/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evpkdf_ss.txt | 20 Ctrl.digest = digest:SHA1 26 Ctrl.digest = digest:SHA1 32 Ctrl.digest = digest:SHA1 38 Ctrl.digest = digest:SHA1 44 Ctrl.digest = digest:SHA1 50 Ctrl.digest = digest:SHA1 56 Ctrl.digest = digest:SHA1 62 Ctrl.digest = digest:SHA1 68 Ctrl.digest = digest:SHA1 74 Ctrl.digest = digest:SHA1 [all …]
|
D | evpkdf_ssh.txt | 15 # The first one uses md instead of digest to test alias works 18 Ctrl.digest = digest:SHA1 26 Ctrl.digest = digest:SHA1 34 Ctrl.digest = digest:SHA1 42 Ctrl.digest = digest:SHA1 50 Ctrl.digest = digest:SHA1 58 Ctrl.digest = digest:SHA1 66 Ctrl.digest = digest:SHA1 74 Ctrl.digest = digest:SHA1 82 Ctrl.digest = digest:SHA1 [all …]
|
D | evpkdf_tls13_kdf.txt | 23 Ctrl.digest = digest:SHA2-256 29 Ctrl.digest = digest:SHA2-256 38 Ctrl.digest = digest:SHA2-256 47 Ctrl.digest = digest:SHA2-256 56 Ctrl.digest = digest:SHA2-256 65 Ctrl.digest = digest:SHA2-256 74 Ctrl.digest = digest:SHA2-256 82 Ctrl.digest = digest:SHA2-256 91 Ctrl.digest = digest:SHA2-256 100 Ctrl.digest = digest:SHA2-256 [all …]
|
D | evpkdf_hkdf.txt | 17 Ctrl.digest = digest:SHA256 25 Ctrl.digest = digest:SHA256 32 Ctrl.digest = digest:SHA256 38 Ctrl.digest = digest:SHA256 46 Ctrl.digest = digest:SHA256 53 Ctrl.digest = digest:SHA256 59 Ctrl.digest = digest:SHA256 67 Ctrl.digest = digest:SHA256 75 Ctrl.digest = digest:SHA256 81 Ctrl.digest = digest:SHA1 [all …]
|
D | evpkdf_x963.txt | 21 Ctrl.digest = digest:SHA1 27 Ctrl.digest = digest:SHA224 33 Ctrl.digest = digest:SHA256 39 Ctrl.digest = digest:SHA384 44 Ctrl.digest = digest:SHA384 50 Ctrl.digest = digest:SHA512 55 Ctrl.digest = digest:SHA512 61 Ctrl.digest = digest:SHA512 67 Ctrl.digest = digest:SHA512 73 Ctrl.digest = digest:SHA512 [all …]
|
D | evpkdf_pbkdf2.txt | 21 Ctrl.digest = digest:sha1 29 Ctrl.digest = digest:sha256 37 Ctrl.digest = digest:sha512 45 Ctrl.digest = digest:sha1 53 Ctrl.digest = digest:sha256 61 Ctrl.digest = digest:sha512 69 Ctrl.digest = digest:sha1 77 Ctrl.digest = digest:sha256 85 Ctrl.digest = digest:sha512 92 Ctrl.digest = digest:sha1 [all …]
|
D | evpkdf_pbkdf1.txt | 21 Ctrl.digest = digest:md2 29 Ctrl.digest = digest:md5 37 Ctrl.digest = digest:sha1 45 Ctrl.digest = digest:md2 53 Ctrl.digest = digest:md5 61 Ctrl.digest = digest:sha1 69 Ctrl.digest = digest:md2 77 Ctrl.digest = digest:md5 85 Ctrl.digest = digest:sha1 93 Ctrl.digest = digest:md2 [all …]
|
D | evpkdf_x942.txt | 17 Ctrl.digest = digest:SHA1 23 Ctrl.digest = digest:SHA1 32 Ctrl.digest = digest:SHA1 39 Ctrl.digest = digest:SHA1 47 Ctrl.digest = digest:SHA1 55 Ctrl.digest = digest:SHA1 62 Ctrl.digest = digest:SHA1 69 Ctrl.digest = digest:SHA1 81 Ctrl.digest = digest:SHA256 92 Ctrl.digest = digest:SHA256
|
/third_party/python/Modules/ |
D | sha512module.c | 46 SHA_INT64 digest[8]; /* Message digest */ member 74 memcpy(dest->digest, src->digest, sizeof(src->digest)); in SHAcopy() 132 S[i] = sha_info->digest[i]; in sha512_transform() 227 sha_info->digest[i] = sha_info->digest[i] + S[i]; in sha512_transform() 239 sha_info->digest[0] = Py_ULL(0x6a09e667f3bcc908); in sha512_init() 240 sha_info->digest[1] = Py_ULL(0xbb67ae8584caa73b); in sha512_init() 241 sha_info->digest[2] = Py_ULL(0x3c6ef372fe94f82b); in sha512_init() 242 sha_info->digest[3] = Py_ULL(0xa54ff53a5f1d36f1); in sha512_init() 243 sha_info->digest[4] = Py_ULL(0x510e527fade682d1); in sha512_init() 244 sha_info->digest[5] = Py_ULL(0x9b05688c2b3e6c1f); in sha512_init() [all …]
