Home
last modified time | relevance | path

Searched refs:digest (Results 526 - 550 of 562) sorted by relevance

1...<<212223

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_openssl.c4011 int cipher, digest; in openssl_get_keyblock_size()
4019 digest = SSL_CIPHER_get_digest_nid(ssl_cipher); in openssl_get_keyblock_size()
4020 wpa_printf(MSG_DEBUG, "OpenSSL: cipher nid %d digest nid %d", in openssl_get_keyblock_size()
4021 cipher, digest); in openssl_get_keyblock_size()
4022 if (cipher < 0 || digest < 0) in openssl_get_keyblock_size()
4025 h = EVP_get_digestbynid(digest); in openssl_get_keyblock_size()
/third_party/node/deps/v8/tools/
H A Dv8_presubmit.py211 file_sum = md5er(handle.read()).digest()
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_local.h91 EVP_MD *digest; /* digest used in MSG_SIG_ALG and POPO, default SHA256 */ member
H A Dcmp_msg.c419 privkey, ctx->digest, in ossl_cmp_certreq_new()
/third_party/python/Tools/ccbench/
H A Dccbench.py124 hashlib.sha1(s).digest()
/third_party/python/Lib/
H A Drandom.py157 a = int.from_bytes(a + _sha512(a).digest())
/third_party/openssl/crypto/cmp/
H A Dcmp_local.h91 EVP_MD *digest; /* digest used in MSG_SIG_ALG and POPO, default SHA256 */ member
H A Dcmp_msg.c419 privkey, ctx->digest, in ossl_cmp_certreq_new()
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/
H A Devp.rs481 digest: *const EVP_MD, in PKCS5_PBKDF2_HMAC()
H A Dtypes.rs112 digest: *mut EVP_MD,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_openssl.c4252 int cipher, digest; in openssl_get_keyblock_size()
4261 digest = SSL_CIPHER_get_digest_nid(ssl_cipher); in openssl_get_keyblock_size()
4262 wpa_printf(MSG_DEBUG, "OpenSSL: cipher nid %d digest nid %d", in openssl_get_keyblock_size()
4263 cipher, digest); in openssl_get_keyblock_size()
4264 if (cipher < 0 || digest < 0) in openssl_get_keyblock_size()
4279 if (digest == NID_undef) { in openssl_get_keyblock_size()
4280 wpa_printf(MSG_DEBUG, "OpenSSL: no digest in use (e.g., AEAD)"); in openssl_get_keyblock_size()
4283 h = EVP_get_digestbynid(digest); in openssl_get_keyblock_size()
/third_party/skia/third_party/externals/spirv-cross/
H A Dtest_shaders.py592 return md5.digest()
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/ProfileData/
H A DGCOV.cpp696 CoveragePath += "##" + Result.digest().str().str();
/third_party/openssl/ohos_lite/include/openssl/
H A Devp.h112 /* digest can only handle a single block */
115 /* digest is extensible-output function, XOF */
151 # define EVP_MD_CTX_FLAG_ONESHOT 0x0001/* digest update will be
163 * digest in FIPS mode */
166 * The following PAD options are also currently ignored in 1.0.0, digest
966 int EVP_add_digest(const EVP_MD *digest);
1092 const EVP_MD *digest, int keylen, unsigned char *out);
1323 * Method handles all operations: don't assume any digest related defaults.
/third_party/skia/dm/
H A DDM.cpp1166 SkMD5::Digest digest = hash.finish(); in Run()
1168 md5.appendf("%02x", digest.data[i]); in Run()
/third_party/rust/crates/libc/src/
H A Dpsp.rs2813 pub fn sceKernelUtilsMd5Digest(data: *mut u8, size: u32, digest: *mut u8) -> i32; in sceKernelUtilsMd5Digest()
2820 pub fn sceKernelUtilsMd5BlockResult(ctx: *mut SceKernelUtilsMd5Context, digest: *mut u8) in sceKernelUtilsMd5BlockResult()
