Home
last modified time | relevance | path

Searched refs:digest (Results 1 – 25 of 643) sorted by relevance

12345678910>>...26

/third_party/python/Modules/
Dsha512module.c46 SHA_INT64 digest[8]; /* Message digest */ member
74 memcpy(dest->digest, src->digest, sizeof(src->digest)); in SHAcopy()
132 S[i] = sha_info->digest[i]; in sha512_transform()
227 sha_info->digest[i] = sha_info->digest[i] + S[i]; in sha512_transform()
239 sha_info->digest[0] = Py_ULL(0x6a09e667f3bcc908); in sha512_init()
240 sha_info->digest[1] = Py_ULL(0xbb67ae8584caa73b); in sha512_init()
241 sha_info->digest[2] = Py_ULL(0x3c6ef372fe94f82b); in sha512_init()
242 sha_info->digest[3] = Py_ULL(0xa54ff53a5f1d36f1); in sha512_init()
243 sha_info->digest[4] = Py_ULL(0x510e527fade682d1); in sha512_init()
244 sha_info->digest[5] = Py_ULL(0x9b05688c2b3e6c1f); in sha512_init()
[all …]
Dsha256module.c45 SHA_INT32 digest[8]; /* Message digest */ member
86 memcpy(dest->digest, src->digest, sizeof(src->digest)); in SHAcopy()
144 S[i] = sha_info->digest[i]; in sha_transform()
223 sha_info->digest[i] = sha_info->digest[i] + S[i]; in sha_transform()
235 sha_info->digest[0] = 0x6A09E667L; in sha_init()
236 sha_info->digest[1] = 0xBB67AE85L; in sha_init()
237 sha_info->digest[2] = 0x3C6EF372L; in sha_init()
238 sha_info->digest[3] = 0xA54FF53AL; in sha_init()
239 sha_info->digest[4] = 0x510E527FL; in sha_init()
240 sha_info->digest[5] = 0x9B05688CL; in sha_init()
[all …]
/third_party/curl/lib/vauth/
Ddigest.c343 unsigned char digest[MD5_DIGEST_LEN]; in Curl_auth_create_digest_md5_message() local
400 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message()
406 Curl_MD5_update(ctxt, (const unsigned char *) digest, MD5_DIGEST_LEN); in Curl_auth_create_digest_md5_message()
413 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message()
417 msnprintf(&HA1_hex[2 * i], 3, "%02x", digest[i]); in Curl_auth_create_digest_md5_message()
437 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message()
440 msnprintf(&HA2_hex[2 * i], 3, "%02x", digest[i]); in Curl_auth_create_digest_md5_message()
467 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message()
470 msnprintf(&resp_hash_hex[2 * i], 3, "%02x", digest[i]); in Curl_auth_create_digest_md5_message()
501 struct digestdata *digest) in Curl_auth_decode_digest_http_message() argument
[all …]
Dcram.c64 unsigned char digest[MD5_DIGEST_LEN]; in Curl_auth_create_cram_md5_message() local
80 Curl_HMAC_final(ctxt, digest); in Curl_auth_create_cram_md5_message()
85 userp, digest[0], digest[1], digest[2], digest[3], digest[4], in Curl_auth_create_cram_md5_message()
86 digest[5], digest[6], digest[7], digest[8], digest[9], digest[10], in Curl_auth_create_cram_md5_message()
87 digest[11], digest[12], digest[13], digest[14], digest[15]); in Curl_auth_create_cram_md5_message()
Ddigest_sspi.c319 struct digestdata *digest) in Curl_auth_decode_digest_http_message() argument
325 if(digest->input_token) { in Curl_auth_decode_digest_http_message()
354 Curl_auth_digest_cleanup(digest); in Curl_auth_decode_digest_http_message()
360 digest->input_token = (BYTE *) Curl_memdup(chlg, chlglen + 1); in Curl_auth_decode_digest_http_message()
361 if(!digest->input_token) in Curl_auth_decode_digest_http_message()
364 digest->input_token_len = chlglen; in Curl_auth_decode_digest_http_message()
