Searched refs:hash (Results 276 - 300 of 965) sorted by relevance

<<11121314151617181920>>

/external/webkit/Source/WebCore/workers/
H A DWorkerLocation.cpp72 String WorkerLocation::hash() const function in class:WebCore::WorkerLocation
H A DWorkerLocation.h58 String hash() const;
/external/guava/guava-tests/test/com/google/common/collect/
H A DComputingConcurrentHashMapTest.java119 int hash = map.hash(key);
122 ReferenceEntry<Object, Object> entry = segment.getEntry(key, hash);
176 int hash = map.hash(key);
178 int index = hash & (table.length() - 1);
180 DummyEntry<Object, Object> entry = DummyEntry.create(key, hash, null);
205 int hash = map.hash(key);
207 int index = hash
[all...]
/external/dropbear/
H A Dsignkey.c281 unsigned char hash[MD5_HASH_SIZE]; local
290 md5_done(&hs, hash);
301 ret[pos] = hexdig(hash[i] >> 4);
302 ret[pos+1] = hexdig(hash[i] & 0x0f);
316 unsigned char hash[SHA1_HASH_SIZE]; local
325 sha1_done(&hs, hash);
335 ret[pos] = hexdig(hash[i] >> 4);
336 ret[pos+1] = hexdig(hash[i] & 0x0f);
/external/guava/guava/src/com/google/common/hash/
H A DAbstractNonStreamingHashFunction.java3 package com.google.common.hash;
13 * All the hash computation done using {@linkplain #newHasher()} are delegated to the {@linkplain
101 public HashCode hash() { method in class:AbstractNonStreamingHashFunction.BufferingHasher
/external/openssh/
H A Dkexecdh.c78 u_char **hash, u_int *hashlen)
111 dump_digest("hash", digest, EVP_MD_size(evp_md));
113 *hash = digest;
67 kex_ecdh_hash( const EVP_MD *evp_md, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexgex.c52 u_char **hash, u_int *hashlen)
93 *hash = digest;
96 dump_digest("hash", digest, *hashlen);
41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
/external/webkit/Source/JavaScriptCore/runtime/
H A DRegExpKey.h96 static unsigned hash(const JSC::RegExpKey& key) { return key.pattern->hash(); } function in struct:WTF::RegExpHash
H A DUString.h190 static unsigned hash(StringImpl* key) { return key->hash(); } function in struct:JSC::UStringHash
230 static unsigned hash(const RefPtr<StringImpl>& key) { return key->hash(); } function in struct:JSC::UStringHash
236 static unsigned hash(const UString& key) { return key.impl()->hash(); } function in struct:JSC::UStringHash
249 // UStringHash is the default hash for UString
/external/webkit/Source/WebCore/html/
H A DHTMLAreaElement.idl34 readonly attribute DOMString hash;
/external/webkit/Source/WebCore/platform/network/
H A DHTTPHeaderMap.cpp82 static unsigned hash(const char* cString) function in struct:WebCore::CaseFoldingCStringTranslator
84 return CaseFoldingHash::hash(cString, strlen(cString));
92 static void translate(AtomicString& location, const char* cString, unsigned /*hash*/)
/external/icu4c/i18n/
H A Dsortkey.cpp40 // A hash code of kInvalidHashCode indicates that the has code needs
41 // to be computed. A hash code of kEmptyHashCode is used for empty keys
42 // and for any key whose computed hash code is kInvalidHashCode.
368 // We compute the hash by iterating sparsely over 64 (at most) characters
370 // previous hash value by a prime number and add the new character in,
376 int32_t hash = 0;
380 hash = ( hash * 37 ) + ((p[0] << 8) + p[1]);
385 if (hash == kInvalidHashCode)
387 hash
[all...]
/external/jmonkeyengine/engine/src/core/com/jme3/material/
H A DMatParam.java343 int hash = 5;
344 hash = 17 * hash + (this.type != null ? this.type.hashCode() : 0);
345 hash = 17 * hash + (this.name != null ? this.name.hashCode() : 0);
346 return hash;
/external/oprofile/libdb/
H A Ddb_manage.c53 * return the number of bytes used by hash table, node table and header.
102 /* rebuild the hash table, node zero is never used. This works
103 * because layout of file is node table then hash table,
105 * double size ==> old hash table and new hash table can't
106 * overlap so on the new hash table is entirely in the new
107 * memory area (the grown part) and we know the new hash
108 * hash table is zeroed. That's why we don't need to zero init
112 * all things are fine and we don't need to init the hash
113 * table because in this case the new hash tabl
155 find_samples_data(size_t hash, char const * filename) argument
181 size_t hash; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_record.c49 if (suite->hash == TLS_HASH_MD5) {
52 } else if (suite->hash == TLS_HASH_SHA) {
252 u8 len[2], hash[100]; local
361 "hash value");
383 hlen = sizeof(hash);
384 if (crypto_hash_finish(hmac, hash, &hlen) < 0) {
390 os_memcmp(hash, out_data + *out_len, hlen) != 0) {
