/third_party/openssl/crypto/ocsp/ |
D | ocsp_lib.c | 56 alg = &cid->hashAlgorithm; in OCSP_cert_id_new() 95 ret = OBJ_cmp(a->hashAlgorithm.algorithm, b->hashAlgorithm.algorithm); in OCSP_id_issuer_cmp()
|
D | ocsp_vfy.c | 286 if (OBJ_cmp(tmpid->hashAlgorithm.algorithm, in ocsp_check_ids() 287 cid->hashAlgorithm.algorithm)) in ocsp_check_ids() 316 OBJ_obj2txt(name, sizeof(name), cid->hashAlgorithm.algorithm, 0); in ocsp_match_issuerid()
|
D | ocsp_local.h | 19 X509_ALGOR hashAlgorithm; member
|
D | ocsp_asn.c | 24 ASN1_EMBED(OCSP_CERTID, hashAlgorithm, X509_ALGOR),
|
D | ocsp_prn.c | 22 i2a_ASN1_OBJECT(bp, a->hashAlgorithm.algorithm); in ocsp_certid_print()
|
D | ocsp_srv.c | 45 *pmd = cid->hashAlgorithm.algorithm; in OCSP_id_get0_info()
|
/third_party/node/deps/npm/node_modules/http-signature/lib/ |
D | signer.js | 77 hashAlgorithm: alg[1], 211 alg = (this.rs_alg[0] || this.rs_key.type) + '-' + sigObj.hashAlgorithm; 381 if (!HASH_ALGOS[sigObj.hashAlgorithm]) { 382 throw (new InvalidAlgorithmError(sigObj.hashAlgorithm.toUpperCase() + 385 options.algorithm = key.type + '-' + sigObj.hashAlgorithm;
|
/third_party/node/deps/npm/node_modules/sshpk/lib/ |
D | signature.js | 29 this.hashAlgorithm = opts.hashAlgo; 45 switch (this.hashAlgorithm) { 58 'algorithm ' + this.hashAlgorithm)); 102 if ((this.hashAlgorithm && 103 this.hashAlgorithm !== 'sha1') ||
|
D | key.js | 180 if (signature.hashAlgorithm && 181 signature.hashAlgorithm !== hashAlgo)
|
D | ed-compat.js | 96 sigObj.hashAlgorithm = 'sha512';
|
D | private-key.js | 172 sig.hashAlgorithm = hashAlgo;
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | tls_openssl_ocsp.c | 47 X509_ALGOR *hashAlgorithm; member 170 ASN1_SIMPLE(CertID, hashAlgorithm, X509_ALGOR), 405 dgst = EVP_get_digestbyobj(certid->hashAlgorithm->algorithm); in issuer_match() 714 txt = algor_str(sresp->certID->hashAlgorithm); in check_ocsp_resp() 779 (OBJ_cmp(cid1->hashAlgorithm->algorithm, in check_ocsp_resp() 780 cid2->hashAlgorithm->algorithm) != 0 || in check_ocsp_resp()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | tls_openssl_ocsp.c | 47 X509_ALGOR *hashAlgorithm; member 170 ASN1_SIMPLE(CertID, hashAlgorithm, X509_ALGOR), 405 dgst = EVP_get_digestbyobj(certid->hashAlgorithm->algorithm); in issuer_match() 714 txt = algor_str(sresp->certID->hashAlgorithm); in check_ocsp_resp() 779 (OBJ_cmp(cid1->hashAlgorithm->algorithm, in check_ocsp_resp() 780 cid2->hashAlgorithm->algorithm) != 0 || in check_ocsp_resp()
|
/third_party/node/deps/npm/node_modules/cacache/ |
D | CHANGELOG.md | 466 …he entire API has been overhauled to use SRI hashes instead of digest/hashAlgorithm pairs. SRI has… 482 * `opts.digest` and `opts.hashAlgorithm` are obsolete for any API calls that used them. 486 …and `get.stream.byDigest()` now expect an SRI instead of a `digest` + `opts.hashAlgorithm` pairing. 535 * **index:** set default hashAlgorithm ([d6eb2f0](https://github.com/npm/cacache/commit/d6eb2f0)) 602 * **hashes:** change default hashAlgorithm to sha512 ([ea00ba6](https://github.com/npm/cacache/comm… 603 * **hashes:** missed a spot for hashAlgorithm defaults ([45997d8](https://github.com/npm/cacache/co… 627 * **index:** add hashAlgorithm and format insert ret val ([b639746](https://github.com/npm/cacache/… 649 * hashes: Default hashAlgorithm changed from sha1 to sha512. If you 650 rely on the prior setting, pass `opts.hashAlgorithm` in explicitly.
|
D | README.md | 562 should be in the format `<hashAlgorithm>-<base64-hash>`. 582 const hashAlgorithm = 'sha512' 586 hashAlgorithm + 588 crypto.createHash(hashAlgorithm).update(data).digest('base64')
|
/third_party/node/deps/npm/lib/ |
D | ci.js | 21 hashAlgorithm: 'sha1', property
|
/third_party/openssl/doc/internal/man7/ |
D | DERlib.pod | 92 hashAlgorithm [0] HashAlgorithm DEFAULT 104 hashAlgorithm sha256Identifier,
|
/third_party/node/deps/npm/lib/config/ |
D | figgy-config.js | 34 hashAlgorithm: 'sha1', property
|
/third_party/openssl/crypto/rsa/ |
D | rsa_asn1.c | 88 ASN1_EXP_OPT(RSA_PSS_PARAMS, hashAlgorithm, X509_ALGOR,0),
|
D | rsa_ameth.c | 233 if (pss->hashAlgorithm) { in rsa_pss_param_print() 234 if (i2a_ASN1_OBJECT(bp, pss->hashAlgorithm->algorithm) <= 0) in rsa_pss_param_print() 487 if (!ossl_x509_algor_new_from_md(&pss->hashAlgorithm, sigmd)) in ossl_rsa_pss_params_create()
|
D | rsa_backend.c | 516 *pmd = ossl_x509_algor_get_md(pss->hashAlgorithm); in ossl_rsa_pss_get_param_unverified()
|
/third_party/node/deps/npm/node_modules/sshpk/ |
D | README.md | 186 ### `Key#createVerify([hashAlgorithm])` 195 - `hashAlgorithm` -- optional String name of hash algorithm to use, any 302 ### `PrivateKey#createVerify([hashAlgorithm])` 306 ### `PrivateKey#createSign([hashAlgorithm])` 315 - `hashAlgorithm` -- optional String name of hash algorithm to use, any
|
/third_party/node/deps/npm/node_modules/sshpk/lib/formats/ |
D | x509.js | 189 sig.signature.hashAlgorithm = algParts[1]; 472 sig.algo = signature.type + '-' + signature.hashAlgorithm;
|
/third_party/openssl/ohos_lite/include/openssl/ |
D | rsa.h | 284 X509_ALGOR *hashAlgorithm; member
|
/third_party/openssl/include/openssl/ |
D | rsa.h | 316 X509_ALGOR *hashAlgorithm; member
|