394 struct digestdata *digest, in Curl_auth_create_digest_http_message() argument
430 if((userp && !digest->user) || (!userp && digest->user) || in Curl_auth_create_digest_http_message()
431 (passwdp && !digest->passwd) || (!passwdp && digest->passwd) || in Curl_auth_create_digest_http_message()
432 (userp && digest->user && strcmp(userp, digest->user)) || in Curl_auth_create_digest_http_message()
[all …]
/third_party/node/test/parallel/
Dtest-crypto-hash.js13 let digest; variable
16 const a1 = crypto.createHash('sha1').update('Test123').digest('hex');
17 const a2 = crypto.createHash('sha256').update('Test123').digest('base64');
18 const a3 = crypto.createHash('sha512').update('Test123').digest(); // buffer
19 const a4 = crypto.createHash('sha1').update('Test123').digest('buffer');
44 digest = 'latin1';
45 const a0 = crypto.createHash(cryptoType).update('Test123').digest(digest);
49 `${cryptoType} with ${digest} digest failed to evaluate to expected hash`
53 digest = 'hex';
57 `${cryptoType} with ${digest} digest failed to evaluate to expected hash`);
[all …]
/third_party/selinux/libselinux/src/
Dlabel_support.c116 void digest_gen_hash(struct selabel_digest *digest) in digest_gen_hash() argument
121 if (!digest) in digest_gen_hash()
125 Sha1Update(&context, digest->hashbuf, digest->hashbuf_size); in digest_gen_hash()
126 Sha1Finalise(&context, (SHA1_HASH *)digest->digest); in digest_gen_hash()
127 free(digest->hashbuf); in digest_gen_hash()
128 digest->hashbuf = NULL; in digest_gen_hash()
144 int digest_add_specfile(struct selabel_digest *digest, FILE *fp, in digest_add_specfile() argument
151 if (!digest) in digest_add_specfile()
154 if (digest->hashbuf_size + buf_len < digest->hashbuf_size) { in digest_add_specfile()
158 digest->hashbuf_size += buf_len; in digest_add_specfile()
[all …]
Dlabel.c62 struct selabel_digest *digest = NULL; in selabel_is_digest_set() local
67 digest = calloc(1, sizeof(*digest)); in selabel_is_digest_set()
68 if (!digest) in selabel_is_digest_set()
71 digest->digest = calloc(1, DIGEST_SPECFILE_SIZE + 1); in selabel_is_digest_set()
72 if (!digest->digest) in selabel_is_digest_set()
75 digest->specfile_list = calloc(DIGEST_FILES_MAX, in selabel_is_digest_set()
77 if (!digest->specfile_list) in selabel_is_digest_set()
80 entry = digest; in selabel_is_digest_set()
87 if (digest) { in selabel_is_digest_set()
88 free(digest->digest); in selabel_is_digest_set()
[all …]
/third_party/ffmpeg/libavformat/
Dhttpauth.c43 DigestParams *digest = &state->digest_params; in handle_digest_params() local
49 *dest = digest->nonce; in handle_digest_params()
50 *dest_len = sizeof(digest->nonce); in handle_digest_params()
52 *dest = digest->opaque; in handle_digest_params()
53 *dest_len = sizeof(digest->opaque); in handle_digest_params()
55 *dest = digest->algorithm; in handle_digest_params()
56 *dest_len = sizeof(digest->algorithm); in handle_digest_params()
58 *dest = digest->qop; in handle_digest_params()
59 *dest_len = sizeof(digest->qop); in handle_digest_params()
61 *dest = digest->stale; in handle_digest_params()
[all …]
/third_party/openssl/crypto/evp/
Ddigest.c21 if (ctx->digest != NULL) { in cleanup_old_md_data()
22 if (ctx->digest->cleanup != NULL in cleanup_old_md_data()