|
D | sha256module.c | 45 SHA_INT32 digest[8]; /* Message digest */ member 86 memcpy(dest->digest, src->digest, sizeof(src->digest)); in SHAcopy() 144 S[i] = sha_info->digest[i]; in sha_transform() 223 sha_info->digest[i] = sha_info->digest[i] + S[i]; in sha_transform() 235 sha_info->digest[0] = 0x6A09E667L; in sha_init() 236 sha_info->digest[1] = 0xBB67AE85L; in sha_init() 237 sha_info->digest[2] = 0x3C6EF372L; in sha_init() 238 sha_info->digest[3] = 0xA54FF53AL; in sha_init() 239 sha_info->digest[4] = 0x510E527FL; in sha_init() 240 sha_info->digest[5] = 0x9B05688CL; in sha_init() [all …]
|
/third_party/node/test/parallel/ |
D | test-crypto-hash.js | 13 let digest; variable 16 const a1 = crypto.createHash('sha1').update('Test123').digest('hex'); 17 const a2 = crypto.createHash('sha256').update('Test123').digest('base64'); 18 const a3 = crypto.createHash('sha512').update('Test123').digest(); // buffer 19 const a4 = crypto.createHash('sha1').update('Test123').digest('buffer'); 44 digest = 'latin1'; 45 const a0 = crypto.createHash(cryptoType).update('Test123').digest(digest); 49 `${cryptoType} with ${digest} digest failed to evaluate to expected hash` 53 digest = 'hex'; 57 `${cryptoType} with ${digest} digest failed to evaluate to expected hash`); [all …]
|
/third_party/selinux/libselinux/src/ |
D | label_support.c | 116 void digest_gen_hash(struct selabel_digest *digest) in digest_gen_hash() argument 123 if (!digest) in digest_gen_hash() 129 remaining_size = digest->hashbuf_size; in digest_gen_hash() 130 ptr = digest->hashbuf; in digest_gen_hash() 138 Sha1Finalise(&context, (SHA1_HASH *)digest->digest); in digest_gen_hash() 139 free(digest->hashbuf); in digest_gen_hash() 140 digest->hashbuf = NULL; in digest_gen_hash() 156 int digest_add_specfile(struct selabel_digest *digest, FILE *fp, in digest_add_specfile() argument 163 if (!digest) in digest_add_specfile() 166 if (digest->hashbuf_size + buf_len < digest->hashbuf_size) { in digest_add_specfile() [all …]
|
D | label.c | 62 struct selabel_digest *digest = NULL; in selabel_is_digest_set() local 67 digest = calloc(1, sizeof(*digest)); in selabel_is_digest_set() 68 if (!digest) in selabel_is_digest_set() 71 digest->digest = calloc(1, DIGEST_SPECFILE_SIZE + 1); in selabel_is_digest_set() 72 if (!digest->digest) in selabel_is_digest_set() 75 digest->specfile_list = calloc(DIGEST_FILES_MAX, in selabel_is_digest_set() 77 if (!digest->specfile_list) in selabel_is_digest_set() 80 entry = digest; in selabel_is_digest_set() 87 if (digest) { in selabel_is_digest_set() 88 free(digest->digest); in selabel_is_digest_set() [all …]
|
/third_party/ffmpeg/libavformat/ |
D | httpauth.c | 43 DigestParams *digest = &state->digest_params; in handle_digest_params() local 49 *dest = digest->nonce; in handle_digest_params() 50 *dest_len = sizeof(digest->nonce); in handle_digest_params() 52 *dest = digest->opaque; in handle_digest_params() 53 *dest_len = sizeof(digest->opaque); in handle_digest_params() 55 *dest = digest->algorithm; in handle_digest_params() 56 *dest_len = sizeof(digest->algorithm); in handle_digest_params() 58 *dest = digest->qop; in handle_digest_params() 59 *dest_len = sizeof(digest->qop); in handle_digest_params() 61 *dest = digest->stale; in handle_digest_params() [all …]
|
/third_party/openssl/crypto/evp/ |
