/external/mesa3d/src/mesa/state_tracker/ |
st_atom_depth.c | 98 struct pipe_depth_stencil_alpha_state *dsa = &st->state.depth_stencil; local 102 memset(dsa, 0, sizeof(*dsa)); 106 dsa->depth.enabled = 1; 107 dsa->depth.writemask = ctx->Depth.Mask; 108 dsa->depth.func = st_compare_func_to_pipe(ctx->Depth.Func); 112 dsa->stencil[0].enabled = 1; 113 dsa->stencil[0].func = st_compare_func_to_pipe(ctx->Stencil.Function[0]); 114 dsa->stencil[0].fail_op = gl_stencil_op_to_pipe(ctx->Stencil.FailFunc[0]); 115 dsa->stencil[0].zfail_op = gl_stencil_op_to_pipe(ctx->Stencil.ZFailFunc[0]) [all...] |
/external/mesa3d/src/gallium/drivers/r300/ |
r300_hyperz.c | 44 struct r300_dsa_state *dsa = r300->dsa_state.state; local 46 switch (dsa->dsa.depth.func) { 66 struct r300_dsa_state *dsa = r300->dsa_state.state; local 67 unsigned func = dsa->dsa.depth.func; 74 struct r300_dsa_state *dsa = r300->dsa_state.state; local 75 unsigned func = dsa->dsa.depth.func; 101 struct r300_dsa_state *dsa = r300->dsa_state.state local 137 struct r300_dsa_state *dsa = r300->dsa_state.state; local [all...] |
r300_render_stencilref.c | 47 struct r300_dsa_state *dsa = (struct r300_dsa_state*)r300->dsa_state.state; local 49 return dsa->two_sided_stencil_ref || 50 (dsa->two_sided && 59 struct r300_dsa_state *dsa = (struct r300_dsa_state*)r300->dsa_state.state; local 63 sr->zb_stencilrefmask = dsa->stencil_ref_mask; 77 struct r300_dsa_state *dsa = (struct r300_dsa_state*)r300->dsa_state.state; local 80 dsa->stencil_ref_mask = dsa->stencil_ref_bf; 92 struct r300_dsa_state *dsa = (struct r300_dsa_state*)r300->dsa_state.state; local 96 dsa->stencil_ref_mask = sr->zb_stencilrefmask [all...] |
r300_state.c | 570 /* Create a new depth, stencil, and alpha state based on the CSO dsa state. 580 struct r300_dsa_state* dsa = CALLOC_STRUCT(r300_dsa_state); local 583 dsa->dsa = *state; 587 dsa->z_buffer_control |= R300_Z_WRITE_ENABLE; 591 dsa->z_buffer_control |= R300_Z_ENABLE; 593 dsa->z_stencil_control |= 598 dsa->z_buffer_control |= R300_Z_ENABLE; 599 dsa->z_stencil_control |= R300_ZS_ALWAYS; 604 dsa->z_buffer_control |= R300_STENCIL_ENABLE 710 struct r300_dsa_state *dsa = local [all...] |
/external/boringssl/src/crypto/evp/ |
p_dsa_asn1.c | 61 #include <openssl/dsa.h> 67 #include "../dsa/internal.h" 80 DSA *dsa = NULL; local 92 dsa = d2i_DSAparams(NULL, &pm, pmlen); 93 if (dsa == NULL) { 98 dsa = DSA_new(); 99 if (dsa == NULL) { 114 dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL); 115 if (dsa->pub_key == NULL) 131 DSA *dsa; local 187 DSA *dsa = NULL; local 307 DSA *dsa; local 421 DSA *dsa; local 452 DSA *dsa; local [all...] |
evp.c | 63 #include <openssl/dsa.h> 249 int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key) { 257 int EVP_PKEY_assign_DSA(EVP_PKEY *pkey, DSA *key) { 261 DSA *EVP_PKEY_get0_DSA(EVP_PKEY *pkey) { 266 return pkey->pkey.dsa; 269 DSA *EVP_PKEY_get1_DSA(EVP_PKEY *pkey) { 270 DSA *dsa = EVP_PKEY_get0_DSA(pkey); local 271 if (dsa != NULL) { 272 DSA_up_ref(dsa); [all...] |
/external/boringssl/src/crypto/dsa/ |
dsa.c | 60 #include <openssl/dsa.h> 88 DSA *DSA_new(void) { 89 DSA *dsa = (DSA *)OPENSSL_malloc(sizeof(DSA)); local 90 if (dsa == NULL) { 91 OPENSSL_PUT_ERROR(DSA, ERR_R_MALLOC_FAILURE); 95 memset(dsa, 0, sizeof(DSA)); [all...] |
dsa_test.c | 60 #include <openssl/dsa.h> 168 static DSA *get_fips_dsa(void) { 169 DSA *dsa = DSA_new(); local 170 if (!dsa) { 173 dsa->p = BN_bin2bn(fips_p, sizeof(fips_p), NULL); 174 dsa->q = BN_bin2bn(fips_q, sizeof(fips_q), NULL); 175 dsa->g = BN_bin2bn(fips_g, sizeof(fips_g), NULL); 176 dsa->pub_key = BN_bin2bn(fips_y, sizeof(fips_y), NULL); 177 dsa->priv_key = BN_bin2bn(fips_x, sizeof(fips_x), NULL) 188 DSA *dsa = NULL; local 259 DSA *dsa = get_fips_dsa(); local [all...] |
