/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_enrollee.c | 37 u8 *hash; in wps_build_e_hash() local 56 hash = wpabuf_put(msg, SHA256_MAC_LEN); in wps_build_e_hash() 66 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); in wps_build_e_hash() 67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash() 72 hash = wpabuf_put(msg, SHA256_MAC_LEN); in wps_build_e_hash() 76 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); in wps_build_e_hash() 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash() 567 u8 hash[WPS_HASH_LEN]; in wps_process_pubkey() local 568 sha256_vector(1, &pk, &pk_len, hash); in wps_process_pubkey() 569 if (os_memcmp_const(hash, wp in wps_process_pubkey() 626 u8 hash[SHA256_MAC_LEN]; wps_process_r_snonce1() local 666 u8 hash[SHA256_MAC_LEN]; wps_process_r_snonce2() local [all...] |
H A D | wps_common.c | 31 u8 hash[SHA256_MAC_LEN], *opos; in wps_kdf() local 51 hmac_sha256_vector(key, SHA256_MAC_LEN, 4, addr, len, hash); in wps_kdf() 53 os_memcpy(opos, hash, SHA256_MAC_LEN); in wps_kdf() 57 os_memcpy(opos, hash, left); in wps_kdf() 135 u8 hash[SHA256_MAC_LEN]; in wps_derive_psk() local 138 (dev_passwd_len + 1) / 2, hash) < 0) in wps_derive_psk() 140 os_memcpy(wps->psk1, hash, WPS_PSK_LEN); in wps_derive_psk() 143 dev_passwd_len / 2, hash) < 0) in wps_derive_psk() 145 os_memcpy(wps->psk2, hash, WPS_PSK_LEN); in wps_derive_psk() 504 u8 hash[SHA1_MAC_LE in uuid_gen_mac_addr() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_crypto.c | 306 wpa_printf(MSG_DEBUG, "DPP: Failed to hash public key"); in dpp_bootstrap_key_hash() 341 wpa_printf(MSG_DEBUG, "DPP: Failed to hash public key"); in dpp_keygen() 537 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", in dpp_bi_pubkey_hash() 546 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash (chirp)", in dpp_bi_pubkey_hash() 559 wpa_printf(MSG_DEBUG, "DPP: Failed to hash public key"); in dpp_get_subject_public_key() 670 u8 hash[SHA256_MAC_LEN]; in dpp_check_pubkey_match() local 683 res = sha256_vector(1, addr, len, hash); in dpp_check_pubkey_match() 687 if (os_memcmp(hash, wpabuf_head(r_hash), SHA256_MAC_LEN) != 0) { in dpp_check_pubkey_match() 689 "DPP: Received hash value does not match calculated public key hash valu in dpp_check_pubkey_match() 710 u8 *hash = NULL; dpp_process_signed_connector() local 1153 u8 hash[SHA256_MAC_LEN]; dpp_derive_pmkid() local 1440 u8 hash[DPP_MAX_HASH_LEN]; dpp_pkex_derive_Qi() local 1515 u8 hash[DPP_MAX_HASH_LEN]; dpp_pkex_derive_Qr() local 1883 u8 *hash; dpp_build_conn_signature() local [all...] |
/third_party/skia/third_party/externals/dawn/src/tests/unittests/native/ |
H A D | DestroyObjectTests.cpp | 253 // ComputePipelines usually set their hash values at construction, but the mock does not, so in TEST_F() 255 constexpr size_t hash = 0x12345; in TEST_F() local 257 computePipelineMock->SetContentHash(hash); in TEST_F() 258 ON_CALL(*computePipelineMock, ComputeContentHash).WillByDefault(Return(hash)); in TEST_F() 360 // RenderPipelines usually set their hash values at construction, but the mock does not, so in TEST_F() 362 constexpr size_t hash = 0x12345; in TEST_F() local 364 renderPipelineMock->SetContentHash(hash); in TEST_F() 365 ON_CALL(*renderPipelineMock, ComputeContentHash).WillByDefault(Return(hash)); in TEST_F() 619 // Compute pipelines usually set their hash values at construction, but the mock does in TEST_F() 621 constexpr size_t hash in TEST_F() local 668 constexpr size_t hash = 0x12345; TEST_F() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_write.c | 581 u8 hash[100], *hpos; in