/external/boringssl/src/include/openssl/ |
H A D | digest.h | 180 /* EVP_MD_type returns a NID identifying |md|. (For example, |NID_sha256|.) */ 181 OPENSSL_EXPORT int EVP_MD_type(const EVP_MD *md); 183 /* EVP_MD_flags returns the flags for |md|, which is a set of |EVP_MD_FLAG_*| 185 OPENSSL_EXPORT uint32_t EVP_MD_flags(const EVP_MD *md); 187 /* EVP_MD_size returns the digest size of |md|, in bytes. */ 188 OPENSSL_EXPORT size_t EVP_MD_size(const EVP_MD *md); 190 /* EVP_MD_block_size returns the native block-size of |md|, in bytes. */ 191 OPENSSL_EXPORT size_t EVP_MD_block_size(const EVP_MD *md);
|
H A D | md4.h | 82 * |md|, which must have at least |MD4_DIGEST_LENGTH| bytes of space. It 84 OPENSSL_EXPORT int MD4_Final(uint8_t *md, MD4_CTX *md4);
|
H A D | md5.h | 83 * |md|, which must have at least |MD5_DIGEST_LENGTH| bytes of space. It 85 OPENSSL_EXPORT int MD5_Final(uint8_t *md, MD5_CTX *md5);
|
H A D | ripemd.h | 86 * digest to |md|, which must have at least |RIPEMD160_DIGEST_LENGTH| bytes of 88 OPENSSL_EXPORT int RIPEMD160_Final(uint8_t *md, RIPEMD160_CTX *ctx);
|
/external/boringssl/src/crypto/digest_extra/ |
H A D | digest_test.cc | 56 // md is the digest to test. 57 const MD &md; member in struct:TestVector 163 ASSERT_TRUE(EVP_DigestInit_ex(ctx.get(), test->md.func(), NULL)); 167 std::unique_ptr<uint8_t[]> digest(new uint8_t[EVP_MD_size(test->md.func())]); 173 ASSERT_TRUE(EVP_DigestInit_ex(ctx.get(), test->md.func(), NULL)); 181 EXPECT_EQ(EVP_MD_size(test->md.func()), digest_len); 185 if (test->md.one_shot_func && test->repeat == 1) { 186 uint8_t *out = test->md.one_shot_func((const uint8_t *)test->input, 190 CompareDigest(test, digest.get(), EVP_MD_size(test->md.func()));
|
/external/boringssl/src/decrepit/obj/ |
H A D | obj_decrepit.c | 43 static void md_callback(const EVP_MD *md, const char *name, const char *unused, argument 51 obj_name.data = (const char *)md;
|
/external/sonic/doc/ |
H A D | post | 8 markdown_py index.md > index.html
|
/external/boringssl/src/crypto/evp/ |
H A D | p_ec.c | 78 const EVP_MD *md; member in struct:__anon661 103 dctx->md = sctx->md; 191 dctx->md = p2; 195 *(const EVP_MD **)p2 = dctx->md;
|
H A D | digestsign.c | 159 uint8_t md[EVP_MAX_MD_SIZE]; local 164 EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) && 165 EVP_PKEY_sign(ctx->pctx, out_sig, out_sig_len, md, mdlen); 184 uint8_t md[EVP_MAX_MD_SIZE]; local 189 EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) && 190 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen);
|
/external/boringssl/src/fipstools/ |
H A D | cavp_ecdsa2_siggen_test.cc | 36 const EVP_MD *md = GetDigestFromInstruction(t); local 37 if (nid == NID_undef || md == nullptr) { 55 if (msg.size() != EVP_MD_size(md)) { 59 digest_len = EVP_MD_size(md); 61 } else if (!EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md,
|
/external/boringssl/src/tool/ |
H A D | digest.cc | 115 // SumFile hashes the contents of |source| with |md| and sets |*out_hex| to the 120 static bool SumFile(std::string *out_hex, const EVP_MD *md, argument 138 if (!EVP_DigestInit_ex(ctx.get(), md, NULL)) { 184 // PrintFileSum hashes |source| with |md| and prints a line to stdout in the 187 static bool PrintFileSum(const EVP_MD *md, const Source &source) { argument 189 if (!SumFile(&hex_digest, md, source)) { 222 static bool Check(const CheckModeArguments &args, const EVP_MD *md, argument 245 const size_t hex_size = EVP_MD_size(md) * 2; 315 if (!SumFile(&calculated_hex_digest, md, target_source)) { 357 static bool DigestSum(const EVP_MD *md, argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_libtomcrypt.c | 27 hash_state md; local 30 md4_init(&md); 32 md4_process(&md, addr[i], len[i]); 33 md4_done(&md, mac); 61 hash_state md; local 64 md5_init(&md); 66 md5_process(&md, addr[i], len[i]); 67 md5_done(&md, mac); 74 hash_state md; local 77 sha1_init(&md); 147 hash_state md; member in union:crypto_hash::__anon26717 [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_libtomcrypt.c | 27 hash_state md; local 30 md4_init(&md); 32 md4_process(&md, addr[i], len[i]); 33 md4_done(&md, mac); 61 hash_state md; local 64 md5_init(&md); 66 md5_process(&md, addr[i], len[i]); 67 md5_done(&md, mac); 74 hash_state md; local 77 sha1_init(&md); 147 hash_state md; member in union:crypto_hash::__anon26980 [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_libtomcrypt.c | 27 hash_state md; local 30 md4_init(&md); 32 md4_process(&md, addr[i], len[i]); 33 md4_done(&md, mac); 61 hash_state md; local 64 md5_init(&md); 66 md5_process(&md, addr[i], len[i]); 67 md5_done(&md, mac); 74 hash_state md; local 77 sha1_init(&md); 147 hash_state md; member in union:crypto_hash::__anon27247 [all...] |
/external/mesa3d/src/gallium/winsys/amdgpu/drm/ |
