/external/openssl/crypto/jpake/ |
jpake_err.c | 84 {ERR_REASON(JPAKE_R_HASH_OF_HASH_OF_KEY_MISMATCH),"hash of hash of key mismatch"}, 85 {ERR_REASON(JPAKE_R_HASH_OF_KEY_MISMATCH),"hash of key mismatch"},
|
/external/srec/tools/thirdparty/OpenFst/fst/lib/ |
product-weight.h | 72 ssize_t Hash() const { 73 ssize_t h1 = value1_.Hash(); 74 ssize_t h2 = value2_.Hash();
|
/external/wpa_supplicant/ |
eap_pax_common.c | 98 u8 hash[SHA1_MAC_LEN]; local 115 hmac_sha1_vector(key, key_len, count, addr, len, hash); 116 os_memcpy(mac, hash, EAP_PAX_MAC_LEN);
|
radius.c | 634 u8 hash[MD5_MAC_LEN]; local 656 md5_vector(4, addr, len, hash); 657 if (os_memcmp(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { 689 * Use one-way MD5 hash calculated from current timestamp and some data given 783 u8 hash[MD5_MAC_LEN]; local 821 md5_vector(first ? 3 : 2, addr, elen, hash); 825 *ppos++ = *pos++ ^ hash[i]; 854 u8 hash[MD5_MAC_LEN], saltbuf[2], *pos; local 886 md5_vector(first ? 3 : 2, addr, _len, hash); 890 *pos++ ^= hash[i] 1051 u8 hash[16]; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_pax_common.c | 98 u8 hash[SHA1_MAC_LEN]; local 115 hmac_sha1_vector(key, key_len, count, addr, len, hash); 116 os_memcpy(mac, hash, EAP_PAX_MAC_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client_write.c | 440 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN], *hpos; local 472 * The hash values are calculated over all handshake messages sent or 478 hpos = hash; 510 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 514 * In digital signing, one-way hash functions are used as input for a 527 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, 529 wpa_printf(MSG_DEBUG, "TLSv1: Failed to sign hash (PKCS #1)"); 597 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; local 607 crypto_hash_finish(conn->verify.md5_client, hash, &hlen) < 0) [all...] |
/frameworks/base/core/java/android/webkit/ |
CacheManager.java | 602 // Note: SHA1 is much stronger hash. But the cost of setupFiles() is 616 // Check hash collision. If the hash file doesn't exist, just 618 // same as the hash file. As mDataBase.getCache() is more 620 // If the hash file exists, make sure that it is same as the 645 // get hash in byte[] 648 byte[] hash = new byte[digestLen]; 653 digest.doFinal(hash, 0); 657 int h = (0x00ff & hash[i]) << 24 | (0x00ff & hash[i + 1]) << 1 [all...] |
/frameworks/base/obex/javax/obex/ |
Authenticator.java | 56 * method and passed through the MD5 hash algorithm. The resulting value is sent 73 * challenge sent via the authentication challenge, apply the MD5 hash 74 * algorithm, and compare the result to the response hash received in the
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/sme/siteMgr/ |
siteHash.h | 2 * \brief Hash & site table internal header file 44 /* PURPOSE: Hash & site table internal header file */ 76 and data used to manage the site table and hash table */
|
/external/dropbear/libtomcrypt/ |
crypt.tex | 125 block cipher and hash function to ensure that they compile and execute to the published design specifications. The library 254 related issue is if you use the same symmetric cipher, hash or public key state data in multiple threads. Normally [all...] |
/external/v8/src/ |
objects.cc | 714 self->Hash(); // Force regeneration of the hash value. 760 self->Hash(); // Force regeneration of the hash value. 3410 uint32_t hash = name->Hash(); local 3441 uint32_t hash = name->Hash(); local 6661 uint32_t hash = source->Hash(); local 6903 uint32_t hash = Shape::HashForObject(key, k); local 7357 uint32_t hash = c1 + (c1 << 10); local 7575 uint32_t hash = 0; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 639 u8 hash[MD5_MAC_LEN]; local 661 md5_vector(4, addr, len, hash); 662 if (os_memcmp(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { 694 * Use one-way MD5 hash calculated from current timestamp and some data given 788 u8 hash[MD5_MAC_LEN]; local 826 md5_vector(first ? 3 : 2, addr, elen, hash); 830 *ppos++ = *pos++ ^ hash[i]; 859 u8 hash[MD5_MAC_LEN], saltbuf[2], *pos; local 890 md5_vector(first ? 3 : 2, addr, _len, hash); 894 *pos++ ^= hash[i] 1055 u8 hash[16]; local [all...] |
/dalvik/libcore/auth/src/main/java/javax/security/auth/ |
PrivateCredentialPermission.java | 236 int hash = 0; local 238 hash = hash + set[i].hashCode(); 240 return getCredentialClass().hashCode() + hash; 382 // Returns the hash code value for this object.
