Home
last modified time | relevance | path

Searched refs:hash (Results 1401 - 1425 of 2011) sorted by relevance

1...<<51525354555657585960>>...81

/third_party/node/lib/internal/modules/esm/
H A Dresolve.js335 const { search, hash } = resolved;
339 resolved.hash = hash;
/third_party/node/deps/icu-small/source/common/
H A Drbbi.cpp393 * Compute a hash code for this BreakIterator
394 * @return A hash code
398 int32_t hash = 0; in hashCode() local
400 hash = fData->hashCode(); in hashCode()
402 return hash; in hashCode()
/third_party/mesa3d/src/gallium/drivers/freedreno/
H A Dfreedreno_gmem.c556 uint32_t hash = gmem_key_hash(key); in lookup_gmem_state() local
559 _mesa_hash_table_search_pre_hashed(cache->ht, hash, key); in lookup_gmem_state()
574 entry = _mesa_hash_table_insert_pre_hashed(cache->ht, hash, key, in lookup_gmem_state()
/third_party/mesa3d/src/gallium/drivers/d3d12/
H A Dd3d12_gs_variant.cpp510 uint32_t hash = hash_gs_variant_key(key); in d3d12_get_gs_variant() local
512 hash, key); in d3d12_get_gs_variant()
516 hash, &gs->gs_key, gs); in d3d12_get_gs_variant()
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx_all.c470 /* calculate cert digest using the same hash algorithm as in its signature */
475 unsigned char hash[EVP_MAX_MD_SIZE]; in X509_digest_sig() local
546 if (!X509_digest(cert, md, hash, &len) in X509_digest_sig()
549 if (ASN1_OCTET_STRING_set(new, hash, len)) { in X509_digest_sig()
/third_party/python/Lib/
H A Dfunctools.py433 """ This class guarantees that hash() will be called no more than once
434 per element. This is important because the lru_cache() will hash
441 def __init__(self, tup, hash=hash):
443 self.hashvalue = hash(tup)
458 its hash value, then that argument is returned without a wrapper. This
H A Ddatetime.py872 self._hashcode = hash(self._getstate())
1138 self._hashcode = hash(self._getstate())
1480 self._hashcode = hash(t._getstate()[0])
1487 self._hashcode = hash(time(h, m, self.second, self.microsecond))
1489 self._hashcode = hash((h, m, self.second, self.microsecond))
2234 self._hashcode = hash(t._getstate()[0])
2238 self._hashcode = hash(timedelta(days, seconds, self.microsecond) - tzoff)
2336 return hash(self._offset)
/third_party/openssl/crypto/x509/
H A Dx_all.c470 /* calculate cert digest using the same hash algorithm as in its signature */
475 unsigned char hash[EVP_MAX_MD_SIZE]; in X509_digest_sig() local
546 if (!X509_digest(cert, md, hash, &len) in X509_digest_sig()
549 if (ASN1_OCTET_STRING_set(new, hash, len)) { in X509_digest_sig()
/third_party/skia/third_party/externals/freetype/src/sfnt/
H A Dsfdriver.c1003 /* a checksum; we use MurmurHash 3 with a hash length of 128 bit */ in sfnt_get_var_ps_name()
1007 FT_UInt32 hash[4]; in sfnt_get_var_ps_name() local
1011 murmur_hash_3_128( result, p - result, seed, hash ); in sfnt_get_var_ps_name()
1016 /* we convert the hash value to hex digits from back to front */ in sfnt_get_var_ps_name()
