/external/chromium_org/net/data/ssl/scripts/ |
generate-weak-test-chains.sh | 49 KEY_SIZE=2048 \ 75 key_size=$(echo "$key_type" | sed -E 's/-.+//') 80 key_size="-name $key_size" 84 -out out/$key_type-intermediate.key $key_size 89 key_size=$(echo "$key_type" | sed -E 's/-.+//') 94 key_size="-name $key_size" 100 -out out/$key_type-ee-by-$signer_key_type-intermediate.key $key_size 107 key_size=$(echo "$key_type" | sed -E 's/-.+//' [all...] |
/external/chromium_org/net/quic/crypto/ |
crypto_secret_boxer_test.cc | 19 const size_t key_size = CryptoSecretBoxer::GetKeySize(); local 20 scoped_ptr<uint8[]> key(new uint8[key_size]); 21 memset(key.get(), 0x11, key_size); 24 boxer.SetKey(StringPiece(reinterpret_cast<char*>(key.get()), key_size));
|
aead_base_decrypter.h | 30 size_t key_size, 36 size_t key_size,
|
aead_base_encrypter.h | 30 size_t key_size, 36 size_t key_size,
|
aead_base_decrypter_openssl.cc | 40 size_t key_size, 44 key_size_(key_size),
|
crypto_server_config_protobuf.h | 50 size_t key_size() const { function in class:net::QuicServerConfigProtobuf
|
aead_base_decrypter_nss.cc | 18 size_t key_size, 23 key_size_(key_size),
|
aead_base_encrypter_nss.cc | 18 size_t key_size, 23 key_size_(key_size),
|
aead_base_encrypter_openssl.cc | 36 size_t key_size, 40 key_size_(key_size),
|
/external/chromium_org/components/crx_file/ |
crx_file.cc | 36 scoped_ptr<CrxFile> CrxFile::Create(const uint32 key_size, 42 header.key_size = key_size; 68 else if (header.key_size > kMaxPublicKeySize) 70 else if (header.key_size == 0)
|
crx_file.h | 29 uint32 key_size; // The size of the public key, in bytes. member in struct:crx_file::CrxFile::Header 50 // Returns a null scoped_ptr if erroneous values of |key_size| and/or 55 static scoped_ptr<CrxFile> Create(const uint32 key_size,
|
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/i965/ |
brw_state_cache.c | 59 assert(item->key_size % 4 == 0); 63 for (i = 0; i < item->key_size/4; i++) { 77 a->key_size == b->key_size && 78 (memcmp(a->key, b->key, a->key_size) == 0); 135 const void *key, GLuint key_size, 145 lookup.key_size = key_size; 154 *(void **)out_aux = ((char *)item->key + item->key_size); 205 const void *item_aux = item->key + item->key_size; [all...] |
/external/mesa3d/src/mesa/drivers/dri/i965/ |
brw_state_cache.c | 59 assert(item->key_size % 4 == 0); 63 for (i = 0; i < item->key_size/4; i++) { 77 a->key_size == b->key_size && 78 (memcmp(a->key, b->key, a->key_size) == 0); 135 const void *key, GLuint key_size, 145 lookup.key_size = key_size; 154 *(void **)out_aux = ((char *)item->key + item->key_size); 205 const void *item_aux = item->key + item->key_size; [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/util/ |
u_keymap.c | 49 unsigned key_size; member in struct:keymap 125 map->key_size = keySize; 156 if (!memcmp(item->key, key, map->key_size)) 199 key_hash = hash(key, map->key_size); 213 item->key = mem_dup(key, map->key_size); 241 key_hash = hash(key, map->key_size); 267 key_hash = hash(key, map->key_size);
|
/external/mesa3d/src/gallium/auxiliary/util/ |
u_keymap.c | 49 unsigned key_size; member in struct:keymap 125 map->key_size = keySize; 156 if (!memcmp(item->key, key, map->key_size)) 199 key_hash = hash(key, map->key_size); 213 item->key = mem_dup(key, map->key_size); 241 key_hash = hash(key, map->key_size); 267 key_hash = hash(key, map->key_size);
|
/external/chromium_org/third_party/leveldatabase/src/db/ |
