/external/wpa_supplicant_8/src/utils/ |
H A D | http-utils.h | 24 u8 *hash; member in struct:http_logo
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha256-prf.c | 57 u8 hash[SHA256_MAC_LEN]; local 82 hmac_sha256_vector(key, key_len, 4, addr, len, hash); 83 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_peap_common.c | 21 u8 hash[SHA1_MAC_LEN]; local 27 addr[0] = hash; 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0) 75 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); 78 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | http-utils.h | 24 u8 *hash; member in struct:http_logo
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/ |
H A D | RSADigestSigner.java | 154 byte[] hash = new byte[digest.getDigestSize()]; 155 digest.doFinal(hash, 0); 159 byte[] data = derEncode(hash); 180 byte[] hash = new byte[digest.getDigestSize()]; 182 digest.doFinal(hash, 0); 190 expected = derEncode(hash); 203 int sigOffset = sig.length - hash.length - 2; 204 int expectedOffset = expected.length - hash.length - 2; 211 for (int i = 0; i < hash.length; i++) 235 byte[] hash) 234 derEncode( byte[] hash) argument [all...] |
/external/chromium_org/base/memory/ |
H A D | discardable_memory_manager.h | 44 struct hash<base::internal::DiscardableMemoryManagerAllocation*> { struct in namespace:BASE_HASH_NAMESPACE 47 return hash<size_t>()(reinterpret_cast<size_t>(ptr));
|
/external/chromium_org/chrome/app/ |
H A D | signature_validator_win_unittest.cc | 81 uint8 hash[crypto::kSHA256Length] = {0}; local 85 crypto::SHA256HashString(key_bytes, hash, crypto::kSHA256Length); 88 base::StringToLowerASCII(base::HexEncode(hash, arraysize(hash)));
|
/external/chromium_org/chrome/browser/download/ |
H A D | chrome_download_manager_delegate.h | 40 struct hash<extensions::CrxInstaller*> { struct in namespace:BASE_HASH_NAMESPACE
|
/external/chromium_org/chrome/browser/extensions/api/image_writer_private/ |
H A D | write_from_url_operation.cc | 22 const std::string& hash, 27 hash_(hash), 146 // Skip verify if no hash. 17 WriteFromUrlOperation( base::WeakPtr<OperationManager> manager, const ExtensionId& extension_id, net::URLRequestContextGetter* request_context, GURL url, const std::string& hash, const std::string& device_path) argument
|
/external/chromium_org/chrome/browser/sync/glue/ |
H A D | extension_backed_data_type_controller.cc | 23 // Helper method to generate a hash from an extension id. 25 std::string hash = base::SHA1HashString(extension_id); local 26 hash = base::HexEncode(hash.c_str(), hash.length()); 27 return hash; 93 // TODO(synced notifications): rather than rely on a hash of the extension
|
/external/chromium_org/chromeos/login/auth/ |
H A D | key.cc | 81 char hash[crypto::kSHA256Length]; local 82 crypto::SHA256HashString(salt + secret_, &hash, sizeof(hash)); 84 // Keep only the first half of the hash for 'weak' hashing so that the 88 reinterpret_cast<const void*>(hash), sizeof(hash) / 2));
|
/external/chromium_org/components/metrics/ |
H A D | cloned_install_detector.cc | 24 uint64 hash = metrics::HashMetricName(value); local 26 // Only use 24 bits from the 64-bit hash. 27 return hash & ((1 << 24) - 1);
|
/external/chromium_org/components/user_manager/ |
H A D | user_manager.cc | 28 const std::string& hash) { 27 ActiveUserHashChanged( const std::string& hash) argument
|
/external/chromium_org/content/browser/download/ |
H A D | save_file.cc | 79 bool SaveFile::GetHash(std::string* hash) { argument 80 return file_.GetHash(hash);
|
/external/chromium_org/content/child/webcrypto/nss/ |
H A D | rsa_oaep_nss.cc | 68 bool InitializeRsaOaepParams(const blink::WebCryptoAlgorithm& hash, argument 74 oaep_params->mgf = WebCryptoHashToMGFMechanism(hash); 75 oaep_params->hashAlg = WebCryptoHashToDigestMechanism(hash); 86 const blink::WebCryptoAlgorithm& hash, 91 if (!InitializeRsaOaepParams(hash, label, &oaep_params)) 120 const blink::WebCryptoAlgorithm& hash, 129 if (!InitializeRsaOaepParams(hash, label, &oaep_params)) 193 const blink::WebCryptoAlgorithmId hash) const OVERRIDE { 194 switch (hash) { 217 key.algorithm().rsaHashedParams()->hash(), 85 EncryptRsaOaep(SECKEYPublicKey* key, const blink::WebCryptoAlgorithm& hash, const CryptoData& label, const CryptoData& data, std::vector<uint8_t>* buffer) argument 119 DecryptRsaOaep(SECKEYPrivateKey* key, const blink::WebCryptoAlgorithm& hash, const CryptoData& label, const CryptoData& data, std::vector<uint8_t>* buffer) argument [all...] |
/external/chromium_org/content/child/webcrypto/openssl/ |
