/third_party/node/test/parallel/ |
H A D | test-crypto-hmac.js | 115 for (const hash in hmac) 116 testHmac(hash, key, data, hmac[hash]); 267 for (const hash in rfc4231[i].hmac) { 268 const str = crypto.createHmac(hash, rfc4231[i].key); 271 let actual = crypto.createHmac(hash, rfc4231[i].key) 278 const expected = rfc4231[i].hmac[hash]; 282 `Test HMAC-${hash} rfc 4231 case ${i + 1}: ${actual} must be ${expected}` 287 `Should get same result from stream (hash: ${hash} an [all...] |
H A D | test-webcrypto-webidl.js | 295 hash: { name: 'SHA-1' }, 301 hash: 'SHA-1', 307 for (const required of ['hash', 'publicExponent', 'modulusLength']) { 320 { name: 'RSA-OAEP', hash: { name: 'SHA-1' } }, 321 { name: 'RSA-OAEP', hash: 'SHA-1' }, 324 assert.throws(() => converters.RsaHashedImportParams({ ...good, hash: undefined }, opts), { 327 message: `${prefix}: ${context} can not be converted to 'RsaHashedImportParams' because 'hash' is required in 'RsaHashedImportParams'.`, 370 { name: 'ECDSA', hash: { name: 'SHA-1' } }, 371 { name: 'ECDSA', hash: 'SHA-1' }, 374 assert.throws(() => converters.EcdsaParams({ ...good, hash [all...] |
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/ |
H A D | ecdh_keys.js | 40 return subtle.deriveKey({name: "ECDH", public: publicKeys[namedCurve]}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"]) 51 return subtle.deriveKey({name: "EcDh", public: publicKeys[namedCurve]}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"]) 63 return subtle.deriveKey({name: "ECDH"}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"]) 74 return subtle.deriveKey({name: "ECDH", public: {message: "Not a CryptoKey"}}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"]) 89 return subtle.deriveKey({name: "ECDH", public: publicKey}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"]) 100 return subtle.deriveKey({name: "ECDH", public: ecdsaKeyPairs[namedCurve].publicKey}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"]) 111 return subtle.deriveKey({name: "ECDH", public: publicKeys[namedCurve]}, noDeriveKeyKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"]) 122 return subtle.deriveKey({name: "ECDH", public: publicKeys[namedCurve]}, publicKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"]) 133 return subtle.deriveKey({name: "ECDH", public: privateKeys[namedCurve]}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"]) 144 return subtle.generateKey({name: "HMAC", hash [all...] |
/third_party/node/deps/v8/src/utils/ |
H A D | identity-map.cc | 50 int IdentityMapBase::ScanKeysFor(Address address, uint32_t hash) const { in ScanKeysFor() 51 int start = hash & mask_; in ScanKeysFor() 65 uint32_t hash) { in InsertKey() 75 int start = hash & mask_; in InsertKey() 134 uint32_t hash = Hash(key); in Lookup() local 135 int index = ScanKeysFor(key, hash); in Lookup() 139 index = ScanKeysFor(key, hash); in Lookup() 145 uint32_t hash = Hash(key); in LookupOrInsert() local 147 int index = ScanKeysFor(key, hash); in LookupOrInsert() 152 std::tie(index, already_exists) = InsertKey(key, hash); in LookupOrInsert() 64 InsertKey(Address address, uint32_t hash) InsertKey() argument [all...] |
/third_party/selinux/libsepol/cil/src/ |
