/third_party/node/lib/internal/modules/esm/ |
H A D | resolve.js | 335 const { search, hash } = resolved; 339 resolved.hash = hash;
|
/third_party/node/deps/icu-small/source/common/ |
H A D | rbbi.cpp | 393 * Compute a hash code for this BreakIterator 394 * @return A hash code 398 int32_t hash = 0; in hashCode() local 400 hash = fData->hashCode(); in hashCode() 402 return hash; in hashCode()
|
/third_party/mesa3d/src/gallium/drivers/freedreno/ |
H A D | freedreno_gmem.c | 556 uint32_t hash = gmem_key_hash(key); in lookup_gmem_state() local 559 _mesa_hash_table_search_pre_hashed(cache->ht, hash, key); in lookup_gmem_state() 574 entry = _mesa_hash_table_insert_pre_hashed(cache->ht, hash, key, in lookup_gmem_state()
|
/third_party/mesa3d/src/gallium/drivers/d3d12/ |
H A D | d3d12_gs_variant.cpp | 510 uint32_t hash = hash_gs_variant_key(key); in d3d12_get_gs_variant() local 512 hash, key); in d3d12_get_gs_variant() 516 hash, &gs->gs_key, gs); in d3d12_get_gs_variant()
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | x_all.c | 470 /* calculate cert digest using the same hash algorithm as in its signature */ 475 unsigned char hash[EVP_MAX_MD_SIZE]; in X509_digest_sig() local 546 if (!X509_digest(cert, md, hash, &len) in X509_digest_sig() 549 if (ASN1_OCTET_STRING_set(new, hash, len)) { in X509_digest_sig()
|
/third_party/python/Lib/ |
H A D | functools.py | 433 """ This class guarantees that hash() will be called no more than once 434 per element. This is important because the lru_cache() will hash 441 def __init__(self, tup, hash=hash): 443 self.hashvalue = hash(tup) 458 its hash value, then that argument is returned without a wrapper. This
|
H A D | datetime.py | 872 self._hashcode = hash(self._getstate()) 1138 self._hashcode = hash(self._getstate()) 1480 self._hashcode = hash(t._getstate()[0]) 1487 self._hashcode = hash(time(h, m, self.second, self.microsecond)) 1489 self._hashcode = hash((h, m, self.second, self.microsecond)) 2234 self._hashcode = hash(t._getstate()[0]) 2238 self._hashcode = hash(timedelta(days, seconds, self.microsecond) - tzoff) 2336 return hash(self._offset)
|
/third_party/openssl/crypto/x509/ |
H A D | x_all.c | 470 /* calculate cert digest using the same hash algorithm as in its signature */ 475 unsigned char hash[EVP_MAX_MD_SIZE]; in X509_digest_sig() local 546 if (!X509_digest(cert, md, hash, &len) in X509_digest_sig() 549 if (ASN1_OCTET_STRING_set(new, hash, len)) { in X509_digest_sig()
|
/third_party/skia/third_party/externals/freetype/src/sfnt/ |
H A D | sfdriver.c | 1003 /* a checksum; we use MurmurHash 3 with a hash length of 128 bit */ in sfnt_get_var_ps_name() 1007 FT_UInt32 hash[4]; in sfnt_get_var_ps_name() local 1011 murmur_hash_3_128( result, p - result, seed, hash ); in sfnt_get_var_ps_name() 1016 /* we convert the hash value to hex digits from back to front */ in sfnt_get_var_ps_name() 1018 h = hash + 3; in sfnt_get_var_ps_name()
|
/third_party/skia/third_party/externals/icu/source/common/ |
H A D | rbbi.cpp | 409 * Compute a hash code for this BreakIterator 410 * @return A hash code 414 int32_t hash = 0; in hashCode() local 416 hash = fData->hashCode(); in hashCode() 418 return hash; in hashCode()
|
/third_party/rust/crates/proc-macro2/src/ |
