Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 42) sorted by relevance

12

/external/boringssl/src/third_party/wycheproof_testvectors/
Drsa_pss_misc_test.txt10 [keysize = 2048]
26 [keysize = 2048]
42 [keysize = 2048]
58 [keysize = 2048]
74 [keysize = 2048]
90 [keysize = 2048]
106 [keysize = 2048]
122 [keysize = 2048]
138 [keysize = 2048]
154 [keysize = 2048]
[all …]
Drsa_signature_test.txt10 [keysize = 2048]
1623 [keysize = 1024]
1686 [keysize = 1024]
1742 [keysize = 1024]
1798 [keysize = 1024]
1854 [keysize = 1536]
1910 [keysize = 1536]
1966 [keysize = 1536]
2022 [keysize = 1536]
2078 [keysize = 2048]
[all …]
/external/mesa3d/src/mesa/program/
Dprog_cache.c40 unsigned keysize; member
176 const void *key, GLuint keysize) in _mesa_search_program_cache() argument
179 cache->last->keysize == keysize && in _mesa_search_program_cache()
180 memcmp(cache->last->key, key, keysize) == 0) { in _mesa_search_program_cache()
184 const GLuint hash = hash_key(key, keysize); in _mesa_search_program_cache()
189 c->keysize == keysize && in _mesa_search_program_cache()
190 memcmp(c->key, key, keysize) == 0) { in _mesa_search_program_cache()
205 const void *key, GLuint keysize, in _mesa_program_cache_insert() argument
208 const GLuint hash = hash_key(key, keysize); in _mesa_program_cache_insert()
213 c->key = malloc(keysize); in _mesa_program_cache_insert()
[all …]
Dprog_cache.h59 const void *key, GLuint keysize);
64 const void *key, GLuint keysize,
70 const void *key, GLuint keysize,
/external/linux-kselftest/tools/testing/selftests/bpf/
Dtest_lpm_map.c209 static void test_lpm_map(int keysize) in test_lpm_map() argument
227 data = alloca(keysize); in test_lpm_map()
228 memset(data, 0, keysize); in test_lpm_map()
230 value = alloca(keysize + 1); in test_lpm_map()
231 memset(value, 0, keysize + 1); in test_lpm_map()
233 key = alloca(sizeof(*key) + keysize); in test_lpm_map()
234 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map()
237 sizeof(*key) + keysize, in test_lpm_map()
238 keysize + 1, in test_lpm_map()
244 for (j = 0; j < keysize; ++j) in test_lpm_map()
[all …]
/external/iperf3/src/
Diperf_auth.c211 int keysize, encryptedtext_len, rsa_buffer_len; in encrypt_rsa_message() local
214 keysize = RSA_size(rsa); in encrypt_rsa_message()
216 rsa_buffer = OPENSSL_malloc(keysize * 2); in encrypt_rsa_message()
217 *encryptedtext = (unsigned char*)OPENSSL_malloc(keysize); in encrypt_rsa_message()
220 rsa_buffer_len = BIO_read(bioBuff, rsa_buffer, keysize * 2); in encrypt_rsa_message()
233 int plaintext_len, rsa_buffer_len, keysize; in decrypt_rsa_message() local
237 keysize = RSA_size(rsa); in decrypt_rsa_message()
238 rsa_buffer = OPENSSL_malloc(keysize * 2); in decrypt_rsa_message()
239 *plaintext = (unsigned char*)OPENSSL_malloc(keysize); in decrypt_rsa_message()
242 rsa_buffer_len = BIO_read(bioBuff, rsa_buffer, keysize * 2); in decrypt_rsa_message()
/external/mdnsresponder/mDNSShared/
Ddnssd_clientlib.c211 unsigned long keysize, keyvalsize; in TXTRecordSetValue() local
214 keysize = (unsigned long)(k - key); in TXTRecordSetValue()
215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); in TXTRecordSetValue()
216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); in TXTRecordSetValue()
233 memcpy(p, key, keysize); in TXTRecordSetValue()
234 p += keysize; in TXTRecordSetValue()
/external/mesa3d/src/gallium/auxiliary/translate/
Dtranslate.h153 int keysize = translate_keysize(a); in translate_key_sanitize() local
155 memset(ptr + keysize, 0, sizeof(*a) - keysize); in translate_key_sanitize()
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/
DOpenSSLECKeyPairGenerator.java78 public void initialize(int keysize, SecureRandom random) { in initialize() argument
79 final String name = SIZE_TO_CURVE_NAME.get(keysize); in initialize()
81 throw new InvalidParameterException("unknown key size " + keysize); in initialize()
DOpenSSLRSAKeyPairGenerator.java65 public void initialize(int keysize, SecureRandom random) { in initialize() argument
66 this.modulusBits = keysize; in initialize()
/external/conscrypt/common/src/main/java/org/conscrypt/
