/external/chromium_org/third_party/skia/src/gpu/ |
GrBinHashKey.h | 26 template<typename ENTRY, size_t KEY_SIZE> 29 enum { kKeySize = KEY_SIZE }; 35 GrTBinHashKey(const GrTBinHashKey<ENTRY, KEY_SIZE>& other) { 39 GrTBinHashKey<ENTRY, KEY_SIZE>& operator=(const GrTBinHashKey<ENTRY, KEY_SIZE>& other) { 55 GrAssert(GrIsALIGN4(KEY_SIZE)); 56 memcpy(&fData, data, KEY_SIZE); 59 size_t len = KEY_SIZE; 75 int compare(const GrTBinHashKey<ENTRY, KEY_SIZE>& key) const { 77 return memcmp(fData, key.fData, KEY_SIZE); [all...] |
/external/skia/src/gpu/ |
GrBinHashKey.h | 26 template<typename ENTRY, size_t KEY_SIZE> 29 enum { kKeySize = KEY_SIZE }; 35 GrTBinHashKey(const GrTBinHashKey<ENTRY, KEY_SIZE>& other) { 39 GrTBinHashKey<ENTRY, KEY_SIZE>& operator=(const GrTBinHashKey<ENTRY, KEY_SIZE>& other) { 55 GrAssert(GrIsALIGN4(KEY_SIZE)); 56 memcpy(&fData, data, KEY_SIZE); 59 size_t len = KEY_SIZE; 75 int compare(const GrTBinHashKey<ENTRY, KEY_SIZE>& key) const { 77 return memcmp(fData, key.fData, KEY_SIZE); [all...] |
/external/chromium_org/net/disk_cache/flash/ |
internal_entry.cc | 72 int key_size = static_cast<int>(key.size()); local 74 return entry->WriteData(0, 0, key_buf.get(), key_size) == key_size; 78 int key_size = entry->GetDataSize(0); local 79 scoped_refptr<net::IOBuffer> key_buf(new net::IOBuffer(key_size)); 80 if (entry->ReadData(0, 0, key_buf.get(), key_size) != key_size) 82 key->assign(key_buf->data(), key_size);
|
/external/chromium_org/net/data/ssl/scripts/ |
generate-weak-test-chains.sh | 49 KEY_SIZE=2048 \ 73 key_size=$(echo "$key_type" | sed -E 's/-.+//') 78 key_size="-name $key_size" 82 -out out/$key_type-intermediate.key $key_size 87 key_size=$(echo "$key_type" | sed -E 's/-.+//') 92 key_size="-name $key_size" 98 -out out/$key_type-ee-by-$signer_key_type-intermediate.key $key_size 105 key_size=$(echo "$key_type" | sed -E 's/-.+//' [all...] |
ee.cnf | 2 KEY_SIZE = 2048 5 default_bits = ${ENV::KEY_SIZE}
|
ca.cnf | 3 KEY_SIZE = 2048 15 key_size = $ENV::KEY_SIZE 18 type = $key_size-$algo-$cert_type 65 default_bits = $ENV::KEY_SIZE
|
redundant-ca.cnf | 8 key_size = $ENV::KEY_SIZE 58 default_bits = $ENV::KEY_SIZE
|
generate-redundant-test-chains.sh | 58 KEY_SIZE=2048 \ 83 KEY_SIZE=2048 \ 111 KEY_SIZE=2048 \ 128 KEY_SIZE=2048 \ 144 KEY_SIZE=2048 \ 167 KEY_SIZE=$signer_key_size \
|
generate-duplicate-cn-certs.sh | 47 KEY_SIZE=2048 \ 90 KEY_SIZE=2048 \ 105 KEY_SIZE=2048 \
|
/external/chromium_org/net/quic/crypto/ |
crypto_secret_boxer_test.cc | 19 const size_t key_size = CryptoSecretBoxer::GetKeySize(); local 20 scoped_ptr<uint8[]> key(new uint8[key_size]); 21 memset(key.get(), 0x11, key_size); 24 boxer.SetKey(StringPiece(reinterpret_cast<char*>(key.get()), key_size));
|
/external/chromium_org/extensions/common/ |
crx_file.cc | 36 scoped_ptr<CrxFile> CrxFile::Create(const uint32 key_size, 42 header.key_size = key_size; 68 else if (header.key_size > kMaxPublicKeySize) 70 else if (header.key_size == 0)
|
crx_file.h | 30 uint32 key_size; // The size of the public key, in bytes. member in struct:extensions::CrxFile::Header 51 // Returns a null scoped_ptr if erroneous values of |key_size| and/or 56 static scoped_ptr<CrxFile> Create(const uint32 key_size,
|
/libcore/crypto/src/main/java/org/conscrypt/ |
ConnectionStateSSLv3.java | 67 int key_size = (is_exportabe) local 84 logger.println(" key size: " + key_size); 90 // 2*hash_size + 2*key_size + 2*iv_size 91 byte[] key_block = new byte[2*hash_size + 2*key_size + 2*iv_size]; 101 byte[] client_key = new byte[key_size]; 102 byte[] server_key = new byte[key_size]; 109 System.arraycopy(key_block, 2*hash_size, client_key, 0, key_size); 110 System.arraycopy(key_block, 2*hash_size+key_size, 111 server_key, 0, key_size); 132 key_size = cipherSuite.expandedKeyMaterial [all...] |
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/i965/ |
brw_state_cache.c | 59 assert(item->key_size % 4 == 0); 63 for (i = 0; i < item->key_size/4; i++) { 77 a->key_size == b->key_size && 78 (memcmp(a->key, b->key, a->key_size) == 0); 135 const void *key, GLuint key_size, 145 lookup.key_size = key_size; 154 *(void **)out_aux = ((char *)item->key + item->key_size); 205 const void *item_aux = item->key + item->key_size; [all...] |
