Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 28) sorted by relevance

12

/external/mesa3d/src/mesa/program/
Dprog_cache.c40 unsigned keysize; member
176 const void *key, GLuint keysize) in _mesa_search_program_cache() argument
179 cache->last->keysize == keysize && in _mesa_search_program_cache()
180 memcmp(cache->last->key, key, keysize) == 0) { in _mesa_search_program_cache()
184 const GLuint hash = hash_key(key, keysize); in _mesa_search_program_cache()
189 c->keysize == keysize && in _mesa_search_program_cache()
190 memcmp(c->key, key, keysize) == 0) { in _mesa_search_program_cache()
205 const void *key, GLuint keysize, in _mesa_program_cache_insert() argument
208 const GLuint hash = hash_key(key, keysize); in _mesa_program_cache_insert()
213 c->key = malloc(keysize); in _mesa_program_cache_insert()
[all …]
Dprog_cache.h59 const void *key, GLuint keysize);
64 const void *key, GLuint keysize,
70 const void *key, GLuint keysize,
/external/linux-kselftest/tools/testing/selftests/bpf/
Dtest_lpm_map.c207 static void test_lpm_map(int keysize) in test_lpm_map() argument
225 data = alloca(keysize); in test_lpm_map()
226 memset(data, 0, keysize); in test_lpm_map()
228 value = alloca(keysize + 1); in test_lpm_map()
229 memset(value, 0, keysize + 1); in test_lpm_map()
231 key = alloca(sizeof(*key) + keysize); in test_lpm_map()
232 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map()
235 sizeof(*key) + keysize, in test_lpm_map()
236 keysize + 1, in test_lpm_map()
242 for (j = 0; j < keysize; ++j) in test_lpm_map()
[all …]
/external/mdnsresponder/mDNSShared/
Ddnssd_clientlib.c211 unsigned long keysize, keyvalsize; in TXTRecordSetValue() local
214 keysize = (unsigned long)(k - key); in TXTRecordSetValue()
215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); in TXTRecordSetValue()
216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); in TXTRecordSetValue()
233 memcpy(p, key, keysize); in TXTRecordSetValue()
234 p += keysize; in TXTRecordSetValue()
/external/mesa3d/src/gallium/auxiliary/translate/
Dtranslate.h153 int keysize = translate_keysize(a); in translate_key_sanitize() local
155 memset(ptr + keysize, 0, sizeof(*a) - keysize); in translate_key_sanitize()
/external/conscrypt/common/src/main/java/org/conscrypt/
DOpenSSLECKeyPairGenerator.java76 public void initialize(int keysize, SecureRandom random) { in initialize() argument
77 final String name = SIZE_TO_CURVE_NAME.get(keysize); in initialize()
79 throw new InvalidParameterException("unknown key size " + keysize); in initialize()
DOpenSSLRSAKeyPairGenerator.java61 public void initialize(int keysize, SecureRandom random) { in initialize() argument
62 this.modulusBits = keysize; in initialize()
/external/scapy/scapy/contrib/
Deigrp.py221 StrLenField("authdata", RandString(16), length_from=lambda pkt: pkt.keysize)
227 if self.keysize is None:
228 keysize = len(self.authdata)
229 p = p[:6] + chb((keysize >> 8) & 0xff) + chb(keysize & 0xff) + p[8:]
Deigrp.uts198 = Verify keysize calculation
/external/wycheproof/java/com/google/security/wycheproof/testcases/
DDsaTest.java840 public void testKeyGeneration(int keysize) throws Exception { in testKeyGeneration() argument
842 generator.initialize(keysize); in testKeyGeneration()
846 assertEquals(keysize, params.getP().bitLength()); in testKeyGeneration()
854 switch (keysize) { in testKeyGeneration()
865 fail("Invalid key size:" + keysize); in testKeyGeneration()
DRsaSignatureTest.java1081 int keysize = 2048; in testBasic() local
1084 keyGen.initialize(keysize); in testBasic()
/external/mesa3d/src/gallium/auxiliary/draw/
Ddraw_vs.h201 int keysize = draw_vs_variant_keysize(a); in draw_vs_variant_key_compare() local
202 return memcmp(a, b, keysize); in draw_vs_variant_key_compare()
/external/syslinux/gpxe/src/net/80211/
Dwpa.c482 pkt->keysize = htons ( pkt->keysize ); in wpa_send_eapol()
524 npkt->keysize = 0; in wpa_send_2_of_4()
617 npkt->keysize = 0; in wpa_send_final()
735 rc = wpa_install_ptk ( ctx, pkt->keysize ); in wpa_handle_3_of_4()
914 pkt->keysize = ntohs ( pkt->keysize ); in eapol_key_rx()
/external/libcups/cups/
Dpwg-private.h39 extern void _pwgGenerateSize(char *keyword, size_t keysize,
Dpwg.h73 extern int pwgFormatSizeName(char *keyword, size_t keysize,
Dpwg-media.c266 size_t keysize, /* I - Size of keyword buffer */ in pwgFormatSizeName() argument
283 …"%s\", width=%d, length=%d, units=\"%s\")", (void *)keyword, CUPS_LLCAST keysize, prefix, name, wi… in pwgFormatSizeName()
288 if (!keyword || keysize < 32 || width < 0 || length < 0 || in pwgFormatSizeName()
376 snprintf(keyword, keysize, "%s_%s_%s", prefix, name, usize); in pwgFormatSizeName()
/external/sqlite/android/
Dsqlite3_android.cpp375 uint32_t keysize = result-1;
376 uint32_t base16Size = keysize*2;
378 base16Encode(base16buf, keybuf, keysize);
/external/syslinux/gpxe/src/include/gpxe/
Dwpa.h115 u16 keysize; member
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/crypto/
DCipherTest.java4374 for (int keysize = SMALLEST_KEY_SIZE; keysize < LARGEST_KEY_SIZE; keysize++) { in testRC4_MultipleKeySizes()
4375 final int index = keysize - SMALLEST_KEY_SIZE; in testRC4_MultipleKeySizes()
4376 kg.init(keysize); in testRC4_MultipleKeySizes()
4399 for (int keysize = SMALLEST_KEY_SIZE; keysize < LARGEST_KEY_SIZE; keysize++) { in testRC4_MultipleKeySizes()
4400 final int index = keysize - SMALLEST_KEY_SIZE; in testRC4_MultipleKeySizes()
4420 + " for key size " + keysize, expected[index], in testRC4_MultipleKeySizes()
4426 assertEquals("Key size: " + keysize, Arrays.toString(ORIGINAL_PLAIN_TEXT), in testRC4_MultipleKeySizes()
/external/golang-protobuf/proto/
Dencode.go1184 keysize := p.mkeyprop.size(p.mkeyprop, keybase)
1186 entry := keysize + valsize
/external/nanohttpd/
DREADME.md241 …ias selfsigned -keystore keystore.jks -storepass password -validity 360 -keysize 2048 -ext SAN=DNS…
/external/nanohttpd/src/site/markdown/
Dindex.md237 …ias selfsigned -keystore keystore.jks -storepass password -validity 360 -keysize 2048 -ext SAN=DNS…
/external/nos/test/system-test-harness/src/test-data/NIST-CAVP/
DgcmDecrypt192.rsp2 # GCM Decrypt with keysize 192 test information
DgcmDecrypt128.rsp2 # GCM Decrypt with keysize 128 test information
DgcmDecrypt256.rsp2 # GCM Decrypt with keysize 256 test information

12