H A D | cil_symtab.c | 152 static void cil_complex_symtab_hash(struct cil_complex_symtab_key *ckey, int mask, intptr_t *hash) in cil_complex_symtab_hash() argument 155 *hash = (intptr_t)((sum >> 2) & mask); in cil_complex_symtab_hash() 171 intptr_t hash; in cil_complex_symtab_insert() local 182 cil_complex_symtab_hash(ckey, symtab->mask, &hash); in cil_complex_symtab_insert() 184 for (prev = NULL, curr = symtab->htable[hash]; curr != NULL; in cil_complex_symtab_insert() 217 node->next = symtab->htable[hash]; in cil_complex_symtab_insert() 218 symtab->htable[hash] = node; in cil_complex_symtab_insert() 230 intptr_t hash; in cil_complex_symtab_search() local 233 cil_complex_symtab_hash(ckey, symtab->mask, &hash); in cil_complex_symtab_search() 234 for (curr = symtab->htable[hash]; cur in cil_complex_symtab_search() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_openssl_ocsp.c | 402 ASN1_OCTET_STRING *hash; in issuer_match() local 408 "OpenSSL: Could not find matching hash algorithm for OCSP"); in issuer_match() 415 hash = ASN1_OCTET_STRING_new(); in issuer_match() 416 if (!hash) in issuer_match() 418 if (!ASN1_OCTET_STRING_set(hash, md, len)) { in issuer_match() 419 ASN1_OCTET_STRING_free(hash); in issuer_match() 423 txt = octet_string_str(hash); in issuer_match() 430 if (ASN1_OCTET_STRING_cmp(certid->issuerNameHash, hash)) { in issuer_match() 431 ASN1_OCTET_STRING_free(hash); in issuer_match() 438 !ASN1_OCTET_STRING_set(hash, m in issuer_match() 463 unsigned char hash[SHA_DIGEST_LENGTH]; STACK_OF() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_openssl_ocsp.c | 402 ASN1_OCTET_STRING *hash; in issuer_match() local 408 "OpenSSL: Could not find matching hash algorithm for OCSP"); in issuer_match() 415 hash = ASN1_OCTET_STRING_new(); in issuer_match() 416 if (!hash) in issuer_match() 418 if (!ASN1_OCTET_STRING_set(hash, md, len)) { in issuer_match() 419 ASN1_OCTET_STRING_free(hash); in issuer_match() 423 txt = octet_string_str(hash); in issuer_match() 430 if (ASN1_OCTET_STRING_cmp(certid->issuerNameHash, hash)) { in issuer_match() 431 ASN1_OCTET_STRING_free(hash); in issuer_match() 438 !ASN1_OCTET_STRING_set(hash, m in issuer_match() 463 unsigned char hash[SHA_DIGEST_LENGTH]; STACK_OF() local [all...] |
/third_party/protobuf/csharp/src/Google.Protobuf.Test.TestProtos/ |
H A D | MapUnittestProto3.cs | 438 int hash = 1; in GetHashCode() 439 hash ^= MapInt32Int32.GetHashCode(); in GetHashCode() 440 hash ^= MapInt64Int64.GetHashCode(); in GetHashCode() 441 hash ^= MapUint32Uint32.GetHashCode(); in GetHashCode() 442 hash ^= MapUint64Uint64.GetHashCode(); in GetHashCode() 443 hash ^= MapSint32Sint32.GetHashCode(); in GetHashCode() 444 hash ^= MapSint64Sint64.GetHashCode(); in GetHashCode() 445 hash ^= MapFixed32Fixed32.GetHashCode(); in GetHashCode() 446 hash ^= MapFixed64Fixed64.GetHashCode(); in GetHashCode() 447 hash in GetHashCode() [all...] |
/third_party/lzma/C/ |
H A D | LzFindMt.c | 298 UInt32 *hash, UInt32 hashMask, UInt32 *heads, UInt32 numHeads, const UInt32 *crc)
304 *heads++ = pos - hash[value]; \
305 hash[value] = pos++; }
335 h0 = hash[v0]; hash[v0] = pos; heads[0] = pos - h0; pos++;
336 h1 = hash[v1]; hash[v1] = pos; heads[1] = pos - h1; pos++;
342 *heads = pos - hash[v0];
343 hash[v0] = pos;
523 MatchFinder_Normalize3(subValue, mf->hash in HashThreadFunc() 1007 UInt32 *hash = p->hash; MixMatches2() local 1031 UInt32 *hash = p->hash; MixMatches3() local 1169 UInt32 *hash = p->hash; MixMatches4() local 1329 hash[h2] = p->lzPos; global() local [all...] |
