/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-7.0.0/src/aead/ |
H A D | ccm.rs | 122 Ccm::<Twofish>::DIGEST_SIZE, in round_trip_ccm_twofish() 130 Ccm::<Twofish>::DIGEST_SIZE, in round_trip_ccm_twofish() 160 Ccm::<Twofish>::DIGEST_SIZE, in modify_ad_ccm_twofish() 168 Ccm::<Twofish>::DIGEST_SIZE, in modify_ad_ccm_twofish() 200 Ccm::<Twofish>::DIGEST_SIZE, in modify_ciphertext_ccm_twofish() 240 Ccm::<Aes128>::DIGEST_SIZE, in round_trip_ccm_aes128() 248 Ccm::<Aes128>::DIGEST_SIZE, in round_trip_ccm_aes128() 278 Ccm::<Aes128>::DIGEST_SIZE, in modify_ad_ccm_aes128() 286 Ccm::<Aes128>::DIGEST_SIZE, in modify_ad_ccm_aes128() 318 Ccm::<Aes128>::DIGEST_SIZE, in modify_ciphertext_ccm_aes128() [all …]
|
H A D | eax.rs | 137 let mut digest = vec![2u8; Eax::<Twofish>::DIGEST_SIZE]; in round_trip_eax_twofish() 169 let mut digest = vec![2u8; Eax::<Twofish>::DIGEST_SIZE]; in modify_ad_eax_twofish() 203 let mut digest = vec![2u8; Eax::<Twofish>::DIGEST_SIZE]; in modify_ciphertext_eax_twofish() 237 let mut digest = vec![2u8; Eax::<Aes128>::DIGEST_SIZE]; in round_trip_eax_aes128() 269 let mut digest = vec![2u8; Eax::<Aes128>::DIGEST_SIZE]; in modify_ad_eax_aes128() 303 let mut digest = vec![2u8; Eax::<Aes128>::DIGEST_SIZE]; in modify_ciphertext_eax_aes128() 337 let mut digest = vec![2u8; Eax::<Aes192>::DIGEST_SIZE]; in round_trip_eax_aes192() 369 let mut digest = vec![2u8; Eax::<Aes192>::DIGEST_SIZE]; in modify_ad_eax_aes192() 403 let mut digest = vec![2u8; Eax::<Aes192>::DIGEST_SIZE]; in modify_ciphertext_eax_aes192() 437 let mut digest = vec![2u8; Eax::<Aes256>::DIGEST_SIZE]; in round_trip_eax_aes256() [all …]
|
H A D | gcm.rs | 126 let mut digest = vec![2u8; Gcm::<Twofish>::DIGEST_SIZE]; in round_trip_gcm_twofish() 158 let mut digest = vec![2u8; Gcm::<Twofish>::DIGEST_SIZE]; in modify_ad_gcm_twofish() 192 let mut digest = vec![2u8; Gcm::<Twofish>::DIGEST_SIZE]; in modify_ciphertext_gcm_twofish() 226 let mut digest = vec![2u8; Gcm::<Aes128>::DIGEST_SIZE]; in round_trip_gcm_aes128() 258 let mut digest = vec![2u8; Gcm::<Aes128>::DIGEST_SIZE]; in modify_ad_gcm_aes128() 292 let mut digest = vec![2u8; Gcm::<Aes128>::DIGEST_SIZE]; in modify_ciphertext_gcm_aes128() 326 let mut digest = vec![2u8; Gcm::<Aes192>::DIGEST_SIZE]; in round_trip_gcm_aes192() 358 let mut digest = vec![2u8; Gcm::<Aes192>::DIGEST_SIZE]; in modify_ad_gcm_aes192() 392 let mut digest = vec![2u8; Gcm::<Aes192>::DIGEST_SIZE]; in modify_ciphertext_gcm_aes192() 426 let mut digest = vec![2u8; Gcm::<Aes256>::DIGEST_SIZE]; in round_trip_gcm_aes256() [all …]
|
/dports/databases/mariadb103-client/mariadb-10.3.34/extra/yassl/taocrypt/include/ |
H A D | sha.hpp | 38 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 20, PAD_SIZE = 56, enumerator 40 SHA() : HASHwithTransform(DIGEST_SIZE / sizeof(word32), BLOCK_SIZE) in SHA() 44 word32 getDigestSize() const { return DIGEST_SIZE; } in getDigestSize() 70 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 32, PAD_SIZE = 56, enumerator 76 word32 getDigestSize() const { return DIGEST_SIZE; } in getDigestSize() 93 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 28, PAD_SIZE = 56, enumerator 99 word32 getDigestSize() const { return DIGEST_SIZE; } in getDigestSize() 118 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 64, PAD_SIZE = 112, enumerator 124 word32 getDigestSize() const { return DIGEST_SIZE; } in getDigestSize() 141 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 48, PAD_SIZE = 112, enumerator [all …]
