Home
last modified time | relevance | path

Searched refs:digest (Results 276 - 300 of 788) sorted by relevance

1...<<11121314151617181920>>...32

/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/Support/
H A DMD5.h63 SmallString<32> digest() const;
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_pwd_common.h69 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_pwd_common.h69 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest);
/third_party/ffmpeg/libavutil/
H A Dsha512.c36 uint8_t digest_len; ///< digest length in 64-bit words
275 void av_sha512_final(AVSHA512* ctx, uint8_t *digest) in av_sha512_final() argument
286 AV_WB64(digest + i*8, ctx->state[i]); in av_sha512_final()
288 AV_WB32(digest + i*8, ctx->state[i] >> 32); in av_sha512_final()
/third_party/skia/src/core/
H A DSkMD5.cpp70 SkMD5::Digest digest; in finish() local
89 // Write out digest. in finish()
90 encode(digest.data, this->state); in finish()
96 return digest; in finish()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dms_funcs.c396 u8 digest[SHA1_MAC_LEN]; in get_asymetric_start_key() local
409 if (sha1_vector(4, addr, len, digest)) in get_asymetric_start_key()
414 os_memcpy(session_key, digest, session_key_len); in get_asymetric_start_key()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dms_funcs.c396 u8 digest[SHA1_MAC_LEN]; in get_asymetric_start_key() local
409 if (sha1_vector(4, addr, len, digest)) in get_asymetric_start_key()
414 os_memcpy(session_key, digest, session_key_len); in get_asymetric_start_key()
/third_party/FreeBSD/sys/crypto/sha2/
H A Dsha256c.c288 SHA256_Final(unsigned char digest[static SHA256_DIGEST_LENGTH], SHA256_CTX *ctx) in SHA256_Final()
295 be32enc_vect(digest, ctx->state, SHA256_DIGEST_LENGTH); in SHA256_Final()
/third_party/node/test/pummel/
H A Dtest-policy-integrity-worker-commonjs.js32 values.push(`${algo}-${h.digest('base64')}`);
37 values.push(`${algo}-${h.digest('base64')}`);
H A Dtest-policy-integrity-worker-module.js32 values.push(`${algo}-${h.digest('base64')}`);
37 values.push(`${algo}-${h.digest('base64')}`);
H A Dtest-policy-integrity-dep.js32 values.push(`${algo}-${h.digest('base64')}`);
37 values.push(`${algo}-${h.digest('base64')}`);
H A Dtest-policy-integrity-parent-commonjs.js32 values.push(`${algo}-${h.digest('base64')}`);
37 values.push(`${algo}-${h.digest('base64')}`);
H A Dtest-policy-integrity-parent-module.js32 values.push(`${algo}-${h.digest('base64')}`);
37 values.push(`${algo}-${h.digest('base64')}`);
H A Dtest-policy-integrity-parent-no-package-json.js32 values.push(`${algo}-${h.digest('base64')}`);
37 values.push(`${algo}-${h.digest('base64')}`);
H A Dtest-policy-integrity-worker-no-package-json.js32 values.push(`${algo}-${h.digest('base64')}`);
37 values.push(`${algo}-${h.digest('base64')}`);
/third_party/node/deps/npm/node_modules/cacache/lib/
H A Dverify.js129 const digest = split.slice(split.length - 3).join('')
131 const integrity = ssri.fromHex(digest, algo)
/third_party/node/deps/openssl/openssl/crypto/pkcs12/
H A Dp12_mutl.c58 const EVP_MD *digest) in pkcs12_gen_gost_mac_key()
67 digest, sizeof(out), out)) { in pkcs12_gen_gost_mac_key()
