Home
last modified time | relevance | path

Searched refs:hash (Results 601 - 625 of 2318) sorted by relevance

1...<<21222324252627282930>>...93

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/
H A Dwps_enrollee.c37 u8 *hash; in wps_build_e_hash() local
56 hash = wpabuf_put(msg, SHA256_MAC_LEN); in wps_build_e_hash()
66 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); in wps_build_e_hash()
67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash()
72 hash = wpabuf_put(msg, SHA256_MAC_LEN); in wps_build_e_hash()
76 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); in wps_build_e_hash()
77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash()
567 u8 hash[WPS_HASH_LEN]; in wps_process_pubkey() local
568 sha256_vector(1, &pk, &pk_len, hash); in wps_process_pubkey()
569 if (os_memcmp_const(hash, wp in wps_process_pubkey()
626 u8 hash[SHA256_MAC_LEN]; wps_process_r_snonce1() local
666 u8 hash[SHA256_MAC_LEN]; wps_process_r_snonce2() local
[all...]
H A Dwps_common.c31 u8 hash[SHA256_MAC_LEN], *opos; in wps_kdf() local
51 hmac_sha256_vector(key, SHA256_MAC_LEN, 4, addr, len, hash); in wps_kdf()
53 os_memcpy(opos, hash, SHA256_MAC_LEN); in wps_kdf()
57 os_memcpy(opos, hash, left); in wps_kdf()
135 u8 hash[SHA256_MAC_LEN]; in wps_derive_psk() local
138 (dev_passwd_len + 1) / 2, hash) < 0) in wps_derive_psk()
140 os_memcpy(wps->psk1, hash, WPS_PSK_LEN); in wps_derive_psk()
143 dev_passwd_len / 2, hash) < 0) in wps_derive_psk()
145 os_memcpy(wps->psk2, hash, WPS_PSK_LEN); in wps_derive_psk()
504 u8 hash[SHA1_MAC_LE in uuid_gen_mac_addr() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/
H A Dwps_enrollee.c37 u8 *hash; in wps_build_e_hash() local
56 hash = wpabuf_put(msg, SHA256_MAC_LEN); in wps_build_e_hash()
66 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); in wps_build_e_hash()
67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash()
72 hash = wpabuf_put(msg, SHA256_MAC_LEN); in wps_build_e_hash()
76 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); in wps_build_e_hash()
77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash()
567 u8 hash[WPS_HASH_LEN]; in wps_process_pubkey() local
568 sha256_vector(1, &pk, &pk_len, hash); in wps_process_pubkey()
569 if (os_memcmp_const(hash, wp in wps_process_pubkey()
626 u8 hash[SHA256_MAC_LEN]; wps_process_r_snonce1() local
666 u8 hash[SHA256_MAC_LEN]; wps_process_r_snonce2() local
[all...]
H A Dwps_common.c31 u8 hash[SHA256_MAC_LEN], *opos; in wps_kdf() local
51 hmac_sha256_vector(key, SHA256_MAC_LEN, 4, addr, len, hash); in wps_kdf()
53 os_memcpy(opos, hash, SHA256_MAC_LEN); in wps_kdf()
57 os_memcpy(opos, hash, left); in wps_kdf()
135 u8 hash[SHA256_MAC_LEN]; in wps_derive_psk() local
138 (dev_passwd_len + 1) / 2, hash) < 0) in wps_derive_psk()
140 os_memcpy(wps->psk1, hash, WPS_PSK_LEN); in wps_derive_psk()
143 dev_passwd_len / 2, hash) < 0) in wps_derive_psk()
145 os_memcpy(wps->psk2, hash, WPS_PSK_LEN); in wps_derive_psk()
504 u8 hash[SHA1_MAC_LE in uuid_gen_mac_addr() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp_crypto.c306 wpa_printf(MSG_DEBUG, "DPP: Failed to hash public key"); in dpp_bootstrap_key_hash()
341 wpa_printf(MSG_DEBUG, "DPP: Failed to hash public key"); in dpp_keygen()
537 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", in dpp_bi_pubkey_hash()
546 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash (chirp)", in dpp_bi_pubkey_hash()
559 wpa_printf(MSG_DEBUG, "DPP: Failed to hash public key"); in dpp_get_subject_public_key()
670 u8 hash[SHA256_MAC_LEN]; in dpp_check_pubkey_match() local
683 res = sha256_vector(1, addr, len, hash); in dpp_check_pubkey_match()
687 if (os_memcmp(hash, wpabuf_head(r_hash), SHA256_MAC_LEN) != 0) { in dpp_check_pubkey_match()
689 "DPP: Received hash value does not match calculated public key hash valu in dpp_check_pubkey_match()
710 u8 *hash = NULL; dpp_process_signed_connector() local
1153 u8 hash[SHA256_MAC_LEN]; dpp_derive_pmkid() local
1440 u8 hash[DPP_MAX_HASH_LEN]; dpp_pkex_derive_Qi() local
1515 u8 hash[DPP_MAX_HASH_LEN]; dpp_pkex_derive_Qr() local
1883 u8 *hash; dpp_build_conn_signature() local
[all...]
