/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_openssl.c | 4011 int cipher, digest; in openssl_get_keyblock_size() 4019 digest = SSL_CIPHER_get_digest_nid(ssl_cipher); in openssl_get_keyblock_size() 4020 wpa_printf(MSG_DEBUG, "OpenSSL: cipher nid %d digest nid %d", in openssl_get_keyblock_size() 4021 cipher, digest); in openssl_get_keyblock_size() 4022 if (cipher < 0 || digest < 0) in openssl_get_keyblock_size() 4025 h = EVP_get_digestbynid(digest); in openssl_get_keyblock_size()
|
/third_party/node/deps/v8/tools/ |
H A D | v8_presubmit.py | 211 file_sum = md5er(handle.read()).digest()
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_local.h | 91 EVP_MD *digest; /* digest used in MSG_SIG_ALG and POPO, default SHA256 */ member
|
H A D | cmp_msg.c | 419 privkey, ctx->digest, in ossl_cmp_certreq_new()
|
/third_party/python/Tools/ccbench/ |
H A D | ccbench.py | 124 hashlib.sha1(s).digest()
|
/third_party/python/Lib/ |
H A D | random.py | 157 a = int.from_bytes(a + _sha512(a).digest())
|
/third_party/openssl/crypto/cmp/ |
H A D | cmp_local.h | 91 EVP_MD *digest; /* digest used in MSG_SIG_ALG and POPO, default SHA256 */ member
|
H A D | cmp_msg.c | 419 privkey, ctx->digest, in ossl_cmp_certreq_new()
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | evp.rs | 481 digest: *const EVP_MD, in PKCS5_PBKDF2_HMAC()
|
H A D | types.rs | 112 digest: *mut EVP_MD,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_openssl.c | 4252 int cipher, digest; in openssl_get_keyblock_size() 4261 digest = SSL_CIPHER_get_digest_nid(ssl_cipher); in openssl_get_keyblock_size() 4262 wpa_printf(MSG_DEBUG, "OpenSSL: cipher nid %d digest nid %d", in openssl_get_keyblock_size() 4263 cipher, digest); in openssl_get_keyblock_size() 4264 if (cipher < 0 || digest < 0) in openssl_get_keyblock_size() 4279 if (digest == NID_undef) { in openssl_get_keyblock_size() 4280 wpa_printf(MSG_DEBUG, "OpenSSL: no digest in use (e.g., AEAD)"); in openssl_get_keyblock_size() 4283 h = EVP_get_digestbynid(digest); in openssl_get_keyblock_size()
|
/third_party/skia/third_party/externals/spirv-cross/ |
H A D | test_shaders.py | 592 return md5.digest()
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/ProfileData/ |
H A D | GCOV.cpp | 696 CoveragePath += "##" + Result.digest().str().str();
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | evp.h | 112 /* digest can only handle a single block */ 115 /* digest is extensible-output function, XOF */ 151 # define EVP_MD_CTX_FLAG_ONESHOT 0x0001/* digest update will be 163 * digest in FIPS mode */ 166 * The following PAD options are also currently ignored in 1.0.0, digest 966 int EVP_add_digest(const EVP_MD *digest); 1092 const EVP_MD *digest, int keylen, unsigned char *out); 1323 * Method handles all operations: don't assume any digest related defaults.
