Home
last modified time | relevance | path

Searched refs:hash (Results 451 - 475 of 4194) sorted by relevance

1...<<11121314151617181920>>...168

/third_party/node/test/parallel/
H A Dtest-crypto-hmac.js115 for (const hash in hmac)
116 testHmac(hash, key, data, hmac[hash]);
267 for (const hash in rfc4231[i].hmac) {
268 const str = crypto.createHmac(hash, rfc4231[i].key);
271 let actual = crypto.createHmac(hash, rfc4231[i].key)
278 const expected = rfc4231[i].hmac[hash];
282 `Test HMAC-${hash} rfc 4231 case ${i + 1}: ${actual} must be ${expected}`
287 `Should get same result from stream (hash: ${hash} an
[all...]
H A Dtest-webcrypto-webidl.js295 hash: { name: 'SHA-1' },
301 hash: 'SHA-1',
307 for (const required of ['hash', 'publicExponent', 'modulusLength']) {
320 { name: 'RSA-OAEP', hash: { name: 'SHA-1' } },
321 { name: 'RSA-OAEP', hash: 'SHA-1' },
324 assert.throws(() => converters.RsaHashedImportParams({ ...good, hash: undefined }, opts), {
327 message: `${prefix}: ${context} can not be converted to 'RsaHashedImportParams' because 'hash' is required in 'RsaHashedImportParams'.`,
370 { name: 'ECDSA', hash: { name: 'SHA-1' } },
371 { name: 'ECDSA', hash: 'SHA-1' },
374 assert.throws(() => converters.EcdsaParams({ ...good, hash
[all...]
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/
H A Decdh_keys.js40 return subtle.deriveKey({name: "ECDH", public: publicKeys[namedCurve]}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
51 return subtle.deriveKey({name: "EcDh", public: publicKeys[namedCurve]}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
63 return subtle.deriveKey({name: "ECDH"}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
74 return subtle.deriveKey({name: "ECDH", public: {message: "Not a CryptoKey"}}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
89 return subtle.deriveKey({name: "ECDH", public: publicKey}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
100 return subtle.deriveKey({name: "ECDH", public: ecdsaKeyPairs[namedCurve].publicKey}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
111 return subtle.deriveKey({name: "ECDH", public: publicKeys[namedCurve]}, noDeriveKeyKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
122 return subtle.deriveKey({name: "ECDH", public: publicKeys[namedCurve]}, publicKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
133 return subtle.deriveKey({name: "ECDH", public: privateKeys[namedCurve]}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
144 return subtle.generateKey({name: "HMAC", hash
[all...]
/third_party/node/deps/v8/src/utils/
H A Didentity-map.cc50 int IdentityMapBase::ScanKeysFor(Address address, uint32_t hash) const { in ScanKeysFor()
51 int start = hash & mask_; in ScanKeysFor()
65 uint32_t hash) { in InsertKey()
75 int start = hash & mask_; in InsertKey()
134 uint32_t hash = Hash(key); in Lookup() local
135 int index = ScanKeysFor(key, hash); in Lookup()
139 index = ScanKeysFor(key, hash); in Lookup()
145 uint32_t hash = Hash(key); in LookupOrInsert() local
147 int index = ScanKeysFor(key, hash); in LookupOrInsert()
152 std::tie(index, already_exists) = InsertKey(key, hash); in LookupOrInsert()
64 InsertKey(Address address, uint32_t hash) InsertKey() argument
[all...]
/third_party/selinux/libsepol/cil/src/
H A Dcil_symtab.c152 static void cil_complex_symtab_hash(struct cil_complex_symtab_key *ckey, int mask, intptr_t *hash) in cil_complex_symtab_hash() argument
