/third_party/curl/lib/vauth/ |
H A D | digest.c | 35 #include "vauth/digest.h" 345 unsigned char digest[MD5_DIGEST_LEN]; in Curl_auth_create_digest_md5_message() local 402 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message() 408 Curl_MD5_update(ctxt, (const unsigned char *) digest, MD5_DIGEST_LEN); in Curl_auth_create_digest_md5_message() 415 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message() 419 msnprintf(&HA1_hex[2 * i], 3, "%02x", digest[i]); in Curl_auth_create_digest_md5_message() 439 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message() 442 msnprintf(&HA2_hex[2 * i], 3, "%02x", digest[i]); in Curl_auth_create_digest_md5_message() 469 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message() 472 msnprintf(&resp_hash_hex[2 * i], 3, "%02x", digest[ in Curl_auth_create_digest_md5_message() 502 Curl_auth_decode_digest_http_message(const char *chlg, struct digestdata *digest) Curl_auth_decode_digest_http_message() argument 669 auth_create_digest_http_message( struct Curl_easy *data, const char *userp, const char *passwdp, const unsigned char *request, const unsigned char *uripath, struct digestdata *digest, char **outptr, size_t *outlen, void (*convert_to_ascii)(unsigned char *, unsigned char *), CURLcode (*hash)(unsigned char *, const unsigned char *, const size_t)) auth_create_digest_http_message() argument 946 Curl_auth_create_digest_http_message(struct Curl_easy *data, const char *userp, const char *passwdp, const unsigned char *request, const unsigned char *uripath, struct digestdata *digest, char **outptr, size_t *outlen) Curl_auth_create_digest_http_message() argument 978 Curl_auth_digest_cleanup(struct digestdata *digest) Curl_auth_digest_cleanup() argument [all...] |
H A D | cram.c | 66 unsigned char digest[MD5_DIGEST_LEN]; in Curl_auth_create_cram_md5_message() local 69 /* Compute the digest using the password as the key */ in Curl_auth_create_cram_md5_message() 76 /* Update the digest with the given challenge */ in Curl_auth_create_cram_md5_message() 81 /* Finalise the digest */ in Curl_auth_create_cram_md5_message() 82 Curl_HMAC_final(ctxt, digest); in Curl_auth_create_cram_md5_message() 87 userp, digest[0], digest[1], digest[2], digest[3], digest[ in Curl_auth_create_cram_md5_message() [all...] |
H A D | digest_sspi.c | 35 #include "vauth/digest.h" 318 * digest [in/out] - The digest data struct being used and modified. 323 struct digestdata *digest) in Curl_auth_decode_digest_http_message() 329 if(digest->input_token) { in Curl_auth_decode_digest_http_message() 358 Curl_auth_digest_cleanup(digest); in Curl_auth_decode_digest_http_message() 364 digest->input_token = (BYTE *) Curl_memdup(chlg, chlglen + 1); in Curl_auth_decode_digest_http_message() 365 if(!digest->input_token) in Curl_auth_decode_digest_http_message() 368 digest->input_token_len = chlglen; in Curl_auth_decode_digest_http_message() 386 * digest [i 322 Curl_auth_decode_digest_http_message(const char *chlg, struct digestdata *digest) Curl_auth_decode_digest_http_message() argument 393 Curl_auth_create_digest_http_message(struct Curl_easy *data, const char *userp, const char *passwdp, const unsigned char *request, const unsigned char *uripath, struct digestdata *digest, char **outptr, size_t *outlen) Curl_auth_create_digest_http_message() argument 653 Curl_auth_digest_cleanup(struct digestdata *digest) Curl_auth_digest_cleanup() argument [all...] |
/third_party/python/Modules/ |