1018 h = hash + 3; in sfnt_get_var_ps_name()
/third_party/skia/third_party/externals/icu/source/common/
H A Drbbi.cpp409 * Compute a hash code for this BreakIterator
410 * @return A hash code
414 int32_t hash = 0; in hashCode() local
416 hash = fData->hashCode(); in hashCode()
418 return hash; in hashCode()
/third_party/rust/crates/proc-macro2/src/
H A Dlib.rs166 use core::hash::{Hash, Hasher};
1021 fn hash<H: Hasher>(&self, hasher: &mut H) { in hash() functions
1022 self.to_string().hash(hasher); in hash()
/third_party/mbedtls/library/
H A Dssl_tls12_client.c2294 unsigned char hash[MBEDTLS_MD_MAX_SIZE]; in ssl_parse_server_key_exchange() local
2372 * Compute the hash that has been signed in ssl_parse_server_key_exchange()
2375 ret = mbedtls_ssl_get_key_exchange_md_tls1_2(ssl, hash, &hashlen, in ssl_parse_server_key_exchange()
2386 MBEDTLS_SSL_DEBUG_BUF(3, "parameters hash", hash, hashlen); in ssl_parse_server_key_exchange()
2418 md_alg, hash, hashlen, in ssl_parse_server_key_exchange()
2423 md_alg, hash, hashlen, p, sig_len, rs_ctx); in ssl_parse_server_key_exchange()
2548 * Same goes for the hash in TLS 1.2's signature_algorithms: at this in ssl_parse_certificate_request()
2549 * point we only have one hash available (see comments in in ssl_parse_certificate_request()
3244 unsigned char hash[4 in ssl_write_certificate_verify() local
[all...]
/third_party/lwip/src/netif/ppp/
H A Deap.c821 /* Obscure the pseudonym with SHA1 hash */ in eap_send_request()
1048 static void eap_chap_response(ppp_pcb *pcb, u_char id, u_char *hash, const char *name, int namelen) { in eap_chap_response() argument
1073 MEMCPY(outp, hash, MD5_SIGNATURE_SIZE); in eap_chap_response()
1318 u_char hash[MD5_SIGNATURE_SIZE]; in eap_request() local
1453 lwip_md5_finish(&mdContext, hash); in eap_request()
1455 eap_chap_response(pcb, id, hash, pcb->eap.es_client.ea_name, in eap_request()
1732 u_char hash[MD5_SIGNATURE_SIZE]; in eap_response() local
1880 lwip_md5_finish(&mdContext, hash); in eap_response()
1882 if (BCMP(hash, inp, MD5_SIGNATURE_SIZE) != 0) { in eap_response()
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dstatem_clnt.c1361 * ciphersuite as long as the hash is the same. in set_client_ciphersuite()
1765 * need to create the synthetic message hash, we defer that step until now in tls_process_as_hello_retry_request()
1938 /* Save the current hash state for when we receive the CertificateVerify */ in tls_post_process_server_certificate()
2575 * elsewhere in OpenSSL. The session ID is set to the SHA256 hash of the in tls_process_new_session_ticket()
3143 EVP_MD_CTX * hash = NULL; in ossl_gost_ukm() local
3150 if ((hash = EVP_MD_CTX_new()) == NULL in ossl_gost_ukm()
3151 || EVP_DigestInit(hash, md) <= 0 in ossl_gost_ukm()
3152 || EVP_DigestUpdate(hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
3153 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
3154 || EVP_DigestFinal_ex(hash, dgst_bu in ossl_gost_ukm()
[all...]