55 pkcs12_gen_gost_mac_key(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *key, const EVP_MD *digest) pkcs12_gen_gost_mac_key() argument
/third_party/node/deps/openssl/openssl/crypto/pkcs7/
H A Dpk7_asn1.c28 ADB_ENTRY(NID_pkcs7_digest, ASN1_NDEF_EXP_OPT(PKCS7, d.digest, PKCS7_DIGEST, 0)),
231 ASN1_SIMPLE(PKCS7_DIGEST, digest, ASN1_OCTET_STRING)
/third_party/openssl/crypto/pkcs7/
H A Dpk7_asn1.c28 ADB_ENTRY(NID_pkcs7_digest, ASN1_NDEF_EXP_OPT(PKCS7, d.digest, PKCS7_DIGEST, 0)),
231 ASN1_SIMPLE(PKCS7_DIGEST, digest, ASN1_OCTET_STRING)
/third_party/openssl/crypto/pkcs12/
H A Dp12_mutl.c58 const EVP_MD *digest) in pkcs12_gen_gost_mac_key()
67 digest, sizeof(out), out)) { in pkcs12_gen_gost_mac_key()
55 pkcs12_gen_gost_mac_key(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *key, const EVP_MD *digest) pkcs12_gen_gost_mac_key() argument
/third_party/skia/modules/canvaskit/
H A Dgm_bindings.cpp171 SkMD5::Digest digest = hash.finish(); in RunGM() local
173 md5.appendf("%02x", digest.data[i]); in RunGM()
/third_party/selinux/libselinux/src/
H A Dlabel_backends_android.c217 status = digest_add_specfile(rec->digest, fp, NULL, sb.st_size, path); in init()
221 digest_gen_hash(rec->digest); in init()
/third_party/mbedtls/library/
H A Dssl_tls13_generic.c1171 ssl->handshake->state_local.finished_in.digest, in ssl_tls13_preprocess_finished_message()
1172 sizeof(ssl->handshake->state_local.finished_in.digest), in ssl_tls13_preprocess_finished_message()
1195 ssl->handshake->state_local.finished_in.digest; in ssl_tls13_parse_finished_message()
1237 /* Preprocessing step: Compute handshake digest */ in mbedtls_ssl_tls13_process_finished_message()
1268 ssl->handshake->state_local.finished_out.digest, in ssl_tls13_prepare_finished_message()
1270 digest), in ssl_tls13_prepare_finished_message()
1296 memcpy(buf, ssl->handshake->state_local.finished_out.digest, in ssl_tls13_write_finished_message_body()
/third_party/node/deps/openssl/openssl/providers/implementations/signature/
H A Drsa_sig.c90 /* main digest */
98 /* message digest for MGF1 */
305 "digest=%s", mdname); in rsa_setup_md()
316 "digest %s != %s", mdname, ctx->mdname); in rsa_setup_md()
367 "digest=%s", mdname); in rsa_setup_mgf1_md()
604 "but the digest only gives %d", in rsa_sign()
907 unsigned char digest[EVP_MAX_MD_SIZE]; in rsa_digest_sign_final() local
924 if (!EVP_DigestFinal_ex(prsactx->mdctx, digest, &dlen)) in rsa_digest_sign_final()
928 return rsa_sign(vprsactx, sig, siglen, sigsize, digest, (size_t)dlen); in rsa_digest_sign_final()
944 unsigned char digest[EVP_MAX_MD_SIZ in rsa_digest_verify_final() local
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Dx509.c151 {"", OPT_MD, '-', "Any supported digest, used for signing and printing"},
264 char *subj = NULL, *digest = NULL; in x509_main() local
591 digest = opt_unknown(); in x509_main()
871 if (!do_X509_REQ_sign(rq, privkey, digest, sigopts)) in x509_main()
888 if (!do_X509_sign(x, privkey, digest, sigopts, &ext_ctx)) in x509_main()
900 if (!do_X509_sign(x, CAkey, digest, sigopts, &ext_ctx)) in x509_main()
1000 const char *fdigname = digest; in x509_main()
1009 BIO_printf(bio_err, "Unknown digest\n"); in x509_main()

Completed in 16 milliseconds

1...<<11121314151617181920>>...32