HomeSort by relevance Sort by last modified time
    Searched full:hash (Results 526 - 550 of 2206) sorted by null

<<21222324252627282930>>

  /external/openssl/crypto/jpake/
jpake_err.c 84 {ERR_REASON(JPAKE_R_HASH_OF_HASH_OF_KEY_MISMATCH),"hash of hash of key mismatch"},
85 {ERR_REASON(JPAKE_R_HASH_OF_KEY_MISMATCH),"hash of key mismatch"},
  /external/srec/tools/thirdparty/OpenFst/fst/lib/
product-weight.h 72 ssize_t Hash() const {
73 ssize_t h1 = value1_.Hash();
74 ssize_t h2 = value2_.Hash();
  /external/wpa_supplicant/
eap_pax_common.c 98 u8 hash[SHA1_MAC_LEN]; local
115 hmac_sha1_vector(key, key_len, count, addr, len, hash);
116 os_memcpy(mac, hash, EAP_PAX_MAC_LEN);
radius.c 634 u8 hash[MD5_MAC_LEN]; local
656 md5_vector(4, addr, len, hash);
657 if (os_memcmp(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) {
689 * Use one-way MD5 hash calculated from current timestamp and some data given
783 u8 hash[MD5_MAC_LEN]; local
821 md5_vector(first ? 3 : 2, addr, elen, hash);
825 *ppos++ = *pos++ ^ hash[i];
854 u8 hash[MD5_MAC_LEN], saltbuf[2], *pos; local
886 md5_vector(first ? 3 : 2, addr, _len, hash);
890 *pos++ ^= hash[i]
1051 u8 hash[16]; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_pax_common.c 98 u8 hash[SHA1_MAC_LEN]; local
115 hmac_sha1_vector(key, key_len, count, addr, len, hash);
116 os_memcpy(mac, hash, EAP_PAX_MAC_LEN);
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_client_write.c 440 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN], *hpos; local
472 * The hash values are calculated over all handshake messages sent or
478 hpos = hash;
510 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen);
514 * In digital signing, one-way hash functions are used as input for a
527 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen,
529 wpa_printf(MSG_DEBUG, "TLSv1: Failed to sign hash (PKCS #1)");
597 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; local
607 crypto_hash_finish(conn->verify.md5_client, hash, &hlen) < 0)
    [all...]
  /frameworks/base/core/java/android/webkit/
CacheManager.java 602 // Note: SHA1 is much stronger hash. But the cost of setupFiles() is
616 // Check hash collision. If the hash file doesn't exist, just
618 // same as the hash file. As mDataBase.getCache() is more
620 // If the hash file exists, make sure that it is same as the
645 // get hash in byte[]
648 byte[] hash = new byte[digestLen];
653 digest.doFinal(hash, 0);
657 int h = (0x00ff & hash[i]) << 24 | (0x00ff & hash[i + 1]) << 1
    [all...]
  /frameworks/base/obex/javax/obex/
Authenticator.java 56 * method and passed through the MD5 hash algorithm. The resulting value is sent
73 * challenge sent via the authentication challenge, apply the MD5 hash
74 * algorithm, and compare the result to the response hash received in the
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/sme/siteMgr/
siteHash.h 2 * \brief Hash & site table internal header file
44 /* PURPOSE: Hash & site table internal header file */
76 and data used to manage the site table and hash table */
  /external/dropbear/libtomcrypt/
crypt.tex 125 block cipher and hash function to ensure that they compile and execute to the published design specifications. The library
254 related issue is if you use the same symmetric cipher, hash or public key state data in multiple threads. Normally
    [all...]
  /external/v8/src/
objects.cc 714 self->Hash(); // Force regeneration of the hash value.
760 self->Hash(); // Force regeneration of the hash value.
3410 uint32_t hash = name->Hash(); local
3441 uint32_t hash = name->Hash(); local
6661 uint32_t hash = source->Hash(); local
6903 uint32_t hash = Shape::HashForObject(key, k); local
7357 uint32_t hash = c1 + (c1 << 10); local
7575 uint32_t hash = 0; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius.c 639 u8 hash[MD5_MAC_LEN]; local
661 md5_vector(4, addr, len, hash);
662 if (os_memcmp(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) {
694 * Use one-way MD5 hash calculated from current timestamp and some data given
788 u8 hash[MD5_MAC_LEN]; local
826 md5_vector(first ? 3 : 2, addr, elen, hash);
830 *ppos++ = *pos++ ^ hash[i];
859 u8 hash[MD5_MAC_LEN], saltbuf[2], *pos; local
890 md5_vector(first ? 3 : 2, addr, _len, hash);
894 *pos++ ^= hash[i]
1055 u8 hash[16]; local
    [all...]
  /dalvik/libcore/auth/src/main/java/javax/security/auth/
PrivateCredentialPermission.java 236 int hash = 0; local
238 hash = hash + set[i].hashCode();
240 return getCredentialClass().hashCode() + hash;
382 // Returns the hash code value for this object.
