/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl_ocsp.c | 401 unsigned char md[EVP_MAX_MD_SIZE]; local 413 if (!X509_NAME_digest(iname, dgst, md, &len)) 418 if (!ASN1_OCTET_STRING_set(hash, md, len)) { 437 !EVP_Digest(ikey->data, ikey->length, md, &len, dgst, NULL) || 438 !ASN1_OCTET_STRING_set(hash, md, len)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl_ocsp.c | 401 unsigned char md[EVP_MAX_MD_SIZE]; local 413 if (!X509_NAME_digest(iname, dgst, md, &len)) 418 if (!ASN1_OCTET_STRING_set(hash, md, len)) { 437 !EVP_Digest(ikey->data, ikey->length, md, &len, dgst, NULL) || 438 !ASN1_OCTET_STRING_set(hash, md, len)) {
|
/external/python/cpython2/Python/ |
H A D | marshal.c | 578 int j, md, shorts_in_top_digit; local 600 md = r_short(p); 601 if (md < 0 || md > PyLong_MARSHAL_BASE) 603 d += (digit)md << j*PyLong_MARSHAL_SHIFT; 609 md = r_short(p); 610 if (md < 0 || md > PyLong_MARSHAL_BASE) 613 if (md == 0 && j == shorts_in_top_digit - 1) { 619 d += (digit)md << [all...] |
/external/apache-commons-math/src/main/java/org/apache/commons/math/dfp/ |
H A D | Dfp.java | 1474 int md = mant.length * 2 - 1; // default, in case result is zero 1477 md = i; 1484 result.mant[mant.length - i - 1] = product[md - i]; 1488 result.exp = exp + x.exp + md - 2 * mant.length + 1; 1497 if (md > (mant.length-1)) { 1498 excp = result.round(product[md-mant.length]); 1587 int md=0; // most sig digit in result 1754 md = mant.length; // default 1757 md = i; 1764 result.mant[mant.length-i-1] = quotient[md [all...] |
/external/ppp/pppd/ |
H A D | chap_ms.c | 198 unsigned char md[MS_CHAP_RESPONSE_LEN]; local 216 ChapMS(challenge, (char *)secret, secret_len, md); 222 &md[MS_CHAP_LANMANRESP], MS_CHAP_LANMANRESP_LEN); 225 diff = memcmp(&response[MS_CHAP_NTRESP], &md[MS_CHAP_NTRESP], 246 unsigned char md[MS_CHAP2_RESPONSE_LEN]; local 257 (char *)secret, secret_len, md, 280 if (memcmp(&md[MS_CHAP2_NTRESP], &response[MS_CHAP2_NTRESP],
|
/external/boringssl/include/openssl/ |
H A D | evp.h | 627 /* EVP_PKEY_CTX_set_signature_md sets |md| as the digest to be used in a 630 const EVP_MD *md); 682 /* EVP_PKEY_CTX_set_rsa_oaep_md sets |md| as the digest used in OAEP padding. 685 const EVP_MD *md); 692 /* EVP_PKEY_CTX_set_rsa_mgf1_md sets |md| as the digest used in MGF1. Returns 695 const EVP_MD *md);
|
/external/boringssl/src/include/openssl/ |
H A D | evp.h | 627 /* EVP_PKEY_CTX_set_signature_md sets |md| as the digest to be used in a 630 const EVP_MD *md); 682 /* EVP_PKEY_CTX_set_rsa_oaep_md sets |md| as the digest used in OAEP padding. 685 const EVP_MD *md); 692 /* EVP_PKEY_CTX_set_rsa_mgf1_md sets |md| as the digest used in MGF1. Returns 695 const EVP_MD *md);
|
/external/boringssl/src/ssl/ |
H A D | t1_enc.cc | 154 * section 5. It XORs |out_len| bytes to |out|, using |md| as the hash and 157 static int tls1_P_hash(uint8_t *out, size_t out_len, const EVP_MD *md, argument 167 size_t chunk = EVP_MD_size(md); 172 if (!HMAC_Init_ex(&ctx_init, secret, secret_len, md, NULL) ||
|
H A D | ssl_privkey.cc | 431 const EVP_MD *md = alg->digest_func(); local 434 if (!EVP_Digest(in, in_len, hash, &hash_len, md, NULL)) { 438 return ssl->cert->key_method->sign_digest(ssl, out, out_len, max_out, md,
|
