/external/boringssl/src/third_party/wycheproof_testvectors/ |
D | rsa_pss_misc_test.txt | 10 [keysize = 2048] 26 [keysize = 2048] 42 [keysize = 2048] 58 [keysize = 2048] 74 [keysize = 2048] 90 [keysize = 2048] 106 [keysize = 2048] 122 [keysize = 2048] 138 [keysize = 2048] 154 [keysize = 2048] [all …]
|
D | rsa_signature_test.txt | 10 [keysize = 2048] 1623 [keysize = 1024] 1686 [keysize = 1024] 1742 [keysize = 1024] 1798 [keysize = 1024] 1854 [keysize = 1536] 1910 [keysize = 1536] 1966 [keysize = 1536] 2022 [keysize = 1536] 2078 [keysize = 2048] [all …]
|
/external/mesa3d/src/mesa/program/ |
D | prog_cache.c | 41 unsigned keysize; member 177 const void *key, GLuint keysize) in _mesa_search_program_cache() argument 180 cache->last->keysize == keysize && in _mesa_search_program_cache() 181 memcmp(cache->last->key, key, keysize) == 0) { in _mesa_search_program_cache() 185 const GLuint hash = hash_key(key, keysize); in _mesa_search_program_cache() 190 c->keysize == keysize && in _mesa_search_program_cache() 191 memcmp(c->key, key, keysize) == 0) { in _mesa_search_program_cache() 206 const void *key, GLuint keysize, in _mesa_program_cache_insert() argument 209 const GLuint hash = hash_key(key, keysize); in _mesa_program_cache_insert() 214 c->key = malloc(keysize); in _mesa_program_cache_insert() [all …]
|
D | prog_cache.h | 59 const void *key, GLuint keysize); 64 const void *key, GLuint keysize, 70 const void *key, GLuint keysize,
|
/external/python/cryptography/tests/hazmat/primitives/ |
D | test_ciphers.py | 31 def test_key_size(self, key, keysize): argument 33 assert cipher.key_size == keysize 74 def test_key_size(self, key, keysize): argument 76 assert cipher.key_size == keysize 108 (b"0" * (keysize // 4), keysize) for keysize in range(32, 449, 8) 110 def test_key_size(self, key, keysize): argument 112 assert cipher.key_size == keysize 125 (b"0" * (keysize // 4), keysize) for keysize in range(40, 129, 8) 127 def test_key_size(self, key, keysize): argument 129 assert cipher.key_size == keysize [all …]
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_lpm_map.c | 209 static void test_lpm_map(int keysize) in test_lpm_map() argument 227 data = alloca(keysize); in test_lpm_map() 228 memset(data, 0, keysize); in test_lpm_map() 230 value = alloca(keysize + 1); in test_lpm_map() 231 memset(value, 0, keysize + 1); in test_lpm_map() 233 key = alloca(sizeof(*key) + keysize); in test_lpm_map() 234 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map() 237 sizeof(*key) + keysize, in test_lpm_map() 238 keysize + 1, in test_lpm_map() 244 for (j = 0; j < keysize; ++j) in test_lpm_map() [all …]
|
/external/iperf3/src/ |
D | iperf_auth.c | 214 int keysize, encryptedtext_len, rsa_buffer_len; in encrypt_rsa_message() local 217 keysize = RSA_size(rsa); in encrypt_rsa_message() 219 rsa_buffer = OPENSSL_malloc(keysize * 2); in encrypt_rsa_message() 220 *encryptedtext = (unsigned char*)OPENSSL_malloc(keysize); in encrypt_rsa_message() 223 rsa_buffer_len = BIO_read(bioBuff, rsa_buffer, keysize * 2); in encrypt_rsa_message() 236 int plaintext_len, rsa_buffer_len, keysize; in decrypt_rsa_message() local 240 keysize = RSA_size(rsa); in decrypt_rsa_message() 241 rsa_buffer = OPENSSL_malloc(keysize * 2); in decrypt_rsa_message() 242 *plaintext = (unsigned char*)OPENSSL_malloc(keysize); in decrypt_rsa_message() 245 rsa_buffer_len = BIO_read(bioBuff, rsa_buffer, keysize * 2); in decrypt_rsa_message()
|
/external/mdnsresponder/mDNSShared/ |
D | dnssd_clientlib.c | 211 unsigned long keysize, keyvalsize; in TXTRecordSetValue() local 214 keysize = (unsigned long)(k - key); in TXTRecordSetValue() 215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); in TXTRecordSetValue() 216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); in TXTRecordSetValue() 233 memcpy(p, key, keysize); in TXTRecordSetValue() 234 p += keysize; in TXTRecordSetValue()
|
/external/mesa3d/src/gallium/auxiliary/translate/ |
D | translate.h | 153 int keysize = translate_keysize(a); in translate_key_sanitize() local 155 memset(ptr + keysize, 0, sizeof(*a) - keysize); in translate_key_sanitize()
|
/external/angle/extensions/ |