  /dalvik/libcore/luni-kernel/src/main/java/org/apache/harmony/lang/annotation/
AnnotationFactory.java 251 * Returns a hash code composed as a sum of hash codes of member elements,
256 int hash = 0; local
258 hash += element.hashCode();
260 return hash;
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_mac.h 4 int hash; member in struct:Hmac_state
9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen);
13 int hmac_memory(int hash,
17 int hmac_memory_multi(int hash,
21 int hmac_file(int hash, const char *fname, const unsigned char *key,
  /external/emma/core/java12/com/vladium/util/
IntObjectMap.java 48 * @param initialCapacity initial number of hash buckets in the table [may not be negative, 0 is equivalent to 1].
86 // index into the corresponding hash bucket:
111 // index into the corresponding hash bucket:
160 // index into the corresponding hash bucket:
261 // index into the corresponding new hash bucket:
  /external/openssl/crypto/dsa/
dsa_gen.c 64 #define HASH EVP_sha()
69 #define HASH EVP_sha1()
184 EVP_Digest(seed,SHA_DIGEST_LENGTH,md,NULL,HASH, NULL);
185 EVP_Digest(buf,SHA_DIGEST_LENGTH,buf2,NULL,HASH, NULL);
233 EVP_Digest(buf,SHA_DIGEST_LENGTH,md,NULL,HASH, NULL);
  /external/webkit/JavaScriptCore/wtf/
HashSet.h 37 template<typename ValueArg, typename HashArg = typename DefaultHash<ValueArg>::Hash,
72 // static unsigned hash(const T&);
85 // static unsigned hash(const T&);
107 static unsigned hash(const T& key) { return Translator::hash(key); } function in struct:WTF::HashSetTranslatorAdapter
  /frameworks/base/awt/java/awt/image/
BandedSampleModel.java 314 int hash = super.hashCode(); local
315 int tmp = hash >>> 8;
316 hash <<= 8;
317 hash |= tmp;
319 return hash ^ 0x55;
  /external/dropbear/libtomcrypt/src/hashes/sha2/
sha256.c 202 Initialize the hash state
203 @param md The hash state you wish to initialize
224 Process a block of memory though the hash
225 @param md The hash state
226 @param in The data to hash
233 Terminate the hash to get the digest
234 @param md The hash state
235 @param out [out] The destination of the hash (32 bytes)
288 Self-test the hash
298 unsigned char hash[32]
    [all...]
  /dalvik/libcore/archive/src/main/java/java/util/jar/
Attributes.java 246 * Computes a hash code of the name.
248 * @return the hash value computed from the name.
253 int hash = 0, multiplier = 1; local
256 hash += (name[i] & 0xDF) * multiplier;
260 hashCode = hash;
447 * Returns the hash code of this {@code Attributes}.
449 * @return the hash code of this object.
  /external/openssl/crypto/ocsp/
ocsp.h 94 * issuerNameHash OCTET STRING, -- Hash of Issuer's DN
95 * issuerKeyHash OCTET STRING, -- Hash of Issuers public key (excluding the tag & length fields)
213 /* KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key
288 "The value for the signature SHALL be computed on the hash of the DER
289 encoding ResponseData." This means that you must hash the DER-encoded
291 will (at least w/RSA) do a hash-'n'-private-encrypt operation. This seems
294 hash. So, we look at the signature-specification algorithm, and try to do
  /external/openssl/include/openssl/
ocsp.h 94 * issuerNameHash OCTET STRING, -- Hash of Issuer's DN
95 * issuerKeyHash OCTET STRING, -- Hash of Issuers public key (excluding the tag & length fields)
213 /* KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key
288 "The value for the signature SHALL be computed on the hash of the DER
289 encoding ResponseData." This means that you must hash the DER-encoded
291 will (at least w/RSA) do a hash-'n'-private-encrypt operation. This seems
294 hash. So, we look at the signature-specification algorithm, and try to do
  /external/oprofile/daemon/
opd_ibs.c 603 unsigned long hash; local
627 hash = last->hashval & (CG_HASH_SIZE - 1);
630 * 'last', we use its hash.
632 list_for_each(pos, &sf->cg_hash[hash]) {
633 cg = list_entry(pos, struct cg_entry, hash);
642 list_add(&cg->hash, &sf->cg_hash[hash]);
  /external/qemu/distrib/zlib-1.2.3/
deflate.h 129 /* Link to older string with same hash index. To limit the size of this
134 Posf *head; /* Heads of the hash chains or NIL. */
136 uInt ins_h; /* hash index of string to be inserted */
137 uInt hash_size; /* number of elements in hash table */
144 * byte no longer takes part in the hash key, that is:
166 /* To speed up deflation, hash chains are never searched beyond this
177 /* Insert new strings in the hash table only if the match length is not

Completed in 356 milliseconds

<<21222324252627282930>>