < 0 || mac == NULL || memcmp(md, mac, mac_size) != 0) [all...] |
s3_enc.c | 228 EVP_MD_CTX md; local 350 EVP_MD_CTX_init(&md); 357 EVP_DigestInit_ex(&md,EVP_md5(), NULL); 358 EVP_DigestUpdate(&md,key,j); 359 EVP_DigestUpdate(&md,er1,SSL3_RANDOM_SIZE); 360 EVP_DigestUpdate(&md,er2,SSL3_RANDOM_SIZE); 361 EVP_DigestFinal_ex(&md,&(exp_key[0]),NULL); 366 EVP_DigestInit_ex(&md,EVP_md5(), NULL); 367 EVP_DigestUpdate(&md,er1,SSL3_RANDOM_SIZE); 368 EVP_DigestUpdate(&md,er2,SSL3_RANDOM_SIZE) 599 const EVP_MD *md; local [all...] |
/external/skia/src/views/ |
SkEvent.cpp | 191 const SkMetaData& md = this->getMetaData(); local 192 SkMetaData::Iter iter(md); 206 md.findS32(name, &value); 212 const SkScalar* values = md.findScalars(name, &count, NULL); 221 const char* value = md.findString(name); 229 md.findPtr(name, &value); 236 md.findBool(name, &value);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
sme.c | 49 const u8 *md = NULL; local 160 md = ie + 2; 162 if (md) { 167 if (md && wpa_key_mgmt_ft(ssid->key_mgmt)) { 176 os_memcpy(mdie->mobility_domain, md, 178 mdie->ft_capab = md[MOBILITY_DOMAIN_ID_LEN]; 183 os_memcmp(md, wpa_s->sme.mobility_domain, 2) == 0 && 441 int sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, 444 if (md == NULL || ies == NULL) { 453 os_memcpy(wpa_s->sme.mobility_domain, md, MOBILITY_DOMAIN_ID_LEN) [all...] |
/libcore/luni/src/main/java/java/util/ |
UUID.java | 148 MessageDigest md = MessageDigest.getInstance("MD5"); local 149 return makeUuid(md.digest(name), 3);
|
/dalvik/dexgen/src/com/android/dexgen/dex/file/ |
DexFile.java | 607 MessageDigest md; local 610 md = MessageDigest.getInstance("SHA-1"); 615 md.update(bytes, 32, bytes.length - 32); 618 int amt = md.digest(bytes, 12, 20);
|
/dalvik/dx/src/com/android/dx/dex/file/ |
DexFile.java | 626 MessageDigest md; local 629 md = MessageDigest.getInstance("SHA-1"); 634 md.update(bytes, 32, bytes.length - 32); 637 int amt = md.digest(bytes, 12, 20);
|
/external/dexmaker/src/dx/java/com/android/dx/dex/file/ |
DexFile.java | 626 MessageDigest md; local 629 md = MessageDigest.getInstance("SHA-1"); 634 md.update(bytes, 32, bytes.length - 32); 637 int amt = md.digest(bytes, 12, 20);
|
/cts/tools/tradefed-host/src/com/android/cts/tradefed/testtype/ |
TestPackageDef.java | 340 MessageDigest md = MessageDigest.getInstance(algorithm); local 341 d = new DigestInputStream(fileStream, md); 345 return toHexString(md.digest());
|
/external/dropbear/libtomcrypt/testprof/ |
x86_prof.c | 594 hash_state md; local 609 hash_descriptor[x].init(&md); 611 #define DO1 func(&md,pt,len); [all...] |
/external/openssh/ |
kex.c | 482 EVP_MD_CTX md; local 489 fatal("bad kex md size %d", mdsz); 496 EVP_DigestInit(&md, kex->evp_md); 498 EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b)); 499 EVP_DigestUpdate(&md, hash, hashlen); 500 EVP_DigestUpdate(&md, &c, 1); 501 EVP_DigestUpdate(&md, kex->session_id, kex->session_id_len); 502 EVP_DigestFinal(&md, digest, NULL); 510 EVP_DigestInit(&md, kex->evp_md); 512 EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b)) 566 EVP_MD_CTX md; local [all...] |
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 108 const EVP_MD *md; local 115 md=EVP_get_digestbyobj(alg->algorithm); 116 if (md == NULL) 122 BIO_set_md(btmp,md); 308 xa = p7->d.digest->md; 869 OBJ_obj2nid(p7->d.digest->md->algorithm))) 907 const EVP_MD *md = NULL; local 909 md = EVP_get_digestbyobj(si->digest_alg->algorithm); 910 if (md == NULL) 914 if (EVP_DigestSignInit(&mctx, &pctx, md,NULL, si->pkey) <= 0 [all...] |
/external/ppp/pppd/ |
chap_ms.c | 199 MS_ChapResponse md; local 219 ChapMS(challenge, (char *)secret, secret_len, &md); 224 diff = memcmp(&rmd->LANManResp, &md.LANManResp, 225 sizeof(md.LANManResp)); 228 diff = memcmp(&rmd->NTResp, &md.NTResp, sizeof(md.NTResp)); 249 MS_Chap2Response md; local 262 (char *)secret, secret_len, &md, 285 if (memcmp(md.NTResp, rmd->NTResp, sizeof(md.NTResp)) == 0) [all...] |
/external/qemu/target-i386/ |
hax-all.c | 888 struct hax_msr_data md; local 889 struct vmx_msr *msrs = md.entries; 897 md.nr_msr = n; 898 ret = hax_sync_msr(env, &md, 0); 902 for (i = 0; i < md.done; i++) { 924 struct hax_msr_data md; local 926 msrs = md.entries; 929 memset(&md, 0, sizeof(struct hax_msr_data)); 934 md.nr_msr = n; 935 md.done = 0 [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_libtomcrypt.c | 34 hash_state md; local 37 md4_init(&md); 39 md4_process(&md, addr[i], len[i]); 40 md4_done(&md, mac); 68 hash_state md; local 71 md5_init(&md); 73 md5_process(&md, addr[i], len[i]); 74 md5_done(&md, mac); 80 hash_state md; local 83 sha1_init(&md); 154 hash_state md; member in union:crypto_hash::__anon15371 [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 27 hash_state md; local 30 md4_init(&md); 32 md4_process(&md, addr[i], len[i]); 33 md4_done(&md, mac); 61 hash_state md; local 64 md5_init(&md); 66 md5_process(&md, addr[i], len[i]); 67 md5_done(&md, mac); 74 hash_state md; local 77 sha1_init(&md); 147 hash_state md; member in union:crypto_hash::__anon15588 [all...] |
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 271 MessageDigest md = MessageDigest.getInstance(algorithm); local 272 byte[] digest = md.digest(bytes);
|