H A D | lib.rs | 166 use core::hash::{Hash, Hasher}; 1021 fn hash<H: Hasher>(&self, hasher: &mut H) { in hash() functions 1022 self.to_string().hash(hasher); in hash()
|
/third_party/mbedtls/library/ |
H A D | ssl_tls12_client.c | 2294 unsigned char hash[MBEDTLS_MD_MAX_SIZE]; in ssl_parse_server_key_exchange() local 2372 * Compute the hash that has been signed in ssl_parse_server_key_exchange() 2375 ret = mbedtls_ssl_get_key_exchange_md_tls1_2(ssl, hash, &hashlen, in ssl_parse_server_key_exchange() 2386 MBEDTLS_SSL_DEBUG_BUF(3, "parameters hash", hash, hashlen); in ssl_parse_server_key_exchange() 2418 md_alg, hash, hashlen, in ssl_parse_server_key_exchange() 2423 md_alg, hash, hashlen, p, sig_len, rs_ctx); in ssl_parse_server_key_exchange() 2548 * Same goes for the hash in TLS 1.2's signature_algorithms: at this in ssl_parse_certificate_request() 2549 * point we only have one hash available (see comments in in ssl_parse_certificate_request() 3244 unsigned char hash[4 in ssl_write_certificate_verify() local [all...] |
/third_party/lwip/src/netif/ppp/ |
H A D | eap.c | 821 /* Obscure the pseudonym with SHA1 hash */ in eap_send_request() 1048 static void eap_chap_response(ppp_pcb *pcb, u_char id, u_char *hash, const char *name, int namelen) { in eap_chap_response() argument 1073 MEMCPY(outp, hash, MD5_SIGNATURE_SIZE); in eap_chap_response() 1318 u_char hash[MD5_SIGNATURE_SIZE]; in eap_request() local 1453 lwip_md5_finish(&mdContext, hash); in eap_request() 1455 eap_chap_response(pcb, id, hash, pcb->eap.es_client.ea_name, in eap_request() 1732 u_char hash[MD5_SIGNATURE_SIZE]; in eap_response() local 1880 lwip_md5_finish(&mdContext, hash); in eap_response() 1882 if (BCMP(hash, inp, MD5_SIGNATURE_SIZE) != 0) { in eap_response()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1361 * ciphersuite as long as the hash is the same. in set_client_ciphersuite() 1765 * need to create the synthetic message hash, we defer that step until now in tls_process_as_hello_retry_request() 1938 /* Save the current hash state for when we receive the CertificateVerify */ in tls_post_process_server_certificate() 2575 * elsewhere in OpenSSL. The session ID is set to the SHA256 hash of the in tls_process_new_session_ticket() 3143 EVP_MD_CTX * hash = NULL; in ossl_gost_ukm() local 3150 if ((hash = EVP_MD_CTX_new()) == NULL in ossl_gost_ukm() 3151 || EVP_DigestInit(hash, md) <= 0 in ossl_gost_ukm() 3152 || EVP_DigestUpdate(hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm() 3153 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm() 3154 || EVP_DigestFinal_ex(hash, dgst_bu in ossl_gost_ukm() [all...] |
/third_party/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1353 * ciphersuite as long as the hash is the same. in set_client_ciphersuite() 1757 * need to create the synthetic message hash, we defer that step until now in tls_process_as_hello_retry_request() 1930 /* Save the current hash state for when we receive the CertificateVerify */ in tls_post_process_server_certificate() 2567 * elsewhere in OpenSSL. The session ID is set to the SHA256 hash of the in tls_process_new_session_ticket() 3135 EVP_MD_CTX * hash = NULL; in ossl_gost_ukm() local 3142 if ((hash = EVP_MD_CTX_new()) == NULL in ossl_gost_ukm() 3143 || EVP_DigestInit(hash, md) <= 0 in ossl_gost_ukm() 3144 || EVP_DigestUpdate(hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm() 3145 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm() 3146 || EVP_DigestFinal_ex(hash, dgst_bu in ossl_gost_ukm() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | wps_supplicant.c | 1213 char hash[2 * WPS_OOB_PUBKEY_HASH_LEN + 10]; in wpas_wps_start_dev_pw() local 1247 os_memcpy(hash, " pkhash=", 8); in wpas_wps_start_dev_pw() 1248 wpa_snprintf_hex_uppercase(hash + 8, sizeof(hash) - 8, in wpas_wps_start_dev_pw() 1252 hash[0] = '\0'; in wpas_wps_start_dev_pw() 1273 pin, dev_pw_id, hash); in wpas_wps_start_dev_pw() 1276 dev_pw_id, hash); in wpas_wps_start_dev_pw() 1283 rpin, dev_pw_id, hash); in wpas_wps_start_dev_pw() 2706 wpa_hexdump(MSG_DEBUG, "WPS: AP Public Key hash", in wpas_wps_nfc_rx_handover_sel() 2744 * so use the request message here to find Enrollee public key hash in wpas_er_wps_nfc_report_handover() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | sae.c | 1146 u8 salt[64], hash[64]; in sae_derive_pwe_from_pt_ecc() local 1167 if (hkdf_extract(hash_len, salt, hash_len, 2, addr, len, hash) < 0) in sae_derive_pwe_from_pt_ecc() 1169 wpa_hexdump(MSG_DEBUG, "SAE: val", hash, hash_len); in sae_derive_pwe_from_pt_ecc() 1174 val = crypto_bignum_init_set(hash, hash_len); in sae_derive_pwe_from_pt_ecc() 1210 u8 salt[64], hash[64]; in sae_derive_pwe_from_pt_ffc() local 1229 if (hkdf_extract(hash_len, salt, hash_len, 2, addr, len, hash) < 0) in sae_derive_pwe_from_pt_ffc() 1231 wpa_hexdump(MSG_DEBUG, "SAE: val", hash, hash_len); in sae_derive_pwe_from_pt_ffc() 1235 val = crypto_bignum_init_set(hash, hash_len); in sae_derive_pwe_from_pt_ffc() 2442 /* 2 bytes are for send-confirm, then the hash, followed by IEs */ in sae_check_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | wps_supplicant.c | 1241 char hash[2 * WPS_OOB_PUBKEY_HASH_LEN + 10]; in wpas_wps_start_dev_pw() local 1275 os_memcpy(hash, " pkhash=", 8); in wpas_wps_start_dev_pw() 1276 wpa_snprintf_hex_uppercase(hash + 8, sizeof(hash) - 8, in wpas_wps_start_dev_pw() 1280 hash[0] = '\0'; in wpas_wps_start_dev_pw() 1306 pin, dev_pw_id, hash); in wpas_wps_start_dev_pw() 1309 dev_pw_id, hash); in wpas_wps_start_dev_pw() 1316 rpin, dev_pw_id, hash); in wpas_wps_start_dev_pw() 2775 wpa_hexdump(MSG_DEBUG, "WPS: AP Public Key hash", in wpas_wps_nfc_rx_handover_sel() 2813 * so use the request message here to find Enrollee public key hash in wpas_er_wps_nfc_report_handover() [all...] |
/third_party/vk-gl-cts/external/vulkancts/modules/vulkan/binding_model/ |
H A D | vktBindingDescriptorBufferTests.cpp | 280 deUint32 hash; // a value used to "salt" results in memory to get unique values per test case member 370 // Update the hash field. Must be called after changing the value of any other parameters. 373 hash = deUint32Hash(basehash); in updateHash() 375 hash = isAccelerationStructure() ? (basehash & HASH_MASK_FOR_AS) : basehash; in updateHash() 706 deUint32 getExpectedData(deUint32 hash, deUint32 set, deUint32 binding, deUint32 arrayIndex = 0) 708 return hash ^ packBindingArgs(set, binding, arrayIndex); 979 const auto expectedData = glslFormat(isNullDescriptor ? 0 : getExpectedData(params.hash, sb.set, sb.binding, sb.inputAttachmentIndex + arrayIndex)); 1156 const auto expectedData = glslFormat(getExpectedData(params.hash, imageBinding.set, imageBinding.binding, 0)); 1199 const auto expectedData = glslFormat(getExpectedData(params.hash, imageBinding.set, imageBinding.binding, 0)); 1250 , m_rng(params.hash) [all...] |
