/third_party/python/Modules/ |
D | sha512module.c | 46 SHA_INT64 digest[8]; /* Message digest */ member 74 memcpy(dest->digest, src->digest, sizeof(src->digest)); in SHAcopy() 132 S[i] = sha_info->digest[i]; in sha512_transform() 227 sha_info->digest[i] = sha_info->digest[i] + S[i]; in sha512_transform() 239 sha_info->digest[0] = Py_ULL(0x6a09e667f3bcc908); in sha512_init() 240 sha_info->digest[1] = Py_ULL(0xbb67ae8584caa73b); in sha512_init() 241 sha_info->digest[2] = Py_ULL(0x3c6ef372fe94f82b); in sha512_init() 242 sha_info->digest[3] = Py_ULL(0xa54ff53a5f1d36f1); in sha512_init() 243 sha_info->digest[4] = Py_ULL(0x510e527fade682d1); in sha512_init() 244 sha_info->digest[5] = Py_ULL(0x9b05688c2b3e6c1f); in sha512_init() [all …]
|
D | sha256module.c | 45 SHA_INT32 digest[8]; /* Message digest */ member 86 memcpy(dest->digest, src->digest, sizeof(src->digest)); in SHAcopy() 144 S[i] = sha_info->digest[i]; in sha_transform() 223 sha_info->digest[i] = sha_info->digest[i] + S[i]; in sha_transform() 235 sha_info->digest[0] = 0x6A09E667L; in sha_init() 236 sha_info->digest[1] = 0xBB67AE85L; in sha_init() 237 sha_info->digest[2] = 0x3C6EF372L; in sha_init() 238 sha_info->digest[3] = 0xA54FF53AL; in sha_init() 239 sha_info->digest[4] = 0x510E527FL; in sha_init() 240 sha_info->digest[5] = 0x9B05688CL; in sha_init() [all …]
|
/third_party/curl/lib/vauth/ |
D | digest.c | 343 unsigned char digest[MD5_DIGEST_LEN]; in Curl_auth_create_digest_md5_message() local 400 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message() 406 Curl_MD5_update(ctxt, (const unsigned char *) digest, MD5_DIGEST_LEN); in Curl_auth_create_digest_md5_message() 413 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message() 417 msnprintf(&HA1_hex[2 * i], 3, "%02x", digest[i]); in Curl_auth_create_digest_md5_message() 437 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message() 440 msnprintf(&HA2_hex[2 * i], 3, "%02x", digest[i]); in Curl_auth_create_digest_md5_message() 467 Curl_MD5_final(ctxt, digest); in Curl_auth_create_digest_md5_message() 470 msnprintf(&resp_hash_hex[2 * i], 3, "%02x", digest[i]); in Curl_auth_create_digest_md5_message() 501 struct digestdata *digest) in Curl_auth_decode_digest_http_message() argument [all …]
|
D | cram.c | 64 unsigned char digest[MD5_DIGEST_LEN]; in Curl_auth_create_cram_md5_message() local 80 Curl_HMAC_final(ctxt, digest); in Curl_auth_create_cram_md5_message() 85 userp, digest[0], digest[1], digest[2], digest[3], digest[4], in Curl_auth_create_cram_md5_message() 86 digest[5], digest[6], digest[7], digest[8], digest[9], digest[10], in Curl_auth_create_cram_md5_message() 87 digest[11], digest[12], digest[13], digest[14], digest[15]); in Curl_auth_create_cram_md5_message()
|
D | digest_sspi.c | 319 struct digestdata *digest) in Curl_auth_decode_digest_http_message() argument 325 if(digest->input_token) { in Curl_auth_decode_digest_http_message() 354 Curl_auth_digest_cleanup(digest); in Curl_auth_decode_digest_http_message() 360 digest->input_token = (BYTE *) Curl_memdup(chlg, chlglen + 1); in Curl_auth_decode_digest_http_message() 361 if(!digest->input_token) in Curl_auth_decode_digest_http_message() 364 digest->input_token_len = chlglen; in Curl_auth_decode_digest_http_message() 394 struct digestdata *digest, in Curl_auth_create_digest_http_message() argument 430 if((userp && !digest->user) || (!userp && digest->user) || in Curl_auth_create_digest_http_message() 431 (passwdp && !digest->passwd) || (!passwdp && digest->passwd) || in Curl_auth_create_digest_http_message() 432 (userp && digest->user && strcmp(userp, digest->user)) || in Curl_auth_create_digest_http_message() [all …]
