/third_party/skia/third_party/externals/freetype/tests/scripts/ |
H A D | download-test-fonts.py | 94 """Compute the digest of a given input byte string, which are the first 98 return m.digest()[:8] 132 expected_digest: Optional digest of the file 140 digest = digest_data(r.content) 141 if digest != expected_digest: 143 "%s has invalid digest %s (expected %s)" 144 % (url, digest.hex(), expected_digest.hex()) 164 expected_digest: Optional digest for the file. 173 digest = digest_data(archive.open(filepath).read()) 174 if digest ! [all...] |
/third_party/gn/src/base/ |
H A D | md5.h | 34 // MD5Digest digest; // the result of the computation 35 // MD5Final(&digest, &ctx); 37 // You can call MD5DigestToBase16() to generate a string of the digest. 57 // Finalizes the MD5 operation and fills the buffer with the digest. 58 void MD5Final(MD5Digest* digest, MD5Context* context); 60 // MD5IntermediateFinal() generates a digest without finalizing the MD5 62 // without affecting the digest generated for the entire input. 63 void MD5IntermediateFinal(MD5Digest* digest, const MD5Context* context); 65 // Converts a digest into human-readable hexadecimal. 66 std::string MD5DigestToBase16(const MD5Digest& digest); [all...] |
/third_party/skia/tests/ |
H A D | MD5Test.cpp | 27 SkMD5::Digest digest = context.finish(); in md5_test() local 29 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); in md5_test() 40 SkMD5::Digest digest = context.finish(); in md5_test() local 42 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); in md5_test() 48 SkMD5::Digest digest; member 54 { "message digest", {{ 0xf9, 0x6b, 0x69, 0x7d, 0x7c, 0xb7, 0x93, 0x8d, 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0 }} }, 62 md5_test(md5_tests[i].message, md5_tests[i].digest, reporter); in DEF_TEST()
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | pbkdf2.c | 50 const EVP_MD *digest, unsigned char *key, 60 PROV_DIGEST digest; member 85 ossl_prov_digest_reset(&ctx->digest); in kdf_pbkdf2_cleanup() 118 if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) in kdf_pbkdf2_init() 120 ossl_prov_digest_reset(&ctx->digest); in kdf_pbkdf2_init() 163 md = ossl_prov_digest_md(&ctx->digest); in kdf_pbkdf2_derive() 180 if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) in kdf_pbkdf2_set_ctx_params() 276 const EVP_MD *digest, unsigned char *key, in pbkdf2_derive() 286 mdlen = EVP_MD_get_size(digest); in pbkdf2_derive() 319 if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NUL in pbkdf2_derive() 274 pbkdf2_derive(const char *pass, size_t passlen, const unsigned char *salt, int saltlen, uint64_t iter, const EVP_MD *digest, unsigned char *key, size_t keylen, int lower_bound_checks) pbkdf2_derive() argument [all...] |
/third_party/openssl/providers/implementations/kdfs/ |
H A D | pbkdf2.c | 50 const EVP_MD *digest, unsigned char *key, 60 PROV_DIGEST digest; member 85 ossl_prov_digest_reset(&ctx->digest); in kdf_pbkdf2_cleanup() 118 if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) in kdf_pbkdf2_init() 120 ossl_prov_digest_reset(&ctx->digest); in kdf_pbkdf2_init() 163 md = ossl_prov_digest_md(&ctx->digest); in kdf_pbkdf2_derive() 180 if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) in kdf_pbkdf2_set_ctx_params() 276 const EVP_MD *digest, unsigned char *key, in pbkdf2_derive() 286 mdlen = EVP_MD_get_size(digest); in pbkdf2_derive() 319 if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NUL in pbkdf2_derive() 274 pbkdf2_derive(const char *pass, size_t passlen, const unsigned char *salt, int saltlen, uint64_t iter, const EVP_MD *digest, unsigned char *key, size_t keylen, int lower_bound_checks) pbkdf2_derive() argument [all...] |
/third_party/python/Lib/test/ |