/third_party/vk-gl-cts/external/vulkancts/modules_no_buildgn/vulkan/binding_model/ |
H A D | vktBindingDescriptorBufferTests.cpp | 280 deUint32 hash; // a value used to "salt" results in memory to get unique values per test case member 369 // Update the hash field. Must be called after changing the value of any other parameters. 372 hash = deUint32Hash(basehash); in updateHash() 374 hash = isAccelerationStructure() ? (basehash & HASH_MASK_FOR_AS) : basehash; in updateHash() 705 deUint32 getExpectedData(deUint32 hash, deUint32 set, deUint32 binding, deUint32 arrayIndex = 0) 707 return hash ^ packBindingArgs(set, binding, arrayIndex); 978 const auto expectedData = glslFormat(isNullDescriptor ? 0 : getExpectedData(params.hash, sb.set, sb.binding, sb.inputAttachmentIndex + arrayIndex)); 1155 const auto expectedData = glslFormat(getExpectedData(params.hash, imageBinding.set, imageBinding.binding, 0)); 1198 const auto expectedData = glslFormat(getExpectedData(params.hash, imageBinding.set, imageBinding.binding, 0)); 1250 , m_rng(params.hash) [all...] |
/foundation/graphic/graphic_3d/lume/Lume_3D/src/ecs/components/ |
H A D | material_component_manager.cpp | 21 #include <base/util/hash.h> 96 return (lhs.type == rhs.type) && (lhs.hash == rhs.hash) && (lhs.name == rhs.name); 206 newProperty.hash = BASE_NS::FNV1aHash(newProperty.name.data(), newProperty.name.size()); in AppendProperties()
|
/foundation/distributeddatamgr/datamgr_service/services/distributeddataservice/service/test/ |
H A D | object_manager_test.cpp | 65 .hash = "modifyTime_size", in SetUp() 76 .hash = "modifyTime_size", in SetUp() 791 EXPECT_EQ(assets[0].hash, "test_test"); in HWTEST_F() 804 EXPECT_EQ(assets[0].hash, "(string)test_(string)test"); in HWTEST_F()
|
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/test/unittest/common/syncer/cloud/ |
H A D | distributeddb_cloud_syncer_lock_test.cpp | 67 .hash = "ASE"}; 800 asset.hash = "new_hash"; in HWTEST_F() 805 b2.hash = "new_hash"; in HWTEST_F() 1001 asset.hash = "new_hash"; in HWTEST_F()
|
/test/xts/device_attest/services/core/network/ |
H A D | attest_network.c | 134 unsigned char hash[HTTPS_NETWORK_SHA256_LEN]; in Sha256Udid() local 143 SHA256_Final(hash, &sha256); in Sha256Udid() 152 (uint32_t)(HTTPS_NETWORK_SHA256_LEN - curLen) - 1, "%02x", hash[i]); in Sha256Udid() 154 (void)memset_s(hash, HTTPS_NETWORK_SHA256_LEN, 0, HTTPS_NETWORK_SHA256_LEN); in Sha256Udid()
|
/third_party/googletest/googletest/scripts/ |
H A D | upload.py | 1005 # Map of filename -> hash of base file. 1027 # We want to save the left hash, as that identifies the base file. 1042 hash = self.base_hashes[filename] 1046 if hash == "0" * 40: # All-zero hash indicates no base file. 1051 base_content, returncode = RunShellWithReturnCode(["git", "show", hash]) 1053 ErrorExit("Got error status from 'git show %s'" % hash) 1339 # Send a hash of all the base file so the server can determine if a copy
|