/third_party/mbedtls/tests/data_files/ |
H A D | Makefile | 51 test-ca.req.sha256: $(test_ca_key_file_rsa) 53 all_intermediate += test-ca.req.sha256 55 parse_input/test-ca.crt test-ca.crt: $(test_ca_key_file_rsa) test-ca.req.sha256 56 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@ 74 test-ca-sha1.crt: $(test_ca_key_file_rsa) test-ca.req.sha256 75 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@ 82 test-ca-sha256.crt: $(test_ca_key_file_rsa) test-ca.req.sha256 83 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA256 version=3 output_file=$@ 84 all_final += test-ca-sha256 [all...] |
/third_party/openssl/test/ |
H A D | defltfips_test.c | 21 EVP_MD *sha256 = NULL; in test_is_fips_enabled() local 45 sha256 = EVP_MD_fetch(NULL, "SHA2-256", NULL); in test_is_fips_enabled() 47 if (!TEST_ptr_null(sha256)) { in test_is_fips_enabled() 48 EVP_MD_free(sha256); in test_is_fips_enabled() 52 if (!TEST_ptr(sha256)) in test_is_fips_enabled() 55 && !TEST_str_eq(OSSL_PROVIDER_get0_name(EVP_MD_get0_provider(sha256)), in test_is_fips_enabled() 57 EVP_MD_free(sha256); in test_is_fips_enabled() 60 EVP_MD_free(sha256); in test_is_fips_enabled()
|
H A D | prov_config_test.c | 25 EVP_MD *sha256 = NULL; in test_double_config() local 38 sha256 = EVP_MD_fetch(ctx, "SHA2-256", NULL); in test_double_config() 39 if (!TEST_ptr(sha256)) in test_double_config() 44 EVP_MD_free(sha256); in test_double_config()
|
H A D | namemap_internal_test.c | 81 const EVP_MD *sha256, *foo; in test_digestbyname() local 91 sha256 = EVP_get_digestbyname("SHA256"); in test_digestbyname() 92 if (!TEST_ptr(sha256)) in test_digestbyname() 95 if (!TEST_ptr_eq(sha256, foo)) in test_digestbyname()
|
/third_party/mbedtls/library/ |
H A D | psa_crypto_hash.c | 47 mbedtls_sha256_free(&operation->ctx.sha256); in mbedtls_psa_hash_abort() 52 mbedtls_sha256_free(&operation->ctx.sha256); in mbedtls_psa_hash_abort() 123 mbedtls_sha256_init(&operation->ctx.sha256); in mbedtls_psa_hash_setup() 124 ret = mbedtls_sha256_starts(&operation->ctx.sha256, 1); in mbedtls_psa_hash_setup() 129 mbedtls_sha256_init(&operation->ctx.sha256); in mbedtls_psa_hash_setup() 130 ret = mbedtls_sha256_starts(&operation->ctx.sha256, 0); in mbedtls_psa_hash_setup() 209 mbedtls_sha256_clone(&target_operation->ctx.sha256, in mbedtls_psa_hash_clone() 210 &source_operation->ctx.sha256); in mbedtls_psa_hash_clone() 215 mbedtls_sha256_clone(&target_operation->ctx.sha256, in mbedtls_psa_hash_clone() 216 &source_operation->ctx.sha256); in mbedtls_psa_hash_clone() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_internal.c | 25 struct sha256_state sha256; member 62 sha256_init(&ctx->u.sha256); in crypto_hash_init() 116 sha256_init(&ctx->u.sha256); in crypto_hash_init() 117 sha256_process(&ctx->u.sha256, key, key_len); in crypto_hash_init() 118 sha256_done(&ctx->u.sha256, tk); in crypto_hash_init() 130 sha256_init(&ctx->u.sha256); in crypto_hash_init() 131 sha256_process(&ctx->u.sha256, k_pad, sizeof(k_pad)); in crypto_hash_init() 160 sha256_process(&ctx->u.sha256, data, len); in crypto_hash_update() 219 sha256_done(&ctx->u.sha256, mac); in crypto_hash_finish() 293 sha256_done(&ctx->u.sha256, ma in crypto_hash_finish() [all...] |
H A D | Makefile | 50 sha256.o \ 51 sha256-prf.o \ 52 sha256-tlsprf.o \ 53 sha256-internal.o \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_internal.c | 25 struct sha256_state sha256; member 62 sha256_init(&ctx->u.sha256); in crypto_hash_init() 116 sha256_init(&ctx->u.sha256); in crypto_hash_init() 117 sha256_process(&ctx->u.sha256, key, key_len); in crypto_hash_init() 118 sha256_done(&ctx->u.sha256, tk); in crypto_hash_init() 130 sha256_init(&ctx->u.sha256); in crypto_hash_init() 131 sha256_process(&ctx->u.sha256, k_pad, sizeof(k_pad)); in crypto_hash_init() 160 sha256_process(&ctx->u.sha256, data, len); in crypto_hash_update() 219 sha256_done(&ctx->u.sha256, mac); in crypto_hash_finish() 293 sha256_done(&ctx->u.sha256, ma in crypto_hash_finish() [all...] |