24 ctx->digest->cleanup(ctx); in cleanup_old_md_data()
25 if (ctx->md_data != NULL && ctx->digest->ctx_size > 0 in cleanup_old_md_data()
28 OPENSSL_clear_free(ctx->md_data, ctx->digest->ctx_size); in cleanup_old_md_data()
87 if (ctx->engine && ctx->digest && in EVP_DigestInit_ex()
88 (type == NULL || (type->type == ctx->digest->type))) in EVP_DigestInit_ex()
126 if (!ctx->digest) { in EVP_DigestInit_ex()
130 type = ctx->digest; in EVP_DigestInit_ex()
133 if (ctx->digest != type) { in EVP_DigestInit_ex()
[all …]
/third_party/node/lib/internal/crypto/
Dpbkdf2.js18 function pbkdf2(password, salt, iterations, keylen, digest, callback) { argument
19 if (typeof digest === 'function') {
20 callback = digest;
21 digest = undefined;
24 ({ password, salt, iterations, keylen, digest } =
25 check(password, salt, iterations, keylen, digest));
40 handleError(_pbkdf2(keybuf, password, salt, iterations, digest, wrap),
41 digest);
44 function pbkdf2Sync(password, salt, iterations, keylen, digest) { argument
45 ({ password, salt, iterations, keylen, digest } =
[all …]
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/
Dima_setup.sh28 local digest
30 digest="$(${algorithm}sum $file 2>/dev/null | cut -f1 -d ' ')"
31 if [ -n "$digest" ]; then
32 echo "$digest"
36 digest="$(openssl $algorithm $file 2>/dev/null | cut -f2 -d ' ')"
37 if [ -n "$digest" ]; then
38 echo "$digest"
49 digest="$(rdigest --$arg $file 2>/dev/null | cut -f1 -d ' ')"
50 if [ -n "$digest" ]; then
51 echo "$digest"
[all …]
/third_party/lwip/src/include/netif/ppp/
Dchap-new.h104 #define CHAP_MDTYPE_D(digest) \ argument
105 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \
106 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \
107 ((digest) == CHAP_MD5)? MDTYPE_MD5: \
110 #define CHAP_MDTYPE_D(digest) \
111 ((digest) == CHAP_MD5)? MDTYPE_MD5: \
117 #define CHAP_CANDIGEST(mdtype, digest) \ argument
118 ((digest) == CHAP_MICROSOFT_V2)? (mdtype) & MDTYPE_MICROSOFT_V2: \
119 ((digest) == CHAP_MICROSOFT)? (mdtype) & MDTYPE_MICROSOFT: \
120 ((digest) == CHAP_MD5)? (mdtype) & MDTYPE_MD5: \
[all …]
/third_party/skia/src/core/
DSkScalerCache.cpp38 auto [digest, size] = this->digest(packedGlyphID); in glyph()
39 return {fGlyphForIndex[digest.index()], size}; in glyph()
42 std::tuple<SkGlyphDigest, size_t> SkScalerCache::digest(SkPackedGlyphID packedGlyphID) { in digest() function in SkScalerCache
43 SkGlyphDigest* digest = fDigestForPackedGlyphID.find(packedGlyphID); in digest() local
45 if (digest != nullptr) { in digest()
46 return {*digest, 0}; in digest()
55 SkGlyphDigest digest = SkGlyphDigest{index, *glyph}; in addGlyph()
56 fDigestForPackedGlyphID.set(glyph->getPackedID(), digest); in addGlyph()
58 return digest; in addGlyph()
112 SkGlyphDigest* digest = fDigestForPackedGlyphID.find(toID); in mergeGlyphAndImage() local
[all …]
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/
Dsctp_sha1.c56 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) in sctp_sha1_final() argument
60 PK11_DigestFinal(ctx->pk11_ctx, digest, &output_len, SHA_DIGEST_LENGTH); in sctp_sha1_final()
79 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) in sctp_sha1_final() argument
81 SHA1_Final(digest, &ctx->sha_ctx); in sctp_sha1_final()
227 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) in sctp_sha1_final() argument
