Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 52) sorted by relevance

123

/external/boringssl/src/third_party/wycheproof_testvectors/
Drsa_pss_misc_test.txt10 [keysize = 2048]
26 [keysize = 2048]
42 [keysize = 2048]
58 [keysize = 2048]
74 [keysize = 2048]
90 [keysize = 2048]
106 [keysize = 2048]
122 [keysize = 2048]
138 [keysize = 2048]
154 [keysize = 2048]
[all …]
Drsa_signature_test.txt10 [keysize = 2048]
1623 [keysize = 1024]
1686 [keysize = 1024]
1742 [keysize = 1024]
1798 [keysize = 1024]
1854 [keysize = 1536]
1910 [keysize = 1536]
1966 [keysize = 1536]
2022 [keysize = 1536]
2078 [keysize = 2048]
[all …]
/external/mesa3d/src/mesa/program/
Dprog_cache.c41 unsigned keysize; member
177 const void *key, GLuint keysize) in _mesa_search_program_cache() argument
180 cache->last->keysize == keysize && in _mesa_search_program_cache()
181 memcmp(cache->last->key, key, keysize) == 0) { in _mesa_search_program_cache()
185 const GLuint hash = hash_key(key, keysize); in _mesa_search_program_cache()
190 c->keysize == keysize && in _mesa_search_program_cache()
191 memcmp(c->key, key, keysize) == 0) { in _mesa_search_program_cache()
206 const void *key, GLuint keysize, in _mesa_program_cache_insert() argument
209 const GLuint hash = hash_key(key, keysize); in _mesa_program_cache_insert()
214 c->key = malloc(keysize); in _mesa_program_cache_insert()
[all …]
Dprog_cache.h59 const void *key, GLuint keysize);
64 const void *key, GLuint keysize,
70 const void *key, GLuint keysize,
/external/python/cryptography/tests/hazmat/primitives/
Dtest_ciphers.py31 def test_key_size(self, key, keysize): argument
33 assert cipher.key_size == keysize
74 def test_key_size(self, key, keysize): argument
76 assert cipher.key_size == keysize
108 (b"0" * (keysize // 4), keysize) for keysize in range(32, 449, 8)
110 def test_key_size(self, key, keysize): argument
112 assert cipher.key_size == keysize
125 (b"0" * (keysize // 4), keysize) for keysize in range(40, 129, 8)
127 def test_key_size(self, key, keysize): argument
129 assert cipher.key_size == keysize
[all …]
/external/linux-kselftest/tools/testing/selftests/bpf/
Dtest_lpm_map.c209 static void test_lpm_map(int keysize) in test_lpm_map() argument
227 data = alloca(keysize); in test_lpm_map()
228 memset(data, 0, keysize); in test_lpm_map()
230 value = alloca(keysize + 1); in test_lpm_map()
231 memset(value, 0, keysize + 1); in test_lpm_map()
233 key = alloca(sizeof(*key) + keysize); in test_lpm_map()
234 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map()
237 sizeof(*key) + keysize, in test_lpm_map()
238 keysize + 1, in test_lpm_map()
244 for (j = 0; j < keysize; ++j) in test_lpm_map()
[all …]
/external/iperf3/src/
Diperf_auth.c214 int keysize, encryptedtext_len, rsa_buffer_len; in encrypt_rsa_message() local
217 keysize = RSA_size(rsa); in encrypt_rsa_message()
219 rsa_buffer = OPENSSL_malloc(keysize * 2); in encrypt_rsa_message()
220 *encryptedtext = (unsigned char*)OPENSSL_malloc(keysize); in encrypt_rsa_message()
223 rsa_buffer_len = BIO_read(bioBuff, rsa_buffer, keysize * 2); in encrypt_rsa_message()
236 int plaintext_len, rsa_buffer_len, keysize; in decrypt_rsa_message() local
240 keysize = RSA_size(rsa); in decrypt_rsa_message()
241 rsa_buffer = OPENSSL_malloc(keysize * 2); in decrypt_rsa_message()
242 *plaintext = (unsigned char*)OPENSSL_malloc(keysize); in decrypt_rsa_message()
245 rsa_buffer_len = BIO_read(bioBuff, rsa_buffer, keysize * 2); in decrypt_rsa_message()
/external/mdnsresponder/mDNSShared/
Ddnssd_clientlib.c211 unsigned long keysize, keyvalsize; in TXTRecordSetValue() local
214 keysize = (unsigned long)(k - key); in TXTRecordSetValue()
215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); in TXTRecordSetValue()
216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); in TXTRecordSetValue()
233 memcpy(p, key, keysize); in TXTRecordSetValue()
234 p += keysize; in TXTRecordSetValue()
/external/mesa3d/src/gallium/auxiliary/translate/
Dtranslate.h153 int keysize = translate_keysize(a); in translate_key_sanitize() local
155 memset(ptr + keysize, 0, sizeof(*a) - keysize); in translate_key_sanitize()
/external/angle/extensions/
DEGL_ANGLE_program_cache_control.txt58 EGLint *keysize,