DOpenSSLECKeyPairGenerator.java74 public void initialize(int keysize, SecureRandom random) { in initialize() argument
75 final String name = SIZE_TO_CURVE_NAME.get(keysize); in initialize()
77 throw new InvalidParameterException("unknown key size " + keysize); in initialize()
DOpenSSLRSAKeyPairGenerator.java59 public void initialize(int keysize, SecureRandom random) { in initialize() argument
60 this.modulusBits = keysize; in initialize()
/external/scapy/scapy/contrib/
Deigrp.py221 StrLenField("authdata", RandString(16), length_from=lambda pkt: pkt.keysize)
227 if self.keysize is None:
228 keysize = len(self.authdata)
229 p = p[:6] + chb((keysize >> 8) & 0xff) + chb(keysize & 0xff) + p[8:]
/external/wycheproof/java/com/google/security/wycheproof/testcases/
DDsaTest.java840 public void testKeyGeneration(int keysize) throws Exception { in testKeyGeneration() argument
842 generator.initialize(keysize); in testKeyGeneration()
846 assertEquals(keysize, params.getP().bitLength()); in testKeyGeneration()
854 switch (keysize) { in testKeyGeneration()
865 fail("Invalid key size:" + keysize); in testKeyGeneration()
DRsaSignatureTest.java1081 int keysize = 2048; in testBasic() local
1084 keyGen.initialize(keysize); in testBasic()
/external/mesa3d/src/gallium/auxiliary/draw/
Ddraw_vs.h201 int keysize = draw_vs_variant_keysize(a); in draw_vs_variant_key_compare() local
202 return memcmp(a, b, keysize); in draw_vs_variant_key_compare()
/external/python/rsa/rsa/
Dcli.py61 keysize = int(cli_args[0])
67 print('Generating %i-bit key' % keysize, file=sys.stderr)
68 (pub_key, priv_key) = rsa.newkeys(keysize)
/external/python/rsa/
DCHANGELOG.txt143 - Changed the meaning of the keysize to mean the size of ``n`` rather than
145 RSA keysize. To get the old behaviour, double the keysize when generating a
/external/libcups/cups/
Dpwg-private.h39 extern void _pwgGenerateSize(char *keyword, size_t keysize,
Dpwg.h73 extern int pwgFormatSizeName(char *keyword, size_t keysize,
Dpwg-media.c266 size_t keysize, /* I - Size of keyword buffer */ in pwgFormatSizeName() argument
283 …"%s\", width=%d, length=%d, units=\"%s\")", (void *)keyword, CUPS_LLCAST keysize, prefix, name, wi… in pwgFormatSizeName()
288 if (!keyword || keysize < 32 || width < 0 || length < 0 || in pwgFormatSizeName()
376 snprintf(keyword, keysize, "%s_%s_%s", prefix, name, usize); in pwgFormatSizeName()
/external/sqlite/android/
Dsqlite3_android.cpp375 uint32_t keysize = result-1;
376 uint32_t base16Size = keysize*2;
378 base16Encode(base16buf, keybuf, keysize);
/external/python/rsa/doc/
Dreference.rst20 .. autofunction:: rsa.newkeys(keysize)
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/crypto/
DCipherTest.java4456 for (int keysize = SMALLEST_KEY_SIZE; keysize < LARGEST_KEY_SIZE; keysize++) { in testRC4_MultipleKeySizes()
4457 final int index = keysize - SMALLEST_KEY_SIZE; in testRC4_MultipleKeySizes()
4458 kg.init(keysize); in testRC4_MultipleKeySizes()
4481 for (int keysize = SMALLEST_KEY_SIZE; keysize < LARGEST_KEY_SIZE; keysize++) { in testRC4_MultipleKeySizes()
4482 final int index = keysize - SMALLEST_KEY_SIZE; in testRC4_MultipleKeySizes()
4502 + " for key size " + keysize, expected[index], in testRC4_MultipleKeySizes()
4508 assertEquals("Key size: " + keysize, Arrays.toString(ORIGINAL_PLAIN_TEXT), in testRC4_MultipleKeySizes()
/external/conscrypt/repackaged/openjdk-integ-tests/src/test/java/com/android/org/conscrypt/javax/crypto/
DCipherTest.java4458 for (int keysize = SMALLEST_KEY_SIZE; keysize < LARGEST_KEY_SIZE; keysize++) { in testRC4_MultipleKeySizes()
4459 final int index = keysize - SMALLEST_KEY_SIZE; in testRC4_MultipleKeySizes()
4460 kg.init(keysize); in testRC4_MultipleKeySizes()
4483 for (int keysize = SMALLEST_KEY_SIZE; keysize < LARGEST_KEY_SIZE; keysize++) { in testRC4_MultipleKeySizes()
4484 final int index = keysize - SMALLEST_KEY_SIZE; in testRC4_MultipleKeySizes()
4504 + " for key size " + keysize, expected[index], in testRC4_MultipleKeySizes()
4510 assertEquals("Key size: " + keysize, Arrays.toString(ORIGINAL_PLAIN_TEXT), in testRC4_MultipleKeySizes()

12