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | tls13_enc.c | 29 * |datalen| (e.g. typically a hash of the handshake messages), derive a new 262 unsigned char hash[EVP_MAX_MD_SIZE]; in tls13_final_finish_mac() local 278 if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { in tls13_final_finish_mac() 296 params, key, hashlen, hash, hashlen, in tls13_final_finish_mac() 310 * for initialising the cipher and hash. Returns 1 on success or 0 on failure. 315 const EVP_MD *hash; in tls13_setup_key_block() local 318 if (!ssl_cipher_get_evp(s->ctx, s->session, &c, &hash, NULL, NULL, NULL, in tls13_setup_key_block() 328 s->s3.tmp.new_hash = hash; in tls13_setup_key_block() 336 const unsigned char *hash, in derive_secret_key_and_iv() 333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument 426 unsigned char hash[EVP_MAX_MD_SIZE]; quic_change_cipher_state() local 632 unsigned char *hash = hashval; tls13_change_cipher_state() local 1040 unsigned char hash[EVP_MAX_MD_SIZE], data[EVP_MAX_MD_SIZE]; tls13_export_keying_material() local 1082 unsigned char hash[EVP_MAX_MD_SIZE], data[EVP_MAX_MD_SIZE]; tls13_export_keying_material_early() local [all...] |
/kernel/linux/linux-5.10/arch/arm64/kernel/vdso32/ |
H A D | vdso.lds.S | 26 .hash : { *(.hash) } :text 27 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-5.10/arch/x86/um/vdso/ |
H A D | vdso-layout.lds.S | 12 .hash : { *(.hash) } :text 13 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-5.10/arch/loongarch/vdso/ |
H A D | vdso.lds.S | 16 .hash : { *(.hash) } :text 17 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-5.10/arch/nds32/kernel/vdso/ |
H A D | vdso.lds.S | 17 .hash : { *(.hash) } :text 18 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-5.10/arch/sh/kernel/vsyscall/ |
H A D | vsyscall.lds.S | 23 .hash : { *(.hash) } :text 24 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-5.10/arch/riscv/kernel/vdso/ |
H A D | vdso.lds.S | 14 .hash : { *(.hash) } :text 15 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-5.10/arch/sparc/vdso/ |
H A D | vdso-layout.lds.S | 31 .hash : { *(.hash) } :text 32 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-5.10/arch/arm/vdso/ |
H A D | vdso.lds.S | 26 .hash : { *(.hash) } :text 27 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-6.6/arch/csky/kernel/vdso/ |
H A D | vdso.lds.S | 12 .hash : { *(.hash) } :text 13 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-6.6/arch/loongarch/vdso/ |
H A D | vdso.lds.S | 16 .hash : { *(.hash) } :text 17 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-6.6/arch/arm/vdso/ |
H A D | vdso.lds.S | 26 .hash : { *(.hash) } :text 27 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-6.6/arch/sh/kernel/vsyscall/ |
H A D | vsyscall.lds.S | 23 .hash : { *(.hash) } :text 24 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-6.6/arch/sparc/vdso/ |
H A D | vdso-layout.lds.S | 31 .hash : { *(.hash) } :text 32 .gnu.hash : { *(.gnu.hash) }
|
/kernel/linux/linux-6.6/io_uring/ |
H A D | io-wq.h | 15 IO_WQ_HASH_SHIFT = 24, /* upper 8 bits are used for hash key */ 33 static inline void io_wq_put_hash(struct io_wq_hash *hash) in io_wq_put_hash() argument 35 if (refcount_dec_and_test(&hash->refs)) in io_wq_put_hash() 36 kfree(hash); in io_wq_put_hash() 40 struct io_wq_hash *hash; member
|
/kernel/linux/linux-6.6/arch/x86/um/vdso/ |
H A D | vdso-layout.lds.S | 12 .hash : { *(.hash) } :text 13 .gnu.hash : { *(.gnu.hash) }
|