H A D | test_hashlib.py | 229 digest = hashlib.new(name, usedforsecurity=False) 292 self.assertIsInstance(h.digest(16), bytes) 293 self.assertEqual(hexstr(h.digest(16)), h.hexdigest(16)) 295 self.assertIsInstance(h.digest(), bytes) 296 self.assertEqual(hexstr(h.digest()), h.hexdigest()) 308 for digest in h.digest, h.hexdigest: 309 self.assertRaises(ValueError, digest, -10) 312 digest(length) 346 self.assertEqual(m1.digest(*arg [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | rehash.c | 75 unsigned char digest[EVP_MAX_MD_SIZE]; member 121 const unsigned char *digest, int need_symlink, in add_entry() 143 if (digest && memcmp(digest, ep->digest, evpmdsize) == 0) { in add_entry() 152 if (digest == NULL) in add_entry() 186 memcpy(ep->digest, digest, evpmdsize); in add_entry() 241 unsigned char digest[EVP_MAX_MD_SIZE]; in do_file() local 279 if (!X509_digest(x->x509, evpmd, digest, NUL in do_file() 120 add_entry(enum Type type, unsigned int hash, const char *filename, const unsigned char *digest, int need_symlink, unsigned short old_id) add_entry() argument [all...] |
/third_party/openssl/apps/ |
H A D | rehash.c | 78 unsigned char digest[EVP_MAX_MD_SIZE]; member 124 const unsigned char *digest, int need_symlink, in add_entry() 146 if (digest && memcmp(digest, ep->digest, evpmdsize) == 0) { in add_entry() 155 if (digest == NULL) in add_entry() 189 memcpy(ep->digest, digest, evpmdsize); in add_entry() 244 unsigned char digest[EVP_MAX_MD_SIZE]; in do_file() local 282 if (!X509_digest(x->x509, evpmd, digest, NUL in do_file() 123 add_entry(enum Type type, unsigned int hash, const char *filename, const unsigned char *digest, int need_symlink, unsigned short old_id) add_entry() argument [all...] |
/third_party/node/src/crypto/ |
H A D | crypto_rsa.cc | 153 Utf8Value digest(env->isolate(), args[*offset]); in AdditionalConfig() 154 params->params.md = EVP_get_digestbyname(*digest); in AdditionalConfig() 156 THROW_ERR_CRYPTO_INVALID_DIGEST(env, "Invalid digest: %s", *digest); in AdditionalConfig() 163 Utf8Value digest(env->isolate(), args[*offset + 1]); in AdditionalConfig() 164 params->params.mgf1_md = EVP_get_digestbyname(*digest); in AdditionalConfig() 167 env, "Invalid MGF1 digest: %s", *digest); in AdditionalConfig() 218 if (params.digest != nullptr && in RSA_Cipher() 219 (EVP_PKEY_CTX_set_rsa_oaep_md(ctx.get(), params.digest) < in RSA_Cipher() 291 digest(other.digest) {} digest() function [all...] |
H A D | crypto_pbkdf2.cc | 26 digest(other.digest) {} in digest() function 57 // 6. The digest algorithm name 105 params->digest = EVP_get_digestbyname(*name); in AdditionalConfig() 106 if (params->digest == nullptr) { in AdditionalConfig() 107 THROW_ERR_CRYPTO_INVALID_DIGEST(env, "Invalid digest: %s", *name); in AdditionalConfig() 129 params.digest, in DeriveBits()
|
/third_party/lwip/src/netif/ppp/ |
H A D | chap-new.c | 55 const struct chap_digest_type *digest, 96 const struct chap_digest_type *digest, 111 /* List of digest types that we know about */ 176 ppp_fatal("CHAP digest 0x%x requested but not available", in chap_auth_peer() 179 pcb->chap_server.digest = dp; in chap_auth_peer() 209 ppp_fatal("CHAP digest 0x%x requested but not available", in chap_auth_with_peer() 212 pcb->chap_client.digest = dp; in chap_auth_with_peer() 264 pcb->chap_server.digest->generate_challenge(pcb, p); in chap_generate_challenge() 328 ok = (*verifier)(name, pcb->chap_server.name, id, pcb->chap_server.digest, 332 ok = chap_verify_response(pcb, name, pcb->chap_server.name, id, pcb->chap_server.digest, 411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) global() argument [all...] |
/third_party/fsverity-utils/lib/ |
H A D | compute_digest.c | 243 struct libfsverity_digest *digest; in libfsverity_compute_digest() local 319 digest = libfsverity_zalloc(sizeof(*digest) + hash_alg->digest_size); in libfsverity_compute_digest() 320 if (!digest) { in libfsverity_compute_digest() 324 digest->digest_algorithm = alg_num; in libfsverity_compute_digest() 325 digest->digest_size = hash_alg->digest_size; in libfsverity_compute_digest() 326 libfsverity_hash_full(hash, &desc, sizeof(desc), digest->digest); in libfsverity_compute_digest() 327 *digest_ret = digest; in libfsverity_compute_digest()
|