H A D | hmac_openssl.cc | 33 const blink::WebCryptoAlgorithm& hash, 38 const EVP_MD* digest_algorithm = GetDigest(hash.id()); 86 params->hash().id(), keylen_bits), 115 const blink::WebCryptoAlgorithm& hash = variable 116 algorithm.hmacImportParams()->hash(); 126 hash.id(), keylen_bits.ValueOrDie()), 138 GetJwkHmacAlgorithmName(algorithm.hmacImportParams()->hash().id()); 164 GetJwkHmacAlgorithmName(key.algorithm().hmacParams()->hash().id()); 181 const blink::WebCryptoAlgorithm& hash = variable 182 key.algorithm().hmacParams()->hash(); 32 SignHmac(const std::vector<uint8_t>& raw_key, const blink::WebCryptoAlgorithm& hash, const CryptoData& data, std::vector<uint8_t>* buffer) argument [all...] |
/external/chromium_org/crypto/third_party/nss/ |
H A D | rsawrapr.c | 26 const SECHashObject *hash; local 30 hash = HASH_GetHashObject(hashAlg); 31 if (hash == NULL) 34 hashContext = (*hash->create)(); 35 rounds = (maskLen + hash->length - 1) / hash->length; 44 (*hash->begin)(hashContext); 45 (*hash->update)(hashContext, mgfSeed, mgfSeedLen); 46 (*hash->update)(hashContext, C, sizeof C); 48 tempHash = mask + counter * hash 78 const SECHashObject *hash; local [all...] |
/external/chromium_org/net/quic/crypto/ |
H A D | common_cert_set.cc | 30 // hash contains the 64-bit, FNV-1a hash of this set. 31 uint64 hash; member in struct:net::__anon9429::CertSet 77 virtual StringPiece GetCert(uint64 hash, uint32 index) const OVERRIDE { 79 if (kSets[i].hash == hash) { 99 uint64 hash; variable 100 memcpy(&hash, common_set_hashes.data() + i * sizeof(uint64), 104 if (kSets[j].hash != hash) { [all...] |
H A D | null_decrypter.cc | 29 uint128 hash; local 30 if (!ReadHash(&reader, &hash)) { 39 if (hash != ComputeHash(buffer)) { 54 uint128 hash; local 55 if (!ReadHash(&reader, &hash)) { 65 if (hash != ComputeHash(buffer)) { 75 bool NullDecrypter::ReadHash(QuicDataReader* reader, uint128* hash) { argument 82 *hash = hi; 83 *hash <<= 64; 84 *hash [all...] |
H A D | null_encrypter.cc | 31 uint128 hash = QuicUtils::FNV1a_128_Hash(buffer.data(), buffer.length()); local 32 QuicUtils::SerializeUint128Short(hash, output);
|
/external/chromium_org/net/quic/ |
H A D | quic_received_packet_manager_test.cc | 162 // Inform the tracker about value of the hash at a gap. 172 // Inform the tracker about value of the hash at a known location. 180 // Inform the tracker about value of the hash at the last location. 229 QuicPacketEntropyHash hash = 0; local 233 hash ^= entropies[index].second; 237 EXPECT_EQ(hash, received_manager_.EntropyHash(i)); 273 // Now set the entropy hash up to 5 to be 100.
|
/external/chromium_org/third_party/WebKit/Source/core/css/ |
H A D | SelectorFilter.cpp | 111 static inline void collectDescendantSelectorIdentifierHashes(const CSSSelector& selector, unsigned*& hash) argument 116 (*hash++) = selector.value().impl()->existingHash() * IdAttributeSalt; 120 (*hash++) = selector.value().impl()->existingHash() * ClassAttributeSalt; 124 (*hash++) = selector.tagQName().localName().impl()->existingHash() * TagNameSalt; 133 unsigned* hash = identifierHashes; local 145 collectDescendantSelectorIdentifierHashes(*current, hash); 162 collectDescendantSelectorIdentifierHashes(*current, hash); 165 if (hash == end) 170 *hash = 0;
|
/external/chromium_org/third_party/WebKit/Source/platform/ |
H A D | Crypto.h | 42 static unsigned hash(const blink::DigestValue& v) function in struct:WTF::DigestValueHash
|
/external/chromium_org/third_party/WebKit/Source/platform/exported/ |
H A D | WebCryptoKeyAlgorithm.cpp | 40 WebCryptoAlgorithm createHash(WebCryptoAlgorithmId hash) argument 42 return WebCryptoAlgorithm::adoptParamsAndCreate(hash, 0); 76 WebCryptoKeyAlgorithm WebCryptoKeyAlgorithm::createHmac(WebCryptoAlgorithmId hash, unsigned keyLengthBits) argument 78 if (!WebCryptoAlgorithm::isHash(hash)) 80 return WebCryptoKeyAlgorithm(WebCryptoAlgorithmIdHmac, adoptPtr(new WebCryptoHmacKeyAlgorithmParams(createHash(hash), keyLengthBits))); 83 WebCryptoKeyAlgorithm WebCryptoKeyAlgorithm::createRsaHashed(WebCryptoAlgorithmId id, unsigned modulusLengthBits, const unsigned char* publicExponent, unsigned publicExponentSize, WebCryptoAlgorithmId hash) argument 85 // FIXME: Verify that id is an RSA algorithm which expects a hash 86 if (!WebCryptoAlgorithm::isHash(hash)) 88 return WebCryptoKeyAlgorithm(id, adoptPtr(new WebCryptoRsaHashedKeyAlgorithmParams(modulusLengthBits, publicExponent, publicExponentSize, createHash(hash))));
|
/external/chromium_org/third_party/WebKit/Source/platform/fonts/ |
H A D | FontCacheKey.h | 60 unsigned hash() const function in struct:blink::FontCacheKey 63 m_creationParams.hash(), 99 static unsigned hash(const FontCacheKey& key) function in struct:blink::FontCacheKeyHash 101 return key.hash();
|