/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_enrollee.c | 37 u8 *hash; in wps_build_e_hash() local 56 hash = wpabuf_put(msg, SHA256_MAC_LEN); in wps_build_e_hash() 66 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); in wps_build_e_hash() 67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash() 72 hash = wpabuf_put(msg, SHA256_MAC_LEN); in wps_build_e_hash() 76 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); in wps_build_e_hash() 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash() 567 u8 hash[WPS_HASH_LEN]; in wps_process_pubkey() local 568 sha256_vector(1, &pk, &pk_len, hash); in wps_process_pubkey() 569 if (os_memcmp_const(hash, wp in wps_process_pubkey() 626 u8 hash[SHA256_MAC_LEN]; wps_process_r_snonce1() local 666 u8 hash[SHA256_MAC_LEN]; wps_process_r_snonce2() local [all...] |
H A D | wps_common.c | 31 u8 hash[SHA256_MAC_LEN], *opos; in wps_kdf() local 51 hmac_sha256_vector(key, SHA256_MAC_LEN, 4, addr, len, hash); in wps_kdf() 53 os_memcpy(opos, hash, SHA256_MAC_LEN); in wps_kdf() 57 os_memcpy(opos, hash, left); in wps_kdf() 135 u8 hash[SHA256_MAC_LEN]; in wps_derive_psk() local 138 (dev_passwd_len + 1) / 2, hash) < 0) in wps_derive_psk() 140 os_memcpy(wps->psk1, hash, WPS_PSK_LEN); in wps_derive_psk() 143 dev_passwd_len / 2, hash) < 0) in wps_derive_psk() 145 os_memcpy(wps->psk2, hash, WPS_PSK_LEN); in wps_derive_psk() 504 u8 hash[SHA1_MAC_LE in uuid_gen_mac_addr() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_enrollee.c | 37 u8 *hash; in wps_build_e_hash() local 56 hash = wpabuf_put(msg, SHA256_MAC_LEN); in wps_build_e_hash() 66 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); in wps_build_e_hash() 67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash() 72 hash = wpabuf_put(msg, SHA256_MAC_LEN); in wps_build_e_hash() 76 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); in wps_build_e_hash() 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash() 567 u8 hash[WPS_HASH_LEN]; in wps_process_pubkey() local 568 sha256_vector(1, &pk, &pk_len, hash); in wps_process_pubkey() 569 if (os_memcmp_const(hash, wp in wps_process_pubkey() 626 u8 hash[SHA256_MAC_LEN]; wps_process_r_snonce1() local 666 u8 hash[SHA256_MAC_LEN]; wps_process_r_snonce2() local [all...] |
H A D | wps_common.c | 31 u8 hash[SHA256_MAC_LEN], *opos; in wps_kdf() local 51 hmac_sha256_vector(key, SHA256_MAC_LEN, 4, addr, len, hash); in wps_kdf() 53 os_memcpy(opos, hash, SHA256_MAC_LEN); in wps_kdf() 57 os_memcpy(opos, hash, left); in wps_kdf() 135 u8 hash[SHA256_MAC_LEN]; in wps_derive_psk() local 138 (dev_passwd_len + 1) / 2, hash) < 0) in wps_derive_psk() 140 os_memcpy(wps->psk1, hash, WPS_PSK_LEN); in wps_derive_psk() 143 dev_passwd_len / 2, hash) < 0) in wps_derive_psk() 145 os_memcpy(wps->psk2, hash, WPS_PSK_LEN); in wps_derive_psk() 504 u8 hash[SHA1_MAC_LE in uuid_gen_mac_addr() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_crypto.c | 306 wpa_printf(MSG_DEBUG, "DPP: Failed to hash public key"); in dpp_bootstrap_key_hash() 341 wpa_printf(MSG_DEBUG, "DPP: Failed to hash public key"); in dpp_keygen() 537 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", in dpp_bi_pubkey_hash() 546 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash (chirp)", in dpp_bi_pubkey_hash() 559 wpa_printf(MSG_DEBUG, "DPP: Failed to hash public key"); in dpp_get_subject_public_key() 670 u8 hash[SHA256_MAC_LEN]; in dpp_check_pubkey_match() local 683 res = sha256_vector(1, addr, len, hash); in dpp_check_pubkey_match() 687 if (os_memcmp(hash, wpabuf_head(r_hash), SHA256_MAC_LEN) != 0) { in dpp_check_pubkey_match() 689 "DPP: Received hash value does not match calculated public key hash valu in dpp_check_pubkey_match() 710 u8 *hash = NULL; dpp_process_signed_connector() local 1153 u8 hash[SHA256_MAC_LEN]; dpp_derive_pmkid() local 1440 u8 hash[DPP_MAX_HASH_LEN]; dpp_pkex_derive_Qi() local 1515 u8 hash[DPP_MAX_HASH_LEN]; dpp_pkex_derive_Qr() local 1883 u8 *hash; dpp_build_conn_signature() local [all...] |
