/external/chromium_org/net/data/ssl/scripts/ |
H A D | generate-weak-test-chains.sh | 73 key_size=$(echo "$key_type" | sed -E 's/-.+//') 78 key_size="-name $key_size" 82 -out out/$key_type-intermediate.key $key_size 87 key_size=$(echo "$key_type" | sed -E 's/-.+//') 92 key_size="-name $key_size" 98 -out out/$key_type-ee-by-$signer_key_type-intermediate.key $key_size 105 key_size=$(echo "$key_type" | sed -E 's/-.+//') 108 CA_COMMON_NAME="$key_size [all...] |
/external/chromium_org/net/disk_cache/flash/ |
H A D | internal_entry.cc | 72 int key_size = static_cast<int>(key.size()); local 74 return entry->WriteData(0, 0, key_buf.get(), key_size) == key_size; 78 int key_size = entry->GetDataSize(0); local 79 scoped_refptr<net::IOBuffer> key_buf(new net::IOBuffer(key_size)); 80 if (entry->ReadData(0, 0, key_buf.get(), key_size) != key_size) 82 key->assign(key_buf->data(), key_size);
|
/external/chromium_org/net/quic/crypto/ |
H A D | crypto_secret_boxer_test.cc | 19 const size_t key_size = CryptoSecretBoxer::GetKeySize(); local 20 scoped_ptr<uint8[]> key(new uint8[key_size]); 21 memset(key.get(), 0x11, key_size); 24 boxer.SetKey(StringPiece(reinterpret_cast<char*>(key.get()), key_size));
|
H A D | crypto_server_config_protobuf.h | 50 size_t key_size() const { function in class:net::QuicServerConfigProtobuf
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_export.c | 38 unsigned long key_size; local 54 key_size = key->dp->size; 60 LTC_ASN1_SHORT_INTEGER, 1UL, &key_size, 69 LTC_ASN1_SHORT_INTEGER, 1UL, &key_size,
|
H A D | ecc_import.c | 96 unsigned long key_size; local 122 LTC_ASN1_SHORT_INTEGER, 1UL, &key_size, 134 LTC_ASN1_SHORT_INTEGER, 1UL, &key_size, 144 for (key->idx = 0; ltc_ecc_sets[key->idx].size && (unsigned long)ltc_ecc_sets[key->idx].size != key_size; ++key->idx);
|
/external/chromium_org/extensions/common/ |
H A D | crx_file.cc | 36 scoped_ptr<CrxFile> CrxFile::Create(const uint32 key_size, argument 42 header.key_size = key_size; 68 else if (header.key_size > kMaxPublicKeySize) 70 else if (header.key_size == 0)
|
H A D | crx_file.h | 30 uint32 key_size; // The size of the public key, in bytes. member in struct:extensions::CrxFile::Header 51 // Returns a null scoped_ptr if erroneous values of |key_size| and/or 56 static scoped_ptr<CrxFile> Create(const uint32 key_size,
|
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/i965/ |
H A D | brw_state_cache.c | 59 assert(item->key_size % 4 == 0); 63 for (i = 0; i < item->key_size/4; i++) { 77 a->key_size == b->key_size && 78 (memcmp(a->key, b->key, a->key_size) == 0); 135 const void *key, GLuint key_size, 145 lookup.key_size = key_size; 154 *(void **)out_aux = ((char *)item->key + item->key_size); 205 const void *item_aux = item->key + item->key_size; 133 brw_search_cache(struct brw_cache *cache, enum brw_cache_id cache_id, const void *key, GLuint key_size, uint32_t *inout_offset, void *out_aux) argument 262 brw_upload_cache(struct brw_cache *cache, enum brw_cache_id cache_id, const void *key, GLuint key_size, const void *data, GLuint data_size, const void *aux, GLuint aux_size, uint32_t *out_offset, void *out_aux) argument [all...] |
/external/mesa3d/src/mesa/drivers/dri/i965/ |
H A D | brw_state_cache.c | 59 assert(item->key_size % 4 == 0); 63 for (i = 0; i < item->key_size/4; i++) { 77 a->key_size == b->key_size && 78 (memcmp(a->key, b->key, a->key_size) == 0); 135 const void *key, GLuint key_size, 145 lookup.key_size = key_size; 154 *(void **)out_aux = ((char *)item->key + item->key_size); 205 const void *item_aux = item->key + item->key_size; 133 brw_search_cache(struct brw_cache *cache, enum brw_cache_id cache_id, const void *key, GLuint key_size, uint32_t *inout_offset, void *out_aux) argument 262 brw_upload_cache(struct brw_cache *cache, enum brw_cache_id cache_id, const void *key, GLuint key_size, const void *data, GLuint data_size, const void *aux, GLuint aux_size, uint32_t *out_offset, void *out_aux) argument [all...] |
/external/chromium/crypto/ |
H A D | signature_verifier_mac.cc | 44 CSSM_KEY_SIZE key_size; local 47 &public_key_, &key_size); 52 public_key_.KeyHeader.LogicalKeySizeInBits = key_size.LogicalKeySizeInBits;
|
H A D | rsa_private_key_mac.cc | 72 CSSM_KEY_SIZE key_size; local 74 crtn = CSSM_QueryKeySizeInBits(GetSharedCSPHandle(), NULL, &key, &key_size); 79 key.KeyHeader.LogicalKeySizeInBits = key_size.LogicalKeySizeInBits; 137 &key_size); 142 public_key->KeyHeader.LogicalKeySizeInBits = key_size.LogicalKeySizeInBits;
|
H A D | hmac_win.cc | 127 DWORD key_size; member in struct:crypto::KeyBlob 138 key_blob->key_size = key_length;
|
/external/bluetooth/bluedroid/btif/include/ |
H A D | btif_dm.h | 57 UINT8 key_size; member in struct:__anon927 70 UINT8 key_size; member in struct:__anon929
|
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/util/ |