/external/doclava/res/assets/templates/assets/ |
H A D | prettify.js | 8 kd="cs",ld="break continue do else for if return while auto case char const default double enum extern float goto int long register short signed sizeof static struct switch typedef union unsigned void volatile catch class delete false import new operator private protected public this throw true try boolean byte extends final finally implements import instanceof null native package strictfp super synchronized throws transient ",md="java",nd="break continue do else for if return while case done elif esac eval fi function in local set then until ", 28 [$c]);y(C({keywords:ad,hashComments:o,cStyleComments:o}),[bd,cd,dd,ed,fd,gd]);y(C({keywords:hd}),[id]);y(C({keywords:jd,hashComments:o,cStyleComments:o}),[kd]);y(C({keywords:ld,cStyleComments:o}),[md]);y(C({keywords:nd,hashComments:o,multiLineStrings:o}),[od,pd,qd]);y(C({keywords:rd,hashComments:o,multiLineStrings:o,tripleQuotedStrings:o}),[sd,td]);y(C({keywords:ud,hashComments:o,multiLineStrings:o,regexLiterals:o}),[vd,wd,xd]);y(C({keywords:yd,hashComments:o,multiLineStrings:o,regexLiterals:o}),
|
/external/google-breakpad/src/client/mac/handler/ |
H A D | exception_handler.cc | 391 MinidumpGenerator md(mach_task_self(), 394 md.SetTaskContext(task_context); 401 md.SetExceptionInformation(exception_type, exception_code, 405 result = md.Write(next_minidump_path_c_);
|
/external/mesa3d/src/gallium/drivers/radeon/ |
H A D | radeon_winsys.h | 443 * \param md Metadata 446 struct radeon_bo_metadata *md); 453 * \param md Metadata 456 struct radeon_bo_metadata *md);
|
/external/protobuf/ruby/ext/google/protobuf_c/ |
H A D | encode_decode.c | 63 const upb_msgdef *md; member in struct:__anon16996 71 hd->md = upb_fielddef_msgsubdef(f); 80 const upb_msgdef *md; // msgdef, for oneof submessage handler member in struct:__anon16997 98 hd->md = upb_fielddef_msgsubdef(f); 100 hd->md = NULL; 190 get_def_obj((void*)submsgdata->md); 206 get_def_obj((void*)submsgdata->md); 371 get_def_obj((void*)oneofdata->md);
|
/external/walt/docs/ |
H A D | TapLatency.md | 4 * [Detailed instructions on how to perform the measurement in usage doc](usage/WALT_usage.md#tap-latency).
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | rsa.c | 462 const uint8_t *in, size_t in_len, const EVP_MD *md, 464 if (in_len != EVP_MD_size(md)) { 477 RSA_padding_add_PKCS1_PSS_mgf1(rsa, padded, in, md, mgf1_md, salt_len) && 537 const EVP_MD *md, const EVP_MD *mgf1_md, int salt_len, 539 if (msg_len != EVP_MD_size(md)) { 561 ret = RSA_verify_PKCS1_PSS_mgf1(rsa, msg, md, mgf1_md, em, salt_len); 461 RSA_sign_pss_mgf1(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, const EVP_MD *md, const EVP_MD *mgf1_md, int salt_len) argument 536 RSA_verify_pss_mgf1(RSA *rsa, const uint8_t *msg, size_t msg_len, const EVP_MD *md, const EVP_MD *mgf1_md, int salt_len, const uint8_t *sig, size_t sig_len) argument
|
/external/libpcap/ |
H A D | pcap-new.c | 942 struct pcap_md *md; /* structure used when doing a remote live capture */ local 943 md = (struct pcap_md *) ((u_char*)fp->priv + sizeof(struct pcap_win)); 947 md->rmt_flags = flags; 995 struct pcap_md *md; /* structure used when doing a remote live capture */ local 997 md = (struct pcap_md *) ((u_char*)p->priv + sizeof(struct pcap_win)); 998 return &(md->rmt_samp);
