/foundation/graphic/graphic_3d/lume/Lume_3D/src/render/node/ |
H A D | render_node_default_material_deferred_shading.cpp | 355 uint64_t hash = 0; in GetPsoHandle() local 356 BASE_NS::HashCombine(hash, currentScene_.lightingFlags); in GetPsoHandle() 357 if ((!RenderHandleUtil::IsValid(allShaderData_.psoHandle)) || (hash != allShaderData_.psoHash)) { in GetPsoHandle() 359 allShaderData_.psoHash = hash; in GetPsoHandle()
|
/third_party/curl/lib/ |
H A D | hostip.c | 50 #include "hash.h" 312 dns = NULL; /* the memory deallocation is being handled by the hash */ in fetch_addr() 338 dns = NULL; /* the memory deallocation is being handled by the hash */ in fetch_addr() 1080 void Curl_init_dnscache(struct Curl_hash *hash, int size) in Curl_init_dnscache() argument 1082 Curl_hash_init(hash, size, Curl_hash_str, Curl_str_key_compare, in Curl_init_dnscache() 1094 struct Curl_hash *hash) in Curl_hostcache_clean() 1099 Curl_hash_clean(hash); in Curl_hostcache_clean() 1093 Curl_hostcache_clean(struct Curl_easy *data, struct Curl_hash *hash) Curl_hostcache_clean() argument
|
/third_party/gn/src/gn/ |
H A D | xcode_writer.cc | 353 std::string hash = base::SHA1HashString(buffer.str()); variable 354 DCHECK_EQ(hash.size() % 4, 0u); 357 const uint32_t* ptr = reinterpret_cast<const uint32_t*>(hash.data()); 358 for (size_t i = 0; i < hash.size() / 4; i++)
|
/third_party/mbedtls/3rdparty/p256-m/p256-m/ |
H A D | p256-m.c | 1287 * Import integer mod n (Montgomery domain) from hash 1324 const uint8_t *hash, size_t hlen) in p256_ecdsa_sign() 1362 /* 4. Skipped - we take the hash as an input, not the message */ in p256_ecdsa_sign() 1364 /* 5. Derive an integer from the hash */ in p256_ecdsa_sign() 1365 ecdsa_m256_from_hash(t3, hash, hlen); /* t3 = e */ in p256_ecdsa_sign() 1398 const uint8_t *hash, size_t hlen) in p256_ecdsa_verify() 1416 /* 2. Skipped - we take the hash as an input, not the message */ in p256_ecdsa_verify() 1418 /* 3. Derive an integer from the hash */ in p256_ecdsa_verify() 1420 ecdsa_m256_from_hash(e, hash, hlen); in p256_ecdsa_verify() 1323 p256_ecdsa_sign(uint8_t sig[64], const uint8_t priv[32], const uint8_t *hash, size_t hlen) p256_ecdsa_sign() argument 1397 p256_ecdsa_verify(const uint8_t sig[64], const uint8_t pub[64], const uint8_t *hash, size_t hlen) p256_ecdsa_verify() argument
|
/third_party/mesa3d/src/amd/vulkan/ |
H A D | radv_pipeline_cache.c | 132 radv_hash_shaders(unsigned char *hash, const struct radv_pipeline_stage *stages, in radv_hash_shaders() argument 151 _mesa_sha1_final(&ctx, hash); in radv_hash_shaders() 155 radv_hash_rt_shaders(unsigned char *hash, const VkRayTracingPipelineCreateInfoKHR *pCreateInfo, in radv_hash_rt_shaders() argument 205 _mesa_sha1_final(&ctx, hash); in radv_hash_rt_shaders() 229 unreachable("hash table should never be full"); in radv_pipeline_cache_search_unlocked() 305 /* Failing to grow that hash table isn't fatal, but may mean we don't in radv_pipeline_cache_add_entry()
|
/third_party/node/src/ |
H A D | inspector_socket.cc | 7 #include "openssl/sha.h" // Sha-1 hash 149 char hash[SHA_DIGEST_LENGTH]; in generate_accept_string() local 152 reinterpret_cast<unsigned char*>(hash))); in generate_accept_string() 153 node::base64_encode(hash, sizeof(hash), *buffer, sizeof(*buffer)); in generate_accept_string()
|
/third_party/ntfs-3g/include/ntfs-3g/ |
H A D | layout.h | 538 * COLLATION_NTOFS_SECURITY_HASH - Sorting is done first by ascending hash 1901 * A simple hash is computed from each security descriptor. This hash is used 1904 * The $SDH index is sorted by security descriptor hash and is stored in a B+ 1907 * matching hash is found, but the security descriptors do not match, the 1908 * search in the $SDH index is continued, searching for a next matching hash. 1933 le32 hash; /* Hash of the security descriptor. */ member 1943 le32 hash; /* Hash of the security descriptor. */ member 1972 le32 hash; /* Hash of the security descriptor. */ member 1992 * The keys are sorted first by hash an 1996 le32 hash; /* Hash of the security descriptor. */ global() member [all...] |
/third_party/rust/crates/libc/src/unix/linux_like/linux/musl/b64/ |
H A D | s390x.rs | 119 impl ::hash::Hash for fpreg_t { 120 fn hash<H: ::hash::Hasher>(&self, state: &mut H) { in hash() functions 122 d.hash(state); in hash()