tls_write_client_certificate_verify() local 612 * The hash values are calculated over all handshake messages sent or in tls_write_client_certificate_verify() 618 hpos = hash; in tls_write_client_certificate_verify() 647 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify() 649 os_memcpy(hash, "\x30\x31\x30\x0d\x06\x09\x60\x86\x48\x01\x65" in tls_write_client_certificate_verify() 683 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_write_client_certificate_verify() 690 * hash algorithms. in tls_write_client_certificate_verify() 693 * HashAlgorithm hash; in tls_write_client_certificate_verify() 787 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_client_finished() local [all...] |
H A D | tlsv1_server_write.c | 564 u8 hash[100]; in tls_write_server_key_exchange() local 575 pos - server_params, hash + 19); in tls_write_server_key_exchange() 580 * signature and hash algorithms. in tls_write_server_key_exchange() 583 * HashAlgorithm hash; in tls_write_server_key_exchange() 610 os_memcpy(hash, in tls_write_server_key_exchange() 623 pos - server_params, hash); in tls_write_server_key_exchange() 632 wpa_hexdump(MSG_MSGDUMP, "TLS: ServerKeyExchange signed_params hash", in tls_write_server_key_exchange() 633 hash, hlen); in tls_write_server_key_exchange() 636 tlsv1_server_log(conn, "TESTING: Break ServerKeyExchange signed params hash"); in tls_write_server_key_exchange() 637 hash[hle in tls_write_server_key_exchange() 837 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_server_finished() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_common.c | 31 u8 hash[SHA256_MAC_LEN], *opos; in wps_kdf() local 51 hmac_sha256_vector(key, SHA256_MAC_LEN, 4, addr, len, hash); in wps_kdf() 53 os_memcpy(opos, hash, SHA256_MAC_LEN); in wps_kdf() 57 os_memcpy(opos, hash, left); in wps_kdf() 135 u8 hash[SHA256_MAC_LEN]; in wps_derive_psk() local 138 (dev_passwd_len + 1) / 2, hash) < 0) in wps_derive_psk() 140 os_memcpy(wps->psk1, hash, WPS_PSK_LEN); in wps_derive_psk() 143 dev_passwd_len / 2, hash) < 0) in wps_derive_psk() 145 os_memcpy(wps->psk2, hash, WPS_PSK_LEN); in wps_derive_psk() 504 u8 hash[SHA1_MAC_LE in uuid_gen_mac_addr() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_write.c | 569 u8 hash[100], *hpos; in tls_write_client_certificate_verify() local 600 * The hash values are calculated over all handshake messages sent or in tls_write_client_certificate_verify() 606 hpos = hash; in tls_write_client_certificate_verify() 635 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify() 637 os_memcpy(hash, "\x30\x31\x30\x0d\x06\x09\x60\x86\x48\x01\x65" in tls_write_client_certificate_verify() 671 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_write_client_certificate_verify() 678 * hash algorithms. in tls_write_client_certificate_verify() 681 * HashAlgorithm hash; in tls_write_client_certificate_verify() 775 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_client_finished() local [all...] |
H A D | tlsv1_server_write.c | 564 u8 hash[100]; in tls_write_server_key_exchange() local 575 pos - server_params, hash + 19); in tls_write_server_key_exchange() 580 * signature and hash algorithms. in tls_write_server_key_exchange() 583 * HashAlgorithm hash; in tls_write_server_key_exchange() 610 os_memcpy(hash, in tls_write_server_key_exchange() 623 pos - server_params, hash); in tls_write_server_key_exchange() 632 wpa_hexdump(MSG_MSGDUMP, "TLS: ServerKeyExchange signed_params hash", in tls_write_server_key_exchange() 633 hash, hlen); in tls_write_server_key_exchange() 636 tlsv1_server_log(conn, "TESTING: Break ServerKeyExchange signed params hash"); in tls_write_server_key_exchange() 637 hash[hle in tls_write_server_key_exchange() 837 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_server_finished() local [all...] |