303 digest[3] = (ctx->H0 & 0xff); in sctp_sha1_final()
304 digest[2] = ((ctx->H0 >> 8) & 0xff); in sctp_sha1_final()
305 digest[1] = ((ctx->H0 >> 16) & 0xff); in sctp_sha1_final()
306 digest[0] = ((ctx->H0 >> 24) & 0xff); in sctp_sha1_final()
308 digest[7] = (ctx->H1 & 0xff); in sctp_sha1_final()
[all …]
/third_party/curl/lib/
Dhttp_digest.c50 struct digestdata *digest; in Curl_input_digest() local
53 digest = &data->state.proxydigest; in Curl_input_digest()
56 digest = &data->state.digest; in Curl_input_digest()
66 return Curl_auth_decode_digest_http_message(header, digest); in Curl_input_digest()
90 struct digestdata *digest; in Curl_output_digest() local
97 digest = &data->state.proxydigest; in Curl_output_digest()
105 digest = &data->state.digest; in Curl_output_digest()
122 have_chlg = digest->input_token ? TRUE : FALSE; in Curl_output_digest()
124 have_chlg = digest->nonce ? TRUE : FALSE; in Curl_output_digest()
160 path, digest, &response, &len); in Curl_output_digest()
[all …]
/third_party/python/Lib/
Dhmac.py98 key = digest_cons(key).digest()
148 h.update(self._inner.digest())
151 def digest(self): member in HMAC
159 return h.digest()
187 def digest(key, msg, digest): argument
196 if _hashopenssl is not None and isinstance(digest, (str, _functype)):
198 return _hashopenssl.hmac_digest(key, msg, digest)
202 if callable(digest):
203 digest_cons = digest
204 elif isinstance(digest, str):
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dfips_prf_wolfssl.c22 sha.digest[0] = state[0]; in sha1_transform()
23 sha.digest[1] = state[1]; in sha1_transform()
24 sha.digest[2] = state[2]; in sha1_transform()
25 sha.digest[3] = state[3]; in sha1_transform()
26 sha.digest[4] = state[4]; in sha1_transform()
28 state[0] = sha.digest[0]; in sha1_transform()
29 state[1] = sha.digest[1]; in sha1_transform()
30 state[2] = sha.digest[2]; in sha1_transform()
31 state[3] = sha.digest[3]; in sha1_transform()
32 state[4] = sha.digest[4]; in sha1_transform()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dfips_prf_wolfssl.c22 sha.digest[0] = state[0]; in sha1_transform()
23 sha.digest[1] = state[1]; in sha1_transform()
24 sha.digest[2] = state[2]; in sha1_transform()
25 sha.digest[3] = state[3]; in sha1_transform()
26 sha.digest[4] = state[4]; in sha1_transform()
28 state[0] = sha.digest[0]; in sha1_transform()
29 state[1] = sha.digest[1]; in sha1_transform()
30 state[2] = sha.digest[2]; in sha1_transform()
31 state[3] = sha.digest[3]; in sha1_transform()
32 state[4] = sha.digest[4]; in sha1_transform()
/third_party/python/Lib/test/
Dtest_hmac.py43 self, h, digest, hashname, digest_size, block_size argument
45 self.assertEqual(h.hexdigest().upper(), digest.upper())
46 self.assertEqual(h.digest(), binascii.unhexlify(digest))
52 self, key, data, digest, hashfunc, hashname, digest_size, block_size argument
56 h, digest, hashname, digest_size, block_size
61 h, digest, hashname, digest_size, block_size
68 self.assertEqual(h.hexdigest().upper(), digest.upper())
72 h, digest, hashname, digest_size, block_size
77 self.assertEqual(h.hexdigest().upper(), digest.upper())
81 self.assertEqual(h.hexdigest().upper(), digest.upper())
[all …]
/third_party/python/Doc/library/
Dhmac.rst21 *digestmod* is the digest name, digest constructor or module for the HMAC