/third_party/openssl/ssl/statem/
H A Dstatem_clnt.c1353 * ciphersuite as long as the hash is the same. in set_client_ciphersuite()
1757 * need to create the synthetic message hash, we defer that step until now in tls_process_as_hello_retry_request()
1930 /* Save the current hash state for when we receive the CertificateVerify */ in tls_post_process_server_certificate()
2567 * elsewhere in OpenSSL. The session ID is set to the SHA256 hash of the in tls_process_new_session_ticket()
3135 EVP_MD_CTX * hash = NULL; in ossl_gost_ukm() local
3142 if ((hash = EVP_MD_CTX_new()) == NULL in ossl_gost_ukm()
3143 || EVP_DigestInit(hash, md) <= 0 in ossl_gost_ukm()
3144 || EVP_DigestUpdate(hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
3145 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 in ossl_gost_ukm()
3146 || EVP_DigestFinal_ex(hash, dgst_bu in ossl_gost_ukm()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dwps_supplicant.c1213 char hash[2 * WPS_OOB_PUBKEY_HASH_LEN + 10]; in wpas_wps_start_dev_pw() local
1247 os_memcpy(hash, " pkhash=", 8); in wpas_wps_start_dev_pw()
1248 wpa_snprintf_hex_uppercase(hash + 8, sizeof(hash) - 8, in wpas_wps_start_dev_pw()
1252 hash[0] = '\0'; in wpas_wps_start_dev_pw()
1273 pin, dev_pw_id, hash); in wpas_wps_start_dev_pw()
1276 dev_pw_id, hash); in wpas_wps_start_dev_pw()
1283 rpin, dev_pw_id, hash); in wpas_wps_start_dev_pw()
2706 wpa_hexdump(MSG_DEBUG, "WPS: AP Public Key hash", in wpas_wps_nfc_rx_handover_sel()
2744 * so use the request message here to find Enrollee public key hash in wpas_er_wps_nfc_report_handover()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Dsae.c1146 u8 salt[64], hash[64]; in sae_derive_pwe_from_pt_ecc() local
1167 if (hkdf_extract(hash_len, salt, hash_len, 2, addr, len, hash) < 0) in sae_derive_pwe_from_pt_ecc()
1169 wpa_hexdump(MSG_DEBUG, "SAE: val", hash, hash_len); in sae_derive_pwe_from_pt_ecc()
1174 val = crypto_bignum_init_set(hash, hash_len); in sae_derive_pwe_from_pt_ecc()
1210 u8 salt[64], hash[64]; in sae_derive_pwe_from_pt_ffc() local
1229 if (hkdf_extract(hash_len, salt, hash_len, 2, addr, len, hash) < 0) in sae_derive_pwe_from_pt_ffc()
1231 wpa_hexdump(MSG_DEBUG, "SAE: val", hash, hash_len); in sae_derive_pwe_from_pt_ffc()
1235 val = crypto_bignum_init_set(hash, hash_len); in sae_derive_pwe_from_pt_ffc()
2442 /* 2 bytes are for send-confirm, then the hash, followed by IEs */ in sae_check_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dwps_supplicant.c1241 char hash[2 * WPS_OOB_PUBKEY_HASH_LEN + 10]; in wpas_wps_start_dev_pw() local
1275 os_memcpy(hash, " pkhash=", 8); in wpas_wps_start_dev_pw()
1276 wpa_snprintf_hex_uppercase(hash + 8, sizeof(hash) - 8, in wpas_wps_start_dev_pw()
1280 hash[0] = '\0'; in wpas_wps_start_dev_pw()
1306 pin, dev_pw_id, hash); in wpas_wps_start_dev_pw()
1309 dev_pw_id, hash); in wpas_wps_start_dev_pw()
1316 rpin, dev_pw_id, hash); in wpas_wps_start_dev_pw()
2775 wpa_hexdump(MSG_DEBUG, "WPS: AP Public Key hash", in wpas_wps_nfc_rx_handover_sel()
2813 * so use the request message here to find Enrollee public key hash in wpas_er_wps_nfc_report_handover()
[all...]
/third_party/vk-gl-cts/external/vulkancts/modules/vulkan/binding_model/
H A DvktBindingDescriptorBufferTests.cpp280 deUint32 hash; // a value used to "salt" results in memory to get unique values per test case member
370 // Update the hash field. Must be called after changing the value of any other parameters.
373 hash = deUint32Hash(basehash); in updateHash()
375 hash = isAccelerationStructure() ? (basehash & HASH_MASK_FOR_AS) : basehash; in updateHash()
706 deUint32 getExpectedData(deUint32 hash, deUint32 set, deUint32 binding, deUint32 arrayIndex = 0)
708 return hash ^ packBindingArgs(set, binding, arrayIndex);
979 const auto expectedData = glslFormat(isNullDescriptor ? 0 : getExpectedData(params.hash, sb.set, sb.binding, sb.inputAttachmentIndex + arrayIndex));
1156 const auto expectedData = glslFormat(getExpectedData(params.hash, imageBinding.set, imageBinding.binding, 0));
1199 const auto expectedData = glslFormat(getExpectedData(params.hash, imageBinding.set, imageBinding.binding, 0));
1250 , m_rng(params.hash)
[all...]