H A D | sha512module.c | 40 /* The SHA block size and message digest sizes, in bytes */ 49 SHA_INT64 digest[8]; /* Message digest */ member 77 memcpy(dest->digest, src->digest, sizeof(src->digest)); in SHAcopy() 135 S[i] = sha_info->digest[i]; in sha512_transform() 230 sha_info->digest[i] = sha_info->digest[i] + S[i]; in sha512_transform() 237 /* initialize the SHA digest */ 317 sha512_final(unsigned char digest[SHA_DIGESTSIZE], SHAobject *sha_info) sha512_final() argument 517 unsigned char digest[SHA_DIGESTSIZE]; SHA512Type_digest_impl() local 535 unsigned char digest[SHA_DIGESTSIZE]; SHA512Type_hexdigest_impl() local [all...] |
H A D | sha256module.c | 39 /* The SHA block size and message digest sizes, in bytes */ 48 SHA_INT32 digest[8]; /* Message digest */ member 89 memcpy(dest->digest, src->digest, sizeof(src->digest)); in SHAcopy() 147 S[i] = sha_info->digest[i]; in sha_transform() 226 sha_info->digest[i] = sha_info->digest[i] + S[i]; in sha_transform() 233 /* initialize the SHA digest */ 313 sha_final(unsigned char digest[SHA_DIGESTSIZE], SHAobject *sha_info) sha_final() argument 461 unsigned char digest[SHA_DIGESTSIZE]; SHA256Type_digest_impl() local 479 unsigned char digest[SHA_DIGESTSIZE]; SHA256Type_hexdigest_impl() local [all...] |
/third_party/selinux/libselinux/src/ |
H A D | label_support.c | 116 void digest_gen_hash(struct selabel_digest *digest) in digest_gen_hash() argument 123 if (!digest) in digest_gen_hash() 129 remaining_size = digest->hashbuf_size; in digest_gen_hash() 130 ptr = digest->hashbuf; in digest_gen_hash() 138 Sha1Finalise(&context, (SHA1_HASH *)digest->digest); in digest_gen_hash() 139 free(digest->hashbuf); in digest_gen_hash() 140 digest->hashbuf = NULL; in digest_gen_hash() 147 * @digest: pointer to the selabel_digest struct 156 int digest_add_specfile(struct selabel_digest *digest, FIL argument [all...] |
H A D | label.c | 62 struct selabel_digest *digest = NULL; in selabel_is_digest_set() local 67 digest = calloc(1, sizeof(*digest)); in selabel_is_digest_set() 68 if (!digest) in selabel_is_digest_set() 71 digest->digest = calloc(1, DIGEST_SPECFILE_SIZE + 1); in selabel_is_digest_set() 72 if (!digest->digest) in selabel_is_digest_set() 75 digest->specfile_list = calloc(DIGEST_FILES_MAX, in selabel_is_digest_set() 77 if (!digest in selabel_is_digest_set() 321 selabel_hash_all_partial_matches(struct selabel_handle *rec, const char *key, uint8_t *digest) selabel_hash_all_partial_matches() argument 375 selabel_digest(struct selabel_handle *rec, unsigned char **digest, size_t *digest_len, char ***specfiles, size_t *num_specfiles) selabel_digest() argument [all...] |
/third_party/ffmpeg/libavformat/ |
H A D | httpauth.c | 43 DigestParams *digest = &state->digest_params; in handle_digest_params() local 49 *dest = digest->nonce; in handle_digest_params() 50 *dest_len = sizeof(digest->nonce); in handle_digest_params() 52 *dest = digest->opaque; in handle_digest_params() 53 *dest_len = sizeof(digest->opaque); in handle_digest_params() 55 *dest = digest->algorithm; in handle_digest_params() 56 *dest_len = sizeof(digest->algorithm); in handle_digest_params() 58 *dest = digest->qop; in handle_digest_params() 59 *dest_len = sizeof(digest->qop); in handle_digest_params() 61 *dest = digest in handle_digest_params() 69 DigestParams *digest = &state->digest_params; handle_digest_update() local 141 DigestParams *digest = &state->digest_params; make_digest_auth() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | digest.c | 30 if (ctx->digest != NULL) { in cleanup_old_md_data() 31 if (ctx->digest->cleanup != NULL in cleanup_old_md_data() 33 ctx->digest->cleanup(ctx); in cleanup_old_md_data() 34 if (ctx->md_data != NULL && ctx->digest->ctx_size > 0 in