|
/third_party/vk-gl-cts/executor/ |
H A D | xeTestResultParser.cpp | 80 deUint32 hash; member 223 deUint32 hash = deStringHash(name); in getEnumValue() local 227 if (entries[ndx].hash == hash && deStringEqual(entries[ndx].name, name)) in getEnumValue()
|
/third_party/skia/third_party/externals/spirv-tools/source/opt/ |
H A D | scalar_analysis.cpp | 33 // 3. Add the operand nodes as children of the first and hash the node. Use the 34 // hash to see if the node is already in the cache. We ensure the children are 36 // in a different order have the same hash and so that the overloaded operator== 551 // Helper functions to insert 32/64 bit values into the 32 bit hash string. This 584 // Concatinate the terms into a string which we can hash. in operator ()() 599 // If we're dealing with a recurrent expression hash the loop as well so that in operator ()() 606 // order of coefficient and offset matters to the hash. in operator ()() 612 return std::hash<std::u32string>{}(hash_string); in operator ()() 628 return std::hash<std::u32string>{}(hash_string); in operator ()() 637 size_t unique_id = std::hash<cons in DumpDot() [all...] |
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/opt/ |
H A D | scalar_analysis.cpp | 33 // 3. Add the operand nodes as children of the first and hash the node. Use the 34 // hash to see if the node is already in the cache. We ensure the children are 36 // in a different order have the same hash and so that the overloaded operator== 551 // Helper functions to insert 32/64 bit values into the 32 bit hash string. This 584 // Concatinate the terms into a string which we can hash. in operator ()() 599 // If we're dealing with a recurrent expression hash the loop as well so that in operator ()() 606 // order of coefficient and offset matters to the hash. in operator ()() 612 return std::hash<std::u32string>{}(hash_string); in operator ()() 628 return std::hash<std::u32string>{}(hash_string); in operator ()() 637 size_t unique_id = std::hash<cons in DumpDot() [all...] |
/third_party/rust/crates/syn/src/ |
H A D | punctuated.rs | 26 use std::hash::{Hash, Hasher}; 408 fn hash<H: Hasher>(&self, state: &mut H) { in hash() functions 410 inner.hash(state); in hash() 411 last.hash(state); in hash()
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | pkey_ctx.rs | 218 /// cryptographic hash of an arbitrary amount of data. The [`MdCtx`](crate::md_ctx::MdCtx) type can be used to do 351 /// This computes the signature of the *raw* bytes of `data`. It is more common to sign the cryptographic hash of 725 use crate::hash::{hash, MessageDigest}; 795 let digest = hash(MessageDigest::sha384(), msg).unwrap(); in rsa_sign() 817 let digest = hash(MessageDigest::sha384(), msg).unwrap(); in rsa_sign_pss()
|
/third_party/spirv-tools/source/opt/ |
H A D | scalar_analysis.cpp | 32 // 3. Add the operand nodes as children of the first and hash the node. Use the 33 // hash to see if the node is already in the cache. We ensure the children are 35 // in a different order have the same hash and so that the overloaded operator== 550 // Helper functions to insert 32/64 bit values into the 32 bit hash string. This 583 // Concatenate the terms into a string which we can hash. in operator ()() 598 // If we're dealing with a recurrent expression hash the loop as well so that in operator ()() 605 // order of coefficient and offset matters to the hash. in operator ()() 611 return std::hash<std::u32string>{}(hash_string); in operator ()() 627 return std::hash<std::u32string>{}(hash_string); in operator ()() 636 size_t unique_id = std::hash<cons in DumpDot() [all...] |
/foundation/multimedia/av_session/services/session/server/remote/ |
H A D | remote_session_syncer_impl.cpp | 59 CHECK_AND_RETURN_RET_LOG(hashCalculator.Init() == AVSESSION_SUCCESS, AVSESSION_ERROR, "hash init failed"); in Init() 61 AVSESSION_SUCCESS, AVSESSION_ERROR, "hash update failed"); in Init() 62 std::vector<uint8_t> hash; in Init() local 63 CHECK_AND_RETURN_RET_LOG(hashCalculator.GetResult(hash) == AVSESSION_SUCCESS, AVSESSION_ERROR, in Init() 64 "hash get result failed"); in Init() 67 for (const auto& byte : hash) { in Init()
|
/foundation/communication/dsoftbus/core/authentication/src/ |