/third_party/skia/third_party/externals/dawn/src/tests/unittests/native/
H A DDestroyObjectTests.cpp253 // ComputePipelines usually set their hash values at construction, but the mock does not, so in TEST_F()
255 constexpr size_t hash = 0x12345; in TEST_F() local
257 computePipelineMock->SetContentHash(hash); in TEST_F()
258 ON_CALL(*computePipelineMock, ComputeContentHash).WillByDefault(Return(hash)); in TEST_F()
360 // RenderPipelines usually set their hash values at construction, but the mock does not, so in TEST_F()
362 constexpr size_t hash = 0x12345; in TEST_F() local
364 renderPipelineMock->SetContentHash(hash); in TEST_F()
365 ON_CALL(*renderPipelineMock, ComputeContentHash).WillByDefault(Return(hash)); in TEST_F()
619 // Compute pipelines usually set their hash values at construction, but the mock does in TEST_F()
621 constexpr size_t hash in TEST_F() local
668 constexpr size_t hash = 0x12345; TEST_F() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_client_write.c581 u8 hash[100], *hpos; in tls_write_client_certificate_verify() local
612 * The hash values are calculated over all handshake messages sent or in tls_write_client_certificate_verify()
618 hpos = hash; in tls_write_client_certificate_verify()
647 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify()
649 os_memcpy(hash, "\x30\x31\x30\x0d\x06\x09\x60\x86\x48\x01\x65" in tls_write_client_certificate_verify()
683 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_write_client_certificate_verify()
690 * hash algorithms. in tls_write_client_certificate_verify()
693 * HashAlgorithm hash; in tls_write_client_certificate_verify()
787 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_client_finished() local
[all...]
H A Dtlsv1_server_write.c564 u8 hash[100]; in tls_write_server_key_exchange() local
575 pos - server_params, hash + 19); in tls_write_server_key_exchange()
580 * signature and hash algorithms. in tls_write_server_key_exchange()
583 * HashAlgorithm hash; in tls_write_server_key_exchange()
610 os_memcpy(hash, in tls_write_server_key_exchange()
623 pos - server_params, hash); in tls_write_server_key_exchange()
632 wpa_hexdump(MSG_MSGDUMP, "TLS: ServerKeyExchange signed_params hash", in tls_write_server_key_exchange()
633 hash, hlen); in tls_write_server_key_exchange()
636 tlsv1_server_log(conn, "TESTING: Break ServerKeyExchange signed params hash"); in tls_write_server_key_exchange()
637 hash[hle in tls_write_server_key_exchange()
837 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_server_finished() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client_write.c569 u8 hash[100], *hpos; in tls_write_client_certificate_verify() local
600 * The hash values are calculated over all handshake messages sent or in tls_write_client_certificate_verify()
606 hpos = hash; in tls_write_client_certificate_verify()
635 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify()
637 os_memcpy(hash, "\x30\x31\x30\x0d\x06\x09\x60\x86\x48\x01\x65" in tls_write_client_certificate_verify()
671 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_write_client_certificate_verify()
678 * hash algorithms. in tls_write_client_certificate_verify()
681 * HashAlgorithm hash; in tls_write_client_certificate_verify()
775 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_client_finished() local
[all...]
