/external/grpc-grpc/test/core/tsi/alts/frame_protector/ |
D | alts_frame_protector_test.cc | 34 const size_t key_size, bool rekey, const uint8_t* client_message, in alts_test_do_round_trip_check_frames() argument 49 alts_create_frame_protector(key, key_size, /*is_client=*/true, rekey, in alts_test_do_round_trip_check_frames() 58 alts_create_frame_protector(key, key_size, /*is_client=*/false, rekey, in alts_test_do_round_trip_check_frames() 331 bool rekey) { in alts_test_do_round_trip() argument 339 size_t key_length = rekey ? kAes128GcmRekeyKeyLength : kAes128GcmKeyLength; in alts_test_do_round_trip() 345 alts_create_frame_protector(key, key_length, /*is_client=*/true, rekey, in alts_test_do_round_trip() 354 alts_create_frame_protector(key, key_length, /*is_client=*/false, rekey, in alts_test_do_round_trip() 366 static void alts_test_do_round_trip_all(bool rekey) { in alts_test_do_round_trip_all() argument 383 alts_test_do_round_trip(fixture, rekey); in alts_test_do_round_trip_all()
|
D | alts_crypter_test.cc | 350 gsec_aead_crypter** client_crypter_unseal, bool rekey) { in create_random_alts_seal_crypter() argument 351 size_t key_length = rekey ? kAes128GcmRekeyKeyLength : kAes128GcmKeyLength; in create_random_alts_seal_crypter() 355 kAesGcmTagLength, rekey, server_crypter_seal, in create_random_alts_seal_crypter() 358 kAesGcmTagLength, rekey, in create_random_alts_seal_crypter() 361 kAesGcmTagLength, rekey, client_crypter_seal, in create_random_alts_seal_crypter() 364 kAesGcmTagLength, rekey, in create_random_alts_seal_crypter() 367 size_t overflow_size = rekey ? 8 : 5; in create_random_alts_seal_crypter()
|
/external/grpc-grpc/test/core/tsi/alts/zero_copy_frame_protector/ |
D | alts_grpc_record_protocol_test.cc | 112 test_fixture_integrity_only_create(bool rekey, bool extra_copy) { in test_fixture_integrity_only_create() argument 116 size_t key_length = rekey ? kAes128GcmRekeyKeyLength : kAes128GcmKeyLength; in test_fixture_integrity_only_create() 123 key, key_length, kAesGcmNonceLength, kAesGcmTagLength, rekey, in test_fixture_integrity_only_create() 130 key, key_length, kAesGcmNonceLength, kAesGcmTagLength, rekey, in test_fixture_integrity_only_create() 137 key, key_length, kAesGcmNonceLength, kAesGcmTagLength, rekey, in test_fixture_integrity_only_create() 144 key, key_length, kAesGcmNonceLength, kAesGcmTagLength, rekey, in test_fixture_integrity_only_create() 170 test_fixture_privacy_integrity_create(bool rekey) { in test_fixture_privacy_integrity_create() argument 174 size_t key_length = rekey ? kAes128GcmRekeyKeyLength : kAes128GcmKeyLength; in test_fixture_privacy_integrity_create() 181 key, key_length, kAesGcmNonceLength, kAesGcmTagLength, rekey, in test_fixture_privacy_integrity_create() 188 key, key_length, kAesGcmNonceLength, kAesGcmTagLength, rekey, in test_fixture_privacy_integrity_create() [all …]
|
D | alts_zero_copy_grpc_protector_test.cc | 102 alts_zero_copy_grpc_protector_test_fixture_create(bool rekey, in alts_zero_copy_grpc_protector_test_fixture_create() argument 109 size_t key_length = rekey ? kAes128GcmRekeyKeyLength : kAes128GcmKeyLength; in alts_zero_copy_grpc_protector_test_fixture_create() 114 key, key_length, rekey, /*is_client=*/true, integrity_only, in alts_zero_copy_grpc_protector_test_fixture_create() 118 key, key_length, rekey, /*is_client=*/false, integrity_only, in alts_zero_copy_grpc_protector_test_fixture_create()
|