/third_party/skia/third_party/externals/dawn/src/tests/unittests/native/ |
H A D | DestroyObjectTests.cpp | 253 // ComputePipelines usually set their hash values at construction, but the mock does not, so in TEST_F() 255 constexpr size_t hash = 0x12345; in TEST_F() local 257 computePipelineMock->SetContentHash(hash); in TEST_F() 258 ON_CALL(*computePipelineMock, ComputeContentHash).WillByDefault(Return(hash)); in TEST_F() 360 // RenderPipelines usually set their hash values at construction, but the mock does not, so in TEST_F() 362 constexpr size_t hash = 0x12345; in TEST_F() local 364 renderPipelineMock->SetContentHash(hash); in TEST_F() 365 ON_CALL(*renderPipelineMock, ComputeContentHash).WillByDefault(Return(hash)); in TEST_F() 619 // Compute pipelines usually set their hash values at construction, but the mock does in TEST_F() 621 constexpr size_t hash in TEST_F() local 668 constexpr size_t hash = 0x12345; TEST_F() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_write.c | 581 u8 hash[100], *hpos; in tls_write_client_certificate_verify() local 612 * The hash values are calculated over all handshake messages sent or in tls_write_client_certificate_verify() 618 hpos = hash; in tls_write_client_certificate_verify() 647 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify() 649 os_memcpy(hash, "\x30\x31\x30\x0d\x06\x09\x60\x86\x48\x01\x65" in tls_write_client_certificate_verify() 683 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_write_client_certificate_verify() 690 * hash algorithms. in tls_write_client_certificate_verify() 693 * HashAlgorithm hash; in tls_write_client_certificate_verify() 787 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_client_finished() local [all...] |
H A D | tlsv1_server_write.c | 564 u8 hash[100]; in tls_write_server_key_exchange() local 575 pos - server_params, hash + 19); in tls_write_server_key_exchange() 580 * signature and hash algorithms. in tls_write_server_key_exchange() 583 * HashAlgorithm hash; in tls_write_server_key_exchange() 610 os_memcpy(hash, in tls_write_server_key_exchange() 623 pos - server_params, hash); in tls_write_server_key_exchange() 632 wpa_hexdump(MSG_MSGDUMP, "TLS: ServerKeyExchange signed_params hash", in tls_write_server_key_exchange() 633 hash, hlen); in tls_write_server_key_exchange() 636 tlsv1_server_log(conn, "TESTING: Break ServerKeyExchange signed params hash"); in tls_write_server_key_exchange() 637 hash[hle in tls_write_server_key_exchange() 837 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_server_finished() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_write.c | 569 u8 hash[100], *hpos; in tls_write_client_certificate_verify() local 600 * The hash values are calculated over all handshake messages sent or in tls_write_client_certificate_verify() 606 hpos = hash; in tls_write_client_certificate_verify() 635 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify() 637 os_memcpy(hash, "\x30\x31\x30\x0d\x06\x09\x60\x86\x48\x01\x65" in tls_write_client_certificate_verify() 671 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_write_client_certificate_verify() 678 * hash algorithms. in tls_write_client_certificate_verify() 681 * HashAlgorithm hash; in tls_write_client_certificate_verify() 775 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_client_finished() local [all...] |
H A D | tlsv1_server_write.c | 564 u8 hash[100]; in tls_write_server_key_exchange() local 575 pos - server_params, hash + 19); in tls_write_server_key_exchange() 580 * signature and hash algorithms. in tls_write_server_key_exchange() 583 * HashAlgorithm hash; in tls_write_server_key_exchange() 610 os_memcpy(hash, in tls_write_server_key_exchange() 623 pos - server_params, hash); in tls_write_server_key_exchange() 632 wpa_hexdump(MSG_MSGDUMP, "TLS: ServerKeyExchange signed_params hash", in tls_write_server_key_exchange() 633 hash, hlen); in tls_write_server_key_exchange() 636 tlsv1_server_log(conn, "TESTING: Break ServerKeyExchange signed params hash"); in tls_write_server_key_exchange() 637 hash[hle in tls_write_server_key_exchange() 837 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_server_finished() local [all...] |