/third_party/jerryscript/jerry-core/ecma/base/ |
H A D | ecma-helpers-string.c | 221 symbol_p->header.u.hash = (lit_string_hash_t) (((uintptr_t) symbol_p) >> ECMA_SYMBOL_HASH_SHIFT); in ecma_new_symbol_from_descriptor_string() 222 JERRY_ASSERT ((symbol_p->header.u.hash & ECMA_GLOBAL_SYMBOL_FLAG) == 0); in ecma_new_symbol_from_descriptor_string() 357 string_desc_p->u.hash = lit_utf8_string_calc_hash (string_p, string_size); in ecma_new_ecma_string_from_utf8() 377 string_desc_p->header.u.hash = lit_utf8_string_calc_hash (string_p, size); in ecma_new_nonref_ecma_string_from_utf8() 387 string_desc_p->header.u.hash = lit_utf8_string_calc_hash (string_p, size); in ecma_new_nonref_ecma_string_from_utf8() 396 string_desc_p->header.u.hash = lit_utf8_string_calc_hash (string_p, size); in ecma_new_nonref_ecma_string_from_utf8() 481 string_desc_p->u.hash = lit_utf8_string_calc_hash (begin_data_p, converted_string_size); in ecma_new_ecma_string_from_utf8_converted_to_cesu8() 612 string_desc_p->u.hash = lit_utf8_string_calc_hash (str_buf, str_size); in ecma_new_ecma_string_from_number() 732 hash_start = string1_p->u.hash; in ecma_append_chars_to_string() 735 string_desc_p->u.hash in ecma_append_chars_to_string() 2789 const lit_string_hash_t hash = lit_utf8_string_calc_hash (string_begin_p, string_size); ecma_stringbuilder_finalize() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius.c | 526 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_acct_req() local 537 md5_vector(4, addr, len, hash); in radius_msg_verify_acct_req() 538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() 549 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_das_req() local 565 md5_vector(4, addr, len, hash); in radius_msg_verify_das_req() 566 if (os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0) in radius_msg_verify_das_req() 854 u8 hash[MD5_MAC_LEN]; in radius_msg_verify() local 876 if (md5_vector(4, addr, len, hash) < 0 || in radius_msg_verify() 877 os_memcmp_const(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { in radius_msg_verify() 988 u8 hash[MD5_MAC_LE in decrypt_ms_key() local 1065 u8 hash[MD5_MAC_LEN], saltbuf[2], *pos; encrypt_ms_key() local 1296 u8 hash[16]; radius_user_password_hide() local 1565 u8 hash[16]; radius_msg_get_tunnel_password() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius.c | 526 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_acct_req() local 537 md5_vector(4, addr, len, hash); in radius_msg_verify_acct_req() 538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() 549 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_das_req() local 565 md5_vector(4, addr, len, hash); in radius_msg_verify_das_req() 566 if (os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0) in radius_msg_verify_das_req() 854 u8 hash[MD5_MAC_LEN]; in radius_msg_verify() local 876 if (md5_vector(4, addr, len, hash) < 0 || in radius_msg_verify() 877 os_memcmp_const(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { in radius_msg_verify() 988 u8 hash[MD5_MAC_LE in decrypt_ms_key() local 1065 u8 hash[MD5_MAC_LEN], saltbuf[2], *pos; encrypt_ms_key() local 1296 u8 hash[16]; radius_user_password_hide() local 1565 u8 hash[16]; radius_msg_get_tunnel_password() local [all...] |
/foundation/graphic/graphic_2d/rosen/modules/render_service_base/src/render/ |
