/third_party/node/test/fixtures/wpt/WebCryptoAPI/generateKey/ |
H A D | failures.js | 98 results.push({name: algorithmName, hash: "SHA-256", modulusLength: 1024, publicExponent: publicExponent}); 150 {name: "HMAC", hash: "MD5"}, 151 {name: "RSA", hash: "SHA-256", modulusLength: 2048, publicExponent: new Uint8Array([1,0,1])}, 152 {name: "RSA-PSS", hash: "SHA", modulusLength: 2048, publicExponent: new Uint8Array([1,0,1])},
|
/third_party/node/deps/v8/src/runtime/ |
H A D | runtime-collections.cc | 10 #include "src/objects/hash-table-inl.h" 82 int hash = args.smi_value_at(2); in RUNTIME_FUNCTION() local 95 bool was_present = JSWeakCollection::Delete(weak_collection, key, hash); in RUNTIME_FUNCTION() 105 int hash = args.smi_value_at(3); in RUNTIME_FUNCTION() local 118 JSWeakCollection::Set(weak_collection, key, value, hash); in RUNTIME_FUNCTION()
|
/third_party/mesa3d/src/util/ |
H A D | hash_table.h | 41 uint32_t hash; member 94 _mesa_hash_table_insert_pre_hashed(struct hash_table *ht, uint32_t hash, 99 _mesa_hash_table_search_pre_hashed(struct hash_table *ht, uint32_t hash, 151 entry->hash = 0, entry->key = (void*)NULL, entry->data = NULL, \
|
/third_party/protobuf/csharp/src/Google.Protobuf.Test.TestProtos/ |
H A D | UnittestImportPublicProto3.cs | 109 int hash = 1; in GetHashCode() 110 if (E != 0) hash ^= E.GetHashCode(); in GetHashCode() 112 hash ^= _unknownFields.GetHashCode(); in GetHashCode() 114 return hash; in GetHashCode()
|
/third_party/rust/crates/syn/codegen/src/ |
H A D | hash.rs | 7 const HASH_SRC: &str = "src/gen/hash.rs"; 58 #hashed_val.hash(state); in expand_impl_body() 108 #val.hash(state); in expand_impl_body() 139 fn hash<H>(&self, #hasher: &mut H) in expand_impl() functions 161 use std::hash::{Hash, Hasher}; in generate()
|
/third_party/rust/crates/rustix/src/backend/linux_raw/net/ |
H A D | addr.rs | 141 impl core::hash::Hash for SocketAddrUnix { 143 fn hash<H: core::hash::Hasher>(&self, state: &mut H) { in hash() functions 145 self.unix.sun_path[..self_len].hash(state) in hash()
|
/kernel/linux/linux-5.10/kernel/ |
H A D | kprobes.c | 22 #include <linux/hash.h> 75 static raw_spinlock_t *kretprobe_table_lock_ptr(unsigned long hash) in kretprobe_table_lock_ptr() argument 77 return &(kretprobe_table_locks[hash].lock); in kretprobe_table_lock_ptr() 450 /* Return true if the kprobe is disarmed. Note: p must be on hash list */ 551 /* Loop on 'freeing_list' for disarming and removing from kprobe hash list */ in do_unoptimize_kprobes() 560 * Remove unused probes from hash list. After waiting in do_unoptimize_kprobes() 580 * still in use, keep it on kprobes hash list. in do_free_cleaned_kprobes() 788 * the kprobe hash list and free it. in kill_optimized_kprobe() 1244 unsigned long hash = hash_ptr(tsk, KPROBE_HASH_BITS); in __acquires() local 1247 *head = &kretprobe_inst_table[hash]; in __acquires() 1278 unsigned long hash = hash_ptr(tsk, KPROBE_HASH_BITS); __releases() local 1326 unsigned long hash, flags = 0; kprobe_flush_task() local 1360 unsigned long flags, hash; cleanup_rp_inst() local 2062 unsigned long hash, flags = 0; pre_handler_kretprobe() local [all...] |
/kernel/linux/linux-5.10/net/core/ |
H A D | sock_map.c | 856 u32 hash; member 882 u32 hash) in sock_hash_select_bucket() 884 return &htab->buckets[hash & (htab->buckets_num - 1)]; in sock_hash_select_bucket() 888 sock_hash_lookup_elem_raw(struct hlist_head *head, u32 hash, void *key, in sock_hash_lookup_elem_raw() argument 894 if (elem->hash == hash && in sock_hash_lookup_elem_raw() 905 u32 key_size = map->key_size, hash; in __sock_hash_lookup_elem() local 911 hash = sock_hash_bucket_hash(key, key_size); in __sock_hash_lookup_elem() 912 bucket = sock_hash_select_bucket(htab, hash); in __sock_hash_lookup_elem() 913 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, ke in __sock_hash_lookup_elem() 881 sock_hash_select_bucket(struct bpf_shtab *htab, u32 hash) sock_hash_select_bucket() argument 953 u32 hash, key_size = map->key_size; sock_hash_delete_elem() local 973 sock_hash_alloc_elem(struct bpf_shtab *htab, void *key, u32 key_size, u32 hash, struct sock *sk, struct bpf_shtab_elem *old) sock_hash_alloc_elem() argument 1003 u32 key_size = map->key_size, hash; sock_hash_update_common() local 1076 u32 hash, key_size = map->key_size; sock_hash_get_next_key() local [all...] |
