/third_party/node/deps/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_asn1.c | 28 ADB_ENTRY(NID_pkcs7_digest, ASN1_NDEF_EXP_OPT(PKCS7, d.digest, PKCS7_DIGEST, 0)), 231 ASN1_SIMPLE(PKCS7_DIGEST, digest, ASN1_OCTET_STRING)
|
/third_party/openssl/crypto/pkcs7/ |
H A D | pk7_asn1.c | 28 ADB_ENTRY(NID_pkcs7_digest, ASN1_NDEF_EXP_OPT(PKCS7, d.digest, PKCS7_DIGEST, 0)), 231 ASN1_SIMPLE(PKCS7_DIGEST, digest, ASN1_OCTET_STRING)
|
/third_party/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 58 const EVP_MD *digest) in pkcs12_gen_gost_mac_key() 67 digest, sizeof(out), out)) { in pkcs12_gen_gost_mac_key() 55 pkcs12_gen_gost_mac_key(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *key, const EVP_MD *digest) pkcs12_gen_gost_mac_key() argument
|
/third_party/skia/modules/canvaskit/ |
H A D | gm_bindings.cpp | 171 SkMD5::Digest digest = hash.finish(); in RunGM() local 173 md5.appendf("%02x", digest.data[i]); in RunGM()
|
/third_party/selinux/libselinux/src/ |
H A D | label_backends_android.c | 217 status = digest_add_specfile(rec->digest, fp, NULL, sb.st_size, path); in init() 221 digest_gen_hash(rec->digest); in init()
|
H A D | selinux_restorecon.c | 375 new_entry->digest = strdup(sha1_buf); in add_xattr_entry() 376 if (!new_entry->digest) { in add_xattr_entry() 825 uint8_t digest[SHA1_HASH_SIZE]; member 829 * Returns true if the digest of all partial matched contexts is the same as 831 * dir_hash_node with the newly calculated digest. 856 /* Save digest of all matched contexts for the current directory. */ in check_context_match_for_dir() 870 memcpy((*new_node)->digest, calculated_digest, digest_len); in check_context_match_for_dir() 1160 * If selabel_no_digest = true then no digest has been requested by in selinux_restorecon_common() 1254 /* Skip digest if not a directory */ in selinux_restorecon_common() 1278 /* Skip digest o in selinux_restorecon_common() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/marvell/cesa/ |
H A D | hash.c | 292 /* We must explicitly set the digest state. */ in mv_cesa_ahash_dma_step() 358 * Hardware's MD5 digest is in little endian format, but in mv_cesa_ahash_complete() 917 .digest = mv_cesa_md5_digest, 988 .digest = mv_cesa_sha1_digest, 1062 .digest = mv_cesa_sha256_digest, 1296 .digest = mv_cesa_ahmac_md5_digest, 1367 .digest = mv_cesa_ahmac_sha1_digest, 1438 .digest = mv_cesa_ahmac_sha256_digest,
|
/kernel/linux/linux-5.10/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 59 unsigned char *digest) in TSS_sha1() 70 ret = crypto_shash_digest(&sdesc->shash, data, datalen, digest); in TSS_sha1() 75 static int TSS_rawhmac(unsigned char *digest, const unsigned char *key, in TSS_rawhmac() argument 113 ret = crypto_shash_final(&sdesc->shash, digest); in TSS_rawhmac() 122 int TSS_authhmac(unsigned char *digest, const unsigned char *key, in TSS_authhmac() argument 165 ret = TSS_rawhmac(digest, key, keylen, SHA1_DIGEST_SIZE, in TSS_authhmac() 58 TSS_sha1(const unsigned char *data, unsigned int datalen, unsigned char *digest) TSS_sha1() argument
|
/kernel/linux/linux-5.10/kernel/ |