cleanup_old_md_data() 37 OPENSSL_clear_free(ctx->md_data, ctx->digest->ctx_size); in cleanup_old_md_data() 46 if (ctx->digest != NULL && ctx->digest->freectx != NULL) in evp_md_ctx_clear_digest() 47 ctx->digest->freectx(ctx->algctx); in evp_md_ctx_clear_digest() 60 ctx->digest = NULL; in evp_md_ctx_clear_digest() 67 /* Non legacy code, this has to be later than the ctx->digest cleanin in evp_md_ctx_clear_digest() 668 EVP_MD *digest = EVP_MD_fetch(libctx, name, propq); EVP_Q_digest() local 681 EVP_MD_get_params(const EVP_MD *digest, OSSL_PARAM params[]) EVP_MD_get_params() argument 688 EVP_MD_gettable_params(const EVP_MD *digest) EVP_MD_gettable_params() argument [all...] |
/third_party/openssl/crypto/evp/ |
H A D | digest.c | 30 if (ctx->digest != NULL) { in cleanup_old_md_data() 31 if (ctx->digest->cleanup != NULL in cleanup_old_md_data() 33 ctx->digest->cleanup(ctx); in cleanup_old_md_data() 34 if (ctx->md_data != NULL && ctx->digest->ctx_size > 0 in cleanup_old_md_data() 37 OPENSSL_clear_free(ctx->md_data, ctx->digest->ctx_size); in cleanup_old_md_data() 46 if (ctx->digest != NULL && ctx->digest->freectx != NULL) in evp_md_ctx_clear_digest() 47 ctx->digest->freectx(ctx->algctx); in evp_md_ctx_clear_digest() 60 ctx->digest = NULL; in evp_md_ctx_clear_digest() 67 /* Non legacy code, this has to be later than the ctx->digest cleanin in evp_md_ctx_clear_digest() 668 EVP_MD *digest = EVP_MD_fetch(libctx, name, propq); EVP_Q_digest() local 681 EVP_MD_get_params(const EVP_MD *digest, OSSL_PARAM params[]) EVP_MD_get_params() argument 688 EVP_MD_gettable_params(const EVP_MD *digest) EVP_MD_gettable_params() argument [all...] |
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/ |
H A D | ima_setup.sh | 27 local digest 29 digest="$(${algorithm}sum $file 2>/dev/null | cut -f1 -d ' ')" 30 if [ -n "$digest" ]; then 31 echo "$digest" 35 digest="$(openssl $algorithm $file 2>/dev/null | cut -f2 -d ' ')" 36 if [ -n "$digest" ]; then 37 echo "$digest" 48 digest="$(rdigest --$arg $file 2>/dev/null | cut -f1 -d ' ')" 49 if [ -n "$digest" ]; then 50 echo "$digest" [all...] |
/third_party/skia/src/core/ |
H A D | SkScalerCache.cpp | 38 auto [digest, size] = this->digest(packedGlyphID); in glyph() 39 return {fGlyphForIndex[digest.index()], size}; in glyph() 42 std::tuple<SkGlyphDigest, size_t> SkScalerCache::digest(SkPackedGlyphID packedGlyphID) { in digest() function in SkScalerCache 43 SkGlyphDigest* digest = fDigestForPackedGlyphID.find(packedGlyphID); in digest() local 45 if (digest != nullptr) { in digest() 46 return {*digest, 0}; in digest() 55 SkGlyphDigest digest = SkGlyphDigest{index, *glyph}; in addGlyph() local 56 fDigestForPackedGlyphID.set(glyph->getPackedID(), digest); in addGlyph() 58 return digest; in addGlyph() 112 SkGlyphDigest* digest = fDigestForPackedGlyphID.find(toID); mergeGlyphAndImage() local [all...] |
/third_party/fsverity-utils/programs/ |
H A D | cmd_digest.c | 3 * The 'fsverity digest' command 29 * Compute the fs-verity digest of the given file(s), for offline signing. 69 struct libfsverity_digest *digest = NULL; in fsverity_cmd_digest() local 80 &tree_params, &digest) != 0) { in fsverity_cmd_digest() 81 error_msg("failed to compute digest"); in fsverity_cmd_digest() 85 ASSERT(digest->digest_size <= FS_VERITY_MAX_DIGEST_SIZE); in fsverity_cmd_digest() 89 * Format the digest for use with the built-in signature in fsverity_cmd_digest() 92 d = xzalloc(sizeof(*d) + digest->digest_size); in fsverity_cmd_digest() 95 cpu_to_le16(digest->digest_algorithm); in fsverity_cmd_digest() 96 d->digest_size = cpu_to_le16(digest in fsverity_cmd_digest() [all...] |
