HomeSort by relevance Sort by last modified time
    Searched refs:md (Results 1 - 25 of 585) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/third_party/openssl/openssl/crypto/mdc2/
mdc2_one.c 63 unsigned char *MDC2(const unsigned char *d, size_t n, unsigned char *md)
68 if (md == NULL) md=m;
72 MDC2_Final(md,&c);
74 return(md);
  /external/openssl/crypto/mdc2/
mdc2_one.c 63 unsigned char *MDC2(const unsigned char *d, size_t n, unsigned char *md)
68 if (md == NULL) md=m;
72 MDC2_Final(md,&c);
74 return(md);
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/digest/
HMAC.java 15 Digest md; field in class:HMAC
23 public HMAC(Digest md, byte[] key, int size)
25 this.md = md;
28 tmp = new byte[md.getDigestLength()];
37 md.reset();
38 md.update(key);
39 md.digest(tmp);
51 md.update(k_xor_ipad);
61 md.update(b)
    [all...]
HashForSSH2Types.java 17 Digest md; field in class:HashForSSH2Types
19 public HashForSSH2Types(Digest md)
21 this.md = md;
28 md = new SHA1();
32 md = new MD5();
43 md.update(tmp);
48 md.update(b);
53 md.update((byte) (v >> 24));
54 md.update((byte) (v >> 16))
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
MessageDigest1Test.java 37 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
38 md.reset();
39 assertTrue(md.runEngineReset);
46 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
47 md.update((byte) 1);
48 assertTrue(md.runEngineUpdate1);
55 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
57 md.update(bytes, 1, 2);
58 assertTrue(md.runEngineUpdate2);
63 md.update(null, 0, 1)
99 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
109 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
124 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
133 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
143 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
203 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
211 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
219 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
227 MessageDigest md = MessageDigest.getInstance("SHA"); local
    [all...]
  /external/eigen/doc/snippets/
MatrixBase_cast.cpp 1 Matrix2d md = Matrix2d::Identity() * 0.45; variable
3 cout << md + mf.cast<double>() << endl;
  /external/chromium_org/third_party/openssl/openssl/crypto/ripemd/
rmd_one.c 65 unsigned char *md)
70 if (md == NULL) md=m;
74 RIPEMD160_Final(md,&c);
76 return(md);
  /external/chromium_org/third_party/openssl/openssl/crypto/sha/
sha1_one.c 65 unsigned char *SHA1(const unsigned char *d, size_t n, unsigned char *md)
70 if (md == NULL) md=m;
74 SHA1_Final(md,&c);
76 return(md);
  /external/openssl/crypto/ripemd/
rmd_one.c 65 unsigned char *md)
70 if (md == NULL) md=m;
74 RIPEMD160_Final(md,&c);
76 return(md);
  /external/openssl/crypto/sha/
sha1_one.c 65 unsigned char *SHA1(const unsigned char *d, size_t n, unsigned char *md)
70 if (md == NULL) md=m;
74 SHA1_Final(md,&c);
76 return(md);
  /external/qemu/telephony/
modem_driver.c 43 ModemDriver* md = _md; local
46 qemu_chr_write(md->cs, (const uint8_t*)message, len);
52 ModemDriver* md = _md; local
53 int ret = sizeof(md->in_buff) - md->in_pos;
62 ModemDriver* md = _md; local
83 if (md->in_sms) {
87 md->in_buff[ md->in_pos ] = c;
88 md->in_pos++
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/
md2.c 60 static void md2_update_chksum(hash_state *md)
64 L = md->md2.chksum[15];
70 L = (md->md2.chksum[j] ^= PI_SUBST[(int)(md->md2.buf[j] ^ L)] & 255);
74 static void md2_compress(hash_state *md)
81 md->md2.X[16+j] = md->md2.buf[j];
82 md->md2.X[32+j] = md->md2.X[j] ^ md->md2.X[16+j]
    [all...]
  /external/wpa_supplicant_8/src/crypto/
sha256-internal.c 81 static int sha256_compress(struct sha256_state *md, unsigned char *buf)
89 S[i] = md->state[i];
117 md->state[i] = md->state[i] + S[i];
124 void sha256_init(struct sha256_state *md)
126 md->curlen = 0;
127 md->length = 0;
128 md->state[0] = 0x6A09E667UL;
129 md->state[1] = 0xBB67AE85UL;
130 md->state[2] = 0x3C6EF372UL
    [all...]