/external/wpa_supplicant_6/wpa_supplicant/src/wps/
H A Dwps_attr_build.c105 u8 hash[SHA256_MAC_LEN]; local
122 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash);
127 wpabuf_put_data(msg, hash, WPS_AUTHENTICATOR_LEN);
215 u8 hash[SHA256_MAC_LEN]; local
219 wpabuf_len(msg), hash);
223 wpabuf_put_data(msg, hash, WPS_KWA_LEN);
H A Dwps_attr_process.c25 u8 hash[SHA256_MAC_LEN]; local
48 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash);
50 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) {
62 u8 hash[SHA256_MAC_LEN]; local
79 hmac_sha256(wps->authkey, WPS_AUTHKEY_LEN, head, len, hash);
80 if (os_memcmp(hash, key_wrap_auth, WPS_KWA_LEN) != 0) {
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_attr_process.c19 u8 hash[SHA256_MAC_LEN]; local
42 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash);
44 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) {
56 u8 hash[SHA256_MAC_LEN]; local
73 hmac_sha256(wps->authkey, WPS_AUTHKEY_LEN, head, len, hash);
74 if (os_memcmp(hash, key_wrap_auth, WPS_KWA_LEN) != 0) {
/external/wpa_supplicant_8/src/wps/
H A Dwps_attr_process.c19 u8 hash[SHA256_MAC_LEN]; local
42 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash);
44 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) {
56 u8 hash[SHA256_MAC_LEN]; local
73 hmac_sha256(wps->authkey, WPS_AUTHKEY_LEN, head, len, hash);
74 if (os_memcmp(hash, key_wrap_auth, WPS_KWA_LEN) != 0) {
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_attr_process.c19 u8 hash[SHA256_MAC_LEN]; local
42 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash);
44 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) {
56 u8 hash[SHA256_MAC_LEN]; local
73 hmac_sha256(wps->authkey, WPS_AUTHKEY_LEN, head, len, hash);
74 if (os_memcmp(hash, key_wrap_auth, WPS_KWA_LEN) != 0) {
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_pwd.c463 struct crypto_hash *hash; local
493 hash = eap_pwd_h_init();
494 if (hash == NULL)
504 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
517 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
521 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
528 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->order));
542 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
546 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
553 eap_pwd_h_update(hash, cruf
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_pwd.c463 struct crypto_hash *hash; local
493 hash = eap_pwd_h_init();
494 if (hash == NULL)
504 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
517 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
521 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
528 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->order));
542 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
546 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
553 eap_pwd_h_update(hash, cruf
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_pwd.c463 struct crypto_hash *hash; local
493 hash = eap_pwd_h_init();
494 if (hash == NULL)
504 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
517 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
521 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
528 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->order));
542 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
546 eap_pwd_h_update(hash, cruft, BN_num_bytes(data->grp->prime));
553 eap_pwd_h_update(hash, cruf
[all...]
/external/chromium/chrome/browser/sync/util/
H A Duser_settings.cc270 // We use 10 bits of data from the MD5 digest as the hash.
274 int32 hash = 0; local
278 hash = hash << 8;
279 hash = hash | (*i & kHashMask);
284 return hash;
404 int32 hash = kInvalidHash; local
410 hash = query.column_int(1);
414 if (salt.empty() || hash
[all...]
/external/e2fsprogs/e2fsck/
H A Drevoke.c83 struct list_head hash; member in struct:jbd_revoke_record_s
89 /* The revoke table is just a simple hash table of revoke records. */
92 /* It is conceivable that we might want a larger hash table
109 /* Borrowed from buffer.c: this is a tried and tested block hash function */
110 static inline int hash(journal_t *journal, unsigned long block) function
135 hash_list = &journal->j_revoke->hash_table[hash(journal, blocknr)];
136 list_add(&record->hash, hash_list);
152 /* Find a revoke record in the journal's hash table. */
160 hash_list = &journal->j_revoke->hash_table[hash(journal, blocknr)];
163 while (&(record->hash) !
[all...]

Completed in 475 milliseconds

<<11121314151617181920>>