155 *hash = (intptr_t)((sum >> 2) & mask); in cil_complex_symtab_hash()
171 intptr_t hash; in cil_complex_symtab_insert() local
182 cil_complex_symtab_hash(ckey, symtab->mask, &hash); in cil_complex_symtab_insert()
184 for (prev = NULL, curr = symtab->htable[hash]; curr != NULL; in cil_complex_symtab_insert()
217 node->next = symtab->htable[hash]; in cil_complex_symtab_insert()
218 symtab->htable[hash] = node; in cil_complex_symtab_insert()
230 intptr_t hash; in cil_complex_symtab_search() local
233 cil_complex_symtab_hash(ckey, symtab->mask, &hash); in cil_complex_symtab_search()
234 for (curr = symtab->htable[hash]; cur in cil_complex_symtab_search()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_openssl_ocsp.c402 ASN1_OCTET_STRING *hash; in issuer_match() local
408 "OpenSSL: Could not find matching hash algorithm for OCSP"); in issuer_match()
415 hash = ASN1_OCTET_STRING_new(); in issuer_match()
416 if (!hash) in issuer_match()
418 if (!ASN1_OCTET_STRING_set(hash, md, len)) { in issuer_match()
419 ASN1_OCTET_STRING_free(hash); in issuer_match()
423 txt = octet_string_str(hash); in issuer_match()
430 if (ASN1_OCTET_STRING_cmp(certid->issuerNameHash, hash)) { in issuer_match()
431 ASN1_OCTET_STRING_free(hash); in issuer_match()
438 !ASN1_OCTET_STRING_set(hash, m in issuer_match()
463 unsigned char hash[SHA_DIGEST_LENGTH]; STACK_OF() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_openssl_ocsp.c402 ASN1_OCTET_STRING *hash; in issuer_match() local
408 "OpenSSL: Could not find matching hash algorithm for OCSP"); in issuer_match()
415 hash = ASN1_OCTET_STRING_new(); in issuer_match()
416 if (!hash) in issuer_match()
418 if (!ASN1_OCTET_STRING_set(hash, md, len)) { in issuer_match()
419 ASN1_OCTET_STRING_free(hash); in issuer_match()
423 txt = octet_string_str(hash); in issuer_match()
430 if (ASN1_OCTET_STRING_cmp(certid->issuerNameHash, hash)) { in issuer_match()
431 ASN1_OCTET_STRING_free(hash); in issuer_match()
438 !ASN1_OCTET_STRING_set(hash, m in issuer_match()
463 unsigned char hash[SHA_DIGEST_LENGTH]; STACK_OF() local
[all...]
/third_party/protobuf/csharp/src/Google.Protobuf.Test.TestProtos/
H A DMapUnittestProto3.cs438 int hash = 1; in GetHashCode()
439 hash ^= MapInt32Int32.GetHashCode(); in GetHashCode()
440 hash ^= MapInt64Int64.GetHashCode(); in GetHashCode()
441 hash ^= MapUint32Uint32.GetHashCode(); in GetHashCode()
442 hash ^= MapUint64Uint64.GetHashCode(); in GetHashCode()
443 hash ^= MapSint32Sint32.GetHashCode(); in GetHashCode()
444 hash ^= MapSint64Sint64.GetHashCode(); in GetHashCode()
445 hash ^= MapFixed32Fixed32.GetHashCode(); in GetHashCode()
446 hash ^= MapFixed64Fixed64.GetHashCode(); in GetHashCode()
447 hash in GetHashCode()
[all...]
/third_party/lzma/C/
H A DLzFindMt.c298 UInt32 *hash, UInt32 hashMask, UInt32 *heads, UInt32 numHeads, const UInt32 *crc)
304 *heads++ = pos - hash[value]; \
305 hash[value] = pos++; }
335 h0 = hash[v0]; hash[v0] = pos; heads[0] = pos - h0; pos++;
336 h1 = hash[v1]; hash[v1] = pos; heads[1] = pos - h1; pos++;
342 *heads = pos - hash[v0];
343 hash[v0] = pos;
523 MatchFinder_Normalize3(subValue, mf->hash in HashThreadFunc()
1007 UInt32 *hash = p->hash; MixMatches2() local
1031 UInt32 *hash = p->hash; MixMatches3() local
1169 UInt32 *hash = p->hash; MixMatches4() local
1329 hash[h2] = p->lzPos; global() local