/third_party/jerryscript/jerry-core/ecma/base/ |
H A D | ecma-helpers-string.c | 221 symbol_p->header.u.hash = (lit_string_hash_t) (((uintptr_t) symbol_p) >> ECMA_SYMBOL_HASH_SHIFT); in ecma_new_symbol_from_descriptor_string() 222 JERRY_ASSERT ((symbol_p->header.u.hash & ECMA_GLOBAL_SYMBOL_FLAG) == 0); in ecma_new_symbol_from_descriptor_string() 357 string_desc_p->u.hash = lit_utf8_string_calc_hash (string_p, string_size); in ecma_new_ecma_string_from_utf8() 377 string_desc_p->header.u.hash = lit_utf8_string_calc_hash (string_p, size); in ecma_new_nonref_ecma_string_from_utf8() 387 string_desc_p->header.u.hash = lit_utf8_string_calc_hash (string_p, size); in ecma_new_nonref_ecma_string_from_utf8() 396 string_desc_p->header.u.hash = lit_utf8_string_calc_hash (string_p, size); in ecma_new_nonref_ecma_string_from_utf8() 481 string_desc_p->u.hash = lit_utf8_string_calc_hash (begin_data_p, converted_string_size); in ecma_new_ecma_string_from_utf8_converted_to_cesu8() 612 string_desc_p->u.hash = lit_utf8_string_calc_hash (str_buf, str_size); in ecma_new_ecma_string_from_number() 732 hash_start = string1_p->u.hash; in ecma_append_chars_to_string() 735 string_desc_p->u.hash in ecma_append_chars_to_string() 2789 const lit_string_hash_t hash = lit_utf8_string_calc_hash (string_begin_p, string_size); ecma_stringbuilder_finalize() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius.c | 526 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_acct_req() local 537 md5_vector(4, addr, len, hash); in radius_msg_verify_acct_req() 538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() 549 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_das_req() local 565 md5_vector(4, addr, len, hash); in radius_msg_verify_das_req() 566 if (os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0) in radius_msg_verify_das_req() 854 u8 hash[MD5_MAC_LEN]; in radius_msg_verify() local 876 if (md5_vector(4, addr, len, hash) < 0 || in radius_msg_verify() 877 os_memcmp_const(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { in radius_msg_verify() 988 u8 hash[MD5_MAC_LE in decrypt_ms_key() local 1065 u8 hash[MD5_MAC_LEN], saltbuf[2], *pos; encrypt_ms_key() local 1296 u8 hash[16]; radius_user_password_hide() local 1565 u8 hash[16]; radius_msg_get_tunnel_password() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius.c | 526 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_acct_req() local 537 md5_vector(4, addr, len, hash); in radius_msg_verify_acct_req() 538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() 549 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_das_req() local 565 md5_vector(4, addr, len, hash); in radius_msg_verify_das_req() 566 if (os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0) in radius_msg_verify_das_req() 854 u8 hash[MD5_MAC_LEN]; in radius_msg_verify() local 876 if (md5_vector(4, addr, len, hash) < 0 || in radius_msg_verify() 877 os_memcmp_const(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { in radius_msg_verify() 988 u8 hash[MD5_MAC_LE in decrypt_ms_key() local 1065 u8 hash[MD5_MAC_LEN], saltbuf[2], *pos; encrypt_ms_key() local 1296 u8 hash[16]; radius_user_password_hide() local 1565 u8 hash[16]; radius_msg_get_tunnel_password() local [all...] |
/foundation/ability/idl_tool/idl_tool_2/util/ |
H A D | string_helper.cpp | 196 unsigned int hash = 0;
in GetHashCode() local 201 hash = hash * seed + (*string);
in GetHashCode() 204 return (hash & 0x7FFFFFFF);
in GetHashCode()
