Searched defs:hash (Results 1 - 25 of 896) sorted by last modified time

1234567891011>>

/external/zxing/core/
H A Dcore.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/zxing/ com/google/zxing/aztec/ ...
/external/zopfli/src/zopfli/
H A Dlz77.c332 /* Switch to the other hash once this will be more efficient. */
335 /* Now use the hash that encodes the length and first byte. */
377 ZopfliHash hash; local
378 ZopfliHash* h = &hash;
H A Dsqueeze.c222 ZopfliHash hash; local
223 ZopfliHash* h = &hash;
344 ZopfliHash hash; local
345 ZopfliHash* h = &hash;
/external/zopfli/src/zopflipng/lodepng/
H A Dlodepng.cpp1339 sequences to generate a hash value from the stream bytes. Setting it to 3
1346 The HASH_NUM_VALUES is the amount of unique possible hash values that
1353 int* head; /*hash value to head circular pos*/
1354 int* val; /*circular pos to hash value*/
1360 static unsigned hash_init(Hash* hash, unsigned windowsize) argument
1363 hash->head = (int*)lodepng_malloc(sizeof(int) * HASH_NUM_VALUES);
1364 hash->val = (int*)lodepng_malloc(sizeof(int) * windowsize);
1365 hash->chain = (unsigned short*)lodepng_malloc(sizeof(unsigned short) * windowsize);
1366 hash->zeros = (unsigned short*)lodepng_malloc(sizeof(unsigned short) * windowsize);
1368 if(!hash
1378 hash_cleanup(Hash* hash) argument
1415 updateHashChain(Hash* hash, size_t wpos, int hashval) argument
1431 encodeLZ77(uivector* out, Hash* hash, const unsigned char* in, size_t inpos, size_t insize, unsigned windowsize, unsigned minmatch, unsigned nicematch, unsigned lazymatching) argument
1671 deflateDynamic(ucvector* out, size_t* bp, Hash* hash, const unsigned char* data, size_t datapos, size_t dataend, const LodePNGCompressSettings* settings, int final) argument
1916 deflateFixed(ucvector* out, size_t* bp, Hash* hash, const unsigned char* data, size_t datapos, size_t dataend, const LodePNGCompressSettings* settings, int final) argument
1970 Hash hash; local
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpmksa_cache_auth.c53 unsigned int hash; local
58 /* unlink from hash list */
59 hash = PMKID_HASH(entry->pmkid);
60 pos = pmksa->pmkid[hash];
67 pmksa->pmkid[hash] = entry->hnext;
193 int hash; local
212 hash = PMKID_HASH(entry->pmkid);
213 entry->hnext = pmksa->pmkid[hash];
214 pmksa->pmkid[hash] = entry;
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c44 u8 hash[SHA1_MAC_LEN]; local
52 if (hmac_sha1(key, 16, buf, len, hash))
54 os_memcpy(mic, hash, MD5_MAC_LEN);
744 u8 *pos, r0_key_data[48], hash[32]; local
782 sha256_vector(2, addr, len, hash);
783 os_memcpy(pmk_r0_name, hash, WPA_PMK_NAME_LEN);
795 u8 hash[32]; local
812 sha256_vector(4, addr, len, hash);
813 os_memcpy(pmk_r1_name, hash, WPA_PMK_NAME_LEN);
853 u8 *pos, hash[3 local
915 unsigned char hash[SHA256_MAC_LEN]; local
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_cryptoapi.c110 HCRYPTHASH hash; local
120 if (!CryptCreateHash(prov, alg, 0, 0, &hash)) {
127 if (!CryptHashData(hash, (BYTE *) addr[i], len[i], 0)) {
129 CryptDestroyHash(hash);
135 if (!CryptGetHashParam(hash, HP_HASHVAL, mac, &hlen, 0)) {
140 CryptDestroyHash(hash);
348 HCRYPTHASH hash; member in struct:crypto_hash
419 if (!CryptCreateHash(ctx->prov, calg, ctx->key, 0, &ctx->hash)) {
441 if (!CryptSetHashParam(ctx->hash, HP_HMAC_INFO, (BYTE *) &info,
444 CryptDestroyHash(ctx->hash);
[all...]
H A Dms_funcs.c85 u8 hash[SHA1_MAC_LEN]; local
96 if (sha1_vector(3, addr, len, hash))
98 os_memcpy(challenge, hash, 8);
336 u8 hash[SHA1_MAC_LEN]; local
342 if (sha1_vector(3, addr, len, hash))
344 os_memcpy(master_key, hash, 16);
H A Drandom.c102 u8 hash[SHA1_MAC_LEN]; local
106 /* First, add hash back to pool to make backtracking more difficult. */
108 sizeof(pool), hash);
109 random_mix_pool(hash, sizeof(hash));
114 sizeof(buf), hash);
116 * Fold the hash to further reduce any potential output pattern.
120 hash_ptr = (u32 *) hash;
122 os_memcpy(out, hash, EXTRACT_LEN);
H A Dsha1-prf.c35 u8 hash[SHA1_MAC_LEN]; local
57 hash))
59 os_memcpy(&buf[pos], hash, plen);
H A Dsha1-tprf.c34 u8 hash[SHA1_MAC_LEN]; local
40 addr[0] = hash;
57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
60 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN);
63 os_memcpy(&buf[pos], hash, plen);
H A Dsha256-prf.c57 u8 hash[SHA256_MAC_LEN]; local
82 hmac_sha256_vector(key, key_len, 4, addr, len, hash);
83 os_memcpy(&buf[pos], hash, plen);
H A Dtls.h60 const u8 *hash; member in struct:tls_event_data::__anon33598
H A Dtls_openssl.c229 HCRYPTHASH hash; local
247 wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported",
