/external/boringssl/src/third_party/wycheproof_testvectors/ |
D | rsa_pss_misc_test.txt | 10 [keysize = 2048] 26 [keysize = 2048] 42 [keysize = 2048] 58 [keysize = 2048] 74 [keysize = 2048] 90 [keysize = 2048] 106 [keysize = 2048] 122 [keysize = 2048] 138 [keysize = 2048] 154 [keysize = 2048] [all …]
|
D | rsa_signature_test.txt | 10 [keysize = 2048] 1623 [keysize = 1024] 1686 [keysize = 1024] 1742 [keysize = 1024] 1798 [keysize = 1024] 1854 [keysize = 1536] 1910 [keysize = 1536] 1966 [keysize = 1536] 2022 [keysize = 1536] 2078 [keysize = 2048] [all …]
|
/external/mesa3d/src/mesa/program/ |
D | prog_cache.c | 40 unsigned keysize; member 176 const void *key, GLuint keysize) in _mesa_search_program_cache() argument 179 cache->last->keysize == keysize && in _mesa_search_program_cache() 180 memcmp(cache->last->key, key, keysize) == 0) { in _mesa_search_program_cache() 184 const GLuint hash = hash_key(key, keysize); in _mesa_search_program_cache() 189 c->keysize == keysize && in _mesa_search_program_cache() 190 memcmp(c->key, key, keysize) == 0) { in _mesa_search_program_cache() 205 const void *key, GLuint keysize, in _mesa_program_cache_insert() argument 208 const GLuint hash = hash_key(key, keysize); in _mesa_program_cache_insert() 213 c->key = malloc(keysize); in _mesa_program_cache_insert() [all …]
|
D | prog_cache.h | 59 const void *key, GLuint keysize); 64 const void *key, GLuint keysize, 70 const void *key, GLuint keysize,
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_lpm_map.c | 209 static void test_lpm_map(int keysize) in test_lpm_map() argument 227 data = alloca(keysize); in test_lpm_map() 228 memset(data, 0, keysize); in test_lpm_map() 230 value = alloca(keysize + 1); in test_lpm_map() 231 memset(value, 0, keysize + 1); in test_lpm_map() 233 key = alloca(sizeof(*key) + keysize); in test_lpm_map() 234 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map() 237 sizeof(*key) + keysize, in test_lpm_map() 238 keysize + 1, in test_lpm_map() 244 for (j = 0; j < keysize; ++j) in test_lpm_map() [all …]
|
/external/iperf3/src/ |
D | iperf_auth.c | 211 int keysize, encryptedtext_len, rsa_buffer_len; in encrypt_rsa_message() local 214 keysize = RSA_size(rsa); in encrypt_rsa_message() 216 rsa_buffer = OPENSSL_malloc(keysize * 2); in encrypt_rsa_message() 217 *encryptedtext = (unsigned char*)OPENSSL_malloc(keysize); in encrypt_rsa_message() 220 rsa_buffer_len = BIO_read(bioBuff, rsa_buffer, keysize * 2); in encrypt_rsa_message() 233 int plaintext_len, rsa_buffer_len, keysize; in decrypt_rsa_message() local 237 keysize = RSA_size(rsa); in decrypt_rsa_message() 238 rsa_buffer = OPENSSL_malloc(keysize * 2); in decrypt_rsa_message() 239 *plaintext = (unsigned char*)OPENSSL_malloc(keysize); in decrypt_rsa_message() 242 rsa_buffer_len = BIO_read(bioBuff, rsa_buffer, keysize * 2); in decrypt_rsa_message()
|
/external/mdnsresponder/mDNSShared/ |
D | dnssd_clientlib.c | 211 unsigned long keysize, keyvalsize; in TXTRecordSetValue() local 214 keysize = (unsigned long)(k - key); in TXTRecordSetValue() 215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); in TXTRecordSetValue() 216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); in TXTRecordSetValue() 233 memcpy(p, key, keysize); in TXTRecordSetValue() 234 p += keysize; in TXTRecordSetValue()
|
/external/mesa3d/src/gallium/auxiliary/translate/ |
D | translate.h | 153 int keysize = translate_keysize(a); in translate_key_sanitize() local 155 memset(ptr + keysize, 0, sizeof(*a) - keysize); in translate_key_sanitize()
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
D | OpenSSLECKeyPairGenerator.java | 78 public void initialize(int keysize, SecureRandom random) { in initialize() argument 79 final String name = SIZE_TO_CURVE_NAME.get(keysize); in initialize() 81 throw new InvalidParameterException("unknown key size " + keysize); in initialize()
|
D | OpenSSLRSAKeyPairGenerator.java | 65 public void initialize(int keysize, SecureRandom random) { in initialize() argument 66 this.modulusBits = keysize; in initialize()
