/external/chromium_org/third_party/openssl/openssl/crypto/mdc2/ |
mdc2_one.c | 63 unsigned char *MDC2(const unsigned char *d, size_t n, unsigned char *md) 68 if (md == NULL) md=m; 72 MDC2_Final(md,&c); 74 return(md);
|
/external/openssl/crypto/mdc2/ |
mdc2_one.c | 63 unsigned char *MDC2(const unsigned char *d, size_t n, unsigned char *md) 68 if (md == NULL) md=m; 72 MDC2_Final(md,&c); 74 return(md);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/digest/ |
HMAC.java | 15 Digest md; field in class:HMAC 23 public HMAC(Digest md, byte[] key, int size) 25 this.md = md; 28 tmp = new byte[md.getDigestLength()]; 37 md.reset(); 38 md.update(key); 39 md.digest(tmp); 51 md.update(k_xor_ipad); 61 md.update(b) [all...] |
HashForSSH2Types.java | 17 Digest md; field in class:HashForSSH2Types 19 public HashForSSH2Types(Digest md) 21 this.md = md; 28 md = new SHA1(); 32 md = new MD5(); 43 md.update(tmp); 48 md.update(b); 53 md.update((byte) (v >> 24)); 54 md.update((byte) (v >> 16)) [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest1Test.java | 37 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 38 md.reset(); 39 assertTrue(md.runEngineReset); 46 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 47 md.update((byte) 1); 48 assertTrue(md.runEngineUpdate1); 55 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 57 md.update(bytes, 1, 2); 58 assertTrue(md.runEngineUpdate2); 63 md.update(null, 0, 1) 99 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 109 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 124 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 133 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 143 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 203 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 211 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 219 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 227 MessageDigest md = MessageDigest.getInstance("SHA"); local [all...] |
/external/eigen/doc/snippets/ |
MatrixBase_cast.cpp | 1 Matrix2d md = Matrix2d::Identity() * 0.45; variable 3 cout << md + mf.cast<double>() << endl;
|
/external/chromium_org/third_party/openssl/openssl/crypto/ripemd/ |
rmd_one.c | 65 unsigned char *md) 70 if (md == NULL) md=m; 74 RIPEMD160_Final(md,&c); 76 return(md);
|
/external/chromium_org/third_party/openssl/openssl/crypto/sha/ |
sha1_one.c | 65 unsigned char *SHA1(const unsigned char *d, size_t n, unsigned char *md) 70 if (md == NULL) md=m; 74 SHA1_Final(md,&c); 76 return(md);
|
/external/openssl/crypto/ripemd/ |
rmd_one.c | 65 unsigned char *md) 70 if (md == NULL) md=m; 74 RIPEMD160_Final(md,&c); 76 return(md);
|
/external/openssl/crypto/sha/ |
sha1_one.c | 65 unsigned char *SHA1(const unsigned char *d, size_t n, unsigned char *md) 70 if (md == NULL) md=m; 74 SHA1_Final(md,&c); 76 return(md);
|
/external/qemu/telephony/ |
modem_driver.c | 43 ModemDriver* md = _md; local 46 qemu_chr_write(md->cs, (const uint8_t*)message, len); 52 ModemDriver* md = _md; local 53 int ret = sizeof(md->in_buff) - md->in_pos; 62 ModemDriver* md = _md; local 83 if (md->in_sms) { 87 md->in_buff[ md->in_pos ] = c; 88 md->in_pos++ [all...] |
/external/dropbear/libtomcrypt/src/hashes/ |
md2.c | 60 static void md2_update_chksum(hash_state *md) 64 L = md->md2.chksum[15]; 70 L = (md->md2.chksum[j] ^= PI_SUBST[(int)(md->md2.buf[j] ^ L)] & 255); 74 static void md2_compress(hash_state *md) 81 md->md2.X[16+j] = md->md2.buf[j]; 82 md->md2.X[32+j] = md->md2.X[j] ^ md->md2.X[16+j] [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha256-internal.c | 81 static int sha256_compress(struct sha256_state *md, unsigned char *buf) 89 S[i] = md->state[i]; 117 md->state[i] = md->state[i] + S[i]; 124 void sha256_init(struct sha256_state *md) 126 md->curlen = 0; 127 md->length = 0; 128 md->state[0] = 0x6A09E667UL; 129 md->state[1] = 0xBB67AE85UL; 130 md->state[2] = 0x3C6EF372UL [all...] |
sha256_i.h | 20 void sha256_init(struct sha256_state *md); 21 int sha256_process(struct sha256_state *md, const unsigned char *in, 23 int sha256_done(struct sha256_state *md, unsigned char *out);
|
/external/dropbear/libtomcrypt/src/hashes/helper/ |