|
/third_party/node/test/parallel/ |
D | test-crypto-hash.js | 13 let digest; variable 16 const a1 = crypto.createHash('sha1').update('Test123').digest('hex'); 17 const a2 = crypto.createHash('sha256').update('Test123').digest('base64'); 18 const a3 = crypto.createHash('sha512').update('Test123').digest(); // buffer 19 const a4 = crypto.createHash('sha1').update('Test123').digest('buffer'); 44 digest = 'latin1'; 45 const a0 = crypto.createHash(cryptoType).update('Test123').digest(digest); 49 `${cryptoType} with ${digest} digest failed to evaluate to expected hash` 53 digest = 'hex'; 57 `${cryptoType} with ${digest} digest failed to evaluate to expected hash`); [all …]
|
/third_party/selinux/libselinux/src/ |
D | label_support.c | 116 void digest_gen_hash(struct selabel_digest *digest) in digest_gen_hash() argument 121 if (!digest) in digest_gen_hash() 125 Sha1Update(&context, digest->hashbuf, digest->hashbuf_size); in digest_gen_hash() 126 Sha1Finalise(&context, (SHA1_HASH *)digest->digest); in digest_gen_hash() 127 free(digest->hashbuf); in digest_gen_hash() 128 digest->hashbuf = NULL; in digest_gen_hash() 144 int digest_add_specfile(struct selabel_digest *digest, FILE *fp, in digest_add_specfile() argument 151 if (!digest) in digest_add_specfile() 154 if (digest->hashbuf_size + buf_len < digest->hashbuf_size) { in digest_add_specfile() 158 digest->hashbuf_size += buf_len; in digest_add_specfile() [all …]
|
D | label.c | 62 struct selabel_digest *digest = NULL; in selabel_is_digest_set() local 67 digest = calloc(1, sizeof(*digest)); in selabel_is_digest_set() 68 if (!digest) in selabel_is_digest_set() 71 digest->digest = calloc(1, DIGEST_SPECFILE_SIZE + 1); in selabel_is_digest_set() 72 if (!digest->digest) in selabel_is_digest_set() 75 digest->specfile_list = calloc(DIGEST_FILES_MAX, in selabel_is_digest_set() 77 if (!digest->specfile_list) in selabel_is_digest_set() 80 entry = digest; in selabel_is_digest_set() 87 if (digest) { in selabel_is_digest_set() 88 free(digest->digest); in selabel_is_digest_set() [all …]
|
/third_party/ffmpeg/libavformat/ |
D | httpauth.c | 43 DigestParams *digest = &state->digest_params; in handle_digest_params() local 49 *dest = digest->nonce; in handle_digest_params() 50 *dest_len = sizeof(digest->nonce); in handle_digest_params() 52 *dest = digest->opaque; in handle_digest_params() 53 *dest_len = sizeof(digest->opaque); in handle_digest_params() 55 *dest = digest->algorithm; in handle_digest_params() 56 *dest_len = sizeof(digest->algorithm); in handle_digest_params() 58 *dest = digest->qop; in handle_digest_params() 59 *dest_len = sizeof(digest->qop); in handle_digest_params() 61 *dest = digest->stale; in handle_digest_params() [all …]
|
/third_party/openssl/crypto/evp/ |