H A D | test_compute_digest.c | 53 const char *digest; member 59 .digest = "\x48\xdf\x0c\x46\x23\x29\xcd\x87" 67 .digest = "\xf2\x09\x6a\x36\xc5\xcd\xca\x4f" 75 .digest = "\x6a\xc3\x99\x79\x01\x6e\x3d\xdf" 83 .digest = "\xb8\x03\x42\x95\x03\xd9\x59\x15" 91 .digest = "\x3d\x24\x8c\xa5\x42\xa2\x4f\xc6" 100 .digest = "\x91\x79\x00\xb0\xd2\x99\x45\x4a" 109 .digest = "\xbc\x2d\x70\x32\x4c\x04\x8c\x22" 117 .digest = "\xe9\xdf\x92\x7c\x14\xfc\xb9\x61" 125 .digest 281 u8 digest[SHA256_DIGEST_LENGTH]; handle_merkle_tree_block() local 331 u8 digest[SHA256_DIGEST_LENGTH]; handle_descriptor() local [all...] |
/third_party/node/test/parallel/ |
H A D | test-webcrypto-digest.js | 21 subtle.digest('SHA-512', Buffer.alloc(0)) 28 // subtle.digest('SHA-512', new ArrayBuffer(2 ** 31 - 1)) 32 // assert.rejects(subtle.digest('SHA-512', new ArrayBuffer(kMaxLength + 1)), { 39 // Get the digest using the legacy crypto API 41 createHash(test[1]).update(kData).digest().toString('hex'); 43 // Get the digest using the SubtleCrypto API 45 subtle.digest({ name: test[0] }, kData), 46 subtle.digest({ name: test[0], length: test[2] }, kData), 47 subtle.digest(test[0], kData), 48 subtle.digest(tes [all...] |
/third_party/lwip/src/include/netif/ppp/ |
H A D | chap-new.h | 57 * CHAP digest codes. 87 /* Return the digest alg. ID for the most preferred digest type. */ 99 /* Return the bit flag (lsb set) for our most preferred digest type. */ 102 /* Return the bit flag for a given digest algorithm ID. */ 104 #define CHAP_MDTYPE_D(digest) \ 105 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 106 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 107 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 110 #define CHAP_MDTYPE_D(digest) \ 159 const struct chap_digest_type *digest; global() member 168 const struct chap_digest_type *digest; global() member [all...] |
/third_party/node/lib/internal/crypto/ |
H A D | pbkdf2.js | 33 function pbkdf2(password, salt, iterations, keylen, digest, callback) { 34 if (typeof digest === 'function') { 35 callback = digest; 36 digest = undefined; 39 ({ password, salt, iterations, keylen, digest } = 40 check(password, salt, iterations, keylen, digest)); 50 digest); 65 function pbkdf2Sync(password, salt, iterations, keylen, digest) { 66 ({ password, salt, iterations, keylen, digest } = 67 check(password, salt, iterations, keylen, digest)); [all...] |
/third_party/curl/lib/ |
H A D | http_digest.c | 52 struct digestdata *digest; in Curl_input_digest() local 55 digest = &data->state.proxydigest; in Curl_input_digest() 58 digest = &data->state.digest; in Curl_input_digest() 68 return Curl_auth_decode_digest_http_message(header, digest); in Curl_input_digest() 92 struct digestdata *digest; in Curl_output_digest() local 99 digest = &data->state.proxydigest; in Curl_output_digest() 107 digest = &data->state.digest; in Curl_output_digest() 124 have_chlg = digest in Curl_output_digest() [all...] |
/third_party/node/deps/npm/node_modules/ssri/lib/ |
H A D | index.js | 97 return `${this.algorithms[i]}-${h.digest('base64')}${this.optString}` 142 this.digest = '' 160 this.digest = match[2] 169 return this.digest && Buffer.from(this.digest, 'base64').toString('hex') 188 const foundHash = other[algo].find(hash => hash.digest === this.digest) 196 return other.digest === this.digest ? other : false 211 this.digest [all...] |
/third_party/node/benchmark/crypto/ |