H A D | kexec_file.c | 685 /* Calculate and store the digest of segments */ 692 char *digest; in kexec_calculate_store_digests() local 729 digest = kzalloc(SHA256_DIGEST_SIZE, GFP_KERNEL); in kexec_calculate_store_digests() 730 if (!digest) { in kexec_calculate_store_digests() 740 * Skip purgatory as it will be modified once we put digest in kexec_calculate_store_digests() 753 * update digest accordingly. in kexec_calculate_store_digests() 776 ret = crypto_shash_final(desc, digest); in kexec_calculate_store_digests() 785 digest, SHA256_DIGEST_SIZE, 0); in kexec_calculate_store_digests() 791 kfree(digest); in kexec_calculate_store_digests()
|
/kernel/linux/linux-6.6/drivers/crypto/allwinner/sun8i-ce/ |
H A D | sun8i-ce-core.c | 405 .digest = sun8i_ce_hash_digest, 439 .digest = sun8i_ce_hash_digest, 472 .digest = sun8i_ce_hash_digest, 505 .digest = sun8i_ce_hash_digest, 538 .digest = sun8i_ce_hash_digest, 571 .digest = sun8i_ce_hash_digest,
|
/kernel/linux/linux-6.6/drivers/crypto/marvell/cesa/ |
H A D | hash.c | 316 /* We must explicitly set the digest state. */ in mv_cesa_ahash_dma_step() 382 * Hardware's MD5 digest is in little endian format, but in mv_cesa_ahash_complete() 941 .digest = mv_cesa_md5_digest, 1012 .digest = mv_cesa_sha1_digest, 1086 .digest = mv_cesa_sha256_digest, 1295 .digest = mv_cesa_ahmac_md5_digest, 1366 .digest = mv_cesa_ahmac_sha1_digest, 1437 .digest = mv_cesa_ahmac_sha256_digest,
|
/third_party/mbedtls/library/ |
H A D | ssl_tls13_generic.c | 1171 ssl->handshake->state_local.finished_in.digest, in ssl_tls13_preprocess_finished_message() 1172 sizeof(ssl->handshake->state_local.finished_in.digest), in ssl_tls13_preprocess_finished_message() 1195 ssl->handshake->state_local.finished_in.digest; in ssl_tls13_parse_finished_message() 1237 /* Preprocessing step: Compute handshake digest */ in mbedtls_ssl_tls13_process_finished_message() 1268 ssl->handshake->state_local.finished_out.digest, in ssl_tls13_prepare_finished_message() 1270 digest), in ssl_tls13_prepare_finished_message() 1296 memcpy(buf, ssl->handshake->state_local.finished_out.digest, in ssl_tls13_write_finished_message_body()
|
/third_party/node/deps/openssl/openssl/providers/implementations/signature/ |
H A D | rsa_sig.c | 90 /* main digest */ 98 /* message digest for MGF1 */ 305 "digest=%s", mdname); in rsa_setup_md() 316 "digest %s != %s", mdname, ctx->mdname); in rsa_setup_md() 367 "digest=%s", mdname); in rsa_setup_mgf1_md() 604 "but the digest only gives %d", in rsa_sign() 907 unsigned char digest[EVP_MAX_MD_SIZE]; in rsa_digest_sign_final() local 924 if (!EVP_DigestFinal_ex(prsactx->mdctx, digest, &dlen)) in rsa_digest_sign_final() 928 return rsa_sign(vprsactx, sig, siglen, sigsize, digest, (size_t)dlen); in rsa_digest_sign_final() 944 unsigned char digest[EVP_MAX_MD_SIZ in rsa_digest_verify_final() local [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | x509.c | 151 {"", OPT_MD, '-', "Any supported digest, used for signing and printing"}, 264 char *subj = NULL, *digest = NULL; in x509_main() local 591 digest = opt_unknown(); in x509_main() 871 if (!do_X509_REQ_sign(rq, privkey, digest, sigopts)) in x509_main() 888 if (!do_X509_sign(x, privkey, digest, sigopts, &ext_ctx)) in x509_main() 900 if (!do_X509_sign(x, CAkey, digest, sigopts, &ext_ctx)) in x509_main() 1000 const char *fdigname = digest; in x509_main() 1009 BIO_printf(bio_err, "Unknown digest\n"); in x509_main()