65 EGLint keysize,
126 void *key, EGLint *keysize, void *binary, EGLint *binarysize);
132 and 'keysize' are non-null, and 'binary' and 'key' are null, the size of the
133 binary at 'index' is written to 'binarysize', and the key size to 'keysize'.
135 'binary' out parameter, and if 'keysize' is not null, the size of the 'key'
136 out parameter. Any attempt to write more than 'binarysize' or 'keysize'
137 bytes will produce an EGL_BAD_ACCESS error in this case. If 'keysize' or
149 EGLint keysize, const void *binary, EGLint binarysize);
153 maximum size, EGL_BAD_PARAMETER is generated. If 'keysize' does not equal
/external/conscrypt/common/src/main/java/org/conscrypt/
DOpenSSLECKeyPairGenerator.java74 public void initialize(int keysize, SecureRandom random) { in initialize() argument
75 final String name = SIZE_TO_CURVE_NAME.get(keysize); in initialize()
77 throw new InvalidParameterException("unknown key size " + keysize); in initialize()
DOpenSSLRSAKeyPairGenerator.java59 public void initialize(int keysize, SecureRandom random) { in initialize() argument
60 this.modulusBits = keysize; in initialize()
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/
DOpenSSLECKeyPairGenerator.java76 public void initialize(int keysize, SecureRandom random) { in initialize() argument
77 final String name = SIZE_TO_CURVE_NAME.get(keysize); in initialize()
79 throw new InvalidParameterException("unknown key size " + keysize); in initialize()
DOpenSSLRSAKeyPairGenerator.java63 public void initialize(int keysize, SecureRandom random) { in initialize() argument
64 this.modulusBits = keysize; in initialize()
/external/angle/include/EGL/
Deglext_angle.h184 …AMCACHEQUERYANGLEPROC) (EGLDisplay dpy, EGLint index, void *key, EGLint *keysize, void *binary, EG…
185 …LPROGRAMCACHEPOPULATEANGLEPROC) (EGLDisplay dpy, const void *key, EGLint keysize, const void *bina…
189 …lProgramCacheQueryANGLE(EGLDisplay dpy, EGLint index, void *key, EGLint *keysize, void *binary, EG…
190 …TRY eglProgramCachePopulateANGLE(EGLDisplay dpy, const void *key, EGLint keysize, const void *bina…
/external/scapy/scapy/contrib/
Deigrp.py221 StrLenField("authdata", RandString(16), length_from=lambda pkt: pkt.keysize)
227 if self.keysize is None:
228 keysize = len(self.authdata)
229 p = p[:6] + chb((keysize >> 8) & 0xff) + chb(keysize & 0xff) + p[8:]
/external/wycheproof/java/com/google/security/wycheproof/testcases/
DDsaTest.java840 public void testKeyGeneration(int keysize) throws Exception { in testKeyGeneration() argument
842 generator.initialize(keysize); in testKeyGeneration()
846 assertEquals(keysize, params.getP().bitLength()); in testKeyGeneration()
854 switch (keysize) { in testKeyGeneration()
865 fail("Invalid key size:" + keysize); in testKeyGeneration()
DRsaSignatureTest.java1081 int keysize = 2048; in testBasic() local
1084 keyGen.initialize(keysize); in testBasic()
/external/mesa3d/src/gallium/auxiliary/draw/
Ddraw_vs.h202 int keysize = draw_vs_variant_keysize(a); in draw_vs_variant_key_compare() local
203 return memcmp(a, b, keysize); in draw_vs_variant_key_compare()
/external/python/rsa/rsa/
Dcli.py61 keysize = int(cli_args[0])
67 print('Generating %i-bit key' % keysize, file=sys.stderr)
68 (pub_key, priv_key) = rsa.newkeys(keysize)
/external/python/rsa/
DCHANGELOG.txt143 - Changed the meaning of the keysize to mean the size of ``n`` rather than
145 RSA keysize. To get the old behaviour, double the keysize when generating a
/external/libcups/cups/
Dpwg-private.h39 extern void _pwgGenerateSize(char *keyword, size_t keysize,
Dpwg.h73 extern int pwgFormatSizeName(char *keyword, size_t keysize,
/external/sqlite/android/
Dsqlite3_android.cpp381 uint32_t keysize = result-1;
382 uint32_t base16Size = keysize*2;
384 base16Encode(base16buf, keybuf, keysize);
/external/angle/src/libEGL/
DlibEGL.cpp610 EGLint *keysize, in eglProgramCacheQueryANGLE() argument
614 EGL_ProgramCacheQueryANGLE(dpy, index, key, keysize, binary, binarysize); in eglProgramCacheQueryANGLE()
619 EGLint keysize, in eglProgramCachePopulateANGLE() argument
623 EGL_ProgramCachePopulateANGLE(dpy, key, keysize, binary, binarysize); in eglProgramCachePopulateANGLE()

123