H A D | oneshot-verify.js | 45 function measureSync(n, digest, signature, publicKey, keys) { 49 digest, 57 function measureAsync(n, digest, signature, publicKey, keys) { 68 digest, 78 function measureAsyncParallel(n, digest, signature, publicKey, keys) { 87 digest, 99 let publicKey, keys, digest; 104 digest = 'sha256'; 136 const signature = crypto.sign(digest, data, privateKey); 140 measureSync(n, digest, signatur [all...] |
H A D | oneshot-sign.js | 34 function measureSync(n, digest, privateKey, keys) { 38 digest, 45 function measureAsync(n, digest, privateKey, keys) { 56 digest, 65 function measureAsyncParallel(n, digest, privateKey, keys) { 74 digest, 85 let privateKey, keys, digest; 90 digest = 'sha256'; 122 measureSync(n, digest, privateKey, keys); 125 measureAsync(n, digest, privateKe [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | fips_prf_wolfssl.c | 22 sha.digest[0] = state[0]; in sha1_transform() 23 sha.digest[1] = state[1]; in sha1_transform() 24 sha.digest[2] = state[2]; in sha1_transform() 25 sha.digest[3] = state[3]; in sha1_transform() 26 sha.digest[4] = state[4]; in sha1_transform() 28 state[0] = sha.digest[0]; in sha1_transform() 29 state[1] = sha.digest[1]; in sha1_transform() 30 state[2] = sha.digest[2]; in sha1_transform() 31 state[3] = sha.digest[3]; in sha1_transform() 32 state[4] = sha.digest[ in sha1_transform() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | fips_prf_wolfssl.c | 22 sha.digest[0] = state[0]; in sha1_transform() 23 sha.digest[1] = state[1]; in sha1_transform() 24 sha.digest[2] = state[2]; in sha1_transform() 25 sha.digest[3] = state[3]; in sha1_transform() 26 sha.digest[4] = state[4]; in sha1_transform() 28 state[0] = sha.digest[0]; in sha1_transform() 29 state[1] = sha.digest[1]; in sha1_transform() 30 state[2] = sha.digest[2]; in sha1_transform() 31 state[3] = sha.digest[3]; in sha1_transform() 32 state[4] = sha.digest[ in sha1_transform() [all...] |
/third_party/python/Lib/ |
H A D | hmac.py | 92 _warnings.warn('No block_size attribute on given digest object; ' 98 key = digest_cons(key).digest() 142 To be used only internally with digest() and hexdigest(). 148 h.update(self._inner.digest()) 151 def digest(self): member in HMAC 159 return h.digest() 162 """Like digest(), but returns a string of hexadecimal digits instead. 181 method, and can ask for the hash value at any time by calling its digest() 187 def digest(key, msg, digest) function [all...] |
/third_party/openssl/test/recipes/ |
H A D | 20-test_kdf.t | 19 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 22 { cmd => [qw{openssl kdf -keylen 16 -digest MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 25 { cmd => [qw{openssl kdf -keylen 10 -digest SHA256 -kdfopt key:secret -kdfopt salt:salt -kdfopt info:label HKDF}], 28 { cmd => [qw{openssl kdf -keylen 25 -digest SHA256 -kdfopt pass:passwordPASSWORDpassword -kdfopt salt:saltSALTsaltSALTsaltSALTsaltSALTsalt -kdfopt iter:4096 PBKDF2}], 34 { cmd => [qw{openssl kdf -keylen 16 -mac HMAC -digest SHA256 -kdfopt hexkey:b74a149a161546f8c20b06ac4ed4 -kdfopt hexinfo:348a37a27ef1282f5f020dcc -kdfopt hexsalt:3638271ccd68a25dc24ecddd39ef3f89 SSKDF}], 37 { cmd => [qw{openssl kdf -keylen 14 -digest SHA224 -kdfopt hexkey:6dbdc23f045488e4062757b06b9ebae183fc5a5946d80db93fec6f62ec07e3727f0126aed12ce4b262f47d48d54287f81d474c7c3b1850e9 -kdfopt hexinfo:a1b2c3d4e54341565369643c832e9849dcdba71e9a3139e606e095de3c264a66e98a165854cd07989b1ee0ec3f8dbe SSKDF}], 40 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt hexkey:0102030405 -kdfopt hexxcghash:06090A -kdfopt hexsession_id:01020304 -kdfopt type:A SSHKDF}], 44 # Using the -kdfopt digest: option instead of -digest 45 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest [all...] |