hash_memory.c | 29 hash_state *md; local 45 md = XMALLOC(sizeof(hash_state)); 46 if (md == NULL) { 50 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 53 if ((err = hash_descriptor[hash].process(md, in, inlen)) != CRYPT_OK) { 56 err = hash_descriptor[hash].done(md, out); 60 zeromem(md, sizeof(hash_state)); 62 XFREE(md);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest1Test.java | 40 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 41 md.reset(); 42 assertTrue(md.runEngineReset); 49 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 50 md.update((byte) 1); 51 assertTrue(md.runEngineUpdate1); 58 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 60 md.update(bytes, 1, 2); 61 assertTrue(md.runEngineUpdate2); 66 md.update(null, 0, 1) 102 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 112 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 127 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 136 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 146 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 214 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 222 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 230 MyMessageDigest1 md = new MyMessageDigest1("ABC"); local 238 MessageDigest md = null; local [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
openssldigest.cc | 76 const EVP_MD* md; local 78 md = EVP_md5(); 80 md = EVP_sha1(); 83 md = EVP_sha224(); 85 md = EVP_sha256(); 87 md = EVP_sha384(); 89 md = EVP_sha512(); 96 ASSERT(EVP_MD_size(md) >= 16); 97 *mdp = md; 103 const EVP_MD *md; local [all...] |
/external/dropbear/libtomcrypt/src/hashes/sha2/ |
sha384.c | 36 @param md The hash state you wish to initialize 39 int sha384_init(hash_state * md) 41 LTC_ARGCHK(md != NULL); 43 md->sha512.curlen = 0; 44 md->sha512.length = 0; 45 md->sha512.state[0] = CONST64(0xcbbb9d5dc1059ed8); 46 md->sha512.state[1] = CONST64(0x629a292a367cd507); 47 md->sha512.state[2] = CONST64(0x9159015a3070dd17); 48 md->sha512.state[3] = CONST64(0x152fecd8f70e5939); 49 md->sha512.state[4] = CONST64(0x67332667ffc00b31) [all...] |
sha224.c | 37 @param md The hash state you wish to initialize 40 int sha224_init(hash_state * md) 42 LTC_ARGCHK(md != NULL); 44 md->sha256.curlen = 0; 45 md->sha256.length = 0; 46 md->sha256.state[0] = 0xc1059ed8UL; 47 md->sha256.state[1] = 0x367cd507UL; 48 md->sha256.state[2] = 0x3070dd17UL; 49 md->sha256.state[3] = 0xf70e5939UL; 50 md->sha256.state[4] = 0xffc00b31UL [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_hash.h | 196 int chc_init(hash_state * md); 197 int chc_process(hash_state * md, const unsigned char *in, unsigned long inlen); 198 int chc_done(hash_state * md, unsigned char *hash); 204 int whirlpool_init(hash_state * md); 205 int whirlpool_process(hash_state * md, const unsigned char *in, unsigned long inlen); 206 int whirlpool_done(hash_state * md, unsigned char *hash); 212 int sha512_init(hash_state * md); 213 int sha512_process(hash_state * md, const unsigned char *in, unsigned long inlen); 214 int sha512_done(hash_state * md, unsigned char *hash); 223 int sha384_init(hash_state * md); [all...] |
/external/dropbear/libtomcrypt/src/hashes/chc/ |
chc.c | 84 @param md The hash state you wish to initialize 87 int chc_init(hash_state *md) 93 LTC_ARGCHK(md != NULL); 116 cipher_descriptor[cipher_idx].ecb_encrypt(buf, md->chc.state, key); 119 md->chc.length = 0; 120 md->chc.curlen = 0; 121 zeromem(md->chc.buf, sizeof(md->chc.buf)); 132 static int chc_compress(hash_state *md, unsigned char *buf) 141 if ((err = cipher_descriptor[cipher_idx].setup(md->chc.state, cipher_blocksize, 0, key)) != CRYPT_OK) 256 md[MAXBLOCKSIZE]; member in struct:__anon19180 268 hash_state md; local [all...] |
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_1.c | 36 hash_state *md; local 50 md = XMALLOC(sizeof(hash_state)); 52 if (md == NULL || buf == NULL) { 53 if (md != NULL) { 54 XFREE(md); 63 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) { 69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) { 72 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 93 zeromem(md, sizeof(hash_state)) [all...] |
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_mgf1.c | 36 hash_state *md; local 51 md = XMALLOC(sizeof(hash_state)); 53 if (md == NULL || buf == NULL) { 54 if (md != NULL) { 55 XFREE(md); 72 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 75 if ((err = hash_descriptor[hash_idx].process(md, seed, seedlen)) != CRYPT_OK) { 78 if ((err = hash_descriptor[hash_idx].process(md, buf, 4)) != CRYPT_OK) { 81 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 95 zeromem(md, sizeof(hash_state)) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/md4/ |
md4test.c | 96 static char *pt(unsigned char *md); 102 unsigned char md[MD4_DIGEST_LENGTH]; local 109 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_md4(), NULL); 110 p=pt(md); 127 static char *pt(unsigned char *md) 133 sprintf(&(buf[i*2]),"%02x",md[i]);
|
/external/openssl/crypto/md4/ |
md4test.c | 96 static char *pt(unsigned char *md); 102 unsigned char md[MD4_DIGEST_LENGTH]; local 109 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_md4(), NULL); 110 p=pt(md); 127 static char *pt(unsigned char *md) 133 sprintf(&(buf[i*2]),"%02x",md[i]);
|