D | digest.c | 30 if (ctx->digest != NULL) { in cleanup_old_md_data() 31 if (ctx->digest->cleanup != NULL in cleanup_old_md_data() 33 ctx->digest->cleanup(ctx); in cleanup_old_md_data() 34 if (ctx->md_data != NULL && ctx->digest->ctx_size > 0 in cleanup_old_md_data() 37 OPENSSL_clear_free(ctx->md_data, ctx->digest->ctx_size); in cleanup_old_md_data() 46 if (ctx->digest != NULL && ctx->digest->freectx != NULL) in evp_md_ctx_clear_digest() 47 ctx->digest->freectx(ctx->algctx); in evp_md_ctx_clear_digest() 60 ctx->digest = NULL; in evp_md_ctx_clear_digest() 173 if (!ossl_assert(ctx->digest != NULL)) { in evp_md_init_internal() 177 if (ctx->digest->freectx != NULL) in evp_md_init_internal() [all …]
|
/third_party/node/lib/internal/crypto/ |
D | pbkdf2.js | 18 function pbkdf2(password, salt, iterations, keylen, digest, callback) { argument 19 if (typeof digest === 'function') { 20 callback = digest; 21 digest = undefined; 24 ({ password, salt, iterations, keylen, digest } = 25 check(password, salt, iterations, keylen, digest)); 40 handleError(_pbkdf2(keybuf, password, salt, iterations, digest, wrap), 41 digest); 44 function pbkdf2Sync(password, salt, iterations, keylen, digest) { argument 45 ({ password, salt, iterations, keylen, digest } = [all …]
|
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/ |
D | ima_setup.sh | 28 local digest 30 digest="$(${algorithm}sum $file 2>/dev/null | cut -f1 -d ' ')" 31 if [ -n "$digest" ]; then 32 echo "$digest" 36 digest="$(openssl $algorithm $file 2>/dev/null | cut -f2 -d ' ')" 37 if [ -n "$digest" ]; then 38 echo "$digest" 49 digest="$(rdigest --$arg $file 2>/dev/null | cut -f1 -d ' ')" 50 if [ -n "$digest" ]; then 51 echo "$digest" [all …]
|
/third_party/fsverity-utils/programs/ |
D | cmd_digest.c | 69 struct libfsverity_digest *digest = NULL; in fsverity_cmd_digest() local 80 &tree_params, &digest) != 0) { in fsverity_cmd_digest() 85 ASSERT(digest->digest_size <= FS_VERITY_MAX_DIGEST_SIZE); in fsverity_cmd_digest() 92 d = xzalloc(sizeof(*d) + digest->digest_size); in fsverity_cmd_digest() 95 cpu_to_le16(digest->digest_algorithm); in fsverity_cmd_digest() 96 d->digest_size = cpu_to_le16(digest->digest_size); in fsverity_cmd_digest() 97 memcpy(d->digest, digest->digest, digest->digest_size); in fsverity_cmd_digest() 99 bin2hex((const u8 *)d, sizeof(*d) + digest->digest_size, in fsverity_cmd_digest() 102 bin2hex(digest->digest, digest->digest_size, in fsverity_cmd_digest() 112 libfsverity_get_hash_name(digest->digest_algorithm), in fsverity_cmd_digest() [all …]
|
D | test_compute_digest.c | 53 const char *digest; member 59 .digest = "\x48\xdf\x0c\x46\x23\x29\xcd\x87" 67 .digest = "\xf2\x09\x6a\x36\xc5\xcd\xca\x4f" 75 .digest = "\x6a\xc3\x99\x79\x01\x6e\x3d\xdf" 83 .digest = "\xb8\x03\x42\x95\x03\xd9\x59\x15" 91 .digest = "\x3d\x24\x8c\xa5\x42\xa2\x4f\xc6" 100 .digest = "\x91\x79\x00\xb0\xd2\x99\x45\x4a" 109 .digest = "\xbc\x2d\x70\x32\x4c\x04\x8c\x22" 117 .digest = "\xe9\xdf\x92\x7c\x14\xfc\xb9\x61" 125 .digest = "\x03\x93\xee\x3d\xfd\x4a\x28\x96" [all …]
|
/third_party/lwip/src/include/netif/ppp/ |
D | chap-new.h | 104 #define CHAP_MDTYPE_D(digest) \ argument 105 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 106 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 107 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 110 #define CHAP_MDTYPE_D(digest) \ 111 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 117 #define CHAP_CANDIGEST(mdtype, digest) \ argument 118 ((digest) == CHAP_MICROSOFT_V2)? (mdtype) & MDTYPE_MICROSOFT_V2: \ 119 ((digest) == CHAP_MICROSOFT)? (mdtype) & MDTYPE_MICROSOFT: \ 120 ((digest) == CHAP_MD5)? (mdtype) & MDTYPE_MD5: \ [all …]
