Home
last modified time | relevance | path

Searched refs:digest (Results 476 - 500 of 1140) sorted by relevance

1...<<11121314151617181920>>...46

/third_party/node/deps/openssl/openssl/crypto/pkcs7/
H A Dpk7_asn1.c28 ADB_ENTRY(NID_pkcs7_digest, ASN1_NDEF_EXP_OPT(PKCS7, d.digest, PKCS7_DIGEST, 0)),
231 ASN1_SIMPLE(PKCS7_DIGEST, digest, ASN1_OCTET_STRING)
/third_party/openssl/crypto/pkcs7/
H A Dpk7_asn1.c28 ADB_ENTRY(NID_pkcs7_digest, ASN1_NDEF_EXP_OPT(PKCS7, d.digest, PKCS7_DIGEST, 0)),
231 ASN1_SIMPLE(PKCS7_DIGEST, digest, ASN1_OCTET_STRING)
/third_party/openssl/crypto/pkcs12/
H A Dp12_mutl.c58 const EVP_MD *digest) in pkcs12_gen_gost_mac_key()
67 digest, sizeof(out), out)) { in pkcs12_gen_gost_mac_key()
55 pkcs12_gen_gost_mac_key(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *key, const EVP_MD *digest) pkcs12_gen_gost_mac_key() argument
/third_party/skia/modules/canvaskit/
H A Dgm_bindings.cpp171 SkMD5::Digest digest = hash.finish(); in RunGM() local
173 md5.appendf("%02x", digest.data[i]); in RunGM()
/third_party/selinux/libselinux/src/
H A Dlabel_backends_android.c217 status = digest_add_specfile(rec->digest, fp, NULL, sb.st_size, path); in init()
221 digest_gen_hash(rec->digest); in init()
H A Dselinux_restorecon.c375 new_entry->digest = strdup(sha1_buf); in add_xattr_entry()
376 if (!new_entry->digest) { in add_xattr_entry()
825 uint8_t digest[SHA1_HASH_SIZE]; member
829 * Returns true if the digest of all partial matched contexts is the same as
831 * dir_hash_node with the newly calculated digest.
856 /* Save digest of all matched contexts for the current directory. */ in check_context_match_for_dir()
870 memcpy((*new_node)->digest, calculated_digest, digest_len); in check_context_match_for_dir()
1160 * If selabel_no_digest = true then no digest has been requested by in selinux_restorecon_common()
1254 /* Skip digest if not a directory */ in selinux_restorecon_common()
1278 /* Skip digest o in selinux_restorecon_common()
[all...]
/kernel/linux/linux-5.10/drivers/crypto/marvell/cesa/
H A Dhash.c292 /* We must explicitly set the digest state. */ in mv_cesa_ahash_dma_step()
358 * Hardware's MD5 digest is in little endian format, but in mv_cesa_ahash_complete()
917 .digest = mv_cesa_md5_digest,
988 .digest = mv_cesa_sha1_digest,
1062 .digest = mv_cesa_sha256_digest,
1296 .digest = mv_cesa_ahmac_md5_digest,
1367 .digest = mv_cesa_ahmac_sha1_digest,
1438 .digest = mv_cesa_ahmac_sha256_digest,
/kernel/linux/linux-5.10/security/keys/trusted-keys/
H A Dtrusted_tpm1.c59 unsigned char *digest) in TSS_sha1()
70 ret = crypto_shash_digest(&sdesc->shash, data, datalen, digest); in TSS_sha1()
75 static int TSS_rawhmac(unsigned char *digest, const unsigned char *key, in TSS_rawhmac() argument
113 ret = crypto_shash_final(&sdesc->shash, digest); in TSS_rawhmac()
122 int TSS_authhmac(unsigned char *digest, const unsigned char *key, in TSS_authhmac() argument
165 ret = TSS_rawhmac(digest, key, keylen, SHA1_DIGEST_SIZE, in TSS_authhmac()
58 TSS_sha1(const unsigned char *data, unsigned int datalen, unsigned char *digest) TSS_sha1() argument
/kernel/linux/linux-5.10/kernel/
H A Dkexec_file.c685 /* Calculate and store the digest of segments */