|
/third_party/skia/dm/ |
H A D | DM.cpp | 1166 SkMD5::Digest digest = hash.finish(); in Run() 1168 md5.appendf("%02x", digest.data[i]); in Run()
|
/third_party/rust/crates/libc/src/ |
H A D | psp.rs | 2813 pub fn sceKernelUtilsMd5Digest(data: *mut u8, size: u32, digest: *mut u8) -> i32; in sceKernelUtilsMd5Digest() 2820 pub fn sceKernelUtilsMd5BlockResult(ctx: *mut SceKernelUtilsMd5Context, digest: *mut u8) in sceKernelUtilsMd5BlockResult() 2822 pub fn sceKernelUtilsSha1Digest(data: *mut u8, size: u32, digest: *mut u8) -> i32; in sceKernelUtilsSha1Digest() 2831 digest: *mut u8, in sceKernelUtilsSha1BlockResult()
|
/third_party/openssl/test/ |
H A D | evp_pkey_provided_test.c | 1706 static OSSL_PARAM *do_construct_hkdf_params(char *digest, char *key, in do_construct_hkdf_params() argument 1712 *p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST, digest, 0); in do_construct_hkdf_params()
|
/third_party/skia/third_party/externals/dng_sdk/source/ |
H A D | dng_negative.cpp | 497 // logic is to include these zeros in the digest. However, older in IPTCDigest() 499 // in the digest, so we support both methods and allow either to in IPTCDigest() 537 dng_fingerprint digest = IPTCDigest (); in RebuildIPTC() local 539 fXMP->SetIPTCDigest (digest); in RebuildIPTC() 1487 // writing, so always compute the digest of 8-bit data as 16-bits. 1533 // the digest, no matter the native order. Little-endian 1584 // the digest for these images. 1720 // the digest, no matter the native order. Little-endian 1791 // Find fast digest of the raw image. 1831 // Find the fast digest o [all...] |
/third_party/curl/lib/ |
H A D | urldata.h | 1238 BIT(iestyle); /* TRUE if digest should be done IE-style or FALSE if it 1367 struct digestdata digest; /* state data for host Digest auth */ member
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/DebugInfo/DWARF/ |
H A D | DWARFDebugLine.cpp | 141 OS << " md5_checksum: " << FileEntry.Checksum.digest() << '\n'; in dump()
|
/third_party/python/Modules/ |
H A D | _ssl.c | 1964 const char *skcipher = NULL, *digest = NULL, *kx = NULL, *auth = NULL; in cipher_to_dict() local 1981 digest = nid != NID_undef ? OBJ_nid2ln(nid) : NULL; in cipher_to_dict() 1999 "digest", digest, in cipher_to_dict()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | speed.c | 239 {"evp", OPT_EVP, 's', "Use EVP-named cipher or digest"}, 240 {"hmac", OPT_HMAC, 's', "HMAC using EVP-named digest"}, 545 unsigned char digest[EVP_MAX_MD_SIZE]; in EVP_Digest_loop() local 552 if (!EVP_Digest(buf, (size_t)lengths[testnum], digest, NULL, md, in EVP_Digest_loop() 1527 "%s: %s is an unknown cipher or digest\n", in speed_main() 1536 BIO_printf(bio_err, "%s: %s is an unknown digest\n", in speed_main()
|
/third_party/openssl/apps/ |
H A D | speed.c | 239 {"evp", OPT_EVP, 's', "Use EVP-named cipher or digest"}, 240 {"hmac", OPT_HMAC, 's', "HMAC using EVP-named digest"}, 545 unsigned char digest[EVP_MAX_MD_SIZE]; in EVP_Digest_loop() local 552 if (!EVP_Digest(buf, (size_t)lengths[testnum], digest, NULL, md, in EVP_Digest_loop() 1513 "%s: %s is an unknown cipher or digest\n", in speed_main() 1522 BIO_printf(bio_err, "%s: %s is an unknown digest\n", in speed_main()
|
/third_party/skia/tools/viewer/ |
H A D | Viewer.cpp | 2487 SkMD5::Digest digest = hash.finish(); in drawImGui() 2489 entry.fKeyString.appendf("%02x", digest.data[i]); in drawImGui()
|
/third_party/node/deps/undici/ |
H A D | undici.js | 1459 let actualValue = crypto.createHash(algorithm).update(bytes).digest("base64"); 11828 const digest = crypto.createHash("sha1").update(keyValue + uid).digest("base64"); 11829 if (secWSAccept !== digest) {
|