sha256_i.h 20 void sha256_init(struct sha256_state *md);
21 int sha256_process(struct sha256_state *md, const unsigned char *in,
23 int sha256_done(struct sha256_state *md, unsigned char *out);
  /external/dropbear/libtomcrypt/src/hashes/helper/
hash_memory.c 29 hash_state *md; local
45 md = XMALLOC(sizeof(hash_state));
46 if (md == NULL) {
50 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) {
53 if ((err = hash_descriptor[hash].process(md, in, inlen)) != CRYPT_OK) {
56 err = hash_descriptor[hash].done(md, out);
60 zeromem(md, sizeof(hash_state));
62 XFREE(md);
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
MessageDigest1Test.java 40 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
41 md.reset();
42 assertTrue(md.runEngineReset);
49 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
50 md.update((byte) 1);
51 assertTrue(md.runEngineUpdate1);
58 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
60 md.update(bytes, 1, 2);
61 assertTrue(md.runEngineUpdate2);
66 md.update(null, 0, 1)
102 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
112 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
127 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
136 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
146 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
214 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
222 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
230 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local
238 MessageDigest md = null; local
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/base/
openssldigest.cc 76 const EVP_MD* md; local
78 md = EVP_md5();
80 md = EVP_sha1();
83 md = EVP_sha224();
85 md = EVP_sha256();
87 md = EVP_sha384();
89 md = EVP_sha512();
96 ASSERT(EVP_MD_size(md) >= 16);
97 *mdp = md;
103 const EVP_MD *md; local
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/sha2/
sha384.c 36 @param md The hash state you wish to initialize
39 int sha384_init(hash_state * md)
41 LTC_ARGCHK(md != NULL);
43 md->sha512.curlen = 0;
44 md->sha512.length = 0;
45 md->sha512.state[0] = CONST64(0xcbbb9d5dc1059ed8);
46 md->sha512.state[1] = CONST64(0x629a292a367cd507);
47 md->sha512.state[2] = CONST64(0x9159015a3070dd17);
48 md->sha512.state[3] = CONST64(0x152fecd8f70e5939);
49 md->sha512.state[4] = CONST64(0x67332667ffc00b31)
    [all...]
sha224.c 37 @param md The hash state you wish to initialize
40 int sha224_init(hash_state * md)
42 LTC_ARGCHK(md != NULL);
44 md->sha256.curlen = 0;
45 md->sha256.length = 0;
46 md->sha256.state[0] = 0xc1059ed8UL;
47 md->sha256.state[1] = 0x367cd507UL;
48 md->sha256.state[2] = 0x3070dd17UL;
49 md->sha256.state[3] = 0xf70e5939UL;
50 md->sha256.state[4] = 0xffc00b31UL
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_hash.h 196 int chc_init(hash_state * md);
197 int chc_process(hash_state * md, const unsigned char *in, unsigned long inlen);
198 int chc_done(hash_state * md, unsigned char *hash);
204 int whirlpool_init(hash_state * md);
205 int whirlpool_process(hash_state * md, const unsigned char *in, unsigned long inlen);
206 int whirlpool_done(hash_state * md, unsigned char *hash);
212 int sha512_init(hash_state * md);
213 int sha512_process(hash_state * md, const unsigned char *in, unsigned long inlen);
214 int sha512_done(hash_state * md, unsigned char *hash);
223 int sha384_init(hash_state * md);
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/chc/
chc.c 84 @param md The hash state you wish to initialize
87 int chc_init(hash_state *md)
93 LTC_ARGCHK(md != NULL);
116 cipher_descriptor[cipher_idx].ecb_encrypt(buf, md->chc.state, key);
119 md->chc.length = 0;
120 md->chc.curlen = 0;
121 zeromem(md->chc.buf, sizeof(md->chc.buf));
132 static int chc_compress(hash_state *md, unsigned char *buf)
141 if ((err = cipher_descriptor[cipher_idx].setup(md->chc.state, cipher_blocksize, 0, key)) != CRYPT_OK)
256 md[MAXBLOCKSIZE]; member in struct:__anon19180
268 hash_state md; local
    [all...]
  /external/dropbear/libtomcrypt/src/misc/pkcs5/
pkcs_5_1.c 36 hash_state *md; local
50 md = XMALLOC(sizeof(hash_state));
52 if (md == NULL || buf == NULL) {
53 if (md != NULL) {
54 XFREE(md);
63 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) {
66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) {
72 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) {
93 zeromem(md, sizeof(hash_state))
    [all...]
  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_mgf1.c 36 hash_state *md; local
51 md = XMALLOC(sizeof(hash_state));
53 if (md == NULL || buf == NULL) {
54 if (md != NULL) {
55 XFREE(md);
72 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) {
75 if ((err = hash_descriptor[hash_idx].process(md, seed, seedlen)) != CRYPT_OK) {
78 if ((err = hash_descriptor[hash_idx].process(md, buf, 4)) != CRYPT_OK) {
81 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) {
95 zeromem(md, sizeof(hash_state))
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/md4/
md4test.c 96 static char *pt(unsigned char *md);
102 unsigned char md[MD4_DIGEST_LENGTH]; local
109 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_md4(), NULL);
110 p=pt(md);
127 static char *pt(unsigned char *md)
133 sprintf(&(buf[i*2]),"%02x",md[i]);
  /external/openssl/crypto/md4/
md4test.c 96 static char *pt(unsigned char *md);
102 unsigned char md[MD4_DIGEST_LENGTH]; local
109 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_md4(), NULL);
110 p=pt(md);
127 static char *pt(unsigned char *md)
133 sprintf(&(buf[i*2]),"%02x",md[i]);

Completed in 471 milliseconds

1 2 3 4 5 6 7 8 91011>>