Home
last modified time | relevance | path

Searched refs:digest (Results 501 - 525 of 788) sorted by relevance

1...<<21222324252627282930>>...32

/third_party/node/deps/openssl/config/archs/solaris-x86-gcc/asm/include/openssl/
H A Dcrmf.h195 EVP_PKEY *pkey, const EVP_MD *digest,
/third_party/node/deps/openssl/config/archs/solaris-x86-gcc/no-asm/include/openssl/
H A Dcrmf.h195 EVP_PKEY *pkey, const EVP_MD *digest,
/third_party/node/deps/openssl/config/archs/linux64-mips64/asm/include/openssl/
H A Dcrmf.h195 EVP_PKEY *pkey, const EVP_MD *digest,
/third_party/node/deps/openssl/config/archs/linux64-mips64/asm_avx2/include/openssl/
H A Dcrmf.h195 EVP_PKEY *pkey, const EVP_MD *digest,
/third_party/node/deps/openssl/config/archs/linux64-mips64/no-asm/include/openssl/
H A Dcrmf.h195 EVP_PKEY *pkey, const EVP_MD *digest,
/third_party/node/deps/openssl/config/archs/linux64-s390x/asm/include/openssl/
H A Dcrmf.h195 EVP_PKEY *pkey, const EVP_MD *digest,
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_local.h255 ASN1_OCTET_STRING *digest; member
/third_party/node/deps/undici/src/lib/fetch/
H A Dutil.js574 let actualValue = crypto.createHash(algorithm).update(bytes).digest('base64')
/third_party/openssl/crypto/cms/
H A Dcms_local.h255 ASN1_OCTET_STRING *digest; member
H A Dcms_asn1.c250 ASN1_SIMPLE(CMS_DigestedData, digest, ASN1_OCTET_STRING)
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_nettle.c66 alg->digest(ctx, alg->digest_size, mac); in nettle_digest_vector()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dcrypto_nettle.c66 alg->digest(ctx, alg->digest_size, mac); in nettle_digest_vector()
/foundation/communication/dsoftbus/components/nstackx/fillp/src/fillp_lib/src/fillp/
H A Dfillp_conn.c1900 (void)memcpy_s(stateCookie->digest, FILLP_KEYSIZE, pcb->pcbInst->macInfo.currentMacKey, FILLP_KEYSIZE); in FillpGenerateCookie()
1936 FillpHmacSha256Final(&ctx, stateCookie->digest, FILLP_KEYSIZE); in FillpGenerateCookie()
1984 if (stateCookie->digest[count] != outDigest[count]) { in FillpValidateCookieHmac()
1985 FILLP_LOGINF("fillp_sock_id:%d HMAC-SHA2 digest mismatched. SaveDigest:%d NewDigest:%d", in FillpValidateCookieHmac()
1986 FILLP_GET_SOCKET(pcb)->index, stateCookie->digest[count], outDigest[count]); in FillpValidateCookieHmac()
/third_party/node/deps/openssl/openssl/include/openssl/
H A Devp.h159 /* digest can only handle a single block */
162 /* digest is extensible-output function, XOF */
199 # define EVP_MD_CTX_FLAG_ONESHOT 0x0001/* digest update will be
214 * The following PAD options are also currently ignored in 1.0.0, digest
689 int EVP_MD_get_params(const EVP_MD *digest, OSSL_PARAM params[]);
692 const OSSL_PARAM *EVP_MD_gettable_params(const EVP_MD *digest);
1171 int EVP_add_digest(const EVP_MD *digest);
1488 const EVP_MD *digest, int keylen, unsigned char *out);
1741 * Method handles all operations: don't assume any digest related defaults.
/third_party/openssl/include/openssl/
H A Devp.h157 /* digest can only handle a single block */
160 /* digest is extensible-output function, XOF */
197 # define EVP_MD_CTX_FLAG_ONESHOT 0x0001/* digest update will be
212 * The following PAD options are also currently ignored in 1.0.0, digest
687 int EVP_MD_get_params(const EVP_MD *digest, OSSL_PARAM params[]);
690 const OSSL_PARAM *EVP_MD_gettable_params(const EVP_MD *digest);
1169 int EVP_add_digest(const EVP_MD *digest);
1486 const EVP_MD *digest, int keylen, unsigned char *out);
1739 * Method handles all operations: don't assume any digest related defaults.
/third_party/curl/tests/
H A Dftpserver.pl1765 my $digest = Digest::MD5::md5_hex($POP3_TIMESTAMP, $TEXT_PASSWORD);
1767 if ($secret ne $digest) {
/third_party/ffmpeg/libavutil/
H A Dripemd.c36 uint8_t digest_len; ///< digest length in 32-bit words
548 void av_ripemd_final(AVRIPEMD* ctx, uint8_t *digest) in av_ripemd_final() argument
558 AV_WL32(digest + i*4, ctx->state[i]); in av_ripemd_final()
/third_party/mbedtls/library/
H A Dssl_misc.h965 /* Buffer holding digest of the handshake up to
967 unsigned char digest[MBEDTLS_TLS1_3_MD_MAX_SIZE]; member
975 /* Buffer holding digest of the handshake up to but
977 unsigned char digest[MBEDTLS_TLS1_3_MD_MAX_SIZE]; member
1068 * - For stream/CBC, the type of message digest to be used.
1069 * - For stream/CBC, (static) encryption/decryption keys for the digest.
1088 * - For stream/CBC transformations, the message digest contexts
1367 * \param update_hs_digest This indicates if the handshake digest
/third_party/lzma/C/
H A DXzEnc.c249 static void SeqCheckInStream_GetDigest(CSeqCheckInStream *p, Byte *digest) in SeqCheckInStream_GetDigest() argument
251 XzCheck_Final(&p->check, digest); in SeqCheckInStream_GetDigest()
/third_party/node/lib/
H A D_tls_wrap.js1459 .digest('hex'), 0, 32);
1557 .digest('hex'), 0, 32);
/third_party/node/test/parallel/
H A Dtest-buffer-alloc.js1069 crypto.createHash('sha1').update(b1).digest('hex'),
1070 crypto.createHash('sha1').update(b2).digest('hex')
/third_party/mesa3d/src/util/
H A Dxxhash.h230 * It's still possible to continue inserting input into the hash state after a digest,
262 typedef struct { unsigned char digest[4]; } XXH32_canonical_t; member
299 typedef struct { unsigned char digest[8]; } XXH64_canonical_t; member
/third_party/node/deps/openssl/openssl/engines/
H A De_capi.c138 static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen,
1005 static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen, in capi_dsa_do_sign() argument
1039 if (!CryptSetHashParam(hash, HP_HASHVAL, (unsigned char *)digest, 0)) { in capi_dsa_do_sign()
/third_party/openssl/engines/
H A De_capi.c138 static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen,
1005 static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen, in capi_dsa_do_sign() argument
1039 if (!CryptSetHashParam(hash, HP_HASHVAL, (unsigned char *)digest, 0)) { in capi_dsa_do_sign()
/third_party/openssl/test/
H A Dacvp_test.c625 unsigned char digest[EVP_MAX_MD_SIZE]; in dsa_sigver_test() local
646 digest, &digest_len, md, NULL))) in dsa_sigver_test()
652 || !TEST_int_eq(EVP_PKEY_verify(ctx, sig, sig_len, digest, digest_len), in dsa_sigver_test()

Completed in 40 milliseconds

1...<<21222324252627282930>>...32