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | OpenSSLECKeyPairGenerator.java | 74 public void initialize(int keysize, SecureRandom random) { in initialize() argument 75 final String name = SIZE_TO_CURVE_NAME.get(keysize); in initialize() 77 throw new InvalidParameterException("unknown key size " + keysize); in initialize()
|
D | OpenSSLRSAKeyPairGenerator.java | 59 public void initialize(int keysize, SecureRandom random) { in initialize() argument 60 this.modulusBits = keysize; in initialize()
|
/external/scapy/scapy/contrib/ |
D | eigrp.py | 221 StrLenField("authdata", RandString(16), length_from=lambda pkt: pkt.keysize) 227 if self.keysize is None: 228 keysize = len(self.authdata) 229 p = p[:6] + chb((keysize >> 8) & 0xff) + chb(keysize & 0xff) + p[8:]
|
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
D | DsaTest.java | 840 public void testKeyGeneration(int keysize) throws Exception { in testKeyGeneration() argument 842 generator.initialize(keysize); in testKeyGeneration() 846 assertEquals(keysize, params.getP().bitLength()); in testKeyGeneration() 854 switch (keysize) { in testKeyGeneration() 865 fail("Invalid key size:" + keysize); in testKeyGeneration()
|
D | RsaSignatureTest.java | 1081 int keysize = 2048; in testBasic() local 1084 keyGen.initialize(keysize); in testBasic()
|
/external/mesa3d/src/gallium/auxiliary/draw/ |
D | draw_vs.h | 201 int keysize = draw_vs_variant_keysize(a); in draw_vs_variant_key_compare() local 202 return memcmp(a, b, keysize); in draw_vs_variant_key_compare()
|
/external/python/rsa/rsa/ |
D | cli.py | 61 keysize = int(cli_args[0]) 67 print('Generating %i-bit key' % keysize, file=sys.stderr) 68 (pub_key, priv_key) = rsa.newkeys(keysize)
|
/external/python/rsa/ |
D | CHANGELOG.txt | 143 - Changed the meaning of the keysize to mean the size of ``n`` rather than 145 RSA keysize. To get the old behaviour, double the keysize when generating a
|
/external/libcups/cups/ |
D | pwg-private.h | 39 extern void _pwgGenerateSize(char *keyword, size_t keysize,
|
D | pwg.h | 73 extern int pwgFormatSizeName(char *keyword, size_t keysize,
|
D | pwg-media.c | 266 size_t keysize, /* I - Size of keyword buffer */ in pwgFormatSizeName() argument 283 …"%s\", width=%d, length=%d, units=\"%s\")", (void *)keyword, CUPS_LLCAST keysize, prefix, name, wi… in pwgFormatSizeName() 288 if (!keyword || keysize < 32 || width < 0 || length < 0 || in pwgFormatSizeName() 376 snprintf(keyword, keysize, "%s_%s_%s", prefix, name, usize); in pwgFormatSizeName()
|
/external/sqlite/android/ |
D | sqlite3_android.cpp | 375 uint32_t keysize = result-1; 376 uint32_t base16Size = keysize*2; 378 base16Encode(base16buf, keybuf, keysize);
|
/external/python/rsa/doc/ |
D | reference.rst | 20 .. autofunction:: rsa.newkeys(keysize)
|
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/crypto/ |
D | CipherTest.java | 4456 for (int keysize = SMALLEST_KEY_SIZE; keysize < LARGEST_KEY_SIZE; keysize++) { in testRC4_MultipleKeySizes() 4457 final int index = keysize - SMALLEST_KEY_SIZE; in testRC4_MultipleKeySizes() 4458 kg.init(keysize); in testRC4_MultipleKeySizes() 4481 for (int keysize = SMALLEST_KEY_SIZE; keysize < LARGEST_KEY_SIZE; keysize++) { in testRC4_MultipleKeySizes() 4482 final int index = keysize - SMALLEST_KEY_SIZE; in testRC4_MultipleKeySizes() 4502 + " for key size " + keysize, expected[index], in testRC4_MultipleKeySizes() 4508 assertEquals("Key size: " + keysize, Arrays.toString(ORIGINAL_PLAIN_TEXT), in testRC4_MultipleKeySizes()
|
/external/conscrypt/repackaged/openjdk-integ-tests/src/test/java/com/android/org/conscrypt/javax/crypto/ |
D | CipherTest.java | 4458 for (int keysize = SMALLEST_KEY_SIZE; keysize < LARGEST_KEY_SIZE; keysize++) { in testRC4_MultipleKeySizes() 4459 final int index = keysize - SMALLEST_KEY_SIZE; in testRC4_MultipleKeySizes() 4460 kg.init(keysize); in testRC4_MultipleKeySizes() 4483 for (int keysize = SMALLEST_KEY_SIZE; keysize < LARGEST_KEY_SIZE; keysize++) { in testRC4_MultipleKeySizes() 4484 final int index = keysize - SMALLEST_KEY_SIZE; in testRC4_MultipleKeySizes() 4504 + " for key size " + keysize, expected[index], in testRC4_MultipleKeySizes() 4510 assertEquals("Key size: " + keysize, Arrays.toString(ORIGINAL_PLAIN_TEXT), in testRC4_MultipleKeySizes()
|