dsa_asn1.c | 55 #include <openssl/dsa.h> 76 OPENSSL_PUT_ERROR(DSA, ERR_R_MALLOC_FAILURE); 103 DSA_free((DSA *)*pval); 113 ASN1_SIMPLE(DSA, version, LONG), 114 ASN1_SIMPLE(DSA, p, BIGNUM), 115 ASN1_SIMPLE(DSA, q, BIGNUM), 116 ASN1_SIMPLE(DSA, g, BIGNUM), 117 ASN1_SIMPLE(DSA, pub_key, BIGNUM), 118 ASN1_SIMPLE(DSA, priv_key, BIGNUM)} ASN1_SEQUENCE_END_cb(DSA, [all...] |
/libcore/luni/src/test/java/tests/security/interfaces/ |
DSAKeyPairGeneratorTest.java | 50 MyDSA dsa = new MyDSA(dsaParams); local 58 dsa.initialize(dsaParams, random); 64 dsa.initialize(dsaParams, null); 72 dsa.initialize(null, random); 89 MyDSA dsa = new MyDSA(null); local 98 dsa.initialize(520, false, random); 112 dsa.initialize(invalidLen[i], true, random); 125 dsa = new MyDSA(dsaParams); 127 dsa.initialize(520, true, random); 134 dsa.initialize(520, false, random) [all...] |
/system/security/keystore-engine/ |
dsa_meth.cpp | 29 #define LOG_TAG "OpenSSL-keystore-dsa" 35 #include <openssl/dsa.h> 50 static DSA_SIG* keystore_dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) { 51 ALOGV("keystore_dsa_do_sign(%p, %d, %p)", dgst, dlen, dsa); 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); 68 int num = DSA_size(dsa); 96 ALOGV("keystore_dsa_do_sign(%p, %d, %p) => returning %p len %zu", dgst, dlen, dsa, 125 Unique_DSA dsa(EVP_PKEY_get1_DSA(pkey)); 126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) [all...] |
/external/boringssl/src/include/openssl/ |
dsa.h | 74 /* DSA contains functions for signing and verifing with the Digital Signature 80 /* DSA_new returns a new, empty DSA object or NULL on error. */ 81 OPENSSL_EXPORT DSA *DSA_new(void); 83 /* DSA_free decrements the reference count of |dsa| and frees it if the 85 OPENSSL_EXPORT void DSA_free(DSA *dsa); 87 /* DSA_up_ref increments the reference count of |dsa|. */ 88 OPENSSL_EXPORT int DSA_up_ref(DSA *dsa); 93 /* DSA_generate_parameters_ex generates a set of DSA parameters by followin [all...] |
/external/boringssl/src/crypto/pem/ |
pem_all.c | 113 #include <openssl/dsa.h> 122 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa); 134 /* We treat RSA or DSA private keys as a special case. 183 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa) 185 DSA *dtmp; 190 if(dsa) { [all...] |
/external/mesa3d/src/gallium/state_trackers/vega/ |
renderer.c | 83 struct pipe_depth_stencil_alpha_state dsa; member in struct:renderer::__anon20074 125 struct pipe_depth_stencil_alpha_state dsa; member in struct:renderer::__anon20075::__anon20080 734 struct pipe_depth_stencil_alpha_state dsa; local 744 memset(&dsa, 0, sizeof(dsa)); 745 dsa.depth.enabled = 1; 746 dsa.depth.writemask = 1; 747 dsa.depth.func = PIPE_FUNC_ALWAYS; 748 cso_set_depth_stencil_alpha(renderer->cso, &dsa); 974 struct pipe_depth_stencil_alpha_state *dsa; local 1050 struct pipe_depth_stencil_alpha_state dsa; local 1100 struct pipe_depth_stencil_alpha_state dsa; local 1215 struct pipe_depth_stencil_alpha_state *dsa = &renderer->g3d.dsa; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
