/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/Support/ |
H A D | MD5.h | 63 SmallString<32> digest() const;
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_pwd_common.h | 69 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_pwd_common.h | 69 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest);
|
/third_party/ffmpeg/libavutil/ |
H A D | sha512.c | 36 uint8_t digest_len; ///< digest length in 64-bit words 275 void av_sha512_final(AVSHA512* ctx, uint8_t *digest) in av_sha512_final() argument 286 AV_WB64(digest + i*8, ctx->state[i]); in av_sha512_final() 288 AV_WB32(digest + i*8, ctx->state[i] >> 32); in av_sha512_final()
|
/third_party/skia/src/core/ |
H A D | SkMD5.cpp | 70 SkMD5::Digest digest; in finish() local 89 // Write out digest. in finish() 90 encode(digest.data, this->state); in finish() 96 return digest; in finish()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | ms_funcs.c | 396 u8 digest[SHA1_MAC_LEN]; in get_asymetric_start_key() local 409 if (sha1_vector(4, addr, len, digest)) in get_asymetric_start_key() 414 os_memcpy(session_key, digest, session_key_len); in get_asymetric_start_key()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | ms_funcs.c | 396 u8 digest[SHA1_MAC_LEN]; in get_asymetric_start_key() local 409 if (sha1_vector(4, addr, len, digest)) in get_asymetric_start_key() 414 os_memcpy(session_key, digest, session_key_len); in get_asymetric_start_key()
|
/third_party/FreeBSD/sys/crypto/sha2/ |
H A D | sha256c.c | 288 SHA256_Final(unsigned char digest[static SHA256_DIGEST_LENGTH], SHA256_CTX *ctx) in SHA256_Final() 295 be32enc_vect(digest, ctx->state, SHA256_DIGEST_LENGTH); in SHA256_Final()
|
/third_party/node/test/pummel/ |
H A D | test-policy-integrity-worker-commonjs.js | 32 values.push(`${algo}-${h.digest('base64')}`); 37 values.push(`${algo}-${h.digest('base64')}`);
|
H A D | test-policy-integrity-worker-module.js | 32 values.push(`${algo}-${h.digest('base64')}`); 37 values.push(`${algo}-${h.digest('base64')}`);
|
H A D | test-policy-integrity-dep.js | 32 values.push(`${algo}-${h.digest('base64')}`); 37 values.push(`${algo}-${h.digest('base64')}`);
|
H A D | test-policy-integrity-parent-commonjs.js | 32 values.push(`${algo}-${h.digest('base64')}`); 37 values.push(`${algo}-${h.digest('base64')}`);
|
H A D | test-policy-integrity-parent-module.js | 32 values.push(`${algo}-${h.digest('base64')}`); 37 values.push(`${algo}-${h.digest('base64')}`);
|
H A D | test-policy-integrity-parent-no-package-json.js | 32 values.push(`${algo}-${h.digest('base64')}`); 37 values.push(`${algo}-${h.digest('base64')}`);
|
H A D | test-policy-integrity-worker-no-package-json.js | 32 values.push(`${algo}-${h.digest('base64')}`); 37 values.push(`${algo}-${h.digest('base64')}`);
|
/third_party/node/deps/npm/node_modules/cacache/lib/ |
H A D | verify.js | 129 const digest = split.slice(split.length - 3).join('') 131 const integrity = ssri.fromHex(digest, algo)
|
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 58 const EVP_MD *digest) in pkcs12_gen_gost_mac_key() 67 digest, sizeof(out), out)) { in pkcs12_gen_gost_mac_key() 55 pkcs12_gen_gost_mac_key(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *key, const EVP_MD *digest) pkcs12_gen_gost_mac_key() argument
|
/third_party/node/deps/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_asn1.c | 28 ADB_ENTRY(NID_pkcs7_digest, ASN1_NDEF_EXP_OPT(PKCS7, d.digest, PKCS7_DIGEST, 0)), 231 ASN1_SIMPLE(PKCS7_DIGEST, digest, ASN1_OCTET_STRING)
|
/third_party/openssl/crypto/pkcs7/ |
H A D | pk7_asn1.c | 28 ADB_ENTRY(NID_pkcs7_digest, ASN1_NDEF_EXP_OPT(PKCS7, d.digest, PKCS7_DIGEST, 0)), 231 ASN1_SIMPLE(PKCS7_DIGEST, digest, ASN1_OCTET_STRING)
|
/third_party/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 58 const EVP_MD *digest) in pkcs12_gen_gost_mac_key() 67 digest, sizeof(out), out)) { in pkcs12_gen_gost_mac_key() 55 pkcs12_gen_gost_mac_key(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *key, const EVP_MD *digest) pkcs12_gen_gost_mac_key() argument
|
/third_party/skia/modules/canvaskit/ |
H A D | gm_bindings.cpp | 171 SkMD5::Digest digest = hash.finish(); in RunGM() local 173 md5.appendf("%02x", digest.data[i]); in RunGM()
|
/third_party/selinux/libselinux/src/ |
H A D | label_backends_android.c | 217 status = digest_add_specfile(rec->digest, fp, NULL, sb.st_size, path); in init() 221 digest_gen_hash(rec->digest); in init()
|
/third_party/mbedtls/library/ |
H A D | ssl_tls13_generic.c | 1171 ssl->handshake->state_local.finished_in.digest, in ssl_tls13_preprocess_finished_message() 1172 sizeof(ssl->handshake->state_local.finished_in.digest), in ssl_tls13_preprocess_finished_message() 1195 ssl->handshake->state_local.finished_in.digest; in ssl_tls13_parse_finished_message() 1237 /* Preprocessing step: Compute handshake digest */ in mbedtls_ssl_tls13_process_finished_message() 1268 ssl->handshake->state_local.finished_out.digest, in ssl_tls13_prepare_finished_message() 1270 digest), in ssl_tls13_prepare_finished_message() 1296 memcpy(buf, ssl->handshake->state_local.finished_out.digest, in ssl_tls13_write_finished_message_body()
|
/third_party/node/deps/openssl/openssl/providers/implementations/signature/ |
H A D | rsa_sig.c | 90 /* main digest */ 98 /* message digest for MGF1 */ 305 "digest=%s", mdname); in rsa_setup_md() 316 "digest %s != %s", mdname, ctx->mdname); in rsa_setup_md() 367 "digest=%s", mdname); in rsa_setup_mgf1_md() 604 "but the digest only gives %d", in rsa_sign() 907 unsigned char digest[EVP_MAX_MD_SIZE]; in rsa_digest_sign_final() local 924 if (!EVP_DigestFinal_ex(prsactx->mdctx, digest, &dlen)) in rsa_digest_sign_final() 928 return rsa_sign(vprsactx, sig, siglen, sigsize, digest, (size_t)dlen); in rsa_digest_sign_final() 944 unsigned char digest[EVP_MAX_MD_SIZ in rsa_digest_verify_final() local [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | x509.c | 151 {"", OPT_MD, '-', "Any supported digest, used for signing and printing"}, 264 char *subj = NULL, *digest = NULL; in x509_main() local 591 digest = opt_unknown(); in x509_main() 871 if (!do_X509_REQ_sign(rq, privkey, digest, sigopts)) in x509_main() 888 if (!do_X509_sign(x, privkey, digest, sigopts, &ext_ctx)) in x509_main() 900 if (!do_X509_sign(x, CAkey, digest, sigopts, &ext_ctx)) in x509_main() 1000 const char *fdigname = digest; in x509_main() 1009 BIO_printf(bio_err, "Unknown digest\n"); in x509_main()
|