H A D | hash_algs.c | 45 static void openssl_digest_final(struct hash_ctx *_ctx, u8 *digest) in openssl_digest_final() argument 50 ret = EVP_DigestFinal_ex(ctx->md_ctx, digest, NULL); in openssl_digest_final() 128 void libfsverity_hash_final(struct hash_ctx *ctx, u8 *digest) in libfsverity_hash_final() argument 130 ctx->final(ctx, digest); in libfsverity_hash_final() 135 u8 *digest) in libfsverity_hash_full() 139 libfsverity_hash_final(ctx, digest); in libfsverity_hash_full() 134 libfsverity_hash_full(struct hash_ctx *ctx, const void *data, size_t size, u8 *digest) libfsverity_hash_full() argument
|
H A D | sign_digest.c | 271 * This is necessary to change the message digest in sign_pkcs7() 402 libfsverity_sign_digest(const struct libfsverity_digest *digest, in libfsverity_sign_digest() argument 413 if (!digest || !sig_params || !sig_ret || !sig_size_ret) { in libfsverity_sign_digest() 426 hash_alg = libfsverity_find_hash_alg_by_num(digest->digest_algorithm); in libfsverity_sign_digest() 427 if (!hash_alg || digest->digest_size != hash_alg->digest_size) { in libfsverity_sign_digest() 428 libfsverity_error_msg("malformed fsverity digest"); in libfsverity_sign_digest() 449 d = libfsverity_zalloc(sizeof(*d) + digest->digest_size); in libfsverity_sign_digest() 455 d->digest_algorithm = cpu_to_le16(digest->digest_algorithm); in libfsverity_sign_digest() 456 d->digest_size = cpu_to_le16(digest->digest_size); in libfsverity_sign_digest() 457 memcpy(d->digest, diges in libfsverity_sign_digest() [all...] |
/third_party/openssl/test/ |
H A D | hmactest.c | 40 const char *digest; member 103 return TEST_ptr(p) && TEST_str_eq(p, test[idx].digest); in test_hmac_md5() 152 if (!TEST_ptr(p) || !TEST_str_eq(p, test[4].digest)) in test_hmac_run() 165 if (!TEST_ptr(p) || !TEST_str_eq(p, test[5].digest)) in test_hmac_run() 173 if (!TEST_ptr(p) || !TEST_str_eq(p, test[6].digest)) in test_hmac_run() 182 if (!TEST_ptr(p) || !TEST_str_eq(p, test[6].digest)) in test_hmac_run() 186 * Test reusing a key where the digest is provided again but is the same as in test_hmac_run() 194 if (!TEST_ptr(p) || !TEST_str_eq(p, test[6].digest)) in test_hmac_run() 211 if (!TEST_ptr(p) || !TEST_str_eq(p, test[4].digest)) in test_hmac_single_shot() 238 if (!TEST_ptr(p) || !TEST_str_eq(p, test[7].digest)) in test_hmac_copy() [all...] |
/third_party/libwebsockets/lib/cose/ |
H A D | cose_validate_alg.c | 192 uint8_t digest[LWS_GENHASH_LARGEST]; in lws_cose_val_alg_destroy() local 218 lws_genhash_destroy(&alg->hash_ctx, digest); in lws_cose_val_alg_destroy() 224 &alg->u.ecdsactx, digest, ht, in lws_cose_val_alg_destroy() 237 if (lws_genhmac_destroy(&alg->u.hmacctx, digest)) { in lws_cose_val_alg_destroy() 248 res->result = lws_timingsafe_bcmp(digest, cps->mac, in lws_cose_val_alg_destroy() 259 if (!lws_genhash_destroy(&alg->hash_ctx, digest) && in lws_cose_val_alg_destroy() 261 lws_genrsa_hash_sig_verify(&alg->u.rsactx, digest, in lws_cose_val_alg_destroy()
|
/third_party/libwebsockets/lib/jose/jwe/enc/ |
H A D | aescbc.c | 33 uint8_t digest[LWS_GENHASH_LARGEST]; in lws_jwe_encrypt_cbc_hs() local 150 if (lws_genhmac_destroy(&hmacctx, digest)) { in lws_jwe_encrypt_cbc_hs() 156 memcpy((void *)jwe->jws.map.buf[LJWE_ATAG], digest, (unsigned int)hlen / 2); in lws_jwe_encrypt_cbc_hs() 166 uint8_t digest[LWS_GENHASH_LARGEST]; in lws_jwe_auth_and_decrypt_cbc_hs() local 220 if (lws_genhmac_destroy(&hmacctx, digest)) { in lws_jwe_auth_and_decrypt_cbc_hs() 225 /* first half of digest is the auth tag */ in lws_jwe_auth_and_decrypt_cbc_hs() 227 if (lws_timingsafe_bcmp(digest, jwe->jws.map.buf[LJWE_ATAG], (unsigned int)hlen / 2)) { in lws_jwe_auth_and_decrypt_cbc_hs() 231 lwsl_hexdump_notice(digest, (unsigned int)hlen / 2); in lws_jwe_auth_and_decrypt_cbc_hs()
|
/third_party/python/Lib/ |
H A D | hashlib.py | 31 - digest(): Return the digest of the bytes passed to the update() method 33 - hexdigest(): Like digest() except the digest is returned as a string 39 For example, to obtain the digest of the byte string 'Nobody inspects the 46 >>> m.digest() 136 # builtin if the current security policy blocks a digest, bpo#40695. 213 password = new(hash_name, password).digest() 220 # digest objects and just update copies to skip initialization. 224 ocpy.update(icpy.digest()) [all...] |
