/third_party/openssl/util/perl/OpenSSL/Util/ |
H A D | Pod.pm | 48 GLOB (a file handle). The result is given back as a hash table. 50 The additional hash is for extra parameters: 71 =item B<extract_pod_info> returns a hash table with the following
|
/third_party/protobuf/csharp/src/Google.Protobuf/WellKnownTypes/ |
H A D | Empty.cs | 108 int hash = 1; in GetHashCode() 110 hash ^= _unknownFields.GetHashCode(); in GetHashCode() 112 return hash; in GetHashCode()
|
/third_party/protobuf/csharp/src/Google.Protobuf.Test.TestProtos/ |
H A D | UnittestIssue6936B.cs | 95 int hash = 1; in GetHashCode() 97 hash ^= _unknownFields.GetHashCode(); in GetHashCode() 99 return hash; in GetHashCode()
|
H A D | UnittestSelfreferentialOptions.cs | 187 int hash = 1; in GetHashCode() 188 if (HasIntOpt) hash ^= IntOpt.GetHashCode(); in GetHashCode() 189 if (HasFoo) hash ^= Foo.GetHashCode(); in GetHashCode() 191 hash ^= _extensions.GetHashCode(); in GetHashCode() 194 hash ^= _unknownFields.GetHashCode(); in GetHashCode() 196 return hash; in GetHashCode()
|
/third_party/skia/third_party/externals/angle2/src/common/serializer/ |
H A D | JsonSerializer_unittest.cpp | 111 "test2-hash": "SHA1:4315724B1AB1EB2C0128E8E9DAD6D76254BA711D", in TEST_F() 155 "test2-hash": "SHA1:6216A439C16A113E2F1E53AB63FB88877D3597F5", in TEST_F() 199 "test2-hash": "SHA1:0BA7C0DE700CE0F8018D084B8CF447B150A9465D", in TEST_F()
|
/third_party/skia/third_party/externals/dawn/src/dawn_native/d3d12/ |
H A D | SamplerHeapCacheD3D12.cpp | 155 size_t hash = 0; in operator ()() local 157 HashCombine(&hash, sampler); in operator ()() 159 return hash; in operator ()()
|
/third_party/skia/third_party/externals/swiftshader/third_party/subzero/src/ |
H A D | IceStringPool.h | 169 template <typename T> struct hash<Ice::StringID<T>> { struct 172 return hash<std::string>()(Key.toString()); in operator ()() 173 return hash<Ice::StringPool::IDType>()(Key.getID()); in operator ()()
|
/third_party/skia/tools/gpu/ |
H A D | MemoryCache.cpp | 71 SkMD5 hash; in writeShadersToDisk() local 77 // Additionally, we don't want to hash the tag bytes, so we get the same keys as GL, in writeShadersToDisk() 88 hash.write(it->first.fKey->bytes(), bytesToHash); in writeShadersToDisk() 89 SkMD5::Digest digest = hash.finish(); in writeShadersToDisk()
|
/third_party/vk-gl-cts/scripts/khr_util/ |
H A D | registry_cache.py | 44 return hash((self.repository, self.filename, self.revision, self.checksum)) 72 hash = hashlib.sha256(dataFiltered.encode("utf-8")).hexdigest() 73 return hash
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_md5.c | 104 u8 hash[CHAP_MD5_LEN], id; in eap_md5_process() local 123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process() 129 if (os_memcmp_const(hash, pos, CHAP_MD5_LEN) == 0) { in eap_md5_process()
|
/third_party/rust/crates/libc/src/unix/linux_like/linux/gnu/ |
H A D | mod.rs | 539 impl ::hash::Hash for utmpx { 540 fn hash<H: ::hash::Hasher>(&self, state: &mut H) { in hash() functions 541 self.ut_type.hash(state); in hash() 542 self.ut_pid.hash(state); in hash() 543 self.ut_line.hash(state); in hash() 544 self.ut_id.hash(state); in hash() 545 self.ut_user.hash(state); in hash() 546 self.ut_host.hash(state); in hash() 547 self.ut_exit.hash(stat in hash() 584 fn hash<H: ::hash::Hasher>(&self, state: &mut H) { hash() functions [all...] |
/third_party/elfio/elfio/ |
H A D | elfio_symbols.hpp | 352 uint32_t hash = elf_gnu_hash( (const unsigned char*)name.c_str() ); in gnu_hash_lookup() local 353 uint32_t bloom_index = ( hash / ( 8 * sizeof( T ) ) ) % bloom_size; in gnu_hash_lookup() 355 ( (T)1 << ( hash % ( 8 * sizeof( T ) ) ) ) | in gnu_hash_lookup() 356 ( (T)1 << ( ( hash >> bloom_shift ) % ( 8 * sizeof( T ) ) ) ); in gnu_hash_lookup() 362 uint32_t bucket = hash % nbuckets; in gnu_hash_lookup() 377 if ( ( chain_hash >> 1 ) == ( hash >> 1 ) && in gnu_hash_lookup()
|
/third_party/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/ |
H A D | Trie2.java | 320 int hash = initHash(); in hashCode() 322 hash = hashInt(hash, r.hashCode()); in hashCode() 324 if (hash == 0) { in hashCode() 325 hash = 1; in hashCode() 327 fHash = hash; in hashCode() 689 // the same hash on a frozen Trie2, no damage is done. 1026 // Hashing implementation functions. FNV hash. Respected public domain algorithm.