[all...]
/third_party/node/deps/openssl/openssl/ssl/
H A Dtls13_enc.c29 * |datalen| (e.g. typically a hash of the handshake messages), derive a new
262 unsigned char hash[EVP_MAX_MD_SIZE]; in tls13_final_finish_mac() local
278 if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { in tls13_final_finish_mac()
296 params, key, hashlen, hash, hashlen, in tls13_final_finish_mac()
310 * for initialising the cipher and hash. Returns 1 on success or 0 on failure.
315 const EVP_MD *hash; in tls13_setup_key_block() local
318 if (!ssl_cipher_get_evp(s->ctx, s->session, &c, &hash, NULL, NULL, NULL, in tls13_setup_key_block()
328 s->s3.tmp.new_hash = hash; in tls13_setup_key_block()
336 const unsigned char *hash, in derive_secret_key_and_iv()
333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument
426 unsigned char hash[EVP_MAX_MD_SIZE]; quic_change_cipher_state() local
632 unsigned char *hash = hashval; tls13_change_cipher_state() local
1040 unsigned char hash[EVP_MAX_MD_SIZE], data[EVP_MAX_MD_SIZE]; tls13_export_keying_material() local
1082 unsigned char hash[EVP_MAX_MD_SIZE], data[EVP_MAX_MD_SIZE]; tls13_export_keying_material_early() local
[all...]
/kernel/linux/linux-5.10/arch/arm64/kernel/vdso32/
H A Dvdso.lds.S26 .hash : { *(.hash) } :text
27 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-5.10/arch/x86/um/vdso/
H A Dvdso-layout.lds.S12 .hash : { *(.hash) } :text
13 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-5.10/arch/loongarch/vdso/
H A Dvdso.lds.S16 .hash : { *(.hash) } :text
17 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-5.10/arch/nds32/kernel/vdso/
H A Dvdso.lds.S17 .hash : { *(.hash) } :text
18 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-5.10/arch/sh/kernel/vsyscall/
H A Dvsyscall.lds.S23 .hash : { *(.hash) } :text
24 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-5.10/arch/riscv/kernel/vdso/
H A Dvdso.lds.S14 .hash : { *(.hash) } :text
15 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-5.10/arch/sparc/vdso/
H A Dvdso-layout.lds.S31 .hash : { *(.hash) } :text
32 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-5.10/arch/arm/vdso/
H A Dvdso.lds.S26 .hash : { *(.hash) } :text
27 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-6.6/arch/csky/kernel/vdso/
H A Dvdso.lds.S12 .hash : { *(.hash) } :text
13 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-6.6/arch/loongarch/vdso/
H A Dvdso.lds.S16 .hash : { *(.hash) } :text
17 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-6.6/arch/arm/vdso/
H A Dvdso.lds.S26 .hash : { *(.hash) } :text
27 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-6.6/arch/sh/kernel/vsyscall/
H A Dvsyscall.lds.S23 .hash : { *(.hash) } :text
24 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-6.6/arch/sparc/vdso/
H A Dvdso-layout.lds.S31 .hash : { *(.hash) } :text
32 .gnu.hash : { *(.gnu.hash) }
/kernel/linux/linux-6.6/io_uring/
H A Dio-wq.h15 IO_WQ_HASH_SHIFT = 24, /* upper 8 bits are used for hash key */
33 static inline void io_wq_put_hash(struct io_wq_hash *hash) in io_wq_put_hash() argument
35 if (refcount_dec_and_test(&hash->refs)) in io_wq_put_hash()
36 kfree(hash); in io_wq_put_hash()
40 struct io_wq_hash *hash; member
/kernel/linux/linux-6.6/arch/x86/um/vdso/
H A Dvdso-layout.lds.S12 .hash : { *(.hash) } :text
13 .gnu.hash : { *(.gnu.hash) }

Completed in 11 milliseconds

1...<<11121314151617181920>>...168