692 char *digest; in kexec_calculate_store_digests() local
729 digest = kzalloc(SHA256_DIGEST_SIZE, GFP_KERNEL); in kexec_calculate_store_digests()
730 if (!digest) { in kexec_calculate_store_digests()
740 * Skip purgatory as it will be modified once we put digest in kexec_calculate_store_digests()
753 * update digest accordingly. in kexec_calculate_store_digests()
776 ret = crypto_shash_final(desc, digest); in kexec_calculate_store_digests()
785 digest, SHA256_DIGEST_SIZE, 0); in kexec_calculate_store_digests()
791 kfree(digest); in kexec_calculate_store_digests()
/kernel/linux/linux-6.6/drivers/crypto/allwinner/sun8i-ce/
H A Dsun8i-ce-core.c405 .digest = sun8i_ce_hash_digest,
439 .digest = sun8i_ce_hash_digest,
472 .digest = sun8i_ce_hash_digest,
505 .digest = sun8i_ce_hash_digest,
538 .digest = sun8i_ce_hash_digest,
571 .digest = sun8i_ce_hash_digest,
/kernel/linux/linux-6.6/drivers/crypto/marvell/cesa/
H A Dhash.c316 /* We must explicitly set the digest state. */ in mv_cesa_ahash_dma_step()
382 * Hardware's MD5 digest is in little endian format, but in mv_cesa_ahash_complete()
941 .digest = mv_cesa_md5_digest,
1012 .digest = mv_cesa_sha1_digest,
1086 .digest = mv_cesa_sha256_digest,
1295 .digest = mv_cesa_ahmac_md5_digest,
1366 .digest = mv_cesa_ahmac_sha1_digest,
1437 .digest = mv_cesa_ahmac_sha256_digest,
/third_party/mbedtls/library/
H A Dssl_tls13_generic.c1171 ssl->handshake->state_local.finished_in.digest, in ssl_tls13_preprocess_finished_message()
1172 sizeof(ssl->handshake->state_local.finished_in.digest), in ssl_tls13_preprocess_finished_message()
1195 ssl->handshake->state_local.finished_in.digest; in ssl_tls13_parse_finished_message()
1237 /* Preprocessing step: Compute handshake digest */ in mbedtls_ssl_tls13_process_finished_message()
1268 ssl->handshake->state_local.finished_out.digest, in ssl_tls13_prepare_finished_message()
1270 digest), in ssl_tls13_prepare_finished_message()
1296 memcpy(buf, ssl->handshake->state_local.finished_out.digest, in ssl_tls13_write_finished_message_body()
/third_party/node/deps/openssl/openssl/providers/implementations/signature/
H A Drsa_sig.c90 /* main digest */
98 /* message digest for MGF1 */
305 "digest=%s", mdname); in rsa_setup_md()
316 "digest %s != %s", mdname, ctx->mdname); in rsa_setup_md()
367 "digest=%s", mdname); in rsa_setup_mgf1_md()
604 "but the digest only gives %d", in rsa_sign()
907 unsigned char digest[EVP_MAX_MD_SIZE]; in rsa_digest_sign_final() local
924 if (!EVP_DigestFinal_ex(prsactx->mdctx, digest, &dlen)) in rsa_digest_sign_final()
928 return rsa_sign(vprsactx, sig, siglen, sigsize, digest, (size_t)dlen); in rsa_digest_sign_final()
944 unsigned char digest[EVP_MAX_MD_SIZ in rsa_digest_verify_final() local
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Dx509.c151 {"", OPT_MD, '-', "Any supported digest, used for signing and printing"},
264 char *subj = NULL, *digest = NULL; in x509_main() local
591 digest = opt_unknown(); in x509_main()
871 if (!do_X509_REQ_sign(rq, privkey, digest, sigopts)) in x509_main()
888 if (!do_X509_sign(x, privkey, digest, sigopts, &ext_ctx)) in x509_main()
900 if (!do_X509_sign(x, CAkey, digest, sigopts, &ext_ctx)) in x509_main()