H A Dtlsv1_server_write.c564 u8 hash[100]; in tls_write_server_key_exchange() local
575 pos - server_params, hash + 19); in tls_write_server_key_exchange()
580 * signature and hash algorithms. in tls_write_server_key_exchange()
583 * HashAlgorithm hash; in tls_write_server_key_exchange()
610 os_memcpy(hash, in tls_write_server_key_exchange()
623 pos - server_params, hash); in tls_write_server_key_exchange()
632 wpa_hexdump(MSG_MSGDUMP, "TLS: ServerKeyExchange signed_params hash", in tls_write_server_key_exchange()
633 hash, hlen); in tls_write_server_key_exchange()
636 tlsv1_server_log(conn, "TESTING: Break ServerKeyExchange signed params hash"); in tls_write_server_key_exchange()
637 hash[hle in tls_write_server_key_exchange()
837 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_write_server_finished() local
[all...]
/third_party/jerryscript/jerry-core/ecma/base/
H A Decma-helpers-string.c221 symbol_p->header.u.hash = (lit_string_hash_t) (((uintptr_t) symbol_p) >> ECMA_SYMBOL_HASH_SHIFT); in ecma_new_symbol_from_descriptor_string()
222 JERRY_ASSERT ((symbol_p->header.u.hash & ECMA_GLOBAL_SYMBOL_FLAG) == 0); in ecma_new_symbol_from_descriptor_string()
357 string_desc_p->u.hash = lit_utf8_string_calc_hash (string_p, string_size); in ecma_new_ecma_string_from_utf8()
377 string_desc_p->header.u.hash = lit_utf8_string_calc_hash (string_p, size); in ecma_new_nonref_ecma_string_from_utf8()
387 string_desc_p->header.u.hash = lit_utf8_string_calc_hash (string_p, size); in ecma_new_nonref_ecma_string_from_utf8()
396 string_desc_p->header.u.hash = lit_utf8_string_calc_hash (string_p, size); in ecma_new_nonref_ecma_string_from_utf8()
481 string_desc_p->u.hash = lit_utf8_string_calc_hash (begin_data_p, converted_string_size); in ecma_new_ecma_string_from_utf8_converted_to_cesu8()
612 string_desc_p->u.hash = lit_utf8_string_calc_hash (str_buf, str_size); in ecma_new_ecma_string_from_number()
732 hash_start = string1_p->u.hash; in ecma_append_chars_to_string()
735 string_desc_p->u.hash in ecma_append_chars_to_string()
2789 const lit_string_hash_t hash = lit_utf8_string_calc_hash (string_begin_p, string_size); ecma_stringbuilder_finalize() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
H A Dradius.c526 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_acct_req() local
537 md5_vector(4, addr, len, hash); in radius_msg_verify_acct_req()
538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req()
549 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_das_req() local
565 md5_vector(4, addr, len, hash); in radius_msg_verify_das_req()
566 if (os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0) in radius_msg_verify_das_req()
854 u8 hash[MD5_MAC_LEN]; in radius_msg_verify() local
876 if (md5_vector(4, addr, len, hash) < 0 || in radius_msg_verify()
877 os_memcmp_const(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { in radius_msg_verify()
988 u8 hash[MD5_MAC_LE in decrypt_ms_key() local
1065 u8 hash[MD5_MAC_LEN], saltbuf[2], *pos; encrypt_ms_key() local
1296 u8 hash[16]; radius_user_password_hide() local
1565 u8 hash[16]; radius_msg_get_tunnel_password() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
H A Dradius.c526 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_acct_req() local
537 md5_vector(4, addr, len, hash); in radius_msg_verify_acct_req()
538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req()
549 u8 hash[MD5_MAC_LEN]; in radius_msg_verify_das_req() local
565 md5_vector(4, addr, len, hash); in radius_msg_verify_das_req()
566 if (os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0) in radius_msg_verify_das_req()
854 u8 hash[MD5_MAC_LEN]; in radius_msg_verify() local
876 if (md5_vector(4, addr, len, hash) < 0 || in radius_msg_verify()
877 os_memcmp_const(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { in radius_msg_verify()
988 u8 hash[MD5_MAC_LE in decrypt_ms_key() local
1065 u8 hash[MD5_MAC_LEN], saltbuf[2], *pos; encrypt_ms_key() local
1296 u8 hash[16]; radius_user_password_hide() local
1565 u8 hash[16]; radius_msg_get_tunnel_password() local
[all...]