|
/foundation/graphic/graphic_2d/rosen/modules/render_service_base/src/render/ |
H A D | rs_blur_filter.cpp | 39 hash_ = SkOpts::hash(&type_, sizeof(type_), 0); in RSBlurFilter() 40 hash_ = SkOpts::hash(&blurRadiusXForHash, sizeof(blurRadiusXForHash), hash_); in RSBlurFilter() 41 hash_ = SkOpts::hash(&blurRadiusYForHash, sizeof(blurRadiusYForHash), hash_); in RSBlurFilter() 80 result->hash_ = SkOpts::hash(&otherHash, sizeof(otherHash), hash_); in Compose()
|
/third_party/ffmpeg/libavcodec/ |
H A D | lzwenc.c | 42 /** One code in hash table */ 55 int tabsize; ///< Number of values in hash table 74 * @return New hash value 76 static inline int hash(int head, const int add) in hash() function 86 * Hash function calculates next hash value 87 * @param head Actual hash code 89 * @return New hash value 100 * Hash function calculates hash offset 101 * @param head Actual hash code 133 int h = hash(FFMA in findCode() [all...] |
/third_party/icu/ohos_icu4j/src/main/tests/ohos/global/icu/dev/test/util/ |
H A D | DataDrivenTestHelper.java | 125 int hash = line.indexOf('#'); in load() 128 if (hash >= 0) { in load() 129 commentBase = line.substring(hash+1).trim(); in load() 130 line = line.substring(0,hash).trim(); in load()
|
/third_party/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/util/ |
H A D | DataDrivenTestHelper.java | 124 int hash = line.indexOf('#'); in load() 127 if (hash >= 0) { in load() 128 commentBase = line.substring(hash+1).trim(); in load() 129 line = line.substring(0,hash).trim(); in load()
|
/third_party/mbedtls/library/ |
H A D | psa_crypto_core.h | 28 * Tell if PSA is ready for this hash. 33 * \param hash_alg The hash algorithm (ignored for now). 388 /** Sign a message with a private key. For hash-and-sign algorithms, 432 * a hash-and-sign verification algorithm. 468 /** Sign an already-calculated hash with a private key. 481 * \param[in] hash The hash or message to sign. 482 * \param[in] hash_length Size of the \p hash buffer in bytes. 504 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, 508 * \brief Verify the signature a hash o [all...] |
/third_party/node/deps/openssl/openssl/util/perl/OpenSSL/Config/ |
H A D | Query.pm | 51 A reference to a unified information hash table, most commonly known as 56 A reference to a config information hash table, most commonly known as 96 The returned result is a hash table reference, with each key being one of 141 The returned result is a hash table reference, with each key being one of
|
/third_party/rust/crates/clap/src/builder/ |
H A D | os_str.rs | 331 impl std::hash::Hash for Inner { 333 fn hash<H: std::hash::Hasher>(&self, state: &mut H) { in hash() functions 334 self.as_os_str().hash(state); in hash()
|
/third_party/openssl/util/perl/OpenSSL/Config/ |
H A D | Query.pm | 51 A reference to a unified information hash table, most commonly known as 56 A reference to a config information hash table, most commonly known as 96 The returned result is a hash table reference, with each key being one of 141 The returned result is a hash table reference, with each key being one of
|
/third_party/protobuf/csharp/src/Google.Protobuf/WellKnownTypes/ |
H A D | FieldMask.cs | 313 int hash = 1; in GetHashCode() 314 hash ^= paths_.GetHashCode(); in GetHashCode() 316 hash ^= _unknownFields.GetHashCode(); in GetHashCode() 318 return hash; in GetHashCode()
|
H A D | SourceContext.cs | 119 int hash = 1; in GetHashCode() 120 if (FileName.Length != 0) hash ^= FileName.GetHashCode(); in GetHashCode() 122 hash ^= _unknownFields.GetHashCode(); in GetHashCode() 124 return hash; in GetHashCode()
|
/third_party/protobuf/csharp/src/Google.Protobuf.Test.TestProtos/ |
H A D | UnittestImport.cs | 145 int hash = 1; in GetHashCode() 146 if (HasD) hash ^= D.GetHashCode(); in GetHashCode() 148 hash ^= _unknownFields.GetHashCode(); in GetHashCode() 150 return hash; in GetHashCode()
|