/dports/devel/py-minio/minio-4.0.21/tests/unit/ |
H A D | sign_test.py | 30 empty_hash = 'e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855' variable 39 empty_hash, 'x-amz-date:dateString', 41 empty_hash] 43 'X-Amz-Content-Sha256': empty_hash}) 50 empty_hash) 58 'x-amz-content-sha256:' + empty_hash, 61 empty_hash] 66 'X-Amz-Content-Sha256': empty_hash}) 72 empty_hash)
|
/dports/security/botan110/Botan-1.10.17/src/pk_pad/emsa2/ |
H A D | emsa2.cpp | 20 const MemoryRegion<byte>& empty_hash, in emsa2_encoding() argument 23 const size_t HASH_SIZE = empty_hash.size(); in emsa2_encoding() 34 if(empty_hash[j] != msg[j]) in emsa2_encoding() 74 return emsa2_encoding(msg, output_bits, empty_hash, hash_id); in encoding_of() 87 empty_hash, hash_id)); in verify() 100 empty_hash = hash->final(); in EMSA2()
|
/dports/lang/ruby26/ruby-2.6.9/spec/ruby/core/hash/ |
H A D | any_spec.rb | 6 empty_hash = {} 7 empty_hash.any?.should == false 16 empty_hash = {} 17 empty_hash.any? {|k,v| 1 == 1 }.should == false
|
/dports/devel/p5-Method-Signatures/Method-Signatures-20170211/t/ |
H A D | when.t | 16 func empty_hash( HashRef[Int] $ref = { foo => 23, bar => 42 } when {} ) { 20 is_deeply empty_hash(), { foo => 23, bar => 42 }; 21 is_deeply empty_hash({}), { foo => 23, bar => 42 }; 22 is_deeply empty_hash({ this => 23 }), { this => 23 };
|
/dports/emulators/citra/citra-ac98458e0/externals/libressl/ssl/ |
H A D | tls13_key_schedule.c | 33 freezero(secrets->empty_hash.data, secrets->empty_hash.len); in tls13_secrets_destroy() 89 if ((secrets->empty_hash.data = malloc(hash_length)) == NULL) in tls13_secrets_create() 91 secrets->empty_hash.len = hash_length; in tls13_secrets_create() 151 if (!EVP_DigestFinal_ex(mdctx, secrets->empty_hash.data, &mdlen)) in tls13_secrets_create() 156 if (secrets->empty_hash.len != mdlen) in tls13_secrets_create() 236 &secrets->empty_hash)) in tls13_derive_early_secrets() 248 &secrets->empty_hash)) in tls13_derive_early_secrets() 292 &secrets->empty_hash)) in tls13_derive_handshake_secrets()
|
/dports/emulators/citra-qt5/citra-ac98458e0/externals/libressl/ssl/ |
H A D | tls13_key_schedule.c | 33 freezero(secrets->empty_hash.data, secrets->empty_hash.len); in tls13_secrets_destroy() 89 if ((secrets->empty_hash.data = malloc(hash_length)) == NULL) in tls13_secrets_create() 91 secrets->empty_hash.len = hash_length; in tls13_secrets_create() 151 if (!EVP_DigestFinal_ex(mdctx, secrets->empty_hash.data, &mdlen)) in tls13_secrets_create() 156 if (secrets->empty_hash.len != mdlen) in tls13_secrets_create() 236 &secrets->empty_hash)) in tls13_derive_early_secrets() 248 &secrets->empty_hash)) in tls13_derive_early_secrets() 292 &secrets->empty_hash)) in tls13_derive_handshake_secrets()
|
/dports/devel/p5-Config-Objective/Config-Objective-0.9.1/ |
H A D | test.pl | 145 $empty_hash = $conf->empty_hash; 168 && ref($empty_hash) eq 'HASH' 169 && scalar(keys %$empty_hash) == 0
|
/dports/devel/p5-Clone-Choose/Clone-Choose-0.010/t/Auto/MR/ |
H A D | 07-hash.t | 44 my $empty_hash = {}; 45 my $cloned_empty_hash = clone $empty_hash; 47 ok(refaddr $empty_hash != refaddr $cloned_empty_hash, "Empty hash clone");
|
/dports/devel/p5-Clone-Choose/Clone-Choose-0.010/t/Auto/NoMR/ |
H A D | 07-hash.t | 45 my $empty_hash = {}; 46 my $cloned_empty_hash = clone $empty_hash; 48 ok(refaddr $empty_hash != refaddr $cloned_empty_hash, "Empty hash clone");
|
/dports/devel/p5-Clone-Choose/Clone-Choose-0.010/t/Clone/MR/ |
H A D | 07-hash.t | 46 my $empty_hash = {}; 47 my $cloned_empty_hash = clone $empty_hash; 49 ok(refaddr $empty_hash != refaddr $cloned_empty_hash, "Empty hash clone");
|
/dports/devel/p5-Clone-Choose/Clone-Choose-0.010/t/Storable/MR/ |
H A D | 07-hash.t | 46 my $empty_hash = {}; 47 my $cloned_empty_hash = clone $empty_hash; 49 ok(refaddr $empty_hash != refaddr $cloned_empty_hash, "Empty hash clone");
|
/dports/devel/p5-Clone-Choose/Clone-Choose-0.010/t/ClonePP/MR/ |
H A D | 07-hash.t | 46 my $empty_hash = {}; 47 my $cloned_empty_hash = clone $empty_hash; 49 ok(refaddr $empty_hash != refaddr $cloned_empty_hash, "Empty hash clone");
|
/dports/devel/p5-Clone-Choose/Clone-Choose-0.010/t/Storable/NoMR/ |