D | digest.c | 21 if (ctx->digest != NULL) { in cleanup_old_md_data() 22 if (ctx->digest->cleanup != NULL in cleanup_old_md_data() 24 ctx->digest->cleanup(ctx); in cleanup_old_md_data() 25 if (ctx->md_data != NULL && ctx->digest->ctx_size > 0 in cleanup_old_md_data() 28 OPENSSL_clear_free(ctx->md_data, ctx->digest->ctx_size); in cleanup_old_md_data() 87 if (ctx->engine && ctx->digest && in EVP_DigestInit_ex() 88 (type == NULL || (type->type == ctx->digest->type))) in EVP_DigestInit_ex() 126 if (!ctx->digest) { in EVP_DigestInit_ex() 130 type = ctx->digest; in EVP_DigestInit_ex() 133 if (ctx->digest != type) { in EVP_DigestInit_ex() [all …]
|
/third_party/node/lib/internal/crypto/ |
D | pbkdf2.js | 18 function pbkdf2(password, salt, iterations, keylen, digest, callback) { argument 19 if (typeof digest === 'function') { 20 callback = digest; 21 digest = undefined; 24 ({ password, salt, iterations, keylen, digest } = 25 check(password, salt, iterations, keylen, digest)); 40 handleError(_pbkdf2(keybuf, password, salt, iterations, digest, wrap), 41 digest); 44 function pbkdf2Sync(password, salt, iterations, keylen, digest) { argument 45 ({ password, salt, iterations, keylen, digest } = [all …]
|
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/ |
D | ima_setup.sh | 28 local digest 30 digest="$(${algorithm}sum $file 2>/dev/null | cut -f1 -d ' ')" 31 if [ -n "$digest" ]; then 32 echo "$digest" 36 digest="$(openssl $algorithm $file 2>/dev/null | cut -f2 -d ' ')" 37 if [ -n "$digest" ]; then 38 echo "$digest" 49 digest="$(rdigest --$arg $file 2>/dev/null | cut -f1 -d ' ')" 50 if [ -n "$digest" ]; then 51 echo "$digest" [all …]
|
/third_party/lwip/src/include/netif/ppp/ |
D | chap-new.h | 104 #define CHAP_MDTYPE_D(digest) \ argument 105 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 106 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 107 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 110 #define CHAP_MDTYPE_D(digest) \ 111 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 117 #define CHAP_CANDIGEST(mdtype, digest) \ argument 118 ((digest) == CHAP_MICROSOFT_V2)? (mdtype) & MDTYPE_MICROSOFT_V2: \ 119 ((digest) == CHAP_MICROSOFT)? (mdtype) & MDTYPE_MICROSOFT: \ 120 ((digest) == CHAP_MD5)? (mdtype) & MDTYPE_MD5: \ [all …]
|
/third_party/skia/src/core/ |
D | SkScalerCache.cpp | 38 auto [digest, size] = this->digest(packedGlyphID); in glyph() 39 return {fGlyphForIndex[digest.index()], size}; in glyph() 42 std::tuple<SkGlyphDigest, size_t> SkScalerCache::digest(SkPackedGlyphID packedGlyphID) { in digest() function in SkScalerCache 43 SkGlyphDigest* digest = fDigestForPackedGlyphID.find(packedGlyphID); in digest() local 45 if (digest != nullptr) { in digest() 46 return {*digest, 0}; in digest() 55 SkGlyphDigest digest = SkGlyphDigest{index, *glyph}; in addGlyph() 56 fDigestForPackedGlyphID.set(glyph->getPackedID(), digest); in addGlyph() 58 return digest; in addGlyph() 112 SkGlyphDigest* digest = fDigestForPackedGlyphID.find(toID); in mergeGlyphAndImage() local [all …]
|
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/ |
