/external/dropbear/libtomcrypt/src/hashes/ |
D | md2.c | 64 L = md->md2.chksum[15]; in md2_update_chksum() 70 L = (md->md2.chksum[j] ^= PI_SUBST[(int)(md->md2.buf[j] ^ L)] & 255); in md2_update_chksum() 81 md->md2.X[16+j] = md->md2.buf[j]; in md2_compress() 82 md->md2.X[32+j] = md->md2.X[j] ^ md->md2.X[16+j]; in md2_compress() 90 t = (md->md2.X[k] ^= PI_SUBST[(int)(t & 255)]); in md2_compress() 106 zeromem(md->md2.X, sizeof(md->md2.X)); in md2_init() 107 zeromem(md->md2.chksum, sizeof(md->md2.chksum)); in md2_init() 108 zeromem(md->md2.buf, sizeof(md->md2.buf)); in md2_init() 109 md->md2.curlen = 0; in md2_init() 125 if (md-> md2 .curlen > sizeof(md-> md2 .buf)) { in md2_process() [all …]
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
D | MessageDigest_Impl2Test.java | 73 MessageDigest md2 = MessageDigest.getInstance("CBA"); in testGetInstanceString2() local 74 checkMD2(md2, p); in testGetInstanceString2() 89 MessageDigest md2 = MessageDigest.getInstance("CBA", "MyProvider"); in testGetInstanceStringString2() local 90 checkMD2(md2, p); in testGetInstanceStringString2() 107 MessageDigest md2 = MessageDigest.getInstance("CBA", p); in testGetInstanceStringProvider2() local 108 checkMD2(md2, p); in testGetInstanceStringProvider2() 145 private void checkMD2(MessageDigest md2, Provider p) throws Exception { in checkMD2() argument 147 assertEquals("getProvider() failed", p, md2.getProvider()); in checkMD2() 148 assertEquals("getAlgorithm() failed", "CBA", md2.getAlgorithm()); in checkMD2() 150 md2.update((byte) 1); in checkMD2() [all …]
|
/external/openssl/apps/ |
D | passwd.c | 317 EVP_MD_CTX md,md2; in md5crypt() local 340 EVP_MD_CTX_init(&md2); in md5crypt() 341 EVP_DigestInit_ex(&md2,EVP_md5(), NULL); in md5crypt() 342 EVP_DigestUpdate(&md2, passwd, passwd_len); in md5crypt() 343 EVP_DigestUpdate(&md2, salt_out, salt_len); in md5crypt() 344 EVP_DigestUpdate(&md2, passwd, passwd_len); in md5crypt() 345 EVP_DigestFinal_ex(&md2, buf, NULL); in md5crypt() 361 EVP_DigestInit_ex(&md2,EVP_md5(), NULL); in md5crypt() 362 EVP_DigestUpdate(&md2, (i & 1) ? (unsigned const char *) passwd : buf, in md5crypt() 365 EVP_DigestUpdate(&md2, salt_out, salt_len); in md5crypt() [all …]
|
D | speed.c | 377 unsigned char md2[MD2_DIGEST_LENGTH]; in MAIN() local 1510 EVP_Digest(buf,(unsigned long)lengths[j],&(md2[0]),NULL,EVP_md2(),NULL); in MAIN()
|
/external/bouncycastle/patches/ |
D | bcpkix.patch | 191 - digestAlgs.put(PKCSObjectIdentifiers.md2.getId(), "MD2"); 202 + // digestAlgs.put(PKCSObjectIdentifiers.md2.getId(), "MD2"); 312 - digestAlgs.put(PKCSObjectIdentifiers.md2, "MD2"); 322 + // digestAlgs.put(PKCSObjectIdentifiers.md2, "MD2"); 423 - digestOids.put(PKCSObjectIdentifiers.md2WithRSAEncryption, PKCSObjectIdentifiers.md2); 426 + // digestOids.put(PKCSObjectIdentifiers.md2WithRSAEncryption, PKCSObjectIdentifiers.md2); 476 - digestNameToOids.put("MD2", PKCSObjectIdentifiers.md2); 481 + // digestNameToOids.put("MD2", PKCSObjectIdentifiers.md2); 720 - digestOids.put(PKCSObjectIdentifiers.md2WithRSAEncryption, PKCSObjectIdentifiers.md2); 723 + // digestOids.put(PKCSObjectIdentifiers.md2WithRSAEncryption, PKCSObjectIdentifiers.md2); [all …]
|
D | bcprov.patch | 193 // md2 OBJECT IDENTIFIER ::= 196 - static final ASN1ObjectIdentifier md2 = digestAlgorithm.branch("2"); 198 + // static final ASN1ObjectIdentifier md2 = digestAlgorithm.branch("2"); 1158 - oidMap.put("MD2", PKCSObjectIdentifiers.md2); 1161 + // oidMap.put("MD2", PKCSObjectIdentifiers.md2); 3201 - super(PKCSObjectIdentifiers.md2, new MD2Digest(), new PKCS1Encoding(new RSABlindedEngi… 3222 + // super(PKCSObjectIdentifiers.md2, new MD2Digest(), new PKCS1Encoding(new RSABlindedE…
|
/external/openssl/crypto/objects/ |
D | obj_xref.txt | 5 md2WithRSAEncryption md2 rsaEncryption
|
D | obj_mac.num | 4 md2 3
|
D | objects.txt | 359 rsadsi 2 2 : MD2 : md2
|
/external/openssl/ |
D | openssl.config | 3 no-idea no-cast no-seed no-md2 no-sha0 no-whrlpool \ 21 crypto/md2 \
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_hash.h | 129 struct md2_state md2; member
|
/external/dropbear/libtomcrypt/ |
D | Android.mk | 26 src/hashes/helper/hash_memory.c src/hashes/helper/hash_memory_multi.c src/hashes/md2.c src/hashes/m…
|
D | Makefile.in | 117 src/hashes/helper/hash_memory.o src/hashes/helper/hash_memory_multi.o src/hashes/md2.o src/hashes/m…
|
D | makefile.msvc | 24 src/hashes/helper/hash_memory.obj src/hashes/helper/hash_memory_multi.obj src/hashes/md2.obj src/ha…
|
D | makefile.icc | 114 src/hashes/helper/hash_memory.o src/hashes/helper/hash_memory_multi.o src/hashes/md2.o src/hashes/m…
|
D | makefile.unix | 60 src/hashes/helper/hash_memory.o src/hashes/helper/hash_memory_multi.o src/hashes/md2.o src/hashes/m…
|
D | makefile.shared | 119 src/hashes/helper/hash_memory.o src/hashes/helper/hash_memory_multi.o src/hashes/md2.o src/hashes/m…
|
D | changes | 947 -- Fixed bug in yarrow code where it would allow cast5 or md2 to be used with it...
|
D | crypt.tex | 2004 \hline MD2 & md2\_desc & 16 \\
|
/external/dropbear/libtomcrypt/notes/ |
D | hmac_tv.txt | 136 HMAC-md2
|
D | hash_tv.txt | 136 Hash: md2
|
/external/webkit/PerformanceTests/Parser/resources/ |
D | final-url-en | 24577 http://www.angelfire.com/md2/BrokenArrow/ 24578 http://www.angelfire.com/md2/simianline/QuotesWar1.htm
|