1000 const char *fdigname = digest; in x509_main()
1009 BIO_printf(bio_err, "Unknown digest\n"); in x509_main()
/third_party/openssl/apps/
H A Dx509.c151 {"", OPT_MD, '-', "Any supported digest, used for signing and printing"},
264 char *subj = NULL, *digest = NULL; in x509_main() local
591 digest = opt_unknown(); in x509_main()
871 if (!do_X509_REQ_sign(rq, privkey, digest, sigopts)) in x509_main()
888 if (!do_X509_sign(x, privkey, digest, sigopts, &ext_ctx)) in x509_main()
900 if (!do_X509_sign(x, CAkey, digest, sigopts, &ext_ctx)) in x509_main()
1000 const char *fdigname = digest; in x509_main()
1009 BIO_printf(bio_err, "Unknown digest\n"); in x509_main()
/third_party/openssl/providers/implementations/signature/
H A Drsa_sig.c90 /* main digest */
98 /* message digest for MGF1 */
305 "digest=%s", mdname); in rsa_setup_md()
316 "digest %s != %s", mdname, ctx->mdname); in rsa_setup_md()
367 "digest=%s", mdname); in rsa_setup_mgf1_md()
604 "but the digest only gives %d", in rsa_sign()
907 unsigned char digest[EVP_MAX_MD_SIZE]; in rsa_digest_sign_final() local
924 if (!EVP_DigestFinal_ex(prsactx->mdctx, digest, &dlen)) in rsa_digest_sign_final()
928 return rsa_sign(vprsactx, sig, siglen, sigsize, digest, (size_t)dlen); in rsa_digest_sign_final()
944 unsigned char digest[EVP_MAX_MD_SIZ in rsa_digest_verify_final() local
[all...]
/third_party/protobuf/ruby/src/main/java/com/google/protobuf/jruby/
H A DRubyMessage.java178 MessageDigest digest = MessageDigest.getInstance("SHA-256"); in hash()
180 digest.update((byte) map.hashCode()); in hash()
183 digest.update((byte) repeatedFields.hashCode()); in hash()
186 digest.update((byte) field.hashCode()); in hash()
188 return context.runtime.newString(new ByteList(digest.digest())); in hash()
/third_party/rust/crates/rust-openssl/openssl/src/x509/
H A Dmod.rs542 /// Returns a digest of the DER representation of the certificate.
544 pub fn digest(&self, hash_type: MessageDigest) -> Result<DigestBytes, ErrorStack> { in digest() functions
546 let mut digest = DigestBytes { in digest() variables
554 digest.buf.as_mut_ptr() as *mut _, in digest()
557 digest.len = len as usize; in digest()
559 Ok(digest) in digest()
563 #[deprecated(since = "0.10.9", note = "renamed to digest")]
565 self.digest(hash_type).map(|b| b.to_vec()) in fingerprint()
/kernel/linux/linux-5.10/crypto/
H A Dcrc32c_generic.c137 .digest = chksum_digest,
H A Dcrc32_generic.c122 .digest = crc32_digest,
/kernel/linux/linux-5.10/arch/arm64/crypto/
H A Dsha512-ce-glue.c32 asmlinkage void sha512_block_data_order(u64 *digest, u8 const *src, int blocks);
/kernel/linux/linux-5.10/arch/sparc/crypto/
H A Dcrc32c_glue.c128 .digest = crc32c_sparc64_digest,
/kernel/linux/linux-5.10/arch/x86/crypto/
H A Dcrct10dif-pclmul_glue.c105 .digest = chksum_digest,
/kernel/linux/linux-5.10/arch/arm/crypto/
H A Dsha256_glue.c27 asmlinkage void sha256_block_data_order(u32 *digest, const void *data,
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
H A Dsignature.c31 kfree(sig->digest); in public_key_signature_free()
117 * (eg. "pkcs1"). If the encoding needs to know the digest type, this can be

Completed in 28 milliseconds

1...<<11121314151617181920>>...46