Home
last modified time | relevance | path

Searched refs:digest (Results 51 - 75 of 555) sorted by relevance

12345678910>>...23

/third_party/skia/third_party/externals/freetype/tests/scripts/
H A Ddownload-test-fonts.py94 """Compute the digest of a given input byte string, which are the first
98 return m.digest()[:8]
132 expected_digest: Optional digest of the file
140 digest = digest_data(r.content)
141 if digest != expected_digest:
143 "%s has invalid digest %s (expected %s)"
144 % (url, digest.hex(), expected_digest.hex())
164 expected_digest: Optional digest for the file.
173 digest = digest_data(archive.open(filepath).read())
174 if digest !
[all...]
/third_party/gn/src/base/
H A Dmd5.h34 // MD5Digest digest; // the result of the computation
35 // MD5Final(&digest, &ctx);
37 // You can call MD5DigestToBase16() to generate a string of the digest.
57 // Finalizes the MD5 operation and fills the buffer with the digest.
58 void MD5Final(MD5Digest* digest, MD5Context* context);
60 // MD5IntermediateFinal() generates a digest without finalizing the MD5
62 // without affecting the digest generated for the entire input.
63 void MD5IntermediateFinal(MD5Digest* digest, const MD5Context* context);
65 // Converts a digest into human-readable hexadecimal.
66 std::string MD5DigestToBase16(const MD5Digest& digest);
[all...]
/third_party/skia/tests/
H A DMD5Test.cpp27 SkMD5::Digest digest = context.finish(); in md5_test() local
29 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); in md5_test()
40 SkMD5::Digest digest = context.finish(); in md5_test() local
42 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); in md5_test()
48 SkMD5::Digest digest; member
54 { "message digest", {{ 0xf9, 0x6b, 0x69, 0x7d, 0x7c, 0xb7, 0x93, 0x8d, 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0 }} },
62 md5_test(md5_tests[i].message, md5_tests[i].digest, reporter); in DEF_TEST()
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
H A Dpbkdf2.c50 const EVP_MD *digest, unsigned char *key,
60 PROV_DIGEST digest; member
85 ossl_prov_digest_reset(&ctx->digest); in kdf_pbkdf2_cleanup()
118 if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) in kdf_pbkdf2_init()
120 ossl_prov_digest_reset(&ctx->digest); in kdf_pbkdf2_init()
163 md = ossl_prov_digest_md(&ctx->digest); in kdf_pbkdf2_derive()
180 if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) in kdf_pbkdf2_set_ctx_params()
276 const EVP_MD *digest, unsigned char *key, in pbkdf2_derive()
286 mdlen = EVP_MD_get_size(digest); in pbkdf2_derive()
319 if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NUL in pbkdf2_derive()
274 pbkdf2_derive(const char *pass, size_t passlen, const unsigned char *salt, int saltlen, uint64_t iter, const EVP_MD *digest, unsigned char *key, size_t keylen, int lower_bound_checks) pbkdf2_derive() argument
[all...]
/third_party/openssl/providers/implementations/kdfs/
H A Dpbkdf2.c50 const EVP_MD *digest, unsigned char *key,
60 PROV_DIGEST digest; member
85 ossl_prov_digest_reset(&ctx->digest); in kdf_pbkdf2_cleanup()
118 if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) in kdf_pbkdf2_init()
120 ossl_prov_digest_reset(&ctx->digest); in kdf_pbkdf2_init()
163 md = ossl_prov_digest_md(&ctx->digest); in kdf_pbkdf2_derive()
180 if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx)) in kdf_pbkdf2_set_ctx_params()
276 const EVP_MD *digest, unsigned char *key, in pbkdf2_derive()
286 mdlen = EVP_MD_get_size(digest); in pbkdf2_derive()
319 if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NUL in pbkdf2_derive()
274 pbkdf2_derive(const char *pass, size_t passlen, const unsigned char *salt, int saltlen, uint64_t iter, const EVP_MD *digest, unsigned char *key, size_t keylen, int lower_bound_checks) pbkdf2_derive() argument
[all...]