|
/dports/databases/mariadb103-server/mariadb-10.3.34/extra/yassl/taocrypt/include/ |
H A D | sha.hpp | 38 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 20, PAD_SIZE = 56, 40 SHA() : HASHwithTransform(DIGEST_SIZE / sizeof(word32), BLOCK_SIZE) 44 word32 getDigestSize() const { return DIGEST_SIZE; } 70 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 32, PAD_SIZE = 56, 76 word32 getDigestSize() const { return DIGEST_SIZE; } 93 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 28, PAD_SIZE = 56, 99 word32 getDigestSize() const { return DIGEST_SIZE; } 118 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 64, PAD_SIZE = 112, 124 word32 getDigestSize() const { return DIGEST_SIZE; } 141 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 48, PAD_SIZE = 112, [all …]
|
/dports/databases/mysql55-client/mysql-5.5.62/extra/yassl/taocrypt/include/ |
H A D | sha.hpp | 38 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 20, PAD_SIZE = 56, enumerator 40 SHA() : HASHwithTransform(DIGEST_SIZE / sizeof(word32), BLOCK_SIZE) in SHA() 44 word32 getDigestSize() const { return DIGEST_SIZE; } in getDigestSize() 70 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 32, PAD_SIZE = 56, enumerator 76 word32 getDigestSize() const { return DIGEST_SIZE; } in getDigestSize() 93 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 28, PAD_SIZE = 56, enumerator 99 word32 getDigestSize() const { return DIGEST_SIZE; } in getDigestSize() 118 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 64, PAD_SIZE = 112, enumerator 124 word32 getDigestSize() const { return DIGEST_SIZE; } in getDigestSize() 141 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 48, PAD_SIZE = 112, enumerator [all …]
|
/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | rawSHA512_common_plug.c | 160 if (len < (DIGEST_SIZE+1+2)/3*4-2) in sha512_common_valid_nsldap() 182 for (i = 0; i < DIGEST_SIZE; i++) { in sha512_common_binary() 204 for (i = 0; i < DIGEST_SIZE; i++) { in sha512_common_binary_BE() 217 unsigned char out[DIGEST_SIZE]; in sha512_common_binary_rev() 226 for (i = 0; i < DIGEST_SIZE; i++) { in sha512_common_binary_rev() 244 unsigned char out[DIGEST_SIZE]; in sha512_common_binary_xsha512() 253 for (i = 0; i < DIGEST_SIZE; i++) { in sha512_common_binary_xsha512() 269 unsigned char out[DIGEST_SIZE]; in sha512_common_binary_xsha512_BE() 278 for (i = 0; i < DIGEST_SIZE; i++) { in sha512_common_binary_xsha512_BE() 291 unsigned char out[DIGEST_SIZE]; in sha512_common_binary_xsha512_rev() [all …]
|
H A D | rawSHA1_fmt_plug.c | 71 #define BINARY_SIZE DIGEST_SIZE 128 digest_size = DIGEST_SIZE; in init_raw() 183 static uint32_t full[DIGEST_SIZE / 4]; in get_binary() 194 alter_endianity(realcipher, DIGEST_SIZE); in get_binary() 210 uint32_t hash[DIGEST_SIZE / 4]; in source() 214 memcpy(hash, binary, DIGEST_SIZE); in source() 227 alter_endianity(hash, DIGEST_SIZE); in source() 235 alter_endianity(hash, DIGEST_SIZE); in source() 298 uint32_t crypt_key[DIGEST_SIZE / 4]; in cmp_exact() 307 alter_endianity(crypt_key, DIGEST_SIZE); in cmp_exact() [all …]