254 if (!CryptCreateHash(priv->crypt_prov, CALG_SSL3_SHAMD5, 0, 0, &hash))
261 if (!CryptGetHashParam(hash, HP_HASHSIZE, (BYTE *) &hash_size, &len,
268 wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)",
274 if (!CryptSetHashParam(hash, HP_HASHVAL, (BYTE * ) from, 0)) {
286 if (!CryptSignHash(hash, priv->key_spec, NULL, 0, buf, &len)) {
297 CryptDestroyHash(hash);
352 } else if (strncmp(name, "hash://", 7) == 0) {
355 const char *hash local
1367 u8 hash[32]; local
1457 u8 hash[32]; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.c239 u8 hash[SHA1_MAC_LEN]; local
246 addr[0] = hash;
257 &vlen[1], hash);
260 hash);
264 os_memcpy(res, hash, SHA1_MAC_LEN);
268 os_memcpy(res, hash, len);
280 u8 hash[SHA256_MAC_LEN]; local
287 addr[0] = hash;
298 &vlen[1], hash);
301 hash);
[all...]
H A Deap_gpsk_common.c44 u8 ibuf[2], hash[16]; local
48 hashlen = sizeof(hash);
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
63 os_memcpy(opos, hash, clen);
79 u8 ibuf[2], hash[SHA256_MAC_LEN]; local
95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
97 os_memcpy(opos, hash, clen);
H A Deap_pax_common.c92 u8 hash[SHA1_MAC_LEN]; local
109 hmac_sha1_vector(key, key_len, count, addr, len, hash);
110 os_memcpy(mac, hash, EAP_PAX_MAC_LEN);
H A Deap_peap_common.c21 u8 hash[SHA1_MAC_LEN]; local
27 addr[0] = hash;
72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
75 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN);
78 os_memcpy(&buf[pos], hash, plen);
H A Deap_psk_common.c37 u8 hash[aes_block_size]; local
41 if (aes_128_encrypt_block(kdk, rand_p, hash))
44 hash[aes_block_size - 1] ^= counter;
45 if (aes_128_encrypt_block(kdk, hash, tek))
47 hash[aes_block_size - 1] ^= counter;
51 hash[aes_block_size - 1] ^= counter;
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
54 hash[aes_block_size - 1] ^= counter;
59 hash[aes_block_size - 1] ^= counter;
60 if (aes_128_encrypt_block(kdk, hash,
[all...]
H A Deap_pwd_common.c26 void eap_pwd_h_update(struct crypto_hash *hash, const u8 *data, size_t len) argument
28 crypto_hash_update(hash, data, len);
32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument
35 crypto_hash_finish(hash, digest, &len);
43 struct crypto_hash *hash; local
54 hash = crypto_hash_init(CRYPTO_HASH_ALG_HMAC_SHA256,
56 if (hash == NULL)
59 crypto_hash_update(hash, digest, SHA256_MAC_LEN);
60 crypto_hash_update(hash, (u8 *) &i, sizeof(u16));
61 crypto_hash_update(hash, labe
94 struct crypto_hash *hash; local
291 struct crypto_hash *hash; local
[all...]
H A Deap_sake_common.c215 u8 hash[SHA1_MAC_LEN]; local
238 hash);
239 os_memcpy(&buf[pos], hash, plen);
H A Deap_sim_common.c239 u8 hash[SHA256_MAC_LEN]; local
251 addr[0] = hash;
266 hmac_sha256_vector(k, 32, 5, addr, len, hash);
269 os_memcpy(res, hash, hlen);
431 u8 hash[SHA256_MAC_LEN]; local
485 hmac_sha256_vector(key, sizeof(key), 5, addr, len, hash);
487 hash, sizeof(hash));
489 os_memcpy(ck, hash, EAP_AKA_CK_LEN);
490 os_memcpy(ik, hash
[all...]
H A Dikev2_common.c57 size_t data_len, u8 *hash)
66 os_memcpy(hash, tmphash, 12);
72 os_memcpy(hash, tmphash, 12);
97 u8 *hash)
101 hmac_sha1_vector(key, key_len, num_elem, addr, len, hash);
104 hmac_md5_vector(key, key_len, num_elem, addr, len, hash);
118 u8 hash[IKEV2_MAX_HASH_LEN]; local
131 addr[0] = hash;
145 &len[1], hash);
148 hash);
56 ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *hash) argument
95 ikev2_prf_hash(int alg, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *hash) argument
375 u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN]; local
433 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap.c653 * unfortunately, such implementations exist. Use MD5 hash as
1358 if (data->peer_cert.hash) {
1363 data->peer_cert.hash,
2045 * @hash: Buffer for returning whether the password is stored as a
2050 const u8 * eap_get_config_password2(struct eap_sm *sm, size_t *len, int *hash) argument
2059 if (hash)
2060 *hash = 0;
2066 if (hash)
2067 *hash = !!(config->flags & EAP_CONFIG_FLAGS_PASSWORD_NTHASH);
H A Deap_aka.c457 u8 hash[SHA256_MAC_LEN]; local
470 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */
476 sha256_vector(1, &addr, &len, hash);
479 sha1_vector(1, &addr, &len, hash);
481 eap_sim_msg_add(msg, EAP_SIM_AT_CHECKCODE, 0, hash,
492 u8 hash[SHA256_MAC_LEN]; local
518 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */
523 sha256_vector(1, &addr, &len, hash);
526 sha1_vector(1, &addr, &len, hash);
528 if (os_memcmp_const(hash, checkcod
[all...]

Completed in 1235 milliseconds

1234567891011>>