/external/webkit/Source/WebCore/workers/ |
H A D | WorkerLocation.cpp | 72 String WorkerLocation::hash() const function in class:WebCore::WorkerLocation
|
H A D | WorkerLocation.h | 58 String hash() const;
|
/external/guava/guava-tests/test/com/google/common/collect/ |
H A D | ComputingConcurrentHashMapTest.java | 119 int hash = map.hash(key); 122 ReferenceEntry<Object, Object> entry = segment.getEntry(key, hash); 176 int hash = map.hash(key); 178 int index = hash & (table.length() - 1); 180 DummyEntry<Object, Object> entry = DummyEntry.create(key, hash, null); 205 int hash = map.hash(key); 207 int index = hash [all...] |
/external/dropbear/ |
H A D | signkey.c | 281 unsigned char hash[MD5_HASH_SIZE]; local 290 md5_done(&hs, hash); 301 ret[pos] = hexdig(hash[i] >> 4); 302 ret[pos+1] = hexdig(hash[i] & 0x0f); 316 unsigned char hash[SHA1_HASH_SIZE]; local 325 sha1_done(&hs, hash); 335 ret[pos] = hexdig(hash[i] >> 4); 336 ret[pos+1] = hexdig(hash[i] & 0x0f);
|
/external/guava/guava/src/com/google/common/hash/ |
H A D | AbstractNonStreamingHashFunction.java | 3 package com.google.common.hash; 13 * All the hash computation done using {@linkplain #newHasher()} are delegated to the {@linkplain 101 public HashCode hash() { method in class:AbstractNonStreamingHashFunction.BufferingHasher
|
/external/openssh/ |
H A D | kexecdh.c | 78 u_char **hash, u_int *hashlen) 111 dump_digest("hash", digest, EVP_MD_size(evp_md)); 113 *hash = digest; 67 kex_ecdh_hash( const EVP_MD *evp_md, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexgex.c | 52 u_char **hash, u_int *hashlen) 93 *hash = digest; 96 dump_digest("hash", digest, *hashlen); 41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
/external/webkit/Source/JavaScriptCore/runtime/ |
H A D | RegExpKey.h | 96 static unsigned hash(const JSC::RegExpKey& key) { return key.pattern->hash(); } function in struct:WTF::RegExpHash
|
H A D | UString.h | 190 static unsigned hash(StringImpl* key) { return key->hash(); } function in struct:JSC::UStringHash 230 static unsigned hash(const RefPtr<StringImpl>& key) { return key->hash(); } function in struct:JSC::UStringHash 236 static unsigned hash(const UString& key) { return key.impl()->hash(); } function in struct:JSC::UStringHash 249 // UStringHash is the default hash for UString
|
/external/webkit/Source/WebCore/html/ |
H A D | HTMLAreaElement.idl | 34 readonly attribute DOMString hash;
|
/external/webkit/Source/WebCore/platform/network/ |
H A D | HTTPHeaderMap.cpp | 82 static unsigned hash(const char* cString) function in struct:WebCore::CaseFoldingCStringTranslator 84 return CaseFoldingHash::hash(cString, strlen(cString)); 92 static void translate(AtomicString& location, const char* cString, unsigned /*hash*/)
|
/external/icu4c/i18n/ |
H A D | sortkey.cpp | 40 // A hash code of kInvalidHashCode indicates that the has code needs 41 // to be computed. A hash code of kEmptyHashCode is used for empty keys 42 // and for any key whose computed hash code is kInvalidHashCode. 368 // We compute the hash by iterating sparsely over 64 (at most) characters 370 // previous hash value by a prime number and add the new character in, 376 int32_t hash = 0; 380 hash = ( hash * 37 ) + ((p[0] << 8) + p[1]); 385 if (hash == kInvalidHashCode) 387 hash [all...] |
/external/jmonkeyengine/engine/src/core/com/jme3/material/ |
H A D | MatParam.java | 343 int hash = 5; 344 hash = 17 * hash + (this.type != null ? this.type.hashCode() : 0); 345 hash = 17 * hash + (this.name != null ? this.name.hashCode() : 0); 346 return hash;
|
/external/oprofile/libdb/ |
H A D | db_manage.c | 53 * return the number of bytes used by hash table, node table and header. 102 /* rebuild the hash table, node zero is never used. This works 103 * because layout of file is node table then hash table, 105 * double size ==> old hash table and new hash table can't 106 * overlap so on the new hash table is entirely in the new 107 * memory area (the grown part) and we know the new hash 108 * hash table is zeroed. That's why we don't need to zero init 112 * all things are fine and we don't need to init the hash 113 * table because in this case the new hash tabl 155 find_samples_data(size_t hash, char const * filename) argument 181 size_t hash; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 49 if (suite->hash == TLS_HASH_MD5) { 52 } else if (suite->hash == TLS_HASH_SHA) { 252 u8 len[2], hash[100]; local 361 "hash value"); 383 hlen = sizeof(hash); 384 if (crypto_hash_finish(hmac, hash, &hlen) < 0) { 390 os_memcmp(hash, out_data + *out_len, hlen) != 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