memtable.cc | 86 // key_size : varint32 of internal_key.size() 90 size_t key_size = key.size(); local 92 size_t internal_key_size = key_size + 8; 98 memcpy(p, key.data(), key_size); 99 p += key_size;
|
/external/bluetooth/bluedroid/btif/include/ |
btif_dm.h | 68 UINT8 key_size; member in struct:__anon5628 81 UINT8 key_size; member in struct:__anon5630
|
/external/chromium_org/third_party/libxslt/libexslt/ |
crypto.c | 594 int key_len = 0, key_size = 0; local 635 key_size = xmlUTF8Strsize (key, key_len); 636 if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) { 643 memcpy (padkey, key, key_size); 692 int key_len = 0, key_size = 0; local 732 key_size = xmlUTF8Strsize (key, key_len); 733 if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) { 740 memcpy (padkey, key, key_size); [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/cso_cache/ |
cso_context.c | 372 unsigned key_size, hash_key; local 376 key_size = templ->independent_blend_enable ? 379 hash_key = cso_construct_key((void*)templ, key_size); 381 (void*)templ, key_size); 389 memcpy(&cso->state, templ, key_size); 434 unsigned key_size = sizeof(struct pipe_depth_stencil_alpha_state); local 435 unsigned hash_key = cso_construct_key((void*)templ, key_size); 439 (void*)templ, key_size); 497 unsigned key_size = sizeof(struct pipe_rasterizer_state); local 498 unsigned hash_key = cso_construct_key((void*)templ, key_size); 821 unsigned key_size, hash_key; local 977 unsigned key_size = sizeof(struct pipe_sampler_state); local [all...] |
/external/mesa3d/src/gallium/auxiliary/cso_cache/ |
cso_context.c | 372 unsigned key_size, hash_key; local 376 key_size = templ->independent_blend_enable ? 379 hash_key = cso_construct_key((void*)templ, key_size); 381 (void*)templ, key_size); 389 memcpy(&cso->state, templ, key_size); 434 unsigned key_size = sizeof(struct pipe_depth_stencil_alpha_state); local 435 unsigned hash_key = cso_construct_key((void*)templ, key_size); 439 (void*)templ, key_size); 497 unsigned key_size = sizeof(struct pipe_rasterizer_state); local 498 unsigned hash_key = cso_construct_key((void*)templ, key_size); 821 unsigned key_size, hash_key; local 977 unsigned key_size = sizeof(struct pipe_sampler_state); local [all...] |
/external/bluetooth/bluedroid/stack/gatt/ |
gatt_db.c | 120 UINT8 key_size) 157 if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) 200 ** key_size: encryption key size. 212 UINT8 key_size) 227 status = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size); 321 ** key_size: encryption key size. 335 UINT8 key_size, 380 status = read_attr_value ((void *)p_attr, 0, &p, FALSE, (UINT16)(*p_len -2), &len, sec_flag, key_size); 633 ** key_size: encryption key size 645 UINT8 key_size, [all...] |
/external/chromium_org/chrome/browser/net/ |
probe_message.cc | 109 int key_size = sizeof(kEncodingString) - 1; local 113 if (key_pos >= key_size)
|
/external/chromium_org/net/http/ |
des.cc | 183 DWORD key_size; member in struct:net::KeyBlob 191 key_blob.key_size = 8; // 64 bits
|
/external/chromium_org/sync/util/ |
cryptographer.cc | 307 int key_size = bag.key_size(); local 308 for (int i = 0; i < key_size; ++i) { 340 if (static_cast<size_t>(bag.key_size()) < nigoris_.size())
|
/external/chromium_org/components/component_updater/ |
component_unpacker.cc | 54 std::vector<uint8_t> key(header.key_size); 55 len = fread(&key[0], sizeof(uint8_t), header.key_size, crx_file); 56 if (len < header.key_size)
|