/third_party/node/deps/openssl/config/archs/solaris-x86-gcc/asm/include/openssl/ |
H A D | crmf.h | 195 EVP_PKEY *pkey, const EVP_MD *digest,
|
/third_party/node/deps/openssl/config/archs/solaris-x86-gcc/no-asm/include/openssl/ |
H A D | crmf.h | 195 EVP_PKEY *pkey, const EVP_MD *digest,
|
/third_party/node/deps/openssl/config/archs/linux64-mips64/asm/include/openssl/ |
H A D | crmf.h | 195 EVP_PKEY *pkey, const EVP_MD *digest,
|
/third_party/node/deps/openssl/config/archs/linux64-mips64/asm_avx2/include/openssl/ |
H A D | crmf.h | 195 EVP_PKEY *pkey, const EVP_MD *digest,
|
/third_party/node/deps/openssl/config/archs/linux64-mips64/no-asm/include/openssl/ |
H A D | crmf.h | 195 EVP_PKEY *pkey, const EVP_MD *digest,
|
/third_party/node/deps/openssl/config/archs/linux64-s390x/asm/include/openssl/ |
H A D | crmf.h | 195 EVP_PKEY *pkey, const EVP_MD *digest,
|
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_local.h | 255 ASN1_OCTET_STRING *digest; member
|
/third_party/node/deps/undici/src/lib/fetch/ |
H A D | util.js | 574 let actualValue = crypto.createHash(algorithm).update(bytes).digest('base64')
|
/third_party/openssl/crypto/cms/ |
H A D | cms_local.h | 255 ASN1_OCTET_STRING *digest; member
|
H A D | cms_asn1.c | 250 ASN1_SIMPLE(CMS_DigestedData, digest, ASN1_OCTET_STRING)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_nettle.c | 66 alg->digest(ctx, alg->digest_size, mac); in nettle_digest_vector()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_nettle.c | 66 alg->digest(ctx, alg->digest_size, mac); in nettle_digest_vector()
|
/foundation/communication/dsoftbus/components/nstackx/fillp/src/fillp_lib/src/fillp/ |
H A D | fillp_conn.c | 1900 (void)memcpy_s(stateCookie->digest, FILLP_KEYSIZE, pcb->pcbInst->macInfo.currentMacKey, FILLP_KEYSIZE); in FillpGenerateCookie() 1936 FillpHmacSha256Final(&ctx, stateCookie->digest, FILLP_KEYSIZE); in FillpGenerateCookie() 1984 if (stateCookie->digest[count] != outDigest[count]) { in FillpValidateCookieHmac() 1985 FILLP_LOGINF("fillp_sock_id:%d HMAC-SHA2 digest mismatched. SaveDigest:%d NewDigest:%d", in FillpValidateCookieHmac() 1986 FILLP_GET_SOCKET(pcb)->index, stateCookie->digest[count], outDigest[count]); in FillpValidateCookieHmac()
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
H A D | evp.h | 159 /* digest can only handle a single block */ 162 /* digest is extensible-output function, XOF */ 199 # define EVP_MD_CTX_FLAG_ONESHOT 0x0001/* digest update will be 214 * The following PAD options are also currently ignored in 1.0.0, digest 689 int EVP_MD_get_params(const EVP_MD *digest, OSSL_PARAM params[]); 692 const OSSL_PARAM *EVP_MD_gettable_params(const EVP_MD *digest); 1171 int EVP_add_digest(const EVP_MD *digest); 1488 const EVP_MD *digest, int keylen, unsigned char *out); 1741 * Method handles all operations: don't assume any digest related defaults.
|
/third_party/openssl/include/openssl/ |
H A D | evp.h | 157 /* digest can only handle a single block */ 160 /* digest is extensible-output function, XOF */ 197 # define EVP_MD_CTX_FLAG_ONESHOT 0x0001/* digest update will be 212 * The following PAD options are also currently ignored in 1.0.0, digest 687 int EVP_MD_get_params(const EVP_MD *digest, OSSL_PARAM params[]); 690 const OSSL_PARAM *EVP_MD_gettable_params(const EVP_MD *digest); 1169 int EVP_add_digest(const EVP_MD *digest); 1486 const EVP_MD *digest, int keylen, unsigned char *out); 1739 * Method handles all operations: don't assume any digest related defaults.
|
/third_party/curl/tests/ |
H A D | ftpserver.pl | 1765 my $digest = Digest::MD5::md5_hex($POP3_TIMESTAMP, $TEXT_PASSWORD); 1767 if ($secret ne $digest) {
|
/third_party/ffmpeg/libavutil/ |
H A D | ripemd.c | 36 uint8_t digest_len; ///< digest length in 32-bit words 548 void av_ripemd_final(AVRIPEMD* ctx, uint8_t *digest) in av_ripemd_final() argument 558 AV_WL32(digest + i*4, ctx->state[i]); in av_ripemd_final()
|
/third_party/mbedtls/library/ |
H A D | ssl_misc.h | 965 /* Buffer holding digest of the handshake up to 967 unsigned char digest[MBEDTLS_TLS1_3_MD_MAX_SIZE]; member 975 /* Buffer holding digest of the handshake up to but 977 unsigned char digest[MBEDTLS_TLS1_3_MD_MAX_SIZE]; member 1068 * - For stream/CBC, the type of message digest to be used. 1069 * - For stream/CBC, (static) encryption/decryption keys for the digest. 1088 * - For stream/CBC transformations, the message digest contexts 1367 * \param update_hs_digest This indicates if the handshake digest
|
/third_party/lzma/C/ |
H A D | XzEnc.c | 249 static void SeqCheckInStream_GetDigest(CSeqCheckInStream *p, Byte *digest)
in SeqCheckInStream_GetDigest() argument 251 XzCheck_Final(&p->check, digest);
in SeqCheckInStream_GetDigest()
|
/third_party/node/lib/ |
H A D | _tls_wrap.js | 1459 .digest('hex'), 0, 32); 1557 .digest('hex'), 0, 32);
|
/third_party/node/test/parallel/ |
H A D | test-buffer-alloc.js | 1069 crypto.createHash('sha1').update(b1).digest('hex'), 1070 crypto.createHash('sha1').update(b2).digest('hex')
|
/third_party/mesa3d/src/util/ |
H A D | xxhash.h | 230 * It's still possible to continue inserting input into the hash state after a digest, 262 typedef struct { unsigned char digest[4]; } XXH32_canonical_t; member 299 typedef struct { unsigned char digest[8]; } XXH64_canonical_t; member
|
/third_party/node/deps/openssl/openssl/engines/ |
H A D | e_capi.c | 138 static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen, 1005 static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen, in capi_dsa_do_sign() argument 1039 if (!CryptSetHashParam(hash, HP_HASHVAL, (unsigned char *)digest, 0)) { in capi_dsa_do_sign()
|
/third_party/openssl/engines/ |
H A D | e_capi.c | 138 static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen, 1005 static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen, in capi_dsa_do_sign() argument 1039 if (!CryptSetHashParam(hash, HP_HASHVAL, (unsigned char *)digest, 0)) { in capi_dsa_do_sign()
|
/third_party/openssl/test/ |
H A D | acvp_test.c | 625 unsigned char digest[EVP_MAX_MD_SIZE]; in dsa_sigver_test() local 646 digest, &digest_len, md, NULL))) in dsa_sigver_test() 652 || !TEST_int_eq(EVP_PKEY_verify(ctx, sig, sig_len, digest, digest_len), in dsa_sigver_test()
|