H A D | auth_session_message.c | 472 uint8_t hash[UDID_HASH_LEN] = {0}; in GetLocalUdidHash() local 473 if (SoftBusGenerateStrHash((unsigned char *)udid, strlen(udid), (unsigned char *)hash) != SOFTBUS_OK) { in GetLocalUdidHash() 477 if (ConvertBytesToHexString(udidHash, len, hash, UDID_SHORT_HASH_LEN_TEMP) != SOFTBUS_OK) { in GetLocalUdidHash() 511 AUTH_LOGE(AUTH_FSM, "get local udid hash fail"); in UpdateLocalAuthState()
|
H A D | auth_device.c | 156 uint8_t hash[SHA_256_HASH_LEN] = { 0 }; in AuthAddNodeToLimitMap() local 158 if (SoftBusGenerateStrHash((uint8_t *)udid, strlen(udid), hash) != SOFTBUS_OK) { in AuthAddNodeToLimitMap() 162 if (ConvertBytesToUpperCaseHexString(udidHash, SHORT_UDID_HASH_HEX_LEN + 1, hash, UDID_SHORT_HASH_LEN_TEMP) != in AuthAddNodeToLimitMap()
|
/foundation/communication/dsoftbus/adapter/common/openssl/ |
H A D | softbus_adapter_crypto.c | 342 int32_t SoftBusGenerateStrHash(const unsigned char *str, uint32_t len, unsigned char *hash) in SoftBusGenerateStrHash() argument 344 if (str == NULL || hash == NULL || len == 0) { in SoftBusGenerateStrHash() 348 int32_t ret = EVP_Digest(str, len, hash, &olen, EVP_sha256(), NULL); in SoftBusGenerateStrHash()
|
H A D | softbus_aes_encrypt.c | 40 const EncryptKey *randomKey, const uint8_t *rootKey, uint32_t rootKeyLen, uint8_t *hash, uint32_t hashLen) in SoftBusGenerateHmacHash() 45 if (randomKey == NULL || rootKey == NULL || rootKeyLen == 0 || hash == NULL || hashLen < SHA256_MAC_LEN) { in SoftBusGenerateHmacHash() 76 COMM_LOGE(COMM_ADAPTER, "outBufLen is invalid length for hash."); in SoftBusGenerateHmacHash() 80 if (memcpy_s(hash, hashLen, tempOutputData, outBufLen) != EOK) { in SoftBusGenerateHmacHash() 81 COMM_LOGE(COMM_ADAPTER, "hash result memcpy_s failed."); in SoftBusGenerateHmacHash() 39 SoftBusGenerateHmacHash( const EncryptKey *randomKey, const uint8_t *rootKey, uint32_t rootKeyLen, uint8_t *hash, uint32_t hashLen) SoftBusGenerateHmacHash() argument
|
/third_party/libwebsockets/lib/roles/ws/ |
H A D | server-ws.c | 642 unsigned char hash[20]; in handshake_0405() local 668 lws_SHA1(pt->serv_buf, (unsigned int)n, hash); in handshake_0405() 670 accept_len = lws_b64_encode_string((char *)hash, 20, in handshake_0405() 673 lwsl_warn("Base64 encoded hash too long\n"); in handshake_0405()
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/ |
H A D | picotls.c | 128 return cs->hash; in crypto_ptls_get_md() 566 size_t secretlen = cipher->hash->digest_size; in update_traffic_key_server_cb() 611 size_t secretlen = cipher->hash->digest_size; in update_traffic_key_cb()
|
/third_party/node/deps/v8/src/flags/ |
H A D | flags.cc | 507 // causing the code cache to get invalidated by this hash. in ComputeFlagListHash() 514 // Generate a hash that is not 0. in ComputeFlagListHash() 515 uint32_t hash = static_cast<uint32_t>(base::hash_range( in ComputeFlagListHash() local 518 DCHECK_NE(hash, 0); in ComputeFlagListHash() 519 flag_hash.store(hash, std::memory_order_relaxed); in ComputeFlagListHash()
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 385 * k is the output length in bits of the hash function used with HMAC 431 * Hash a hash function; HashLen denotes the length of the 432 * hash function output in octets 475 * Hash a hash function; HashLen denotes the length of the 476 * hash function output in octets 581 * |datalen| (e.g. typically a hash of the handshake messages), derive a new 598 * prefix and label + bytes for the label itself + 1 byte length of hash in prov_tls13_hkdf_expand() 599 * + bytes for the hash itself. We've got the maximum the KDF can handle in prov_tls13_hkdf_expand() 652 unsigned char hash[EVP_MAX_MD_SIZE]; in prov_tls13_hkdf_generate_secret() local 654 /* The pre-extract derive step uses a hash o in prov_tls13_hkdf_generate_secret() [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/storemgmt/ |
H A D | file_store.c | 355 unsigned long hash; in file_set_ctx_params() local 367 hash = X509_NAME_hash_ex(x509_name, in file_set_ctx_params() 371 "%08lx", hash); in file_set_ctx_params()
|
/third_party/rust/crates/bindgen/bindgen-tests/tests/expectations/tests/libclang-9/ |
H A D | class_1_0.rs | 72 impl<T> ::std::hash::Hash for __BindgenUnionField<T> { in fmt() 73 fn hash<H: ::std::hash::Hasher>(&self, _state: &mut H) {} in fmt() functions
|