H A D | u_keymap.c | 49 unsigned key_size; member in struct:keymap 125 map->key_size = keySize; 156 if (!memcmp(item->key, key, map->key_size)) 199 key_hash = hash(key, map->key_size); 213 item->key = mem_dup(key, map->key_size); 241 key_hash = hash(key, map->key_size); 267 key_hash = hash(key, map->key_size);
|
/external/mesa3d/src/gallium/auxiliary/util/ |
H A D | u_keymap.c | 49 unsigned key_size; member in struct:keymap 125 map->key_size = keySize; 156 if (!memcmp(item->key, key, map->key_size)) 199 key_hash = hash(key, map->key_size); 213 item->key = mem_dup(key, map->key_size); 241 key_hash = hash(key, map->key_size); 267 key_hash = hash(key, map->key_size);
|
/external/chromium_org/third_party/leveldatabase/src/db/ |
H A D | memtable.cc | 86 // key_size : varint32 of internal_key.size() 90 size_t key_size = key.size(); local 92 size_t internal_key_size = key_size + 8; 98 memcpy(p, key.data(), key_size); 99 p += key_size;
|
/external/chromium_org/third_party/libxslt/libexslt/ |
H A D | crypto.c | 594 int key_len = 0, key_size = 0; local 635 key_size = xmlUTF8Strsize (key, key_len); 636 if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) { 643 memcpy (padkey, key, key_size); 692 int key_len = 0, key_size = 0; local 732 key_size = xmlUTF8Strsize (key, key_len); 733 if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) { 740 memcpy (padkey, key, key_size); [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/cso_cache/ |
H A D | cso_context.c | 372 unsigned key_size, hash_key; local 376 key_size = templ->independent_blend_enable ? 379 hash_key = cso_construct_key((void*)templ, key_size); 381 (void*)templ, key_size); 389 memcpy(&cso->state, templ, key_size); 434 unsigned key_size = sizeof(struct pipe_depth_stencil_alpha_state); local 435 unsigned hash_key = cso_construct_key((void*)templ, key_size); 439 (void*)templ, key_size); 497 unsigned key_size = sizeof(struct pipe_rasterizer_state); local 498 unsigned hash_key = cso_construct_key((void*)templ, key_size); 821 unsigned key_size, hash_key; local 977 unsigned key_size = sizeof(struct pipe_sampler_state); local [all...] |
/external/mesa3d/src/gallium/auxiliary/cso_cache/ |
H A D | cso_context.c | 372 unsigned key_size, hash_key; local 376 key_size = templ->independent_blend_enable ? 379 hash_key = cso_construct_key((void*)templ, key_size); 381 (void*)templ, key_size); 389 memcpy(&cso->state, templ, key_size); 434 unsigned key_size = sizeof(struct pipe_depth_stencil_alpha_state); local 435 unsigned hash_key = cso_construct_key((void*)templ, key_size); 439 (void*)templ, key_size); 497 unsigned key_size = sizeof(struct pipe_rasterizer_state); local 498 unsigned hash_key = cso_construct_key((void*)templ, key_size); 821 unsigned key_size, hash_key; local 977 unsigned key_size = sizeof(struct pipe_sampler_state); local [all...] |
/external/bluetooth/bluedroid/stack/gatt/ |
H A D | gatt_db.c | 120 UINT8 key_size) 156 if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) 199 ** key_size: encryption key size. 211 UINT8 key_size) 226 status = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size); 310 ** key_size: encryption key size. 324 UINT8 key_size, 361 status = read_attr_value ((void *)p_attr, 0, &p, FALSE, (UINT16)(*p_len -2), &len, sec_flag, key_size); 595 ** key_size: encryption key size 607 UINT8 key_size, 116 gatts_check_attr_readability(tGATT_ATTR16 *p_attr, UINT16 offset, BOOLEAN read_long, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument 204 read_attr_value(void *p_attr, UINT16 offset, UINT8 **p_data, BOOLEAN read_long, UINT16 mtu, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument 315 gatts_db_read_attr_value_by_type(tGATT_TCB *p_tcb, tGATT_SVC_DB *p_db, UINT8 op_code, BT_HDR *p_rsp, UINT16 s_handle, UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_id, UINT16 *p_cur_handle) argument 600 gatts_read_attr_value_by_handle(tGATT_TCB *p_tcb, tGATT_SVC_DB *p_db, UINT8 op_code, UINT16 handle, UINT16 offset, UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_id) argument 658 gatts_read_attr_perm_check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument 704 gatts_write_attr_perm_check(tGATT_SVC_DB *p_db, UINT8 op_code, UINT16 handle, UINT16 offset, UINT8 *p_data, UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument [all...] |
/external/chromium/net/http/ |
H A D | des.cc | 183 DWORD key_size; member in struct:net::KeyBlob 191 key_blob.key_size = 8; // 64 bits
|
/external/chromium_org/chrome/browser/net/ |
H A D | probe_message.cc | 109 int key_size = sizeof(kEncodingString) - 1; local 113 if (key_pos >= key_size)
|
/external/chromium_org/crypto/ |
H A D | hmac_win.cc | 139 DWORD key_size; member in struct:crypto::KeyBlob 150 key_blob->key_size = static_cast<DWORD>(key_length);
|
/external/chromium_org/net/http/ |
H A D | des.cc | 183 DWORD key_size; member in struct:net::KeyBlob 191 key_blob.key_size = 8; // 64 bits
|