|
H A D | rawSHA256_common_plug.c | 57 if (!out) out = mem_calloc_tiny(DIGEST_SIZE, MEM_ALIGN_WORD); in sha256_common_binary() 60 for (i = 0; i < DIGEST_SIZE; i++) { in sha256_common_binary() 68 alter_endianity (out, DIGEST_SIZE); in sha256_common_binary() 79 if (!out) out = mem_calloc_tiny(DIGEST_SIZE, MEM_ALIGN_WORD); in sha256_common_binary_BE() 82 for (i = 0; i < DIGEST_SIZE; i++) { in sha256_common_binary_BE() 88 alter_endianity (out, DIGEST_SIZE); in sha256_common_binary_BE()
|
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/src/java.base/share/classes/sun/security/provider/ |
H A D | SecureRandom.java | 60 private static final int DIGEST_SIZE = 20; field in SecureRandom 203 byte [] b = new byte[DIGEST_SIZE]; 221 byte[] seed = new byte[DIGEST_SIZE]; in engineNextBytes() 230 todo = (result.length - index) < (DIGEST_SIZE - r) ? in engineNextBytes() 231 (result.length - index) : (DIGEST_SIZE - r); in engineNextBytes() 249 todo = (result.length - index) > DIGEST_SIZE ? in engineNextBytes() 250 DIGEST_SIZE : result.length - index; in engineNextBytes() 261 remCount %= DIGEST_SIZE; in engineNextBytes()
|
/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/src/java.base/share/classes/sun/security/provider/ |
H A D | SecureRandom.java | 60 private static final int DIGEST_SIZE = 20; field in SecureRandom 203 byte [] b = new byte[DIGEST_SIZE]; 221 byte[] seed = new byte[DIGEST_SIZE]; in engineNextBytes() 230 todo = (result.length - index) < (DIGEST_SIZE - r) ? in engineNextBytes() 231 (result.length - index) : (DIGEST_SIZE - r); in engineNextBytes() 249 todo = (result.length - index) > DIGEST_SIZE ? in engineNextBytes() 250 DIGEST_SIZE : result.length - index; in engineNextBytes() 261 remCount %= DIGEST_SIZE; in engineNextBytes()
|
/dports/java/openjdk11-jre/jdk11u-jdk-11.0.13-8-1/src/java.base/share/classes/sun/security/provider/ |
H A D | SecureRandom.java | 60 private static final int DIGEST_SIZE = 20; field in SecureRandom 203 byte [] b = new byte[DIGEST_SIZE]; 221 byte[] seed = new byte[DIGEST_SIZE]; in engineNextBytes() 230 todo = (result.length - index) < (DIGEST_SIZE - r) ? in engineNextBytes() 231 (result.length - index) : (DIGEST_SIZE - r); in engineNextBytes() 249 todo = (result.length - index) > DIGEST_SIZE ? in engineNextBytes() 250 DIGEST_SIZE : result.length - index; in engineNextBytes() 261 remCount %= DIGEST_SIZE; in engineNextBytes()
|
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/jdk/src/share/classes/sun/security/provider/ |
H A D | SecureRandom.java | 60 private static final int DIGEST_SIZE = 20; field in SecureRandom 202 byte [] b = new byte[DIGEST_SIZE]; 220 byte[] seed = new byte[DIGEST_SIZE]; in engineNextBytes() 229 todo = (result.length - index) < (DIGEST_SIZE - r) ? in engineNextBytes() 230 (result.length - index) : (DIGEST_SIZE - r); in engineNextBytes() 248 todo = (result.length - index) > DIGEST_SIZE ? in engineNextBytes() 249 DIGEST_SIZE : result.length - index; in engineNextBytes() 260 remCount %= DIGEST_SIZE; in engineNextBytes()
|
/dports/java/openjdk16/jdk16u-jdk-16.0.2-7-1/src/java.base/share/classes/sun/security/provider/ |
