/external/openssl/ssl/ |
s2_srvr.c | 371 const EVP_MD *md; local 455 if (!ssl_cipher_get_evp(s->session,&c,&md,NULL,NULL,NULL))
|
/external/ppp/pppd/include/ |
pcap-int.h | 76 struct pcap_md md; member in struct:pcap
|
/frameworks/base/core/tests/coretests/src/android/app/activity/ |
MetaDataTest.java | 46 Bundle md = ci.metaData; local 47 assertNotNull("No meta data found", md); 49 assertEquals("foo", md.getString("com.android.frameworks.coretests.string")); 50 assertTrue(md.getBoolean("com.android.frameworks.coretests.boolean")); 51 assertEquals(100, md.getInt("com.android.frameworks.coretests.integer")); 52 assertEquals(0xff000000, md.getInt("com.android.frameworks.coretests.color")); 55 Math.floor(md.getFloat("com.android.frameworks.coretests.float") * 10 + .5)); 57 assertEquals(R.xml.metadata, md.getInt("com.android.frameworks.coretests.reference"));
|
/libcore/luni/src/main/java/java/security/ |
MessageDigest.java | 347 MessageDigest md = (MessageDigest) clone(); local 348 return md.digest().length;
|
/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 162 MessageDigest md = MessageDigest.getInstance(sigInfo.getDigestAlgorithm()); local 163 byte[] computedDigest = md.digest(sfBytes); 165 throw new SecurityException("Incorrect MD");
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
DigestInputStreamTest.java | 83 MessageDigest md = MessageDigest.getInstance(algorithmName[i]); local 85 InputStream dis = new DigestInputStream(is, md); 116 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 118 DigestInputStream dis = new DigestInputStream(is, md); 149 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 151 DigestInputStream dis = new DigestInputStream(is, md); 184 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 186 DigestInputStream dis = new DigestInputStream(is, md); 216 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 217 DigestInputStream dis = new DigestInputStream(null, md); 295 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 332 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 372 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 416 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 455 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 485 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 507 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 526 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local 565 MessageDigest md = MessageDigest.getInstance(algorithmName[ii]); local [all...] |
MessageDigest2Test.java | 68 MessageDigestStub md = new MessageDigestStub(algorithm); local 69 assertEquals(algorithm, md.getAlgorithm()); 70 assertEquals(0, md.getDigestLength()); 71 assertNull(md.getProvider()); 289 MessageDigest md = MessageDigest.getInstance(algorithm, e.getKey().getName()); local 290 assertEquals(algorithm, md.getAlgorithm()); 301 MessageDigest md = MessageDigest.getInstance(algorithm, e.getKey().getName()); local 302 assertTrue("length not ok", md.getDigestLength() > 0); 313 MessageDigest md = MessageDigest.getInstance(algorithm); local 314 assertNotNull(md); 332 MessageDigest md = MessageDigest.getInstance(algorithm, e.getKey().getName()); local 377 MessageDigest md = MessageDigest.getInstance(algorithm, e.getKey().getName()); local 407 MessageDigest md = MessageDigest.getInstance(algorithm, e.getKey().getName()); local [all...] |
/libcore/luni/src/main/java/java/util/jar/ |
JarVerifier.java | 393 MessageDigest md; local 395 md = MessageDigest.getInstance(algorithm); 401 md.update(data, start, end - 1 - start); 403 md.update(data, start, end - start); 405 byte[] b = md.digest();
|
/sdk/sdkmanager/libs/sdklib/src/com/android/sdklib/build/ |
JarListSanitizer.java | 439 MessageDigest md = MessageDigest.getInstance("SHA-1"); local 445 md.update(sBuffer, 0, length); 451 return byteArray2Hex(md.digest());
|
/sdk/sdkmanager/libs/sdklib/src/com/android/sdklib/internal/repository/packages/ |
SamplePackage.java | 458 MessageDigest md = null;
local 462 md = MessageDigest.getInstance("SHA-1"); //$NON-NLS-1$
468 if (md != null) {
469 hashDirectoryContent(installFolder, md);
470 return getDigestHexString(md);
480 private void hashDirectoryContent(File folder, MessageDigest md) {
481 if (folder == null || md == null || !folder.isDirectory()) {
487 hashDirectoryContent(f, md);
498 md.update(name.getBytes("UTF-8")); //$NON-NLS-1$
504 md.update((byte) (len & 0x0FF)); [all...] |
/build/tools/signapk/ |