/kernel/linux/linux-6.6/net/core/ |
H A D | sock_map.c | 834 u32 hash; member 860 u32 hash) in sock_hash_select_bucket() 862 return &htab->buckets[hash & (htab->buckets_num - 1)]; in sock_hash_select_bucket() 866 sock_hash_lookup_elem_raw(struct hlist_head *head, u32 hash, void *key, in sock_hash_lookup_elem_raw() argument 872 if (elem->hash == hash && in sock_hash_lookup_elem_raw() 883 u32 key_size = map->key_size, hash; in __sock_hash_lookup_elem() local 889 hash = sock_hash_bucket_hash(key, key_size); in __sock_hash_lookup_elem() 890 bucket = sock_hash_select_bucket(htab, hash); in __sock_hash_lookup_elem() 891 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, ke in __sock_hash_lookup_elem() 859 sock_hash_select_bucket(struct bpf_shtab *htab, u32 hash) sock_hash_select_bucket() argument 931 u32 hash, key_size = map->key_size; sock_hash_delete_elem() local 951 sock_hash_alloc_elem(struct bpf_shtab *htab, void *key, u32 key_size, u32 hash, struct sock *sk, struct bpf_shtab_elem *old) sock_hash_alloc_elem() argument 982 u32 key_size = map->key_size, hash; sock_hash_update_common() local 1048 u32 hash, key_size = map->key_size; sock_hash_get_next_key() local [all...] |
/third_party/libunwind/libunwind/src/dwarf/ |
H A D | Gparser.c | 552 || !cache->hash) { in dwarf_flush_rs_cache() 553 cache->hash = cache->default_hash; in dwarf_flush_rs_cache() 558 if (cache->hash && cache->hash != cache->default_hash) in dwarf_flush_rs_cache() 559 munmap(cache->hash, DWARF_UNW_HASH_SIZE(cache->prev_log_size) in dwarf_flush_rs_cache() 560 * sizeof (cache->hash[0])); in dwarf_flush_rs_cache() 567 GET_MEMORY(cache->hash, DWARF_UNW_HASH_SIZE(cache->log_size) in dwarf_flush_rs_cache() 568 * sizeof (cache->hash[0])); in dwarf_flush_rs_cache() 573 if (!cache->hash || !cache->buckets || !cache->links) in dwarf_flush_rs_cache() 590 cache->hash[ in dwarf_flush_rs_cache() 645 hash (unw_word_t ip, unsigned short log_size) hash() function [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_read.c | 285 u8 hash[32]; in tls_peer_cert_event() local 304 if (sha256_vector(1, addr, len, hash) == 0) { in tls_peer_cert_event() 305 ev.peer_cert.hash = hash; in tls_peer_cert_event() 306 ev.peer_cert.hash_len = sizeof(hash); in tls_peer_cert_event() 502 u8 hash[SHA256_MAC_LEN]; in tls_process_certificate() local 506 "TLSv1: Validate server certificate hash"); in tls_process_certificate() 510 hash) < 0 || in tls_process_certificate() 511 os_memcmp(conn->cred->srv_cert_hash, hash, in tls_process_certificate() 514 "TLSv1: Server certificate hash mismatc in tls_process_certificate() 727 u8 hash[64]; tlsv1_process_diffie_hellman() local 1317 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_process_server_finished() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_read.c | 285 u8 hash[32]; in tls_peer_cert_event() local 304 if (sha256_vector(1, addr, len, hash) == 0) { in tls_peer_cert_event() 305 ev.peer_cert.hash = hash; in tls_peer_cert_event() 306 ev.peer_cert.hash_len = sizeof(hash); in tls_peer_cert_event() 510 u8 hash[SHA256_MAC_LEN]; in tls_process_certificate() local 514 "TLSv1: Validate server certificate hash"); in tls_process_certificate() 518 hash) < 0 || in tls_process_certificate() 519 os_memcmp(conn->cred->srv_cert_hash, hash, in tls_process_certificate() 522 "TLSv1: Server certificate hash mismatc in tls_process_certificate() 735 u8 hash[64]; tlsv1_process_diffie_hellman() local 1325 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; tls_process_server_finished() local [all...] |