|
/third_party/icu/ohos_icu4j/src/main/java/ohos/global/icu/impl/ |
H A D | Trie2.java | 322 int hash = initHash(); in hashCode() 324 hash = hashInt(hash, r.hashCode()); in hashCode() 326 if (hash == 0) { in hashCode() 327 hash = 1; in hashCode() 329 fHash = hash; in hashCode() 695 // the same hash on a frozen Trie2, no damage is done. 1032 // Hashing implementation functions. FNV hash. Respected public domain algorithm.
|
/third_party/mbedtls/library/ |
H A D | psa_crypto_driver_wrappers.h | 101 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, 107 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, 120 const uint8_t *hash, size_t hash_length); 134 const uint8_t *hash, size_t hash_length, 254 uint8_t *hash, 273 uint8_t *hash,
|
H A D | psa_crypto_rsa.c | 286 /* Decode the hash algorithm from alg and store the mbedtls encoding in 287 * md_alg. Verify that the hash length is acceptable. */ 295 /* The Mbed TLS RSA module uses an unsigned int for hash length in psa_rsa_decode_md_type() 304 /* For signatures using a hash, the hash length must be correct. */ in psa_rsa_decode_md_type() 320 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, in mbedtls_psa_rsa_sign_hash() 356 hash, in mbedtls_psa_rsa_sign_hash() 371 hash, in mbedtls_psa_rsa_sign_hash() 402 * up to the hash length. */ in rsa_pss_expected_salt_len() 419 psa_algorithm_t alg, const uint8_t *hash, size_ in mbedtls_psa_rsa_verify_hash() 317 mbedtls_psa_rsa_sign_hash( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, uint8_t *signature, size_t signature_size, size_t *signature_length) mbedtls_psa_rsa_sign_hash() argument 416 mbedtls_psa_rsa_verify_hash( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, const uint8_t *signature, size_t signature_length) mbedtls_psa_rsa_verify_hash() argument [all...] |
/third_party/mesa3d/src/gallium/drivers/r600/sfn/ |
H A D | sfn_nir_vectorize_vs_inputs.c | 226 #define HASH(hash, data) XXH32(&(data), sizeof(data), (hash)) 237 uint32_t hash = 0; in r600_hash_instr() local 239 hash = HASH(hash, var->type); in r600_hash_instr() 240 return HASH(hash, var->data.location); in r600_hash_instr() 296 * of the hash set interfaces. The hash set assumes that we're only in r600_vec_instr_set_remove()
|
/third_party/node/deps/v8/src/compiler/ |
H A D | state-values-utils.cc | 110 size_t hash = count; in StateValuesHashKey() local 112 hash = hash * 23 + (nodes[i] == nullptr ? 0 : nodes[i]->id()); in StateValuesHashKey() 114 return static_cast<int>(hash & 0x7FFFFFFF); in StateValuesHashKey() 122 int hash = StateValuesHashKey(nodes, count); in GetValuesNodeFromCache() local 123 ZoneHashMap::Entry* lookup = hash_map_.LookupOrInsert(&key, hash); in GetValuesNodeFromCache()
|
/third_party/mesa3d/src/gallium/drivers/d3d12/ |
H A D | d3d12_pipeline_state.cpp | 352 uint32_t hash = hash_gfx_pipeline_state(&ctx->gfx_pipeline_state); in d3d12_get_gfx_pipeline_state() local 353 struct hash_entry *entry = _mesa_hash_table_search_pre_hashed(ctx->pso_cache, hash, in d3d12_get_gfx_pipeline_state() 367 entry = _mesa_hash_table_insert_pre_hashed(ctx->pso_cache, hash, &data->key, data); in d3d12_get_gfx_pipeline_state() 479 uint32_t hash = hash_compute_pipeline_state(&ctx->compute_pipeline_state); in d3d12_get_compute_pipeline_state() local 480 struct hash_entry *entry = _mesa_hash_table_search_pre_hashed(ctx->compute_pso_cache, hash, in d3d12_get_compute_pipeline_state() 494 entry = _mesa_hash_table_insert_pre_hashed(ctx->compute_pso_cache, hash, &data->key, data); in d3d12_get_compute_pipeline_state()