/third_party/python/Lib/test/
H A Dtest_hashlib.py229 digest = hashlib.new(name, usedforsecurity=False)
292 self.assertIsInstance(h.digest(16), bytes)
293 self.assertEqual(hexstr(h.digest(16)), h.hexdigest(16))
295 self.assertIsInstance(h.digest(), bytes)
296 self.assertEqual(hexstr(h.digest()), h.hexdigest())
308 for digest in h.digest, h.hexdigest:
309 self.assertRaises(ValueError, digest, -10)
312 digest(length)
346 self.assertEqual(m1.digest(*arg
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Drehash.c75 unsigned char digest[EVP_MAX_MD_SIZE]; member
121 const unsigned char *digest, int need_symlink, in add_entry()
143 if (digest && memcmp(digest, ep->digest, evpmdsize) == 0) { in add_entry()
152 if (digest == NULL) in add_entry()
186 memcpy(ep->digest, digest, evpmdsize); in add_entry()
241 unsigned char digest[EVP_MAX_MD_SIZE]; in do_file() local
279 if (!X509_digest(x->x509, evpmd, digest, NUL in do_file()
120 add_entry(enum Type type, unsigned int hash, const char *filename, const unsigned char *digest, int need_symlink, unsigned short old_id) add_entry() argument
[all...]
/third_party/openssl/apps/
H A Drehash.c78 unsigned char digest[EVP_MAX_MD_SIZE]; member
124 const unsigned char *digest, int need_symlink, in add_entry()
146 if (digest && memcmp(digest, ep->digest, evpmdsize) == 0) { in add_entry()
155 if (digest == NULL) in add_entry()
189 memcpy(ep->digest, digest, evpmdsize); in add_entry()
244 unsigned char digest[EVP_MAX_MD_SIZE]; in do_file() local
282 if (!X509_digest(x->x509, evpmd, digest, NUL in do_file()
123 add_entry(enum Type type, unsigned int hash, const char *filename, const unsigned char *digest, int need_symlink, unsigned short old_id) add_entry() argument
[all...]
/third_party/node/src/crypto/
H A Dcrypto_rsa.cc153 Utf8Value digest(env->isolate(), args[*offset]); in AdditionalConfig()
154 params->params.md = EVP_get_digestbyname(*digest); in AdditionalConfig()
156 THROW_ERR_CRYPTO_INVALID_DIGEST(env, "Invalid digest: %s", *digest); in AdditionalConfig()
163 Utf8Value digest(env->isolate(), args[*offset + 1]); in AdditionalConfig()
164 params->params.mgf1_md = EVP_get_digestbyname(*digest); in AdditionalConfig()
167 env, "Invalid MGF1 digest: %s", *digest); in AdditionalConfig()
218 if (params.digest != nullptr && in RSA_Cipher()
219 (EVP_PKEY_CTX_set_rsa_oaep_md(ctx.get(), params.digest) < in RSA_Cipher()
291 digest(other.digest) {} digest() function
[all...]
H A Dcrypto_pbkdf2.cc26 digest(other.digest) {} in digest() function
57 // 6. The digest algorithm name
105 params->digest = EVP_get_digestbyname(*name); in AdditionalConfig()
106 if (params->digest == nullptr) { in AdditionalConfig()
107 THROW_ERR_CRYPTO_INVALID_DIGEST(env, "Invalid digest: %s", *name); in AdditionalConfig()
129 params.digest, in DeriveBits()
/third_party/lwip/src/netif/ppp/
H A Dchap-new.c55 const struct chap_digest_type *digest,
96 const struct chap_digest_type *digest,
111 /* List of digest types that we know about */
176 ppp_fatal("CHAP digest 0x%x requested but not available", in chap_auth_peer()
179 pcb->chap_server.digest = dp; in chap_auth_peer()
209 ppp_fatal("CHAP digest 0x%x requested but not available", in chap_auth_with_peer()
212 pcb->chap_client.digest = dp; in chap_auth_with_peer()
264 pcb->chap_server.digest->generate_challenge(pcb, p); in chap_generate_challenge()
328 ok = (*verifier)(name, pcb->chap_server.name, id, pcb->chap_server.digest,
332 ok = chap_verify_response(pcb, name, pcb->chap_server.name, id, pcb->chap_server.digest,
411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) global() argument
[all...]