31 MD5 as implicit default digest for *digestmod* is deprecated.
36 .. function:: digest(key, msg, digest)
38 Return digest of *msg* for given secret *key* and *digest*. The
39 function is equivalent to ``HMAC(key, msg, digest).digest()``, but
41 that fit into memory. The parameters *key*, *msg*, and *digest* have
45 when *digest* is a string and name of a digest algorithm, which is
63 .. method:: HMAC.digest()
65 Return the digest of the bytes passed to the :meth:`update` method so far.
66 This bytes object will be the same length as the *digest_size* of the digest
[all …]
/third_party/mbedtls/programs/aes/
Dcrypt_and_hash.c92 unsigned char digest[MBEDTLS_MD_MAX_SIZE]; in main() local
296 if( mbedtls_md_finish( &md_ctx, digest ) != 0 ) in main()
302 memcpy( IV, digest, 16 ); in main()
317 memset( digest, 0, 32 ); in main()
318 memcpy( digest, IV, 16 ); in main()
328 if( mbedtls_md_update( &md_ctx, digest, 32 ) != 0 ) in main()
340 if( mbedtls_md_finish( &md_ctx, digest ) != 0 ) in main()
350 digest, in main()
368 if( mbedtls_md_hmac_starts( &md_ctx, digest, 32 ) != 0 ) in main()
427 if( mbedtls_md_hmac_finish( &md_ctx, digest ) != 0 ) in main()
[all …]
/third_party/openssl/doc/man3/
DBIO_f_md.pod5 BIO_f_md, BIO_set_md, BIO_get_md, BIO_get_md_ctx - message digest BIO filter
21 BIO_f_md() returns the message digest BIO method. This is a filter
23 for the digest routines EVP_DigestInit(), EVP_DigestUpdate()
26 Any data written or read through a digest BIO using BIO_read_ex() and
30 digest calculation and returns the digest value. BIO_puts() is
33 BIO_reset() reinitialises a digest BIO.
35 BIO_set_md() sets the message digest of BIO B<b> to B<md>: this
36 must be called to initialize a digest BIO before any data is
39 BIO_get_md() places the a pointer to the digest BIOs digest method
42 BIO_get_md_ctx() returns the digest BIOs context into B<mdcp>.
[all …]
/third_party/node/deps/npm/node_modules/ssri/
Dindex.js43 this.digest = match[2]
49 return this.digest && Buffer.from(this.digest, 'base64').toString('hex')
67 this.digest.match(BASE64_REGEX) &&
79 return `${this.algorithm}-${this.digest}${options}`
120 hash.digest === otherhash.digest
145 } else if (sri.algorithm && sri.digest) {
162 if (hash.algorithm && hash.digest) {
174 if (obj.algorithm && obj.digest) {
204 const digest = crypto.createHash(algo).update(data).digest('base64')
206 `${algo}-${digest}${optString}`,
[all …]
/third_party/ltp/testcases/kernel/security/integrity/ima/src/
Dima_boot_aggregate.c42 u_int8_t digest[SHA_DIGEST_LENGTH]; member
49 unsigned char digest[SHA_DIGEST_LENGTH]; member
74 memset(&pcr[i].digest, 0, SHA_DIGEST_LENGTH); in do_test()
84 display_sha1_digest(event.header.digest); in do_test()
89 SHA1_Update(&c, pcr[event.header.pcr].digest, in do_test()
91 SHA1_Update(&c, event.header.digest, in do_test()
93 SHA1_Final(pcr[event.header.pcr].digest, &c); in do_test()
114 display_sha1_digest(pcr[i].digest); in do_test()
116 SHA1_Update(&c, pcr[i].digest, SHA_DIGEST_LENGTH); in do_test()

12345678910>>...26