Home
last modified time | relevance | path

Searched refs:hash (Results 1251 - 1275 of 2212) sorted by relevance

1...<<51525354555657585960>>...89

/foundation/graphic/graphic_3d/lume/Lume_3D/src/render/node/
H A Drender_node_default_material_deferred_shading.cpp355 uint64_t hash = 0; in GetPsoHandle() local
356 BASE_NS::HashCombine(hash, currentScene_.lightingFlags); in GetPsoHandle()
357 if ((!RenderHandleUtil::IsValid(allShaderData_.psoHandle)) || (hash != allShaderData_.psoHash)) { in GetPsoHandle()
359 allShaderData_.psoHash = hash; in GetPsoHandle()
/third_party/curl/lib/
H A Dhostip.c50 #include "hash.h"
312 dns = NULL; /* the memory deallocation is being handled by the hash */ in fetch_addr()
338 dns = NULL; /* the memory deallocation is being handled by the hash */ in fetch_addr()
1080 void Curl_init_dnscache(struct Curl_hash *hash, int size) in Curl_init_dnscache() argument
1082 Curl_hash_init(hash, size, Curl_hash_str, Curl_str_key_compare, in Curl_init_dnscache()
1094 struct Curl_hash *hash) in Curl_hostcache_clean()
1099 Curl_hash_clean(hash); in Curl_hostcache_clean()
1093 Curl_hostcache_clean(struct Curl_easy *data, struct Curl_hash *hash) Curl_hostcache_clean() argument
/third_party/gn/src/gn/
H A Dxcode_writer.cc353 std::string hash = base::SHA1HashString(buffer.str()); variable
354 DCHECK_EQ(hash.size() % 4, 0u);
357 const uint32_t* ptr = reinterpret_cast<const uint32_t*>(hash.data());
358 for (size_t i = 0; i < hash.size() / 4; i++)
/third_party/mbedtls/3rdparty/p256-m/p256-m/
H A Dp256-m.c1287 * Import integer mod n (Montgomery domain) from hash
1324 const uint8_t *hash, size_t hlen) in p256_ecdsa_sign()
1362 /* 4. Skipped - we take the hash as an input, not the message */ in p256_ecdsa_sign()
1364 /* 5. Derive an integer from the hash */ in p256_ecdsa_sign()
1365 ecdsa_m256_from_hash(t3, hash, hlen); /* t3 = e */ in p256_ecdsa_sign()
1398 const uint8_t *hash, size_t hlen) in p256_ecdsa_verify()
1416 /* 2. Skipped - we take the hash as an input, not the message */ in p256_ecdsa_verify()
1418 /* 3. Derive an integer from the hash */ in p256_ecdsa_verify()
1420 ecdsa_m256_from_hash(e, hash, hlen); in p256_ecdsa_verify()
1323 p256_ecdsa_sign(uint8_t sig[64], const uint8_t priv[32], const uint8_t *hash, size_t hlen) p256_ecdsa_sign() argument
1397 p256_ecdsa_verify(const uint8_t sig[64], const uint8_t pub[64], const uint8_t *hash, size_t hlen) p256_ecdsa_verify() argument
/third_party/mesa3d/src/amd/vulkan/
H A Dradv_pipeline_cache.c132 radv_hash_shaders(unsigned char *hash, const struct radv_pipeline_stage *stages, in radv_hash_shaders() argument
151 _mesa_sha1_final(&ctx, hash); in radv_hash_shaders()
155 radv_hash_rt_shaders(unsigned char *hash, const VkRayTracingPipelineCreateInfoKHR *pCreateInfo, in radv_hash_rt_shaders() argument
205 _mesa_sha1_final(&ctx, hash); in radv_hash_rt_shaders()
229 unreachable("hash table should never be full"); in radv_pipeline_cache_search_unlocked()
305 /* Failing to grow that hash table isn't fatal, but may mean we don't in radv_pipeline_cache_add_entry()
/third_party/node/src/
H A Dinspector_socket.cc7 #include "openssl/sha.h" // Sha-1 hash
149 char hash[SHA_DIGEST_LENGTH]; in generate_accept_string() local
152 reinterpret_cast<unsigned char*>(hash))); in generate_accept_string()
153 node::base64_encode(hash, sizeof(hash), *buffer, sizeof(*buffer)); in generate_accept_string()
/third_party/ntfs-3g/include/ntfs-3g/
H A Dlayout.h538 * COLLATION_NTOFS_SECURITY_HASH - Sorting is done first by ascending hash
1901 * A simple hash is computed from each security descriptor. This hash is used
1904 * The $SDH index is sorted by security descriptor hash and is stored in a B+
1907 * matching hash is found, but the security descriptors do not match, the
1908 * search in the $SDH index is continued, searching for a next matching hash.
1933 le32 hash; /* Hash of the security descriptor. */ member
1943 le32 hash; /* Hash of the security descriptor. */ member
1972 le32 hash; /* Hash of the security descriptor. */ member
1992 * The keys are sorted first by hash an
1996 le32 hash; /* Hash of the security descriptor. */ global() member
[all...]
/third_party/rust/crates/libc/src/unix/linux_like/linux/musl/b64/
H A Ds390x.rs119 impl ::hash::Hash for fpreg_t {