D | sctp_sha1.c | 56 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) in sctp_sha1_final() argument 60 PK11_DigestFinal(ctx->pk11_ctx, digest, &output_len, SHA_DIGEST_LENGTH); in sctp_sha1_final() 79 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) in sctp_sha1_final() argument 81 SHA1_Final(digest, &ctx->sha_ctx); in sctp_sha1_final() 227 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) in sctp_sha1_final() argument 303 digest[3] = (ctx->H0 & 0xff); in sctp_sha1_final() 304 digest[2] = ((ctx->H0 >> 8) & 0xff); in sctp_sha1_final() 305 digest[1] = ((ctx->H0 >> 16) & 0xff); in sctp_sha1_final() 306 digest[0] = ((ctx->H0 >> 24) & 0xff); in sctp_sha1_final() 308 digest[7] = (ctx->H1 & 0xff); in sctp_sha1_final() [all …]
|
/third_party/curl/lib/ |
D | http_digest.c | 50 struct digestdata *digest; in Curl_input_digest() local 53 digest = &data->state.proxydigest; in Curl_input_digest() 56 digest = &data->state.digest; in Curl_input_digest() 66 return Curl_auth_decode_digest_http_message(header, digest); in Curl_input_digest() 90 struct digestdata *digest; in Curl_output_digest() local 97 digest = &data->state.proxydigest; in Curl_output_digest() 105 digest = &data->state.digest; in Curl_output_digest() 122 have_chlg = digest->input_token ? TRUE : FALSE; in Curl_output_digest() 124 have_chlg = digest->nonce ? TRUE : FALSE; in Curl_output_digest() 160 path, digest, &response, &len); in Curl_output_digest() [all …]
|
/third_party/python/Lib/ |
D | hmac.py | 98 key = digest_cons(key).digest() 148 h.update(self._inner.digest()) 151 def digest(self): member in HMAC 159 return h.digest() 187 def digest(key, msg, digest): argument 196 if _hashopenssl is not None and isinstance(digest, (str, _functype)): 198 return _hashopenssl.hmac_digest(key, msg, digest) 202 if callable(digest): 203 digest_cons = digest 204 elif isinstance(digest, str): [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | fips_prf_wolfssl.c | 22 sha.digest[0] = state[0]; in sha1_transform() 23 sha.digest[1] = state[1]; in sha1_transform() 24 sha.digest[2] = state[2]; in sha1_transform() 25 sha.digest[3] = state[3]; in sha1_transform() 26 sha.digest[4] = state[4]; in sha1_transform() 28 state[0] = sha.digest[0]; in sha1_transform() 29 state[1] = sha.digest[1]; in sha1_transform() 30 state[2] = sha.digest[2]; in sha1_transform() 31 state[3] = sha.digest[3]; in sha1_transform() 32 state[4] = sha.digest[4]; in sha1_transform()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | fips_prf_wolfssl.c | 22 sha.digest[0] = state[0]; in sha1_transform() 23 sha.digest[1] = state[1]; in sha1_transform() 24 sha.digest[2] = state[2]; in sha1_transform() 25 sha.digest[3] = state[3]; in sha1_transform() 26 sha.digest[4] = state[4]; in sha1_transform() 28 state[0] = sha.digest[0]; in sha1_transform() 29 state[1] = sha.digest[1]; in sha1_transform() 30 state[2] = sha.digest[2]; in sha1_transform() 31 state[3] = sha.digest[3]; in sha1_transform() 32 state[4] = sha.digest[4]; in sha1_transform()
|
/third_party/python/Lib/test/ |
D | test_hmac.py | 43 self, h, digest, hashname, digest_size, block_size argument 45 self.assertEqual(h.hexdigest().upper(), digest.upper()) 46 self.assertEqual(h.digest(), binascii.unhexlify(digest)) 52 self, key, data, digest, hashfunc, hashname, digest_size, block_size argument 56 h, digest, hashname, digest_size, block_size 61 h, digest, hashname, digest_size, block_size 68 self.assertEqual(h.hexdigest().upper(), digest.upper()) 72 h, digest, hashname, digest_size, block_size 77 self.assertEqual(h.hexdigest().upper(), digest.upper()) 81 self.assertEqual(h.hexdigest().upper(), digest.upper()) [all …]