/foundation/ability/idl_tool/idl_tool_2/util/
H A Dstring_helper.cpp196 unsigned int hash = 0; in GetHashCode() local
201 hash = hash * seed + (*string); in GetHashCode()
204 return (hash & 0x7FFFFFFF); in GetHashCode()
/foundation/graphic/graphic_2d/rosen/modules/render_service_base/src/render/
H A Drs_blur_filter.cpp39 hash_ = SkOpts::hash(&type_, sizeof(type_), 0); in RSBlurFilter()
40 hash_ = SkOpts::hash(&blurRadiusXForHash, sizeof(blurRadiusXForHash), hash_); in RSBlurFilter()
41 hash_ = SkOpts::hash(&blurRadiusYForHash, sizeof(blurRadiusYForHash), hash_); in RSBlurFilter()
80 result->hash_ = SkOpts::hash(&otherHash, sizeof(otherHash), hash_); in Compose()
/third_party/ffmpeg/libavcodec/
H A Dlzwenc.c42 /** One code in hash table */
55 int tabsize; ///< Number of values in hash table
74 * @return New hash value
76 static inline int hash(int head, const int add) in hash() function
86 * Hash function calculates next hash value
87 * @param head Actual hash code
89 * @return New hash value
100 * Hash function calculates hash offset
101 * @param head Actual hash code
133 int h = hash(FFMA in findCode()
[all...]
/third_party/icu/ohos_icu4j/src/main/tests/ohos/global/icu/dev/test/util/
H A DDataDrivenTestHelper.java125 int hash = line.indexOf('#'); in load()
128 if (hash >= 0) { in load()
129 commentBase = line.substring(hash+1).trim(); in load()
130 line = line.substring(0,hash).trim(); in load()
/third_party/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/util/
H A DDataDrivenTestHelper.java124 int hash = line.indexOf('#'); in load()
127 if (hash >= 0) { in load()
128 commentBase = line.substring(hash+1).trim(); in load()
129 line = line.substring(0,hash).trim(); in load()
/third_party/mbedtls/library/
H A Dpsa_crypto_core.h28 * Tell if PSA is ready for this hash.
33 * \param hash_alg The hash algorithm (ignored for now).
388 /** Sign a message with a private key. For hash-and-sign algorithms,
432 * a hash-and-sign verification algorithm.
468 /** Sign an already-calculated hash with a private key.
481 * \param[in] hash The hash or message to sign.
482 * \param[in] hash_length Size of the \p hash buffer in bytes.
504 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length,
508 * \brief Verify the signature a hash o
[all...]
/third_party/node/deps/openssl/openssl/util/perl/OpenSSL/Config/
H A DQuery.pm51 A reference to a unified information hash table, most commonly known as
56 A reference to a config information hash table, most commonly known as
96 The returned result is a hash table reference, with each key being one of
141 The returned result is a hash table reference, with each key being one of
/third_party/rust/crates/clap/src/builder/
H A Dos_str.rs331 impl std::hash::Hash for Inner {
333 fn hash<H: std::hash::Hasher>(&self, state: &mut H) { in hash() functions
334 self.as_os_str().hash(state); in hash()
/third_party/openssl/util/perl/OpenSSL/Config/
H A DQuery.pm51 A reference to a unified information hash table, most commonly known as
56 A reference to a config information hash table, most commonly known as
96 The returned result is a hash table reference, with each key being one of
141 The returned result is a hash table reference, with each key being one of
/third_party/protobuf/csharp/src/Google.Protobuf/WellKnownTypes/
H A DFieldMask.cs313 int hash = 1; in GetHashCode()
314 hash ^= paths_.GetHashCode(); in GetHashCode()
316 hash ^= _unknownFields.GetHashCode(); in GetHashCode()
318 return hash; in GetHashCode()
H A DSourceContext.cs119 int hash = 1; in GetHashCode()
120 if (FileName.Length != 0) hash ^= FileName.GetHashCode(); in GetHashCode()
122 hash ^= _unknownFields.GetHashCode(); in GetHashCode()
124 return hash; in GetHashCode()
/third_party/protobuf/csharp/src/Google.Protobuf.Test.TestProtos/
H A DUnittestImport.cs145 int hash = 1; in GetHashCode()
146 if (HasD) hash ^= D.GetHashCode(); in GetHashCode()
148 hash ^= _unknownFields.GetHashCode(); in GetHashCode()
150 return hash; in GetHashCode()

Completed in 22 milliseconds

1...<<21222324252627282930>>...93