H A D | Makefile | 39 sha256.o \ 40 sha256-prf.o \ 41 sha256-tlsprf.o \ 42 sha256-internal.o \
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
H A D | lws-genhash.c | 68 mbedtls_sha256_init(&ctx->u.sha256); in lws_genhash_init() 69 if (mbedtls_sha256_starts_ret(&ctx->u.sha256, 0)) in lws_genhash_init() 105 if (mbedtls_sha256_update_ret(&ctx->u.sha256, in, len)) in lws_genhash_update() 136 if (mbedtls_sha256_finish_ret(&ctx->u.sha256, result)) in lws_genhash_destroy() 138 mbedtls_sha256_free(&ctx->u.sha256); in lws_genhash_destroy() 176 mbedtls_sha256_init(&ctx->u.sha256); in lws_genhash_init() 177 mbedtls_sha256_starts(&ctx->u.sha256, 0); in lws_genhash_init() 208 mbedtls_sha256_update(&ctx->u.sha256, in, len); in lws_genhash_update() 234 mbedtls_sha256_finish(&ctx->u.sha256, result); in lws_genhash_destroy() 235 mbedtls_sha256_free(&ctx->u.sha256); in lws_genhash_destroy() [all...] |
/third_party/node/test/parallel/ |
H A D | test-policy-parse-integrity.js | 53 integrity: `sha256-${hash('sha256', packageBody)}` 81 integrity: `sha256-${hash('sha256', depBody)}`, 85 integrity: `1sha256-${hash('sha256', depBody)}`, 93 integrity: `sha256-${hash('sha256', depBody)}sha256-${hash( 94 'sha256', [all...] |
H A D | test-crypto-hmac.js | 11 const instance = crypto.Hmac('sha256', 'Node'); 26 () => crypto.createHmac('sha256', 'key').digest({ 77 sha256: 87 sha256: 97 sha256: 107 sha256: 126 sha256: 144 sha256: 163 sha256: 183 sha256 [all...] |
H A D | test-tls-peer-certificate.js | 36 function sha256(s) { function 37 return crypto.createHash('sha256').update(s); 83 sha256(peerCert.pubkey).digest('hex'), 87 // HPKP / RFC7469 "pin-sha256" of the public key 89 sha256(peerCert.pubkey).digest('base64'), 138 sha256(peerCert.pubkey).digest('hex'),
|
H A D | test-crypto-binary-default.js | 81 sha256: 99 sha256: 118 sha256: 138 sha256: 156 sha256: 'a3b6167473100ee06e0c796c2955552b', 175 sha256: 206 sha256: 369 const a2 = crypto.createHash('sha256').update('Test123').digest('base64'); 648 'I_AM_THE_WALRUS_sha256_signature_signedby_rsa_private_b.sha256', 692 'sha256'); [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | scrypt.c | 39 unsigned char *key, size_t keylen, EVP_MD *sha256, 52 EVP_MD *sha256; member 80 EVP_MD_free(ctx->sha256); in kdf_scrypt_free() 128 EVP_MD_free(ctx->sha256); in set_digest() 129 ctx->sha256 = EVP_MD_fetch(ctx->libctx, "sha256", ctx->propq); in set_digest() 130 if (ctx->sha256 == NULL) { in set_digest() 170 if (ctx->sha256 == NULL && !set_digest(ctx)) in kdf_scrypt_derive() 175 ctx->maxmem_bytes, key, keylen, ctx->sha256, in kdf_scrypt_derive() 413 unsigned char *key, size_t keylen, EVP_MD *sha256, in scrypt_alg() 410 scrypt_alg(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, EVP_MD *sha256, OSSL_LIB_CTX *libctx, const char *propq) scrypt_alg() argument [all...] |
/third_party/openssl/providers/implementations/kdfs/ |
H A D | scrypt.c | 39 unsigned char *key, size_t keylen, EVP_MD *sha256, 52 EVP_MD *sha256; member 80 EVP_MD_free(ctx->sha256); in kdf_scrypt_free() 128 EVP_MD_free(ctx->sha256); in set_digest() 129 ctx->sha256 = EVP_MD_fetch(ctx->libctx, "sha256", ctx->propq); in set_digest() 130 if (ctx->sha256 == NULL) { in set_digest() 170 if (ctx->sha256 == NULL && !set_digest(ctx)) in kdf_scrypt_derive() 175 ctx->maxmem_bytes, key, keylen, ctx->sha256, in kdf_scrypt_derive() 413 unsigned char *key, size_t keylen, EVP_MD *sha256, in scrypt_alg() 410 scrypt_alg(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, EVP_MD *sha256, OSSL_LIB_CTX *libctx, const char *propq) scrypt_alg() argument [all...] |
/third_party/skia/third_party/externals/brotli/java/org/brotli/wrapper/common/ |
H A D | SetRfcDictionaryTest.java | 41 MessageDigest sha256 = MessageDigest.getInstance("SHA-256"); in testRfcDictionaryChecksums() 42 sha256.update(Dictionary.getData().slice()); in testRfcDictionaryChecksums() 43 assertTrue(BrotliCommon.checkDictionaryDataSha256(sha256.digest())); in testRfcDictionaryChecksums()