D | EGL_ANGLE_program_cache_control.txt | 58 EGLint *keysize, 65 EGLint keysize, 126 void *key, EGLint *keysize, void *binary, EGLint *binarysize); 132 and 'keysize' are non-null, and 'binary' and 'key' are null, the size of the 133 binary at 'index' is written to 'binarysize', and the key size to 'keysize'. 135 'binary' out parameter, and if 'keysize' is not null, the size of the 'key' 136 out parameter. Any attempt to write more than 'binarysize' or 'keysize' 137 bytes will produce an EGL_BAD_ACCESS error in this case. If 'keysize' or 149 EGLint keysize, const void *binary, EGLint binarysize); 153 maximum size, EGL_BAD_PARAMETER is generated. If 'keysize' does not equal
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | OpenSSLECKeyPairGenerator.java | 74 public void initialize(int keysize, SecureRandom random) { in initialize() argument 75 final String name = SIZE_TO_CURVE_NAME.get(keysize); in initialize() 77 throw new InvalidParameterException("unknown key size " + keysize); in initialize()
|
D | OpenSSLRSAKeyPairGenerator.java | 59 public void initialize(int keysize, SecureRandom random) { in initialize() argument 60 this.modulusBits = keysize; in initialize()
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
D | OpenSSLECKeyPairGenerator.java | 76 public void initialize(int keysize, SecureRandom random) { in initialize() argument 77 final String name = SIZE_TO_CURVE_NAME.get(keysize); in initialize() 79 throw new InvalidParameterException("unknown key size " + keysize); in initialize()
|
D | OpenSSLRSAKeyPairGenerator.java | 63 public void initialize(int keysize, SecureRandom random) { in initialize() argument 64 this.modulusBits = keysize; in initialize()
|
/external/angle/include/EGL/ |
D | eglext_angle.h | 184 …AMCACHEQUERYANGLEPROC) (EGLDisplay dpy, EGLint index, void *key, EGLint *keysize, void *binary, EG… 185 …LPROGRAMCACHEPOPULATEANGLEPROC) (EGLDisplay dpy, const void *key, EGLint keysize, const void *bina… 189 …lProgramCacheQueryANGLE(EGLDisplay dpy, EGLint index, void *key, EGLint *keysize, void *binary, EG… 190 …TRY eglProgramCachePopulateANGLE(EGLDisplay dpy, const void *key, EGLint keysize, const void *bina…
|
/external/scapy/scapy/contrib/ |
D | eigrp.py | 221 StrLenField("authdata", RandString(16), length_from=lambda pkt: pkt.keysize) 227 if self.keysize is None: 228 keysize = len(self.authdata) 229 p = p[:6] + chb((keysize >> 8) & 0xff) + chb(keysize & 0xff) + p[8:]
|
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
D | DsaTest.java | 840 public void testKeyGeneration(int keysize) throws Exception { in testKeyGeneration() argument 842 generator.initialize(keysize); in testKeyGeneration() 846 assertEquals(keysize, params.getP().bitLength()); in testKeyGeneration() 854 switch (keysize) { in testKeyGeneration() 865 fail("Invalid key size:" + keysize); in testKeyGeneration()
|
D | RsaSignatureTest.java | 1081 int keysize = 2048; in testBasic() local 1084 keyGen.initialize(keysize); in testBasic()
|
/external/mesa3d/src/gallium/auxiliary/draw/ |
D | draw_vs.h | 202 int keysize = draw_vs_variant_keysize(a); in draw_vs_variant_key_compare() local 203 return memcmp(a, b, keysize); in draw_vs_variant_key_compare()
|
/external/python/rsa/rsa/ |
D | cli.py | 61 keysize = int(cli_args[0]) 67 print('Generating %i-bit key' % keysize, file=sys.stderr) 68 (pub_key, priv_key) = rsa.newkeys(keysize)
|
/external/python/rsa/ |
D | CHANGELOG.txt | 143 - Changed the meaning of the keysize to mean the size of ``n`` rather than 145 RSA keysize. To get the old behaviour, double the keysize when generating a
|
/external/libcups/cups/ |
D | pwg-private.h | 39 extern void _pwgGenerateSize(char *keyword, size_t keysize,
|
D | pwg.h | 73 extern int pwgFormatSizeName(char *keyword, size_t keysize,
|
/external/sqlite/android/ |
D | sqlite3_android.cpp | 381 uint32_t keysize = result-1; 382 uint32_t base16Size = keysize*2; 384 base16Encode(base16buf, keybuf, keysize);
|
/external/angle/src/libEGL/ |
D | libEGL.cpp | 610 EGLint *keysize, in eglProgramCacheQueryANGLE() argument 614 EGL_ProgramCacheQueryANGLE(dpy, index, key, keysize, binary, binarysize); in eglProgramCacheQueryANGLE() 619 EGLint keysize, in eglProgramCachePopulateANGLE() argument 623 EGL_ProgramCachePopulateANGLE(dpy, key, keysize, binary, binarysize); in eglProgramCachePopulateANGLE()
|