/third_party/vk-gl-cts/external/vulkancts/modules_no_buildgn/vulkan/binding_model/
H A DvktBindingDescriptorBufferTests.cpp280 deUint32 hash; // a value used to "salt" results in memory to get unique values per test case member
369 // Update the hash field. Must be called after changing the value of any other parameters.
372 hash = deUint32Hash(basehash); in updateHash()
374 hash = isAccelerationStructure() ? (basehash & HASH_MASK_FOR_AS) : basehash; in updateHash()
705 deUint32 getExpectedData(deUint32 hash, deUint32 set, deUint32 binding, deUint32 arrayIndex = 0)
707 return hash ^ packBindingArgs(set, binding, arrayIndex);
978 const auto expectedData = glslFormat(isNullDescriptor ? 0 : getExpectedData(params.hash, sb.set, sb.binding, sb.inputAttachmentIndex + arrayIndex));
1155 const auto expectedData = glslFormat(getExpectedData(params.hash, imageBinding.set, imageBinding.binding, 0));
1198 const auto expectedData = glslFormat(getExpectedData(params.hash, imageBinding.set, imageBinding.binding, 0));
1250 , m_rng(params.hash)
[all...]
/foundation/graphic/graphic_3d/lume/Lume_3D/src/ecs/components/
H A Dmaterial_component_manager.cpp21 #include <base/util/hash.h>
96 return (lhs.type == rhs.type) && (lhs.hash == rhs.hash) && (lhs.name == rhs.name);
206 newProperty.hash = BASE_NS::FNV1aHash(newProperty.name.data(), newProperty.name.size()); in AppendProperties()
/foundation/distributeddatamgr/datamgr_service/services/distributeddataservice/service/test/
H A Dobject_manager_test.cpp65 .hash = "modifyTime_size", in SetUp()
76 .hash = "modifyTime_size", in SetUp()
791 EXPECT_EQ(assets[0].hash, "test_test"); in HWTEST_F()
804 EXPECT_EQ(assets[0].hash, "(string)test_(string)test"); in HWTEST_F()
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/test/unittest/common/syncer/cloud/
H A Ddistributeddb_cloud_syncer_lock_test.cpp67 .hash = "ASE"};
800 asset.hash = "new_hash"; in HWTEST_F()
805 b2.hash = "new_hash"; in HWTEST_F()
1001 asset.hash = "new_hash"; in HWTEST_F()
/test/xts/device_attest/services/core/network/
H A Dattest_network.c134 unsigned char hash[HTTPS_NETWORK_SHA256_LEN]; in Sha256Udid() local
143 SHA256_Final(hash, &sha256); in Sha256Udid()
152 (uint32_t)(HTTPS_NETWORK_SHA256_LEN - curLen) - 1, "%02x", hash[i]); in Sha256Udid()
154 (void)memset_s(hash, HTTPS_NETWORK_SHA256_LEN, 0, HTTPS_NETWORK_SHA256_LEN); in Sha256Udid()
/third_party/googletest/googletest/scripts/
H A Dupload.py1005 # Map of filename -> hash of base file.
1027 # We want to save the left hash, as that identifies the base file.
1042 hash = self.base_hashes[filename]
1046 if hash == "0" * 40: # All-zero hash indicates no base file.
1051 base_content, returncode = RunShellWithReturnCode(["git", "show", hash])
1053 ErrorExit("Got error status from 'git show %s'" % hash)
1339 # Send a hash of all the base file so the server can determine if a copy

Completed in 54 milliseconds

1...<<51525354555657585960>>...81