H A D | 07-hash.t | 47 my $empty_hash = {}; 48 my $cloned_empty_hash = clone $empty_hash; 50 ok(refaddr $empty_hash != refaddr $cloned_empty_hash, "Empty hash clone");
|
/dports/devel/p5-Clone-Choose/Clone-Choose-0.010/t/Clone/NoMR/ |
H A D | 07-hash.t | 47 my $empty_hash = {}; 48 my $cloned_empty_hash = clone $empty_hash; 50 ok(refaddr $empty_hash != refaddr $cloned_empty_hash, "Empty hash clone");
|
/dports/devel/p5-Clone-Choose/Clone-Choose-0.010/t/ClonePP/NoMR/ |
H A D | 07-hash.t | 47 my $empty_hash = {}; 48 my $cloned_empty_hash = clone $empty_hash; 50 ok(refaddr $empty_hash != refaddr $cloned_empty_hash, "Empty hash clone");
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/pk_pad/emsa_x931/ |
H A D | emsa_x931.cpp | 18 const secure_vector<uint8_t>& empty_hash, in emsa2_encoding() argument 21 const size_t HASH_SIZE = empty_hash.size(); in emsa2_encoding() 30 const bool empty_input = (msg == empty_hash); in emsa2_encoding()
|
/dports/security/botan2/Botan-2.18.2/src/lib/pk_pad/emsa_x931/ |
H A D | emsa_x931.cpp | 18 const secure_vector<uint8_t>& empty_hash, in emsa2_encoding() argument 21 const size_t HASH_SIZE = empty_hash.size(); in emsa2_encoding() 30 const bool empty_input = (msg == empty_hash); in emsa2_encoding()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/pk_pad/emsa_x931/ |
H A D | emsa_x931.cpp | 18 const secure_vector<uint8_t>& empty_hash, in emsa2_encoding() argument 21 const size_t HASH_SIZE = empty_hash.size(); in emsa2_encoding() 30 const bool empty_input = (msg == empty_hash); in emsa2_encoding()
|
/dports/security/libressl-static/libressl-3.3.5/ssl/ |
H A D | tls13_key_schedule.c | 66 if (!tls13_secret_init(&secrets->empty_hash, hash_length)) in tls13_secrets_create() 108 if (!EVP_DigestFinal_ex(mdctx, secrets->empty_hash.data, &mdlen)) in tls13_secrets_create() 113 if (secrets->empty_hash.len != mdlen) in tls13_secrets_create() 137 tls13_secret_cleanup(&secrets->empty_hash); in tls13_secrets_destroy() 239 &secrets->empty_hash)) in tls13_derive_early_secrets() 251 &secrets->empty_hash)) in tls13_derive_early_secrets() 295 &secrets->empty_hash)) in tls13_derive_handshake_secrets()
|
/dports/security/libressl/libressl-3.4.3/ssl/ |
H A D | tls13_key_schedule.c | 66 if (!tls13_secret_init(&secrets->empty_hash, hash_length)) in tls13_secrets_create() 108 if (!EVP_DigestFinal_ex(mdctx, secrets->empty_hash.data, &mdlen)) in tls13_secrets_create() 113 if (secrets->empty_hash.len != mdlen) in tls13_secrets_create() 137 tls13_secret_cleanup(&secrets->empty_hash); in tls13_secrets_destroy() 239 &secrets->empty_hash)) in tls13_derive_early_secrets() 251 &secrets->empty_hash)) in tls13_derive_early_secrets() 295 &secrets->empty_hash)) in tls13_derive_handshake_secrets()
|
/dports/www/obhttpd/libressl-3.4.1/ssl/ |
H A D | tls13_key_schedule.c | 66 if (!tls13_secret_init(&secrets->empty_hash, hash_length)) in tls13_secrets_create() 108 if (!EVP_DigestFinal_ex(mdctx, secrets->empty_hash.data, &mdlen)) in tls13_secrets_create() 113 if (secrets->empty_hash.len != mdlen) in tls13_secrets_create() 137 tls13_secret_cleanup(&secrets->empty_hash); in tls13_secrets_destroy() 239 &secrets->empty_hash)) in tls13_derive_early_secrets() 251 &secrets->empty_hash)) in tls13_derive_early_secrets() 295 &secrets->empty_hash)) in tls13_derive_handshake_secrets()
|
/dports/devel/py-pex/pex-1.2.7/tests/ |
H A D | test_util.py | 27 empty_hash = sha1().hexdigest() 31 assert empty_hash == CacheHelper.hash(fp.name) 40 empty_hash = sha1() 43 hash_output = CacheHelper.hash(fp.name, digest=empty_hash) 44 assert hash_output == empty_hash.hexdigest()
|
/dports/devel/p5-Clone-Choose/Clone-Choose-0.010/t/inline/ |
H A D | 07-hash.t | 39 my $empty_hash = {}; 40 my $cloned_empty_hash = clone $empty_hash; 42 ok(refaddr $empty_hash != refaddr $cloned_empty_hash, "Empty hash clone");
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/cert/ |
H A D | known_roots_unittest.cc | 28 SHA256HashValue empty_hash = {{0}}; in TEST() local 29 EXPECT_EQ(0, GetNetTrustAnchorHistogramIdForSPKI(HashValue(empty_hash))); in TEST()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/cert/ |
H A D | known_roots_unittest.cc | 28 SHA256HashValue empty_hash = {{0}}; in TEST() local 29 EXPECT_EQ(0, GetNetTrustAnchorHistogramIdForSPKI(HashValue(empty_hash))); in TEST()
|