120 fn hash<H: ::hash::Hasher>(&self, state: &mut H) { in hash() functions
122 d.hash(state); in hash()
/third_party/vk-gl-cts/executor/
H A DxeTestResultParser.cpp80 deUint32 hash; member
223 deUint32 hash = deStringHash(name); in getEnumValue() local
227 if (entries[ndx].hash == hash && deStringEqual(entries[ndx].name, name)) in getEnumValue()
/third_party/skia/third_party/externals/spirv-tools/source/opt/
H A Dscalar_analysis.cpp33 // 3. Add the operand nodes as children of the first and hash the node. Use the
34 // hash to see if the node is already in the cache. We ensure the children are
36 // in a different order have the same hash and so that the overloaded operator==
551 // Helper functions to insert 32/64 bit values into the 32 bit hash string. This
584 // Concatinate the terms into a string which we can hash. in operator ()()
599 // If we're dealing with a recurrent expression hash the loop as well so that in operator ()()
606 // order of coefficient and offset matters to the hash. in operator ()()
612 return std::hash<std::u32string>{}(hash_string); in operator ()()
628 return std::hash<std::u32string>{}(hash_string); in operator ()()
637 size_t unique_id = std::hash<cons in DumpDot()
[all...]
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/opt/
H A Dscalar_analysis.cpp33 // 3. Add the operand nodes as children of the first and hash the node. Use the
34 // hash to see if the node is already in the cache. We ensure the children are
36 // in a different order have the same hash and so that the overloaded operator==
551 // Helper functions to insert 32/64 bit values into the 32 bit hash string. This
584 // Concatinate the terms into a string which we can hash. in operator ()()
599 // If we're dealing with a recurrent expression hash the loop as well so that in operator ()()
606 // order of coefficient and offset matters to the hash. in operator ()()
612 return std::hash<std::u32string>{}(hash_string); in operator ()()
628 return std::hash<std::u32string>{}(hash_string); in operator ()()
637 size_t unique_id = std::hash<cons in DumpDot()
[all...]
/third_party/rust/crates/syn/src/
H A Dpunctuated.rs26 use std::hash::{Hash, Hasher};
408 fn hash<H: Hasher>(&self, state: &mut H) { in hash() functions
410 inner.hash(state); in hash()
411 last.hash(state); in hash()
/third_party/rust/crates/rust-openssl/openssl/src/
H A Dpkey_ctx.rs218 /// cryptographic hash of an arbitrary amount of data. The [`MdCtx`](crate::md_ctx::MdCtx) type can be used to do
351 /// This computes the signature of the *raw* bytes of `data`. It is more common to sign the cryptographic hash of
725 use crate::hash::{hash, MessageDigest};
795 let digest = hash(MessageDigest::sha384(), msg).unwrap(); in rsa_sign()
817 let digest = hash(MessageDigest::sha384(), msg).unwrap(); in rsa_sign_pss()
/third_party/spirv-tools/source/opt/
H A Dscalar_analysis.cpp32 // 3. Add the operand nodes as children of the first and hash the node. Use the
33 // hash to see if the node is already in the cache. We ensure the children are
35 // in a different order have the same hash and so that the overloaded operator==
550 // Helper functions to insert 32/64 bit values into the 32 bit hash string. This
583 // Concatenate the terms into a string which we can hash. in operator ()()
598 // If we're dealing with a recurrent expression hash the loop as well so that in operator ()()
605 // order of coefficient and offset matters to the hash. in operator ()()
611 return std::hash<std::u32string>{}(hash_string); in operator ()()
627 return std::hash<std::u32string>{}(hash_string); in operator ()()
636 size_t unique_id = std::hash<cons in DumpDot()
[all...]
/foundation/multimedia/av_session/services/session/server/remote/
H A Dremote_session_syncer_impl.cpp59 CHECK_AND_RETURN_RET_LOG(hashCalculator.Init() == AVSESSION_SUCCESS, AVSESSION_ERROR, "hash init failed"); in Init()
61 AVSESSION_SUCCESS, AVSESSION_ERROR, "hash update failed"); in Init()
62 std::vector<uint8_t> hash; in Init() local
63 CHECK_AND_RETURN_RET_LOG(hashCalculator.GetResult(hash) == AVSESSION_SUCCESS, AVSESSION_ERROR, in Init()
64 "hash get result failed"); in Init()
67 for (const auto& byte : hash) { in Init()
/foundation/communication/dsoftbus/core/authentication/src/