DSA.java | 4 import org.bouncycastle.jcajce.provider.asymmetric.dsa.DSAUtil; 5 import org.bouncycastle.jcajce.provider.asymmetric.dsa.KeyFactorySpi; 10 public class DSA 12 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".dsa."; 23 provider.addAlgorithm("AlgorithmParameters.DSA", PREFIX + "AlgorithmParametersSpi"); 25 provider.addAlgorithm("AlgorithmParameterGenerator.DSA", PREFIX + "AlgorithmParameterGeneratorSpi"); 27 provider.addAlgorithm("KeyPairGenerator.DSA", PREFIX + "KeyPairGeneratorSpi"); 28 provider.addAlgorithm("KeyFactory.DSA", PREFIX + "KeyFactorySpi"); 46 addSignatureAlgorithm(provider, "SHA224", "DSA", PREFIX + "DSASigner$dsa224", NISTObjectIdentifiers.dsa_with_sha224); 47 addSignatureAlgorithm(provider, "SHA256", "DSA", PREFIX + "DSASigner$dsa256", NISTObjectIdentifiers.dsa_with_sha256) [all...] |
/system/security/softkeymaster/ |
keymaster_openssl.cpp | 56 void operator()(DSA* p) const { DSA_free(p); } 58 typedef UniquePtr<DSA, DSA_Delete> Unique_DSA; 228 ALOGI("Requested DSA key size is too small (<512)"); 232 Unique_DSA dsa(DSA_new()); 237 if (DSA_generate_parameters_ex(dsa.get(), dsa_params->key_size, NULL, 0, NULL, NULL, 243 dsa->g = BN_bin2bn(dsa_params->generator, dsa_params->generator_len, NULL); 244 if (dsa->g == NULL) { 249 dsa->p = BN_bin2bn(dsa_params->prime_p, dsa_params->prime_p_len, NULL); 250 if (dsa->p == NULL) { 255 dsa->q = BN_bin2bn(dsa_params->prime_q, dsa_params->prime_q_len, NULL) [all...] |
/external/boringssl/src/crypto/x509/ |
x_all.c | 60 #include <openssl/dsa.h> 268 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 270 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa); 273 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 275 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa); [all...] |
/external/libchrome/crypto/ |
scoped_openssl_types.h | 10 #include <openssl/dsa.h> 47 using ScopedDSA = ScopedOpenSSL<DSA, DSA_free>;
|
/external/mesa3d/src/gallium/auxiliary/vl/ |
vl_mpeg12_decoder.h | 76 void *dsa; member in struct:vl_mpeg12_decoder
|
vl_compositor.c | 400 struct pipe_depth_stencil_alpha_state dsa; local 459 memset(&dsa, 0, sizeof dsa); 460 dsa.depth.enabled = 0; 461 dsa.depth.writemask = 0; 462 dsa.depth.func = PIPE_FUNC_ALWAYS; 464 dsa.stencil[i].enabled = 0; 465 dsa.stencil[i].func = PIPE_FUNC_ALWAYS; 466 dsa.stencil[i].fail_op = PIPE_STENCIL_OP_KEEP; 467 dsa.stencil[i].zpass_op = PIPE_STENCIL_OP_KEEP [all...] |
vl_mpeg12_decoder.c | 413 dec->base.context->delete_depth_stencil_alpha_state(dec->base.context, dec->dsa); 773 struct pipe_depth_stencil_alpha_state dsa; local 779 memset(&dsa, 0, sizeof dsa); 780 dsa.depth.enabled = 0; 781 dsa.depth.writemask = 0; 782 dsa.depth.func = PIPE_FUNC_ALWAYS; 784 dsa.stencil[i].enabled = 0; 785 dsa.stencil[i].func = PIPE_FUNC_ALWAYS; 786 dsa.stencil[i].fail_op = PIPE_STENCIL_OP_KEEP [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
AlgorithmParameterGeneratorSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 51 throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec for DSA parameter generation."); 93 params = createParametersInstance("DSA");
|
AlgorithmParametersSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 77 throw new InvalidParameterSpecException("unknown parameter spec passed to DSA parameters object."); 86 throw new InvalidParameterSpecException("DSAParameterSpec required to initialise a DSA algorithm parameters object"); 104 throw new IOException("Not a valid DSA Parameter encoding."); 108 throw new IOException("Not a valid DSA Parameter encoding."); 129 return "DSA Parameters";
|
DSAUtil.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 18 * utility class for converting jce/jca DSA objects 58 throw new InvalidKeyException("can't identify DSA public key: " + key.getClass().getName()); 73 throw new InvalidKeyException("can't identify DSA private key.");
|
KeyPairGeneratorSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 30 super("DSA");
|