/third_party/fsverity-utils/lib/
H A Dcompute_digest.c243 struct libfsverity_digest *digest; in libfsverity_compute_digest() local
319 digest = libfsverity_zalloc(sizeof(*digest) + hash_alg->digest_size); in libfsverity_compute_digest()
320 if (!digest) { in libfsverity_compute_digest()
324 digest->digest_algorithm = alg_num; in libfsverity_compute_digest()
325 digest->digest_size = hash_alg->digest_size; in libfsverity_compute_digest()
326 libfsverity_hash_full(hash, &desc, sizeof(desc), digest->digest); in libfsverity_compute_digest()
327 *digest_ret = digest; in libfsverity_compute_digest()
H A Dhash_algs.c45 static void openssl_digest_final(struct hash_ctx *_ctx, u8 *digest) in openssl_digest_final() argument
50 ret = EVP_DigestFinal_ex(ctx->md_ctx, digest, NULL); in openssl_digest_final()
128 void libfsverity_hash_final(struct hash_ctx *ctx, u8 *digest) in libfsverity_hash_final() argument
130 ctx->final(ctx, digest); in libfsverity_hash_final()
135 u8 *digest) in libfsverity_hash_full()
139 libfsverity_hash_final(ctx, digest); in libfsverity_hash_full()
134 libfsverity_hash_full(struct hash_ctx *ctx, const void *data, size_t size, u8 *digest) libfsverity_hash_full() argument
H A Dsign_digest.c271 * This is necessary to change the message digest in sign_pkcs7()
402 libfsverity_sign_digest(const struct libfsverity_digest *digest, in libfsverity_sign_digest() argument
413 if (!digest || !sig_params || !sig_ret || !sig_size_ret) { in libfsverity_sign_digest()
426 hash_alg = libfsverity_find_hash_alg_by_num(digest->digest_algorithm); in libfsverity_sign_digest()
427 if (!hash_alg || digest->digest_size != hash_alg->digest_size) { in libfsverity_sign_digest()
428 libfsverity_error_msg("malformed fsverity digest"); in libfsverity_sign_digest()
449 d = libfsverity_zalloc(sizeof(*d) + digest->digest_size); in libfsverity_sign_digest()
455 d->digest_algorithm = cpu_to_le16(digest->digest_algorithm); in libfsverity_sign_digest()
456 d->digest_size = cpu_to_le16(digest->digest_size); in libfsverity_sign_digest()
457 memcpy(d->digest, diges in libfsverity_sign_digest()
[all...]
/third_party/openssl/test/
H A Dhmactest.c40 const char *digest; member
103 return TEST_ptr(p) && TEST_str_eq(p, test[idx].digest); in test_hmac_md5()
152 if (!TEST_ptr(p) || !TEST_str_eq(p, test[4].digest)) in test_hmac_run()
165 if (!TEST_ptr(p) || !TEST_str_eq(p, test[5].digest)) in test_hmac_run()
173 if (!TEST_ptr(p) || !TEST_str_eq(p, test[6].digest)) in test_hmac_run()
182 if (!TEST_ptr(p) || !TEST_str_eq(p, test[6].digest)) in test_hmac_run()
186 * Test reusing a key where the digest is provided again but is the same as in test_hmac_run()
194 if (!TEST_ptr(p) || !TEST_str_eq(p, test[6].digest)) in test_hmac_run()
211 if (!TEST_ptr(p) || !TEST_str_eq(p, test[4].digest)) in test_hmac_single_shot()
238 if (!TEST_ptr(p) || !TEST_str_eq(p, test[7].digest)) in test_hmac_copy()
[all...]
/third_party/libwebsockets/lib/cose/
H A Dcose_validate_alg.c192 uint8_t digest[LWS_GENHASH_LARGEST]; in lws_cose_val_alg_destroy() local
218 lws_genhash_destroy(&alg->hash_ctx, digest); in lws_cose_val_alg_destroy()
224 &alg->u.ecdsactx, digest, ht, in lws_cose_val_alg_destroy()
237 if (lws_genhmac_destroy(&alg->u.hmacctx, digest)) { in lws_cose_val_alg_destroy()
248 res->result = lws_timingsafe_bcmp(digest, cps->mac, in lws_cose_val_alg_destroy()
259 if (!lws_genhash_destroy(&alg->hash_ctx, digest) && in lws_cose_val_alg_destroy()
261 lws_genrsa_hash_sig_verify(&alg->u.rsactx, digest, in lws_cose_val_alg_destroy()
/third_party/libwebsockets/lib/jose/jwe/enc/
H A Daescbc.c33 uint8_t digest[LWS_GENHASH_LARGEST]; in lws_jwe_encrypt_cbc_hs() local
150 if (lws_genhmac_destroy(&hmacctx, digest)) { in lws_jwe_encrypt_cbc_hs()
156 memcpy((void *)jwe->jws.map.buf[LJWE_ATAG], digest, (unsigned int)hlen / 2); in lws_jwe_encrypt_cbc_hs()
166 uint8_t digest[LWS_GENHASH_LARGEST]; in lws_jwe_auth_and_decrypt_cbc_hs() local
220 if (lws_genhmac_destroy(&hmacctx, digest)) { in lws_jwe_auth_and_decrypt_cbc_hs()
225 /* first half of digest is the auth tag */ in lws_jwe_auth_and_decrypt_cbc_hs()
227 if (lws_timingsafe_bcmp(digest, jwe->jws.map.buf[LJWE_ATAG], (unsigned int)hlen / 2)) { in lws_jwe_auth_and_decrypt_cbc_hs()
231 lwsl_hexdump_notice(digest, (unsigned int)hlen / 2); in lws_jwe_auth_and_decrypt_cbc_hs()
/third_party/python/Lib/
H A Dhashlib.py31 - digest(): Return the digest of the bytes passed to the update() method
33 - hexdigest(): Like digest() except the digest is returned as a string
39 For example, to obtain the digest of the byte string 'Nobody inspects the
46 >>> m.digest()
136 # builtin if the current security policy blocks a digest, bpo#40695.