|
/third_party/openssl/apps/ |
H A D | x509.c | 151 {"", OPT_MD, '-', "Any supported digest, used for signing and printing"}, 264 char *subj = NULL, *digest = NULL; in x509_main() local 591 digest = opt_unknown(); in x509_main() 871 if (!do_X509_REQ_sign(rq, privkey, digest, sigopts)) in x509_main() 888 if (!do_X509_sign(x, privkey, digest, sigopts, &ext_ctx)) in x509_main() 900 if (!do_X509_sign(x, CAkey, digest, sigopts, &ext_ctx)) in x509_main() 1000 const char *fdigname = digest; in x509_main() 1009 BIO_printf(bio_err, "Unknown digest\n"); in x509_main()
|
/third_party/openssl/providers/implementations/signature/ |
H A D | rsa_sig.c | 90 /* main digest */ 98 /* message digest for MGF1 */ 305 "digest=%s", mdname); in rsa_setup_md() 316 "digest %s != %s", mdname, ctx->mdname); in rsa_setup_md() 367 "digest=%s", mdname); in rsa_setup_mgf1_md() 604 "but the digest only gives %d", in rsa_sign() 907 unsigned char digest[EVP_MAX_MD_SIZE]; in rsa_digest_sign_final() local 924 if (!EVP_DigestFinal_ex(prsactx->mdctx, digest, &dlen)) in rsa_digest_sign_final() 928 return rsa_sign(vprsactx, sig, siglen, sigsize, digest, (size_t)dlen); in rsa_digest_sign_final() 944 unsigned char digest[EVP_MAX_MD_SIZ in rsa_digest_verify_final() local [all...] |
/third_party/protobuf/ruby/src/main/java/com/google/protobuf/jruby/ |
H A D | RubyMessage.java | 178 MessageDigest digest = MessageDigest.getInstance("SHA-256"); in hash() 180 digest.update((byte) map.hashCode()); in hash() 183 digest.update((byte) repeatedFields.hashCode()); in hash() 186 digest.update((byte) field.hashCode()); in hash() 188 return context.runtime.newString(new ByteList(digest.digest())); in hash()
|
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
H A D | mod.rs | 542 /// Returns a digest of the DER representation of the certificate. 544 pub fn digest(&self, hash_type: MessageDigest) -> Result<DigestBytes, ErrorStack> { in digest() functions 546 let mut digest = DigestBytes { in digest() variables 554 digest.buf.as_mut_ptr() as *mut _, in digest() 557 digest.len = len as usize; in digest() 559 Ok(digest) in digest() 563 #[deprecated(since = "0.10.9", note = "renamed to digest")] 565 self.digest(hash_type).map(|b| b.to_vec()) in fingerprint()
|
/kernel/linux/linux-5.10/crypto/ |
H A D | crc32c_generic.c | 137 .digest = chksum_digest,
|
H A D | crc32_generic.c | 122 .digest = crc32_digest,
|
/kernel/linux/linux-5.10/arch/arm64/crypto/ |
H A D | sha512-ce-glue.c | 32 asmlinkage void sha512_block_data_order(u64 *digest, u8 const *src, int blocks);
|
/kernel/linux/linux-5.10/arch/sparc/crypto/ |
H A D | crc32c_glue.c | 128 .digest = crc32c_sparc64_digest,
|
/kernel/linux/linux-5.10/arch/x86/crypto/ |
H A D | crct10dif-pclmul_glue.c | 105 .digest = chksum_digest,
|
/kernel/linux/linux-5.10/arch/arm/crypto/ |
H A D | sha256_glue.c | 27 asmlinkage void sha256_block_data_order(u32 *digest, const void *data,
|
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | signature.c | 31 kfree(sig->digest); in public_key_signature_free() 117 * (eg. "pkcs1"). If the encoding needs to know the digest type, this can be
|