H A D | rs_light_up_effect_filter.cpp | 30 hash_ = SkOpts::hash(&type_, sizeof(type_), 0); in RSLightUpEffectFilter() 31 hash_ = SkOpts::hash(&lightUpDegree_, sizeof(lightUpDegree_), hash_); in RSLightUpEffectFilter() 66 result->hash_ = SkOpts::hash(&otherHash, sizeof(otherHash), hash_); in Compose()
|
/foundation/graphic/graphic_3d/lume/LumeEngine/api/core/property/ |
H A D | property.h | 60 /** Type hash */ 62 /** Compare hash */ 66 /** Return compare hash of this property type declaration */ 102 uint64_t hash; member 134 uint64_t hash(const T& b); 137 inline uint64_t hash(const CORE_NS::PropertyTypeDecl& value) in hash() function
|
/foundation/communication/ipc/ipc/native/src/core/include/ |
H A D | databus_socket_listener.h | 63 return std::hash<std::string>()(info.GetOwnName()) ^
in operator ()() 64 std::hash<std::string>()(info.GetPeerName()) ^
in operator ()() 65 std::hash<std::string>()(info.GetNetworkId());
in operator ()()
|
/third_party/gn/src/gn/ |
H A D | source_dir.h | 131 size_t hash() const { return value_.ptr_hash(); } in hash() function in SourceDir 141 struct hash<SourceDir> { struct 142 std::size_t operator()(const SourceDir& v) const { return v.hash(); } in operator ()()
|
/third_party/mbedtls/programs/pkey/ |
H A D | rsa_sign.c | 39 unsigned char hash[32]; in main() local 104 * Compute the SHA-256 hash of the input file, in main() 105 * then calculate the RSA signature of the hash. in main() 112 argv[1], hash)) != 0) { in main() 118 32, hash, buf)) != 0) { in main()
|
/third_party/node/test/parallel/ |
H A D | test-whatwg-url-custom-parsing.js | 79 if (test.hash) assert.strictEqual(url.hash, test.hash);
|
/third_party/mesa3d/src/util/ |
H A D | u_debug_stack_android.cpp | 40 uint32_t hash = _mesa_hash_string(symbol); in intern_symbol() local 42 _mesa_hash_table_search_pre_hashed(symbol_table, hash, symbol); in intern_symbol() 44 entry = _mesa_hash_table_insert_pre_hashed(symbol_table, hash, symbol, strdup(symbol)); in intern_symbol()
|
/third_party/node/deps/v8/src/compiler/ |
H A D | value-numbering-reducer.cc | 30 const size_t hash = NodeProperties::HashCode(node); in Reduce() local 38 entries_[hash & (kInitialCapacity - 1)] = node; in Reduce() 49 for (size_t i = hash & mask;; i = (i + 1) & mask) { in Reduce()
|
/third_party/protobuf/csharp/src/Google.Protobuf.Test.TestProtos/ |
H A D | OldExtensions1.cs | 94 int hash = 1; in GetHashCode() 96 hash ^= _unknownFields.GetHashCode(); in GetHashCode() 98 return hash; in GetHashCode()
|
/third_party/skia/third_party/externals/swiftshader/src/Device/ |
H A D | PixelProcessor.hpp | 115 uint32_t hash; member 180 struct hash<sw::PixelProcessor::State> struct 184 return state.hash; in operator ()()
|
/third_party/skia/third_party/externals/dawn/src/dawn_native/d3d12/ |
H A D | D3D11on12Util.cpp | 95 size_t hash = 0; in operator ()() local 96 HashCombine(&hash, a->mD3D11on12Device.Get()); in operator ()() 97 return hash; in operator ()()
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-subzero/lib/Support/ |
H A D | regex2.h | 100 * and a mask to pick out the relevant bit of each byte. A hash code 111 uch hash; /* hash code */ member 116 #define CHadd(cs, c) ((cs)->ptr[(uch)(c)] |= (cs)->mask, (cs)->hash += (c)) 117 #define CHsub(cs, c) ((cs)->ptr[(uch)(c)] &= ~(cs)->mask, (cs)->hash -= (c))
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Support/ |
H A D | regex2.h | 103 * and a mask to pick out the relevant bit of each byte. A hash code 114 uch hash; /* hash code */ member 119 #define CHadd(cs, c) ((cs)->ptr[(uch)(c)] |= (cs)->mask, (cs)->hash += (c)) 120 #define CHsub(cs, c) ((cs)->ptr[(uch)(c)] &= ~(cs)->mask, (cs)->hash -= (c))
|