|
/dalvik/libcore/luni-kernel/src/main/java/org/apache/harmony/lang/annotation/ |
AnnotationFactory.java | 251 * Returns a hash code composed as a sum of hash codes of member elements, 256 int hash = 0; local 258 hash += element.hashCode(); 260 return hash;
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 4 int hash; member in struct:Hmac_state 9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen); 13 int hmac_memory(int hash, 17 int hmac_memory_multi(int hash, 21 int hmac_file(int hash, const char *fname, const unsigned char *key,
|
/external/emma/core/java12/com/vladium/util/ |
IntObjectMap.java | 48 * @param initialCapacity initial number of hash buckets in the table [may not be negative, 0 is equivalent to 1]. 86 // index into the corresponding hash bucket: 111 // index into the corresponding hash bucket: 160 // index into the corresponding hash bucket: 261 // index into the corresponding new hash bucket:
|
/external/openssl/crypto/dsa/ |
dsa_gen.c | 64 #define HASH EVP_sha() 69 #define HASH EVP_sha1() 184 EVP_Digest(seed,SHA_DIGEST_LENGTH,md,NULL,HASH, NULL); 185 EVP_Digest(buf,SHA_DIGEST_LENGTH,buf2,NULL,HASH, NULL); 233 EVP_Digest(buf,SHA_DIGEST_LENGTH,md,NULL,HASH, NULL);
|
/external/webkit/JavaScriptCore/wtf/ |
HashSet.h | 37 template<typename ValueArg, typename HashArg = typename DefaultHash<ValueArg>::Hash, 72 // static unsigned hash(const T&); 85 // static unsigned hash(const T&); 107 static unsigned hash(const T& key) { return Translator::hash(key); } function in struct:WTF::HashSetTranslatorAdapter
|
/frameworks/base/awt/java/awt/image/ |
BandedSampleModel.java | 314 int hash = super.hashCode(); local 315 int tmp = hash >>> 8; 316 hash <<= 8; 317 hash |= tmp; 319 return hash ^ 0x55;
|
/external/dropbear/libtomcrypt/src/hashes/sha2/ |
sha256.c | 202 Initialize the hash state 203 @param md The hash state you wish to initialize 224 Process a block of memory though the hash 225 @param md The hash state 226 @param in The data to hash 233 Terminate the hash to get the digest 234 @param md The hash state 235 @param out [out] The destination of the hash (32 bytes) 288 Self-test the hash 298 unsigned char hash[32] [all...] |
/dalvik/libcore/archive/src/main/java/java/util/jar/ |
Attributes.java | 246 * Computes a hash code of the name. 248 * @return the hash value computed from the name. 253 int hash = 0, multiplier = 1; local 256 hash += (name[i] & 0xDF) * multiplier; 260 hashCode = hash; 447 * Returns the hash code of this {@code Attributes}. 449 * @return the hash code of this object.
|
/external/openssl/crypto/ocsp/ |
ocsp.h | 94 * issuerNameHash OCTET STRING, -- Hash of Issuer's DN 95 * issuerKeyHash OCTET STRING, -- Hash of Issuers public key (excluding the tag & length fields) 213 /* KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key 288 "The value for the signature SHALL be computed on the hash of the DER 289 encoding ResponseData." This means that you must hash the DER-encoded 291 will (at least w/RSA) do a hash-'n'-private-encrypt operation. This seems 294 hash. So, we look at the signature-specification algorithm, and try to do
|
/external/openssl/include/openssl/ |
ocsp.h | 94 * issuerNameHash OCTET STRING, -- Hash of Issuer's DN 95 * issuerKeyHash OCTET STRING, -- Hash of Issuers public key (excluding the tag & length fields) 213 /* KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key 288 "The value for the signature SHALL be computed on the hash of the DER 289 encoding ResponseData." This means that you must hash the DER-encoded 291 will (at least w/RSA) do a hash-'n'-private-encrypt operation. This seems 294 hash. So, we look at the signature-specification algorithm, and try to do
|
/external/oprofile/daemon/ |
opd_ibs.c | 603 unsigned long hash; local 627 hash = last->hashval & (CG_HASH_SIZE - 1); 630 * 'last', we use its hash. 632 list_for_each(pos, &sf->cg_hash[hash]) { 633 cg = list_entry(pos, struct cg_entry, hash); 642 list_add(&cg->hash, &sf->cg_hash[hash]);
|
/external/qemu/distrib/zlib-1.2.3/ |
deflate.h | 129 /* Link to older string with same hash index. To limit the size of this 134 Posf *head; /* Heads of the hash chains or NIL. */ 136 uInt ins_h; /* hash index of string to be inserted */ 137 uInt hash_size; /* number of elements in hash table */ 144 * byte no longer takes part in the hash key, that is: 166 /* To speed up deflation, hash chains are never searched beyond this 177 /* Insert new strings in the hash table only if the match length is not
|