|
/third_party/skia/src/core/ |
D | SkScalerCache.cpp | 38 auto [digest, size] = this->digest(packedGlyphID); in glyph() 39 return {fGlyphForIndex[digest.index()], size}; in glyph() 42 std::tuple<SkGlyphDigest, size_t> SkScalerCache::digest(SkPackedGlyphID packedGlyphID) { in digest() function in SkScalerCache 43 SkGlyphDigest* digest = fDigestForPackedGlyphID.find(packedGlyphID); in digest() local 45 if (digest != nullptr) { in digest() 46 return {*digest, 0}; in digest() 55 SkGlyphDigest digest = SkGlyphDigest{index, *glyph}; in addGlyph() 56 fDigestForPackedGlyphID.set(glyph->getPackedID(), digest); in addGlyph() 58 return digest; in addGlyph() 112 SkGlyphDigest* digest = fDigestForPackedGlyphID.find(toID); in mergeGlyphAndImage() local [all …]
|
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/ |
D | sctp_sha1.c | 56 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) in sctp_sha1_final() argument 60 PK11_DigestFinal(ctx->pk11_ctx, digest, &output_len, SHA_DIGEST_LENGTH); in sctp_sha1_final() 79 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) in sctp_sha1_final() argument 81 SHA1_Final(digest, &ctx->sha_ctx); in sctp_sha1_final() 227 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) in sctp_sha1_final() argument 303 digest[3] = (ctx->H0 & 0xff); in sctp_sha1_final() 304 digest[2] = ((ctx->H0 >> 8) & 0xff); in sctp_sha1_final() 305 digest[1] = ((ctx->H0 >> 16) & 0xff); in sctp_sha1_final() 306 digest[0] = ((ctx->H0 >> 24) & 0xff); in sctp_sha1_final() 308 digest[7] = (ctx->H1 & 0xff); in sctp_sha1_final() [all …]
|
/third_party/python/Lib/test/ |
D | test_hmac.py | 43 self, h, digest, hashname, digest_size, block_size argument 45 self.assertEqual(h.hexdigest().upper(), digest.upper()) 46 self.assertEqual(h.digest(), binascii.unhexlify(digest)) 52 self, key, data, digest, hashfunc, hashname, digest_size, block_size argument 56 h, digest, hashname, digest_size, block_size 61 h, digest, hashname, digest_size, block_size 68 self.assertEqual(h.hexdigest().upper(), digest.upper()) 72 h, digest, hashname, digest_size, block_size 77 self.assertEqual(h.hexdigest().upper(), digest.upper()) 81 self.assertEqual(h.hexdigest().upper(), digest.upper()) [all …]
|
/third_party/python/Lib/ |
D | hmac.py | 98 key = digest_cons(key).digest() 148 h.update(self._inner.digest()) 151 def digest(self): member in HMAC 159 return h.digest() 187 def digest(key, msg, digest): argument 196 if _hashopenssl is not None and isinstance(digest, (str, _functype)): 198 return _hashopenssl.hmac_digest(key, msg, digest) 202 if callable(digest): 203 digest_cons = digest 204 elif isinstance(digest, str): [all …]
|
/third_party/openssl/doc/man7/ |
D | provider-digest.pod | 5 provider-digest - The digest library E<lt>-E<gt> provider functions 53 The DIGEST operation enables providers to implement digest algorithms and make 93 A digest algorithm implementation may not implement all of these functions. 101 structure for holding context information during a digest operation. 102 A pointer to this context will be passed back in a number of the other digest 107 OSSL_FUNC_digest_freectx() is passed a pointer to the provider side digest context in 111 OSSL_FUNC_digest_dupctx() should duplicate the provider side digest context in the 116 OSSL_FUNC_digest_init() initialises a digest operation given a newly created 117 provider side digest context in the I<dctx> parameter. 122 previously initialised digest operation. [all …]
|