SignApk.java | 185 MessageDigest md = MessageDigest.getInstance("SHA1"); local 209 md.update(buffer, 0, num); 215 attr.putValue("SHA1-Digest", base64.encode(md.digest())); 236 MessageDigest md = MessageDigest.getInstance("SHA1"); local 246 md.update(b, 0, read); 251 attr.putValue("SHA1-Digest", base64.encode(md.digest())); 303 MessageDigest md = MessageDigest.getInstance("SHA1"); local 305 new DigestOutputStream(new ByteArrayOutputStream(), md), 311 main.putValue("SHA1-Digest-Manifest", base64.encode(md.digest())); 324 sfAttr.putValue("SHA1-Digest", base64.encode(md.digest())) [all...] |
/external/smali/dexlib/src/main/java/org/jf/dexlib/ |
DexFile.java | 857 MessageDigest md; local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
DigestOutputStreamTest.java | 85 MessageDigest md = new MyMessageDigest1(); local 88 MyDigestOutputStream dos = new MyDigestOutputStream(out, md); 90 assertSame(md, dos.myMessageDigest()); 147 MessageDigest md = MessageDigest.getInstance(algorithmName[k]); local 149 DigestOutputStream dos = new DigestOutputStream(bos, md); 180 MessageDigest md = MessageDigest.getInstance(algorithmName[k]); local 182 DigestOutputStream dos = new DigestOutputStream(bos, md); 215 MessageDigest md = MessageDigest.getInstance(algorithmName[k]); local 216 DigestOutputStream dos = new DigestOutputStream(null, md); 291 MessageDigest md = MessageDigest.getInstance(algorithmName[k]) local 325 MessageDigest md = MessageDigest.getInstance(algorithmName[k]); local 362 MessageDigest md = MessageDigest.getInstance(algorithmName[k]); local 403 MessageDigest md = MessageDigest.getInstance(algorithmName[k]); local 433 MessageDigest md = new MyMessageDigest1(); local 471 MessageDigest md = MessageDigest.getInstance(algorithmName[k]); local 510 MessageDigest md = MessageDigest.getInstance(algorithmName[k]); local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest_Impl2Test.java | 115 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 116 assertEquals("incorrect result", "MESSAGE DIGEST ABC", md.toString());
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JCERSACipher.java | 164 String md = Strings.toUpperCase(mode); local 166 if (md.equals("NONE") || md.equals("ECB")) 171 if (md.equals("1")) 177 else if (md.equals("2"))
|
/external/dropbear/libtomcrypt/demos/ |
tv_gen.c | 117 unsigned char md[MAXBLOCKSIZE], *buf; local 139 outlen = sizeof(md); 140 if ((err = hash_memory(x, buf, y, md, &outlen)) != CRYPT_OK) { 146 fprintf(out, "%02X", md[z]);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 3 hash_state md; member in struct:Hmac_state
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/signature/ |
DSASHA1Verify.java | 132 SHA1 md = new SHA1(); local 133 md.update(message); 134 byte[] sha_message = new byte[md.getDigestLength()]; 135 md.digest(sha_message); 187 SHA1 md = new SHA1(); local 188 md.update(message); 189 byte[] sha_message = new byte[md.getDigestLength()]; 190 md.digest(sha_message);
|
/external/linux-tools-perf/util/ |
evlist.c | 179 struct perf_mmap *md = &evlist->mmap[idx]; local 180 unsigned int head = perf_mmap__read_head(md); 181 unsigned int old = md->prev; 182 unsigned char *data = md->base + page_size; 195 if (diff > md->mask / 2 || diff < 0) { 208 event = (union perf_event *)&data[old & md->mask]; 215 if ((old & md->mask) + size != ((old + size) & md->mask)) { 221 cpy = min(md->mask + 1 - (offset & md->mask), len) [all...] |
/external/openssh/ |
cipher.c | 303 MD5_CTX md; local 306 MD5_Init(&md); 307 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase)); 308 MD5_Final(digest, &md); 313 memset(&md, 0, sizeof(md));
|
hostfile.c | 116 const EVP_MD *md = EVP_sha1(); local 122 len = EVP_MD_size(md); 135 HMAC_Init(&mac_ctx, salt, len, md);
|
/external/openssl/apps/ |
crl.c | 328 unsigned char md[EVP_MAX_MD_SIZE]; local 330 if (!X509_CRL_digest(x,digest,md,&n)) 339 BIO_printf(bio_out,"%02X%c",md[j],
|
dgst.c | 109 const EVP_MD *md=NULL,*m; local 150 md=EVP_get_digestbyname(pname); 254 md=m; 430 r = EVP_DigestVerifyInit(mctx, &pctx, md, e, sigkey); 432 r = EVP_DigestSignInit(mctx, &pctx, md, e, sigkey); 456 /* we use md as a filter, reading from 'in' */ 459 if (md == NULL) 460 md = EVP_md5(); 461 if (!BIO_set_md(bmd,md)) 491 if (md == NULL [all...] |
enc.c | 115 char *md=NULL; local 280 else if (strcmp(*argv,"-md") == 0) 283 md= *(++argv); 307 BIO_printf(bio_err,"%-14s the next argument is the md to use to create a key\n","-md"); 334 if (md && (dgst=EVP_get_digestbyname(md)) == NULL) 336 BIO_printf(bio_err,"%s is an unsupported message digest type\n",md);
|
passwd.c | 317 EVP_MD_CTX md,md2; local 332 EVP_MD_CTX_init(&md); 333 EVP_DigestInit_ex(&md,EVP_md5(), NULL); 334 EVP_DigestUpdate(&md, passwd, passwd_len); 335 EVP_DigestUpdate(&md, "$", 1); 336 EVP_DigestUpdate(&md, magic, strlen(magic)); 337 EVP_DigestUpdate(&md, "$", 1); 338 EVP_DigestUpdate(&md, salt_out, salt_len); 348 EVP_DigestUpdate(&md, buf, sizeof buf); 349 EVP_DigestUpdate(&md, buf, i) [all...] |