2822 pub fn sceKernelUtilsSha1Digest(data: *mut u8, size: u32, digest: *mut u8) -> i32; in sceKernelUtilsSha1Digest()
2831 digest: *mut u8, in sceKernelUtilsSha1BlockResult()
/third_party/openssl/test/
H A Devp_pkey_provided_test.c1706 static OSSL_PARAM *do_construct_hkdf_params(char *digest, char *key, in do_construct_hkdf_params() argument
1712 *p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST, digest, 0); in do_construct_hkdf_params()
/third_party/skia/third_party/externals/dng_sdk/source/
H A Ddng_negative.cpp497 // logic is to include these zeros in the digest. However, older in IPTCDigest()
499 // in the digest, so we support both methods and allow either to in IPTCDigest()
537 dng_fingerprint digest = IPTCDigest (); in RebuildIPTC() local
539 fXMP->SetIPTCDigest (digest); in RebuildIPTC()
1487 // writing, so always compute the digest of 8-bit data as 16-bits.
1533 // the digest, no matter the native order. Little-endian
1584 // the digest for these images.
1720 // the digest, no matter the native order. Little-endian
1791 // Find fast digest of the raw image.
1831 // Find the fast digest o
[all...]
/third_party/curl/lib/
H A Durldata.h1238 BIT(iestyle); /* TRUE if digest should be done IE-style or FALSE if it
1367 struct digestdata digest; /* state data for host Digest auth */ member
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/DebugInfo/DWARF/
H A DDWARFDebugLine.cpp141 OS << " md5_checksum: " << FileEntry.Checksum.digest() << '\n'; in dump()
/third_party/python/Modules/
H A D_ssl.c1964 const char *skcipher = NULL, *digest = NULL, *kx = NULL, *auth = NULL; in cipher_to_dict() local
1981 digest = nid != NID_undef ? OBJ_nid2ln(nid) : NULL; in cipher_to_dict()
1999 "digest", digest, in cipher_to_dict()
/third_party/node/deps/openssl/openssl/apps/
H A Dspeed.c239 {"evp", OPT_EVP, 's', "Use EVP-named cipher or digest"},
240 {"hmac", OPT_HMAC, 's', "HMAC using EVP-named digest"},
545 unsigned char digest[EVP_MAX_MD_SIZE]; in EVP_Digest_loop() local
552 if (!EVP_Digest(buf, (size_t)lengths[testnum], digest, NULL, md, in EVP_Digest_loop()
1527 "%s: %s is an unknown cipher or digest\n", in speed_main()
1536 BIO_printf(bio_err, "%s: %s is an unknown digest\n", in speed_main()
/third_party/openssl/apps/
H A Dspeed.c239 {"evp", OPT_EVP, 's', "Use EVP-named cipher or digest"},
240 {"hmac", OPT_HMAC, 's', "HMAC using EVP-named digest"},
545 unsigned char digest[EVP_MAX_MD_SIZE]; in EVP_Digest_loop() local
552 if (!EVP_Digest(buf, (size_t)lengths[testnum], digest, NULL, md, in EVP_Digest_loop()
1513 "%s: %s is an unknown cipher or digest\n", in speed_main()
1522 BIO_printf(bio_err, "%s: %s is an unknown digest\n", in speed_main()
/third_party/skia/tools/viewer/
H A DViewer.cpp2487 SkMD5::Digest digest = hash.finish(); in drawImGui()
2489 entry.fKeyString.appendf("%02x", digest.data[i]); in drawImGui()
/third_party/node/deps/undici/
H A Dundici.js1459 let actualValue = crypto.createHash(algorithm).update(bytes).digest("base64");
11828 const digest = crypto.createHash("sha1").update(keyValue + uid).digest("base64");
11829 if (secWSAccept !== digest) {

Completed in 79 milliseconds

1...<<212223