/external/mesa3d/src/mesa/drivers/dri/i965/ |
brw_state_cache.c | 59 assert(item->key_size % 4 == 0); 63 for (i = 0; i < item->key_size/4; i++) { 77 a->key_size == b->key_size && 78 (memcmp(a->key, b->key, a->key_size) == 0); 135 const void *key, GLuint key_size, 145 lookup.key_size = key_size; 154 *(void **)out_aux = ((char *)item->key + item->key_size); 205 const void *item_aux = item->key + item->key_size; [all...] |
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_export.c | 38 unsigned long key_size; local 54 key_size = key->dp->size; 60 LTC_ASN1_SHORT_INTEGER, 1UL, &key_size, 69 LTC_ASN1_SHORT_INTEGER, 1UL, &key_size,
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/common/ |
FwdLockGlue.c | 32 #define KEY_SIZE 16 33 #define KEY_SIZE_IN_BITS (KEY_SIZE * 8) 78 unsigned char keyEncryptionKey[KEY_SIZE]; 81 if (read(fileDesc, keyEncryptionKey, KEY_SIZE) == KEY_SIZE) { 86 FwdLockGlue_GetRandomNumber(keyEncryptionKey, KEY_SIZE) && 90 if (write(fileDesc, keyEncryptionKey, KEY_SIZE) == KEY_SIZE) { 102 memset(keyEncryptionKey, 0, KEY_SIZE); // Zero out key data.
|
/external/chromium/crypto/ |
signature_verifier_mac.cc | 44 CSSM_KEY_SIZE key_size; local 47 &public_key_, &key_size); 52 public_key_.KeyHeader.LogicalKeySizeInBits = key_size.LogicalKeySizeInBits;
|
rsa_private_key_mac.cc | 72 CSSM_KEY_SIZE key_size; local 74 crtn = CSSM_QueryKeySizeInBits(GetSharedCSPHandle(), NULL, &key, &key_size); 79 key.KeyHeader.LogicalKeySizeInBits = key_size.LogicalKeySizeInBits; 137 &key_size); 142 public_key->KeyHeader.LogicalKeySizeInBits = key_size.LogicalKeySizeInBits;
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/decoder/ |
FwdLockFile.c | 41 #define KEY_SIZE AES_BLOCK_SIZE 42 #define KEY_SIZE_IN_BITS (KEY_SIZE * 8) 175 unsigned char value[KEY_SIZE]; 176 unsigned char key[KEY_SIZE]; 185 pSession->encryptedSessionKeyLength, pData->key, KEY_SIZE); 191 memset(pData->value, 0, KEY_SIZE); 201 HMAC_Init_ex(&pSession->signingContext, pData->key, KEY_SIZE, EVP_sha1(), NULL); 272 pSession->encryptedSessionKeyLength = FwdLockGlue_GetEncryptedKeyLength(KEY_SIZE); 400 HMAC_Init_ex(&pSession->signingContext, NULL, KEY_SIZE, NULL, NULL); 428 HMAC_Init_ex(&pSession->signingContext, NULL, KEY_SIZE, NULL, NULL) [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/util/ |
u_keymap.c | 49 unsigned key_size; member in struct:keymap 125 map->key_size = keySize; 156 if (!memcmp(item->key, key, map->key_size)) 199 key_hash = hash(key, map->key_size); 213 item->key = mem_dup(key, map->key_size); 241 key_hash = hash(key, map->key_size); 267 key_hash = hash(key, map->key_size);
|
/external/mesa3d/src/gallium/auxiliary/util/ |
u_keymap.c | 49 unsigned key_size; member in struct:keymap 125 map->key_size = keySize; 156 if (!memcmp(item->key, key, map->key_size)) 199 key_hash = hash(key, map->key_size); 213 item->key = mem_dup(key, map->key_size); 241 key_hash = hash(key, map->key_size); 267 key_hash = hash(key, map->key_size);
|
/external/chromium_org/third_party/leveldatabase/src/db/ |
memtable.cc | 86 // key_size : varint32 of internal_key.size() 90 size_t key_size = key.size(); local 92 size_t internal_key_size = key_size + 8; 98 memcpy(p, key.data(), key_size); 99 p += key_size;
|
/external/bluetooth/bluedroid/stack/gatt/ |
gatt_db.c | 120 UINT8 key_size) 156 if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) 199 ** key_size: encryption key size. 211 UINT8 key_size) 226 status = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size); 310 ** key_size: encryption key size. 324 UINT8 key_size, 361 status = read_attr_value ((void *)p_attr, 0, &p, FALSE, (UINT16)(*p_len -2), &len, sec_flag, key_size); 595 ** key_size: encryption key size 607 UINT8 key_size, [all...] |
/external/bluetooth/bluedroid/btif/include/ |
btif_dm.h | 57 UINT8 key_size; member in struct:__anon3331 70 UINT8 key_size; member in struct:__anon3333
|