D | alts_iovec_record_protocol_test.cc | 93 alts_iovec_record_protocol_test_fixture_create(bool rekey, in alts_iovec_record_protocol_test_fixture_create() argument 99 size_t key_length = rekey ? kAes128GcmRekeyKeyLength : kAes128GcmKeyLength; in alts_iovec_record_protocol_test_fixture_create() 105 key, key_length, kAesGcmNonceLength, kAesGcmTagLength, rekey, in alts_iovec_record_protocol_test_fixture_create() 113 key, key_length, kAesGcmNonceLength, kAesGcmTagLength, rekey, in alts_iovec_record_protocol_test_fixture_create() 121 key, key_length, kAesGcmNonceLength, kAesGcmTagLength, rekey, in alts_iovec_record_protocol_test_fixture_create() 129 key, key_length, kAesGcmNonceLength, kAesGcmTagLength, rekey, in alts_iovec_record_protocol_test_fixture_create()
|
/external/ipsec-tools/src/racoon/ |
D | TODO | 15 o better rekey 120 (over night, data transfer >1Gb) with frequent dynamic rekey 122 (over night, data transfer >1Gb) with frequent dynamic rekey
|
/external/grpc-grpc/src/core/tsi/alts/crypt/ |
D | aes_gcm.cc | 635 size_t tag_length, bool rekey, in gsec_aes_gcm_aead_crypter_create() argument 647 if ((rekey && key_length != kAes128GcmRekeyKeyLength) || in gsec_aes_gcm_aead_crypter_create() 648 (!rekey && key_length != kAes128GcmKeyLength && in gsec_aes_gcm_aead_crypter_create() 664 if (rekey) { in gsec_aes_gcm_aead_crypter_create()
|
D | gsec.h | 450 size_t tag_length, bool rekey,
|
/external/rust/crates/grpcio-sys/grpc/src/core/tsi/alts/crypt/ |
D | aes_gcm.cc | 633 size_t tag_length, bool rekey, in gsec_aes_gcm_aead_crypter_create() argument 645 if ((rekey && key_length != kAes128GcmRekeyKeyLength) || in gsec_aes_gcm_aead_crypter_create() 646 (!rekey && key_length != kAes128GcmKeyLength && in gsec_aes_gcm_aead_crypter_create() 662 if (rekey) { in gsec_aes_gcm_aead_crypter_create()
|
D | gsec.h | 450 size_t tag_length, bool rekey,
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_walleye_OPM5.171019.017.A1_4.4.88/events/cfg80211/rdev_suspend/ |
D | format | 19 print fmt: "%s, wow%s - any: %d, disconnect: %d, magic pkt: %d, gtk rekey failure: %d, eap identify…
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_seed_N2F62_3.10.49/events/cfg80211/rdev_suspend/ |
D | format | 19 print fmt: "%s, wow%s - any: %d, disconnect: %d, magic pkt: %d, gtk rekey failure: %d, eap identify…
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_flounder_lte_LRX16F_3.10.40/events/cfg80211/rdev_suspend/ |
D | format | 19 print fmt: "%s, wow%s - any: %d, disconnect: %d, magic pkt: %d, gtk rekey failure: %d, eap identify…
|
/external/javasqlite/src/main/java/SQLite/ |
D | Database.java | 851 public void rekey(byte[] ekey) throws SQLite.Exception { in rekey() method in Database 865 public void rekey(String skey) throws SQLite.Exception { in rekey() method in Database
|
D | Shell.java | 450 db.rekey(args.length > 0 ? args[0] : null); in do_meta()
|
/external/grpc-grpc/test/core/tsi/alts/crypt/ |
D | aes_gcm_test.cc | 724 bool rekey = false) { in gsec_test_get_crypter_from_test_vector() argument 736 tag_length, rekey, crypter, nullptr); in gsec_test_get_crypter_from_test_vector() 740 gsec_aead_test_vector* test_vector, bool rekey = false) { in gsec_test_verify_crypter_on_test_vector() argument 742 gsec_test_get_crypter_from_test_vector(&crypter, test_vector, rekey); in gsec_test_verify_crypter_on_test_vector() 780 bool rekey) { in gsec_test_create_random_aes_gcm_crypter() argument 784 rekey, crypter, nullptr); in gsec_test_create_random_aes_gcm_crypter()
|
/external/openssh/regress/ |
D | README.regress | 77 rekey.sh: rekey
|
D | Makefile | 32 rekey \
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 2097 int rekey, ret; in wpa_supplicant_process_1_of_2() local 2109 rekey = wpa_sm_get_state(sm) == WPA_COMPLETED; in wpa_supplicant_process_1_of_2() 2139 if (rekey) { in wpa_supplicant_process_1_of_2()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ChangeLog | 1001 - Support GTK rekey offload.
|
/external/kotlinx.coroutines/benchmarks/src/jmh/resources/ |
D | ospd.txt.gz |
|