/third_party/node/test/parallel/ |
H A D | test-crypto-binary-default.js | 69 .digest('hex'); 224 .digest('hex'); 352 .digest('hex') 361 .digest('hex') 368 const a1 = crypto.createHash('sha1').update('Test123').digest('hex'); 369 const a2 = crypto.createHash('sha256').update('Test123').digest('base64'); 370 const a3 = crypto.createHash('sha512').update('Test123').digest(); // binary 371 const a4 = crypto.createHash('sha1').update('Test123').digest('buffer'); 374 const a0 = crypto.createHash('md5').update('Test123').digest('latin1'); 403 const h1 = crypto.createHash('sha1').update('Test123').digest('he [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/macs/ |
H A D | kmac_prov.c | 120 PROV_DIGEST digest; member 150 ossl_prov_digest_reset(&kctx->digest); in kmac_free() 184 if (!ossl_prov_digest_load_from_params(&kctx->digest, params, in kmac_fetch_new() 190 kctx->out_len = EVP_MD_get_size(ossl_prov_digest_md(&kctx->digest)); in kmac_fetch_new() 197 OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC128, in kmac128_new() 207 OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC256, in kmac256_new() 227 || !ossl_prov_digest_copy(&dst->digest, &src->digest)) { in kmac_dup() 245 const EVP_MD *digest = ossl_prov_digest_md(&kctx->digest); in kmac_setkey() local [all...] |
/third_party/openssl/providers/implementations/macs/ |
H A D | kmac_prov.c | 120 PROV_DIGEST digest; member 150 ossl_prov_digest_reset(&kctx->digest); in kmac_free() 184 if (!ossl_prov_digest_load_from_params(&kctx->digest, params, in kmac_fetch_new() 190 kctx->out_len = EVP_MD_get_size(ossl_prov_digest_md(&kctx->digest)); in kmac_fetch_new() 197 OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC128, in kmac128_new() 207 OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC256, in kmac256_new() 227 || !ossl_prov_digest_copy(&dst->digest, &src->digest)) { in kmac_dup() 245 const EVP_MD *digest = ossl_prov_digest_md(&kctx->digest); in kmac_setkey() local [all...] |
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/ |
H A D | ima_selinux.sh | 47 tst_res TFAIL "$measured_cap: expected: $expected_value, got: $digest" 85 tst_brk TCONF "cannot compute digest for $algorithm" 104 local digest expected_digest algorithm 122 digest=$(echo "$line" | cut -d' ' -f4 | cut -d':' -f2) 128 tst_brk TCONF "cannot compute digest for $algorithm" 130 if [ "$digest" != "$expected_digest" ]; then 131 tst_res TFAIL "digest mismatch: expected: $expected_digest, got: $digest"
|
/third_party/selinux/libselinux/src/ |
H A D | label_internal.h | 51 * The hash value is held in rec->digest if SELABEL_OPT_DIGEST set. To 58 unsigned char *digest; /* SHA1 digest of specfiles */ member 65 extern int digest_add_specfile(struct selabel_digest *digest, FILE *fp, 69 extern void digest_gen_hash(struct selabel_digest *digest); 95 const char *key, uint8_t *digest); 119 struct selabel_digest *digest; member
|
/third_party/mbedtls/programs/hash/ |
H A D | hello.c | 40 unsigned char digest[16]; in main() local 45 if ((ret = mbedtls_md5((unsigned char *) str, 13, digest)) != 0) { in main() 50 mbedtls_printf("%02x", digest[i]); in main()
|
/third_party/skia/third_party/externals/sfntly/java/src/com/google/typography/font/sfntly/ |
H A D | Font.java | 324 private final byte[] digest; field in Font 333 * @param digest the computed digest for the font; null if digest was not 336 private Font(int sfntVersion, byte[] digest) { in Font() argument 338 this.digest = digest; in Font() 351 * Gets a copy of the fonts digest that was created when the font was read. If 352 * no digest was set at creation time then the return result will be null. 354 * @return a copy of the digest arra 357 public byte[] digest() { digest() method in Font 613 private byte[] digest; global() field in Font.Builder 715 setDigest(byte[] digest) setDigest() argument [all...] |