H A D | wps_attr_build.c | 105 u8 hash[SHA256_MAC_LEN]; local 122 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash); 127 wpabuf_put_data(msg, hash, WPS_AUTHENTICATOR_LEN); 215 u8 hash[SHA256_MAC_LEN]; local 219 wpabuf_len(msg), hash); 223 wpabuf_put_data(msg, hash, WPS_KWA_LEN);
|
H A D | wps_attr_process.c | 25 u8 hash[SHA256_MAC_LEN]; local 48 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash); 50 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { 62 u8 hash[SHA256_MAC_LEN]; local 79 hmac_sha256(wps->authkey, WPS_AUTHKEY_LEN, head, len, hash); 80 if (os_memcmp(hash, key_wrap_auth, WPS_KWA_LEN) != 0) {
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_attr_process.c | 19 u8 hash[SHA256_MAC_LEN]; local 42 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash); 44 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { 56 u8 hash[SHA256_MAC_LEN]; local 73 hmac_sha256(wps->authkey, WPS_AUTHKEY_LEN, head, len, hash); 74 if (os_memcmp(hash, key_wrap_auth, WPS_KWA_LEN) != 0) {
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_attr_process.c | 19 u8 hash[SHA256_MAC_LEN]; local 42 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash); 44 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { 56 u8 hash[SHA256_MAC_LEN]; local 73 hmac_sha256(wps->authkey, WPS_AUTHKEY_LEN, head, len, hash); 74 if (os_memcmp(hash, key_wrap_auth, WPS_KWA_LEN) != 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_attr_process.c | 19 u8 hash[SHA256_MAC_LEN]; local 42 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash); 44 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { 56 u8 hash[SHA256_MAC_LEN]; local 73 hmac_sha256(wps->authkey, WPS_AUTHKEY_LEN, head, len, hash); 74 if (os_memcmp(hash, key_wrap_auth, WPS_KWA_LEN) != 0) {
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_pwd.c | 463 struct crypto_hash *hash; local 493 hash = eap_pwd_h_init(); 494 if (hash == NULL) 504 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 517 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 521 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 528 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->order)); 542 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 546 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 553 eap_pwd_h_update(hash, cruf [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_pwd.c | 463 struct crypto_hash *hash; local 493 hash = eap_pwd_h_init(); 494 if (hash == NULL) 504 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 517 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 521 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 528 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->order)); 542 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 546 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 553 eap_pwd_h_update(hash, cruf [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_pwd.c | 463 struct crypto_hash *hash; local 493 hash = eap_pwd_h_init(); 494 if (hash == NULL) 504 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 517 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 521 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 528 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->order)); 542 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 546 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime)); 553 eap_pwd_h_update(hash, cruf [all...] |
/external/chromium/chrome/browser/sync/util/ |
H A D | user_settings.cc | 270 // We use 10 bits of data from the MD5 digest as the hash. 274 int32 hash = 0; local 278 hash = hash << 8; 279 hash = hash | (*i & kHashMask); 284 return hash; 404 int32 hash = kInvalidHash; local 410 hash = query.column_int(1); 414 if (salt.empty() || hash [all...] |
/external/e2fsprogs/e2fsck/ |
H A D | revoke.c | 83 struct list_head hash; member in struct:jbd_revoke_record_s 89 /* The revoke table is just a simple hash table of revoke records. */ 92 /* It is conceivable that we might want a larger hash table 109 /* Borrowed from buffer.c: this is a tried and tested block hash function */ 110 static inline int hash(journal_t *journal, unsigned long block) function 135 hash_list = &journal->j_revoke->hash_table[hash(journal, blocknr)]; 136 list_add(&record->hash, hash_list); 152 /* Find a revoke record in the journal's hash table. */ 160 hash_list = &journal->j_revoke->hash_table[hash(journal, blocknr)]; 163 while (&(record->hash) ! [all...] |