H A Dauth_session_message.c472 uint8_t hash[UDID_HASH_LEN] = {0}; in GetLocalUdidHash() local
473 if (SoftBusGenerateStrHash((unsigned char *)udid, strlen(udid), (unsigned char *)hash) != SOFTBUS_OK) { in GetLocalUdidHash()
477 if (ConvertBytesToHexString(udidHash, len, hash, UDID_SHORT_HASH_LEN_TEMP) != SOFTBUS_OK) { in GetLocalUdidHash()
511 AUTH_LOGE(AUTH_FSM, "get local udid hash fail"); in UpdateLocalAuthState()
H A Dauth_device.c156 uint8_t hash[SHA_256_HASH_LEN] = { 0 }; in AuthAddNodeToLimitMap() local
158 if (SoftBusGenerateStrHash((uint8_t *)udid, strlen(udid), hash) != SOFTBUS_OK) { in AuthAddNodeToLimitMap()
162 if (ConvertBytesToUpperCaseHexString(udidHash, SHORT_UDID_HASH_HEX_LEN + 1, hash, UDID_SHORT_HASH_LEN_TEMP) != in AuthAddNodeToLimitMap()
/foundation/communication/dsoftbus/adapter/common/openssl/
H A Dsoftbus_adapter_crypto.c342 int32_t SoftBusGenerateStrHash(const unsigned char *str, uint32_t len, unsigned char *hash) in SoftBusGenerateStrHash() argument
344 if (str == NULL || hash == NULL || len == 0) { in SoftBusGenerateStrHash()
348 int32_t ret = EVP_Digest(str, len, hash, &olen, EVP_sha256(), NULL); in SoftBusGenerateStrHash()
H A Dsoftbus_aes_encrypt.c40 const EncryptKey *randomKey, const uint8_t *rootKey, uint32_t rootKeyLen, uint8_t *hash, uint32_t hashLen) in SoftBusGenerateHmacHash()
45 if (randomKey == NULL || rootKey == NULL || rootKeyLen == 0 || hash == NULL || hashLen < SHA256_MAC_LEN) { in SoftBusGenerateHmacHash()
76 COMM_LOGE(COMM_ADAPTER, "outBufLen is invalid length for hash."); in SoftBusGenerateHmacHash()
80 if (memcpy_s(hash, hashLen, tempOutputData, outBufLen) != EOK) { in SoftBusGenerateHmacHash()
81 COMM_LOGE(COMM_ADAPTER, "hash result memcpy_s failed."); in SoftBusGenerateHmacHash()
39 SoftBusGenerateHmacHash( const EncryptKey *randomKey, const uint8_t *rootKey, uint32_t rootKeyLen, uint8_t *hash, uint32_t hashLen) SoftBusGenerateHmacHash() argument
/third_party/libwebsockets/lib/roles/ws/
H A Dserver-ws.c642 unsigned char hash[20]; in handshake_0405() local
668 lws_SHA1(pt->serv_buf, (unsigned int)n, hash); in handshake_0405()
670 accept_len = lws_b64_encode_string((char *)hash, 20, in handshake_0405()
673 lwsl_warn("Base64 encoded hash too long\n"); in handshake_0405()
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/
H A Dpicotls.c128 return cs->hash; in crypto_ptls_get_md()
566 size_t secretlen = cipher->hash->digest_size; in update_traffic_key_server_cb()
611 size_t secretlen = cipher->hash->digest_size; in update_traffic_key_cb()
/third_party/node/deps/v8/src/flags/
H A Dflags.cc507 // causing the code cache to get invalidated by this hash. in ComputeFlagListHash()
514 // Generate a hash that is not 0. in ComputeFlagListHash()
515 uint32_t hash = static_cast<uint32_t>(base::hash_range( in ComputeFlagListHash() local
518 DCHECK_NE(hash, 0); in ComputeFlagListHash()
519 flag_hash.store(hash, std::memory_order_relaxed); in ComputeFlagListHash()
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
H A Dhkdf.c385 * k is the output length in bits of the hash function used with HMAC
431 * Hash a hash function; HashLen denotes the length of the
432 * hash function output in octets
475 * Hash a hash function; HashLen denotes the length of the
476 * hash function output in octets
581 * |datalen| (e.g. typically a hash of the handshake messages), derive a new
598 * prefix and label + bytes for the label itself + 1 byte length of hash in prov_tls13_hkdf_expand()
599 * + bytes for the hash itself. We've got the maximum the KDF can handle in prov_tls13_hkdf_expand()
652 unsigned char hash[EVP_MAX_MD_SIZE]; in prov_tls13_hkdf_generate_secret() local
654 /* The pre-extract derive step uses a hash o in prov_tls13_hkdf_generate_secret()
[all...]
/third_party/node/deps/openssl/openssl/providers/implementations/storemgmt/
H A Dfile_store.c355 unsigned long hash; in file_set_ctx_params() local
367 hash = X509_NAME_hash_ex(x509_name, in file_set_ctx_params()
371 "%08lx", hash); in file_set_ctx_params()
/third_party/rust/crates/bindgen/bindgen-tests/tests/expectations/tests/libclang-9/
H A Dclass_1_0.rs72 impl<T> ::std::hash::Hash for __BindgenUnionField<T> { in fmt()
73 fn hash<H: ::std::hash::Hasher>(&self, _state: &mut H) {} in fmt() functions

Completed in 37 milliseconds

1...<<51525354555657585960>>...89