/kernel/linux/linux-5.10/arch/mips/generic/ |
H A D | board-ocelot.its.S | 10 hash { 21 hash {
|
/kernel/linux/linux-6.6/arch/mips/generic/ |
H A D | board-jaguar2.its.S | 10 hash { 20 hash {
|
H A D | board-ocelot.its.S | 10 hash { 21 hash {
|
/third_party/node/deps/openssl/openssl/include/crypto/ |
H A D | ess.h | 34 ASN1_OCTET_STRING *hash; /* Always SHA-1 digest. */ member 60 ASN1_OCTET_STRING *hash; member
|
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/ |
H A D | curve448_local.h | 14 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], 19 ossl_ed448ph_verify(OSSL_LIB_CTX *ctx, const uint8_t hash[64],
|
/third_party/openssl/crypto/ec/curve448/ |
H A D | curve448_local.h | 14 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], 19 ossl_ed448ph_verify(OSSL_LIB_CTX *ctx, const uint8_t hash[64],
|
/third_party/openssl/include/crypto/ |
H A D | ess.h | 34 ASN1_OCTET_STRING *hash; /* Always SHA-1 digest. */ member 60 ASN1_OCTET_STRING *hash; member
|
/foundation/graphic/graphic_2d/rosen/test/render_service/render_service_base/unittest/render/ |
H A D | rs_typeface_cache_test.cpp | 46 // prepare: typeface, size, hash, MemoryOverCheck hook in HWTEST_F() 51 uint32_t hash = typeface->GetHash(); in HWTEST_F() local 52 EXPECT_NE(hash, 0); in HWTEST_F() 68 ret = RSTypefaceCache::Instance().HasTypeface(uniqueId1, hash); in HWTEST_F() 76 ret = RSTypefaceCache::Instance().HasTypeface(uniqueId2, hash); in HWTEST_F() 278 uint32_t hash = 2; in HWTEST_F() local 279 bool result = RSTypefaceCache::Instance().HasTypeface(uniqueId, hash); in HWTEST_F()
|
/kernel/linux/linux-5.10/crypto/ |
H A D | nhpoly1305.c | 3 * NHPoly1305 - ε-almost-∆-universal hash function for Adiantum 15 * ε-almost-∆-universal (ε-∆U) hash function for equal-length inputs over 17 * chunks of the input with the NH hash function [2], reducing the input length 23 * This is *not* a cryptographic hash function; do not use it as such! 35 #include <crypto/internal/hash.h> 43 __le64 hash[NH_NUM_PASSES]) in nh_generic() 69 hash[0] = cpu_to_le64(sums[0]); in nh_generic() 70 hash[1] = cpu_to_le64(sums[1]); in nh_generic() 71 hash[2] = cpu_to_le64(sums[2]); in nh_generic() 72 hash[ in nh_generic() 42 nh_generic(const u32 *key, const u8 *message, size_t message_len, __le64 hash[NH_NUM_PASSES]) nh_generic() argument [all...] |
/kernel/linux/linux-5.10/arch/powerpc/kernel/ |
H A D | vmlinux.lds.S | 271 .hash : AT(ADDR(.hash) - LOAD_OFFSET) { *(.hash) } 272 .gnu.hash : AT(ADDR(.gnu.hash) - LOAD_OFFSET) { *(.gnu.hash) }
|
/kernel/linux/linux-6.6/arch/powerpc/kernel/ |
H A D | vmlinux.lds.S | 339 .hash : AT(ADDR(.hash) - LOAD_OFFSET) { *(.hash) } 340 .gnu.hash : AT(ADDR(.gnu.hash) - LOAD_OFFSET) { *(.gnu.hash) }
|
/kernel/linux/linux-5.10/net/openvswitch/ |
H A D | vport.c | 57 unsigned int hash = jhash(name, strlen(name), (unsigned long) net); in hash_bucket() local 58 return &dev_table[hash & (VPORT_HASH_BUCKETS - 1)]; in hash_bucket() 405 u32 hash; in ovs_vport_find_upcall_portid() local 413 hash = skb_get_hash(skb); in ovs_vport_find_upcall_portid() 414 ids_index = hash - ids->n_ids * reciprocal_divide(hash, ids->rn_ids); in ovs_vport_find_upcall_portid()
|
/kernel/linux/linux-5.10/security/smack/ |
H A D | smack_access.c | 397 * smk_insert_entry - insert a smack label into a hash map, 403 unsigned int hash; in smk_insert_entry() local 406 hash = full_name_hash(NULL, skp->smk_known, strlen(skp->smk_known)); in smk_insert_entry() 407 head = &smack_known_hash[hash & (SMACK_HASH_SLOTS - 1)]; in smk_insert_entry() 422 unsigned int hash; in smk_find_entry() local 426 hash = full_name_hash(NULL, string, strlen(string)); in smk_find_entry() 427 head = &smack_known_hash[hash & (SMACK_HASH_SLOTS - 1)]; in smk_find_entry()
|