|
/third_party/skia/third_party/externals/tint/src/utils/ |
H A D | enum_set_test.cc | 194 auto hash = [&](EnumSet<E> s) { return std::hash<EnumSet<E>>()(s); }; in TEST() local 195 EXPECT_EQ(hash(EnumSet<E>(E::A, E::B)), hash(EnumSet<E>(E::A, E::B))); in TEST() 196 EXPECT_NE(hash(EnumSet<E>(E::A, E::B)), hash(EnumSet<E>(E::A, E::C))); in TEST()
|
/third_party/protobuf/js/binary/ |
H A D | encoder.js | 240 * Writes a 64-bit hash string (8 characters @ 8 bits of data each) to the 242 * @param {string} hash The hash to write. 244 jspb.BinaryEncoder.prototype.writeZigzagVarintHash64 = function(hash) { 246 jspb.utils.splitHash64(hash); 444 * Writes a 64-bit hash string (8 characters @ 8 bits of data each) to the 446 * @param {string} hash The hash to write. 448 jspb.BinaryEncoder.prototype.writeVarintHash64 = function(hash) { 449 jspb.utils.splitHash64(hash); [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | ms_funcs.c | 84 u8 hash[SHA1_MAC_LEN]; in challenge_hash() local 95 if (sha1_vector(3, addr, len, hash)) in challenge_hash() 97 os_memcpy(challenge, hash, 8); in challenge_hash() 335 u8 hash[SHA1_MAC_LEN]; in get_master_key() local 341 if (sha1_vector(3, addr, len, hash)) in get_master_key() 343 os_memcpy(master_key, hash, 16); in get_master_key()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_attr_build.c | 161 u8 hash[SHA256_MAC_LEN]; in wps_build_authenticator() local 178 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash); in wps_build_authenticator() 183 wpabuf_put_data(msg, hash, WPS_AUTHENTICATOR_LEN); in wps_build_authenticator() 371 u8 hash[SHA256_MAC_LEN]; in wps_build_key_wrap_auth() local 375 wpabuf_len(msg), hash); in wps_build_key_wrap_auth() 379 wpabuf_put_data(msg, hash, WPS_KWA_LEN); in wps_build_key_wrap_auth() 432 wpa_printf(MSG_INFO, "WPS: Testing - corrupt public key hash"); in wps_build_oob_dev_pw()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | ms_funcs.c | 84 u8 hash[SHA1_MAC_LEN]; in challenge_hash() local 95 if (sha1_vector(3, addr, len, hash)) in challenge_hash() 97 os_memcpy(challenge, hash, 8); in challenge_hash() 335 u8 hash[SHA1_MAC_LEN]; in get_master_key() local 341 if (sha1_vector(3, addr, len, hash)) in get_master_key() 343 os_memcpy(master_key, hash, 16); in get_master_key()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_attr_build.c | 161 u8 hash[SHA256_MAC_LEN]; in wps_build_authenticator() local 179 hash) < 0) in wps_build_authenticator() 185 wpabuf_put_data(msg, hash, WPS_AUTHENTICATOR_LEN); in wps_build_authenticator() 379 u8 hash[SHA256_MAC_LEN]; in wps_build_key_wrap_auth() local 383 wpabuf_len(msg), hash) < 0) in wps_build_key_wrap_auth() 388 wpabuf_put_data(msg, hash, WPS_KWA_LEN); in wps_build_key_wrap_auth() 441 wpa_printf(MSG_INFO, "WPS: Testing - corrupt public key hash"); in wps_build_oob_dev_pw()
|