213 password = new(hash_name, password).digest()
220 # digest objects and just update copies to skip initialization.
224 ocpy.update(icpy.digest())
[all...]
/third_party/node/test/parallel/
H A Dtest-crypto-binary-default.js69 .digest('hex');
224 .digest('hex');
352 .digest('hex')
361 .digest('hex')
368 const a1 = crypto.createHash('sha1').update('Test123').digest('hex');
369 const a2 = crypto.createHash('sha256').update('Test123').digest('base64');
370 const a3 = crypto.createHash('sha512').update('Test123').digest(); // binary
371 const a4 = crypto.createHash('sha1').update('Test123').digest('buffer');
374 const a0 = crypto.createHash('md5').update('Test123').digest('latin1');
403 const h1 = crypto.createHash('sha1').update('Test123').digest('he
[all...]
/third_party/node/deps/openssl/openssl/providers/implementations/macs/
H A Dkmac_prov.c120 PROV_DIGEST digest; member
150 ossl_prov_digest_reset(&kctx->digest); in kmac_free()
184 if (!ossl_prov_digest_load_from_params(&kctx->digest, params, in kmac_fetch_new()
190 kctx->out_len = EVP_MD_get_size(ossl_prov_digest_md(&kctx->digest)); in kmac_fetch_new()
197 OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC128, in kmac128_new()
207 OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC256, in kmac256_new()
227 || !ossl_prov_digest_copy(&dst->digest, &src->digest)) { in kmac_dup()
245 const EVP_MD *digest = ossl_prov_digest_md(&kctx->digest); in kmac_setkey() local
[all...]
/third_party/openssl/providers/implementations/macs/
H A Dkmac_prov.c120 PROV_DIGEST digest; member
150 ossl_prov_digest_reset(&kctx->digest); in kmac_free()
184 if (!ossl_prov_digest_load_from_params(&kctx->digest, params, in kmac_fetch_new()
190 kctx->out_len = EVP_MD_get_size(ossl_prov_digest_md(&kctx->digest)); in kmac_fetch_new()
197 OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC128, in kmac128_new()
207 OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC256, in kmac256_new()
227 || !ossl_prov_digest_copy(&dst->digest, &src->digest)) { in kmac_dup()
245 const EVP_MD *digest = ossl_prov_digest_md(&kctx->digest); in kmac_setkey() local
[all...]
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/
H A Dima_selinux.sh47 tst_res TFAIL "$measured_cap: expected: $expected_value, got: $digest"
85 tst_brk TCONF "cannot compute digest for $algorithm"
104 local digest expected_digest algorithm
122 digest=$(echo "$line" | cut -d' ' -f4 | cut -d':' -f2)
128 tst_brk TCONF "cannot compute digest for $algorithm"
130 if [ "$digest" != "$expected_digest" ]; then
131 tst_res TFAIL "digest mismatch: expected: $expected_digest, got: $digest"
/third_party/selinux/libselinux/src/
H A Dlabel_internal.h51 * The hash value is held in rec->digest if SELABEL_OPT_DIGEST set. To
58 unsigned char *digest; /* SHA1 digest of specfiles */ member
65 extern int digest_add_specfile(struct selabel_digest *digest, FILE *fp,
69 extern void digest_gen_hash(struct selabel_digest *digest);
95 const char *key, uint8_t *digest);
119 struct selabel_digest *digest; member
/third_party/mbedtls/programs/hash/
H A Dhello.c40 unsigned char digest[16]; in main() local
45 if ((ret = mbedtls_md5((unsigned char *) str, 13, digest)) != 0) { in main()
50 mbedtls_printf("%02x", digest[i]); in main()
/third_party/skia/third_party/externals/sfntly/java/src/com/google/typography/font/sfntly/
H A DFont.java324 private final byte[] digest; field in Font
333 * @param digest the computed digest for the font; null if digest was not
336 private Font(int sfntVersion, byte[] digest) { in Font() argument
338 this.digest = digest; in Font()
351 * Gets a copy of the fonts digest that was created when the font was read. If
352 * no digest was set at creation time then the return result will be null.
354 * @return a copy of the digest arra
357 public byte[] digest() { digest() method in Font
613 private byte[] digest; global() field in Font.Builder
715 setDigest(byte[] digest) setDigest() argument
[all...]

Completed in 13 milliseconds

12345678910>>...23