H A D | SecureRandom.java | 61 private static final int DIGEST_SIZE = 20; field in SecureRandom 209 byte [] b = new byte[DIGEST_SIZE]; 227 byte[] seed = new byte[DIGEST_SIZE]; in engineNextBytes() 236 todo = (result.length - index) < (DIGEST_SIZE - r) ? in engineNextBytes() 237 (result.length - index) : (DIGEST_SIZE - r); in engineNextBytes() 255 todo = (result.length - index) > DIGEST_SIZE ? in engineNextBytes() 256 DIGEST_SIZE : result.length - index; in engineNextBytes() 267 remCount %= DIGEST_SIZE; in engineNextBytes()
|
/dports/java/openjdk17/jdk17u-jdk-17.0.1-12-1/src/java.base/share/classes/sun/security/provider/ |
H A D | SecureRandom.java | 61 private static final int DIGEST_SIZE = 20; field in SecureRandom 209 byte [] b = new byte[DIGEST_SIZE]; 227 byte[] seed = new byte[DIGEST_SIZE]; in engineNextBytes() 236 todo = (result.length - index) < (DIGEST_SIZE - r) ? in engineNextBytes() 237 (result.length - index) : (DIGEST_SIZE - r); in engineNextBytes() 255 todo = (result.length - index) > DIGEST_SIZE ? in engineNextBytes() 256 DIGEST_SIZE : result.length - index; in engineNextBytes() 267 remCount %= DIGEST_SIZE; in engineNextBytes()
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/java.base/share/classes/sun/security/provider/ |
H A D | SecureRandom.java | 60 private static final int DIGEST_SIZE = 20; field in SecureRandom 203 byte [] b = new byte[DIGEST_SIZE]; 221 byte[] seed = new byte[DIGEST_SIZE]; in engineNextBytes() 230 todo = (result.length - index) < (DIGEST_SIZE - r) ? in engineNextBytes() 231 (result.length - index) : (DIGEST_SIZE - r); in engineNextBytes() 249 todo = (result.length - index) > DIGEST_SIZE ? in engineNextBytes() 250 DIGEST_SIZE : result.length - index; in engineNextBytes() 261 remCount %= DIGEST_SIZE; in engineNextBytes()
|
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/src/java.base/share/classes/sun/security/provider/ |
H A D | SecureRandom.java | 61 private static final int DIGEST_SIZE = 20; field in SecureRandom 204 byte [] b = new byte[DIGEST_SIZE]; 222 byte[] seed = new byte[DIGEST_SIZE]; in engineNextBytes() 231 todo = (result.length - index) < (DIGEST_SIZE - r) ? in engineNextBytes() 232 (result.length - index) : (DIGEST_SIZE - r); in engineNextBytes() 250 todo = (result.length - index) > DIGEST_SIZE ? in engineNextBytes() 251 DIGEST_SIZE : result.length - index; in engineNextBytes() 262 remCount %= DIGEST_SIZE; in engineNextBytes()
|
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/src/java.base/share/classes/sun/security/provider/ |
H A D | SecureRandom.java | 61 private static final int DIGEST_SIZE = 20; field in SecureRandom 204 byte [] b = new byte[DIGEST_SIZE]; 222 byte[] seed = new byte[DIGEST_SIZE]; in engineNextBytes() 231 todo = (result.length - index) < (DIGEST_SIZE - r) ? in engineNextBytes() 232 (result.length - index) : (DIGEST_SIZE - r); in engineNextBytes() 250 todo = (result.length - index) > DIGEST_SIZE ? in engineNextBytes() 251 DIGEST_SIZE : result.length - index; in engineNextBytes() 262 remCount %= DIGEST_SIZE; in engineNextBytes()
|
/dports/java/openjdk8-jre/jdk8u-jdk8u312-b07.1/jdk/src/share/classes/sun/security/provider/ |