|
/third_party/skia/third_party/externals/dawn/scripts/ |
H A D | extract.py | 101 sha256 = hashlib.sha256() 106 sha256.update(chunk) 107 digest = sha256.hexdigest()
|
/third_party/musl/src/crypt/ |
H A D | crypt_sha256.c | 2 * public domain sha256 crypt implementation 16 /* public domain sha256 implementation based on fips180-3 */ 18 struct sha256 { struct 43 static void processblock(struct sha256 *s, const uint8_t *buf) in processblock() 86 static void pad(struct sha256 *s) in pad() 109 static void sha256_init(struct sha256 *s) in sha256_init() 122 static void sha256_sum(struct sha256 *s, uint8_t *md) in sha256_sum() 135 static void sha256_update(struct sha256 *s, const void *m, unsigned long len) in sha256_update() 178 static void hashmd(struct sha256 *s, unsigned int n, const void *md) in hashmd() 189 struct sha256 ct in sha256crypt() [all...] |
/third_party/python/Lib/test/ |
H A D | test_hmac.py | 225 hashlib.sha256: 'b0344c61d8db38535ca8afceaf0bf12b' 242 hashlib.sha256: '5bdcc146bf60754e6a042426089575c7' 259 hashlib.sha256: '773ea91e36800e46854db8ebd09181a7' 276 hashlib.sha256: '82558a389a443c0ea4cc819899f2083a' 294 hashlib.sha256: '60e431591ee0b67f0d8a26aacbf5b77f' 315 hashlib.sha256: '9b09ffa71b942fcb27635fbcd5b0e944' 330 @hashlib_helper.requires_hashdigest('sha256', openssl=True) 332 self._rfc4231_test_cases(hashlib.sha256, 'sha256', 32, 64) 342 @hashlib_helper.requires_hashdigest('sha256') [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | sign.rs | 26 //! let mut signer = Signer::new(MessageDigest::sha256(), &keypair).unwrap(); 32 //! let mut verifier = Verifier::new(MessageDigest::sha256(), &keypair).unwrap(); 57 let mut signer = Signer::new(MessageDigest::sha256(), &key).unwrap(); 679 let mut signer = Signer::new(MessageDigest::sha256(), &pkey).unwrap(); in rsa_sign() 694 let mut verifier = Verifier::new(MessageDigest::sha256(), &pkey).unwrap(); in rsa_verify_ok() 706 let mut verifier = Verifier::new(MessageDigest::sha256(), &pkey).unwrap(); in rsa_verify_invalid() 839 let mut signer = Signer::new(MessageDigest::sha256(), &key).unwrap(); in ec() 843 let mut verifier = Verifier::new(MessageDigest::sha256(), &key).unwrap(); in ec() 867 let mut signer = Signer::new(MessageDigest::sha256(), &pkey).unwrap(); in rsa_sign_verify() 873 signer.set_rsa_mgf1_md(MessageDigest::sha256()) in rsa_sign_verify() [all...] |
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_sct_ctx.c | 211 EVP_MD *sha256 = EVP_MD_fetch(sctx->libctx, "SHA2-256", sctx->propq); in ct_public_key_hash() local 213 if (sha256 == NULL) in ct_public_key_hash() 230 if (!EVP_Digest(der, der_len, md, &md_len, sha256, NULL)) in ct_public_key_hash() 242 EVP_MD_free(sha256); in ct_public_key_hash()
|
H A D | ct_log.c | 83 EVP_MD *sha256 = NULL; in ct_v1_log_id_from_pkey() local 89 sha256 = EVP_MD_fetch(log->libctx, "SHA2-256", log->propq); in ct_v1_log_id_from_pkey() 90 if (sha256 == NULL) { in ct_v1_log_id_from_pkey() 95 ret = EVP_Digest(pkey_der, pkey_der_len, log->log_id, &len, sha256, in ct_v1_log_id_from_pkey() 98 EVP_MD_free(sha256); in ct_v1_log_id_from_pkey()
|
/third_party/openssl/crypto/ct/ |
H A D | ct_sct_ctx.c | 211 EVP_MD *sha256 = EVP_MD_fetch(sctx->libctx, "SHA2-256", sctx->propq); in ct_public_key_hash() local 213 if (sha256 == NULL) in ct_public_key_hash() 230 if (!EVP_Digest(der, der_len, md, &md_len, sha256, NULL)) in ct_public_key_hash() 242 EVP_MD_free(sha256); in ct_public_key_hash()
|
H A D | ct_log.c | 83 EVP_MD *sha256 = NULL; in ct_v1_log_id_from_pkey() local 89 sha256 = EVP_MD_fetch(log->libctx, "SHA2-256", log->propq); in ct_v1_log_id_from_pkey() 90 if (sha256 == NULL) { in ct_v1_log_id_from_pkey() 95 ret = EVP_Digest(pkey_der, pkey_der_len, log->log_id, &len, sha256, in ct_v1_log_id_from_pkey() 98 EVP_MD_free(sha256); in ct_v1_log_id_from_pkey()
|