|
/external/mesa3d/src/amd/vulkan/ |
H A D | radv_image.c | 384 struct radeon_bo_metadata *md) 398 md->metadata[0] = 1; /* metadata image format version 1 */ 401 md->metadata[1] = si_get_bo_metadata_word1(device); 421 memcpy(&md->metadata[2], desc, sizeof(desc)); 425 md->metadata[10+i] = image->surface.level[i].offset >> 8; 427 md->size_metadata = (11 + image->levels - 1) * 4; 382 radv_query_opaque_metadata(struct radv_device *device, struct radv_image *image, struct radeon_bo_metadata *md) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | sme.c | 212 const u8 *md = NULL; local 363 md = ie + 2; 365 if (md) { 370 if (md && wpa_key_mgmt_ft(ssid->key_mgmt)) { 379 os_memcpy(mdie->mobility_domain, md, 381 mdie->ft_capab = md[MOBILITY_DOMAIN_ID_LEN]; 386 os_memcmp(md, wpa_s->sme.mobility_domain, 2) == 0 && 1146 int sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, argument 1149 if (md == NULL || ies == NULL) { 1158 os_memcpy(wpa_s->sme.mobility_domain, md, MOBILITY_DOMAIN_ID_LE [all...] |
/external/pcre/dist2/ |
H A D | RunTest.bat | 73 if not exist testout8 md testout8
74 if not exist testoutjit8 md testoutjit8
78 if not exist testout16 md testout16
79 if not exist testoutjit16 md testoutjit16
83 if not exist testout32 md testout32
84 if not exist testoutjit32 md testoutjit32
|
/external/syslinux/memdisk/ |
H A D | inflate.c | 502 unsigned ml, md; /* masks for bl and bd bits */ local 513 md = mask_bits[bd]; 545 if ((e = (t = td + ((unsigned)b & md))->e) > 16)
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
H A D | sha2.c | 1079 static int sha256_final(EVP_MD_CTX *ctx, unsigned char *md) argument 1081 SHA256_Final(md, data(ctx)); 1098 static int sha384_final(EVP_MD_CTX *ctx, unsigned char *md) argument 1100 SHA384_Final(md, data(ctx)); 1117 static int sha512_final(EVP_MD_CTX *ctx, unsigned char *md) argument 1119 SHA512_Final(md, data(ctx));
|
/external/openssh/ |
H A D | ssh-agent.c | 303 struct ssh_digest_ctx *md; local 347 if ((md = ssh_digest_start(SSH_DIGEST_MD5)) == NULL || 348 ssh_digest_update(md, buf, 32) < 0 || 349 ssh_digest_update(md, session_id, 16) < 0 || 350 ssh_digest_final(md, mdbuf, sizeof(mdbuf)) < 0) 352 ssh_digest_free(md);
|
H A D | ssh.c | 525 struct ssh_digest_ctx *md; local 1188 if ((md = ssh_digest_start(SSH_DIGEST_SHA1)) == NULL || 1189 ssh_digest_update(md, thishost, strlen(thishost)) < 0 || 1190 ssh_digest_update(md, host, strlen(host)) < 0 || 1191 ssh_digest_update(md, portstr, strlen(portstr)) < 0 || 1192 ssh_digest_update(md, options.user, strlen(options.user)) < 0 || 1193 ssh_digest_final(md, conn_hash, sizeof(conn_hash)) < 0) 1195 ssh_digest_free(md);
|
/external/boringssl/src/crypto/fipsmodule/sha/ |
H A D | sha256.c | 122 int SHA224_Final(uint8_t *md, SHA256_CTX *ctx) { argument 123 return SHA256_Final(md, ctx);
|
/external/e2fsprogs/lib/blkid/ |
H A D | probe.c | 97 struct mdp_superblock_s *md; local 118 md = (struct mdp_superblock_s *)buf; 119 if (md->set_uuid0 || md->set_uuid1 || md->set_uuid2 || md->set_uuid3) { 120 memcpy(ret_uuid, &md->set_uuid0, 4); 121 memcpy(ret_uuid + 4, &md->set_uuid1, 12);
|