|
/third_party/python/Doc/library/ |
D | hmac.rst | 21 *digestmod* is the digest name, digest constructor or module for the HMAC 31 MD5 as implicit default digest for *digestmod* is deprecated. 36 .. function:: digest(key, msg, digest) 38 Return digest of *msg* for given secret *key* and *digest*. The 39 function is equivalent to ``HMAC(key, msg, digest).digest()``, but 41 that fit into memory. The parameters *key*, *msg*, and *digest* have 45 when *digest* is a string and name of a digest algorithm, which is 63 .. method:: HMAC.digest() 65 Return the digest of the bytes passed to the :meth:`update` method so far. 66 This bytes object will be the same length as the *digest_size* of the digest [all …]
|
/third_party/mbedtls/programs/aes/ |
D | crypt_and_hash.c | 92 unsigned char digest[MBEDTLS_MD_MAX_SIZE]; in main() local 296 if( mbedtls_md_finish( &md_ctx, digest ) != 0 ) in main() 302 memcpy( IV, digest, 16 ); in main() 317 memset( digest, 0, 32 ); in main() 318 memcpy( digest, IV, 16 ); in main() 328 if( mbedtls_md_update( &md_ctx, digest, 32 ) != 0 ) in main() 340 if( mbedtls_md_finish( &md_ctx, digest ) != 0 ) in main() 350 digest, in main() 368 if( mbedtls_md_hmac_starts( &md_ctx, digest, 32 ) != 0 ) in main() 427 if( mbedtls_md_hmac_finish( &md_ctx, digest ) != 0 ) in main() [all …]
|
/third_party/openssl/doc/man3/ |
D | BIO_f_md.pod | 5 BIO_f_md, BIO_set_md, BIO_get_md, BIO_get_md_ctx - message digest BIO filter 21 BIO_f_md() returns the message digest BIO method. This is a filter 23 for the digest routines EVP_DigestInit(), EVP_DigestUpdate() 26 Any data written or read through a digest BIO using BIO_read_ex() and 30 digest calculation and returns the digest value. BIO_puts() is 33 BIO_reset() reinitialises a digest BIO. 35 BIO_set_md() sets the message digest of BIO B<b> to B<md>: this 36 must be called to initialize a digest BIO before any data is 39 BIO_get_md() places the a pointer to the digest BIOs digest method 42 BIO_get_md_ctx() returns the digest BIOs context into B<mdcp>. [all …]
|
/third_party/node/deps/npm/node_modules/ssri/ |
D | index.js | 43 this.digest = match[2] 49 return this.digest && Buffer.from(this.digest, 'base64').toString('hex') 67 this.digest.match(BASE64_REGEX) && 79 return `${this.algorithm}-${this.digest}${options}` 120 hash.digest === otherhash.digest 145 } else if (sri.algorithm && sri.digest) { 162 if (hash.algorithm && hash.digest) { 174 if (obj.algorithm && obj.digest) { 204 const digest = crypto.createHash(algo).update(data).digest('base64') 206 `${algo}-${digest}${optString}`, [all …]
|
/third_party/ltp/testcases/kernel/security/integrity/ima/src/ |
D | ima_boot_aggregate.c | 42 u_int8_t digest[SHA_DIGEST_LENGTH]; member 49 unsigned char digest[SHA_DIGEST_LENGTH]; member 74 memset(&pcr[i].digest, 0, SHA_DIGEST_LENGTH); in do_test() 84 display_sha1_digest(event.header.digest); in do_test() 89 SHA1_Update(&c, pcr[event.header.pcr].digest, in do_test() 91 SHA1_Update(&c, event.header.digest, in do_test() 93 SHA1_Final(pcr[event.header.pcr].digest, &c); in do_test() 114 display_sha1_digest(pcr[i].digest); in do_test() 116 SHA1_Update(&c, pcr[i].digest, SHA_DIGEST_LENGTH); in do_test()
|