H A D | amdgpu_bo.c | 596 struct radeon_bo_metadata *md) 611 md->microtile = RADEON_LAYOUT_LINEAR; 612 md->macrotile = RADEON_LAYOUT_LINEAR; 615 md->macrotile = RADEON_LAYOUT_TILED; 617 md->microtile = RADEON_LAYOUT_TILED; 619 md->pipe_config = AMDGPU_TILING_GET(tiling_flags, PIPE_CONFIG); 620 md->bankw = 1 << AMDGPU_TILING_GET(tiling_flags, BANK_WIDTH); 621 md->bankh = 1 << AMDGPU_TILING_GET(tiling_flags, BANK_HEIGHT); 622 md->tile_split = eg_tile_split(AMDGPU_TILING_GET(tiling_flags, TILE_SPLIT)); 623 md 595 amdgpu_buffer_get_metadata(struct pb_buffer *_buf, struct radeon_bo_metadata *md) argument 631 amdgpu_buffer_set_metadata(struct pb_buffer *_buf, struct radeon_bo_metadata *md) argument [all...] |
/external/boringssl/src/crypto/x509/ |
H A D | x_all.c | 80 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) argument 84 x->sig_alg, x->signature, x->cert_info, pkey, md)); 95 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) argument 98 x->signature, x->req_info, pkey, md)); 108 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) argument 112 x->sig_alg, x->signature, x->crl, pkey, md)); 123 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) argument 126 x->signature, x->spkac, pkey, md)); 352 unsigned char *md, unsigned int *len) 358 return EVP_Digest(key->data, key->length, md, le 351 X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, unsigned int *len) argument 361 X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, unsigned int *len) argument 368 X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, unsigned int *len) argument 375 X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, unsigned int *len) argument 382 X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, unsigned int *len) argument [all...] |
/external/markdown/markdown/extensions/ |
H A D | footnotes.py | 55 def extendMarkdown(self, md, md_globals): 57 md.registerExtension(self) 58 self.parser = md.parser 60 md.preprocessors.add("footnote", FootnotePreprocessor(self), 64 md.inlinePatterns.add("footnote", FootnotePattern(FOOTNOTE_RE, self), 69 md.treeprocessors.add("footnote", FootnoteTreeprocessor(self), 72 md.postprocessors.add("footnote", FootnotePostprocessor(self),
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
H A D | CertificateEntry.java | 94 MessageDigest md = MessageDigest.getInstance("SHA-256"); 95 md.update(issuerKey); 96 byte[] issuerKeyHash = md.digest();
|
/external/ppp/pppd/include/ |
H A D | pcap-int.h | 76 struct pcap_md md; member in struct:pcap
|
/external/javassist/src/main/javassist/compiler/ |
H A D | Javac.java | 141 private CtBehavior compileMethod(Parser p, MethodDecl md) argument 144 int mod = MemberResolver.getModifiers(md.getModifiers()); 145 CtClass[] plist = gen.makeParamList(md); 146 CtClass[] tlist = gen.makeThrowsList(md); 148 md = p.parseMethod2(stable, md); 150 if (md.isConstructor()) { 154 md.accept(gen); 161 Declarator r = md.getReturn(); 168 md [all...] |
/external/protobuf/csharp/src/Google.Protobuf/Reflection/ |
H A D | TypeRegistry.cs | 132 return FromFiles(messageDescriptors.Select(md => md.File));
|
/external/walt/docs/ |
H A D | ChromeOS.md | 4 1. Via the [pywalt/walt.py](/pywalt/walt.py) command line script - for this mode refer to [pywalt/README.md](/pywalt/README.md) 44 If you need to deploy your own version of WALT Android app, follow instruction in [Development.md](Development.md)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | sme.h | 19 int sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, 55 static inline int sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, argument
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | padding.c | 271 size_t seed_len, const EVP_MD *md) { 276 size_t md_len = EVP_MD_size(md); 284 if (!EVP_DigestInit_ex(&ctx, md, NULL) || 316 const EVP_MD *md, const EVP_MD *mgf1md) { 317 if (md == NULL) { 318 md = EVP_sha1(); 321 mgf1md = md; 324 size_t mdlen = EVP_MD_size(md); 346 if (!EVP_Digest(param, param_len, db, NULL, md, NULL)) { 387 size_t param_len, const EVP_MD *md, 270 PKCS1_MGF1(uint8_t *out, size_t len, const uint8_t *seed, size_t seed_len, const EVP_MD *md) argument 313 RSA_padding_add_PKCS1_OAEP_mgf1(uint8_t *to, size_t to_len, const uint8_t *from, size_t from_len, const uint8_t *param, size_t param_len, const EVP_MD *md, const EVP_MD *mgf1md) argument 384 RSA_padding_check_PKCS1_OAEP_mgf1(uint8_t *out, size_t *out_len, size_t max_out, const uint8_t *from, size_t from_len, const uint8_t *param, size_t param_len, const EVP_MD *md, const EVP_MD *mgf1md) argument [all...] |
/external/libusb/msvc/ |
H A D | ddk_build.cmd | 65 md %dstPath%\lib 68 md %dstPath%\examples 81 md examples\listdevs_ddkbuild 101 md examples\xusb_ddkbuild 121 md examples\getopt\getopt_ddkbuild 133 md examples\fxload_ddkbuild 153 md examples\hotplugtest_ddkbuild
|