H A D | SecureRandom.java | 60 private static final int DIGEST_SIZE = 20; field in SecureRandom 202 byte [] b = new byte[DIGEST_SIZE]; 220 byte[] seed = new byte[DIGEST_SIZE]; in engineNextBytes() 229 todo = (result.length - index) < (DIGEST_SIZE - r) ? in engineNextBytes() 230 (result.length - index) : (DIGEST_SIZE - r); in engineNextBytes() 248 todo = (result.length - index) > DIGEST_SIZE ? in engineNextBytes() 249 DIGEST_SIZE : result.length - index; in engineNextBytes() 260 remCount %= DIGEST_SIZE; in engineNextBytes()
|
/dports/devel/tcl-trf/trf2.1.4/generic/ |
H A D | sha1.c | 42 #define DIGEST_SIZE (20) macro 44 #define DIGEST_SIZE (8) macro 67 DIGEST_SIZE, 141 Trf_FlipRegisterLong ((VOID*) result, DIGEST_SIZE); 142 memcpy ((VOID *) digest, (VOID *) result, DIGEST_SIZE);
|
/dports/emulators/yuzu/yuzu-0b47f7a46/externals/libzip/libzip/lib/ |
H A D | zip_crypto_win.c | 107 #define DIGEST_SIZE 20 macro 153 BYTE key[DIGEST_SIZE]; in hmacInit() 228 BYTE Ti[DIGEST_SIZE]; in pbkdf2() 229 BYTE V[DIGEST_SIZE]; in pbkdf2() 230 LPBYTE U = malloc(max((cbSalt + 4), DIGEST_SIZE)); in pbkdf2() 247 r = cbDerivedKey - (l - 1) * DIGEST_SIZE; in pbkdf2() 250 ZeroMemory(Ti, DIGEST_SIZE); in pbkdf2() 262 memcpy(U, V, DIGEST_SIZE); in pbkdf2() 263 dwULen = DIGEST_SIZE; in pbkdf2() 270 xor(Ti, V, DIGEST_SIZE); in pbkdf2() [all …]
|
/dports/archivers/libzip/libzip-1.7.3/lib/ |
H A D | zip_crypto_win.c | 108 #define DIGEST_SIZE 20 macro 154 BYTE key[DIGEST_SIZE]; in hmacInit() 229 BYTE Ti[DIGEST_SIZE]; in pbkdf2() 230 BYTE V[DIGEST_SIZE]; in pbkdf2() 231 LPBYTE U = malloc(max((cbSalt + 4), DIGEST_SIZE)); in pbkdf2() 248 r = cbDerivedKey - (l - 1) * DIGEST_SIZE; in pbkdf2() 251 ZeroMemory(Ti, DIGEST_SIZE); in pbkdf2() 263 memcpy(U, V, DIGEST_SIZE); in pbkdf2() 264 dwULen = DIGEST_SIZE; in pbkdf2() 271 myxor(Ti, V, DIGEST_SIZE); in pbkdf2() [all …]
|
/dports/databases/mysql55-client/mysql-5.5.62/include/ |
H A D | sha2.h | 39 #define SHA512_DIGEST_LENGTH TaoCrypt::SHA512::DIGEST_SIZE 43 #define SHA384_DIGEST_LENGTH TaoCrypt::SHA384::DIGEST_SIZE 47 #define SHA256_DIGEST_LENGTH TaoCrypt::SHA256::DIGEST_SIZE 51 #define SHA224_DIGEST_LENGTH TaoCrypt::SHA224::DIGEST_SIZE
|
/dports/games/wesnoth/wesnoth-1.14.17/src/ |
H A D | hash.cpp | 30 static_assert(utils::md5::DIGEST_SIZE == MD5_DIGEST_LENGTH, "Constants mismatch"); 31 static_assert(utils::sha1::DIGEST_SIZE == SHA_DIGEST_LENGTH, "Constants mismatch"); 37 static_assert(utils::md5::DIGEST_SIZE == CC_MD5_DIGEST_LENGTH, "Constants mismatch"); 38 static_assert(utils::sha1::DIGEST_SIZE == CC_SHA1_DIGEST_LENGTH, "Constants mismatch"); 118 return hexencode_hash<DIGEST_SIZE>(hash); in hex_digest() 123 return encode_hash<DIGEST_SIZE>(hash); in base64_digest() 140 return hexencode_hash<DIGEST_SIZE>(hash); in hex_digest() 145 return encode_hash<DIGEST_SIZE>(hash); in base64_digest()
|
/dports/databases/mariadb103-client/mariadb-10.3.34/extra/yassl/taocrypt/test/ |
H A D | test.cpp | 346 byte md5sum[MD5::DIGEST_SIZE]; in file_test() 370 byte hash[SHA::DIGEST_SIZE]; in sha_test() 407 byte hash[SHA256::DIGEST_SIZE]; in sha256_test() 439 byte hash[SHA512::DIGEST_SIZE]; in sha512_test() 474 byte hash[SHA384::DIGEST_SIZE]; in sha384_test() 509 byte hash[SHA224::DIGEST_SIZE]; in sha224_test() 537 byte hash[MD5::DIGEST_SIZE]; in md5_test() 576 byte hash[MD4::DIGEST_SIZE]; in md4_test() 621 byte hash[MD2::DIGEST_SIZE]; in md2_test() 714 byte hash[MD5::DIGEST_SIZE]; in hmac_test() [all …]
|