/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/wolf/ |
D | TpmToWolfDesSupport.c | 54 UINT32 keyBits, in TDES_setup() argument 63 if(keyBits == 128) in TDES_setup() 79 UINT32 keyBits, in TDES_setup_encrypt_key() argument 83 return TDES_setup( key, keyBits, skey, DES_ENCRYPTION ); in TDES_setup_encrypt_key() 90 UINT32 keyBits, in TDES_setup_decrypt_key() argument 94 return TDES_setup( key, keyBits, skey, DES_DECRYPTION ); in TDES_setup_decrypt_key()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ |
D | RsaKeyCache.c | 135 TPM_KEY_BITS keySave = publicArea->parameters.rsaDetail.keyBits; in InitializeKeyCache() 141 publicArea->parameters.rsaDetail.keyBits in InitializeKeyCache() 150 publicArea->parameters.rsaDetail.keyBits = keySave; in InitializeKeyCache() 237 int keyBits = publicArea->parameters.rsaDetail.keyBits; in GetCachedRsaKey() local 244 if((s_rsaKeyCache[index].publicModulus.t.size * 8) == keyBits) in GetCachedRsaKey()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/include/prototypes/ |
D | TpmToWolfDesSupport_fp.h | 52 UINT32 keyBits, 61 UINT32 keyBits, 69 UINT32 keyBits,
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/command/Object/ |
D | Object_spt.c | 50 UINT16 keyBits; in GetIV2BSize() local 57 keyBits = CONTEXT_ENCRYPT_KEY_BITS; in GetIV2BSize() 62 keyBits = protector->publicArea.parameters.asymDetail.symmetric.keyBits.sym; in GetIV2BSize() 67 return sizeof(UINT16) + CryptGetSymmetricBlockSize(symAlg, keyBits); in GetIV2BSize() 105 UINT16 *keyBits, // OUT: the symmetric key size in bits in ComputeProtectionKeyParms() argument 118 *keyBits = CONTEXT_ENCRYPT_KEY_BITS; in ComputeProtectionKeyParms() 125 *keyBits = symDef->keyBits.sym; in ComputeProtectionKeyParms() 126 symKey->t.size = (*keyBits + 7) / 8; in ComputeProtectionKeyParms() 822 UINT16 keyBits; in ProduceOuterWrap() local 859 &symAlg, &keyBits, &symKey); in ProduceOuterWrap() [all …]
|
/external/tpm2-tss/test/integration/ |
D | esys-policy-password.int.c | 69 .keyBits = {.aes = 128}, in test_esys_policy_password() 120 .keyBits.aes = 128, in test_esys_policy_password() 125 .keyBits = 2048, in test_esys_policy_password() 181 .keyBits = {.aes = 128}, in test_esys_policy_password() 242 .keyBits.aes = 128, in test_esys_policy_password() 249 .keyBits = 2048, in test_esys_policy_password()
|
D | esys-create-policy-auth.int.c | 53 .keyBits.aes = 128, in test_esys_create_policy_auth() 111 .keyBits.aes = 128, in test_esys_create_policy_auth() 147 .keyBits.aes = 128, in test_esys_create_policy_auth() 152 .keyBits = 2048, in test_esys_create_policy_auth() 227 .keyBits.aes = 128, in test_esys_create_policy_auth() 234 .keyBits = 2048, in test_esys_create_policy_auth()
|
D | esys-create-fail.int.c | 94 .keyBits.aes = 128, in test_esys_create_fail() 132 .keyBits.aes = 128, in test_esys_create_fail() 137 .keyBits = 2048, in test_esys_create_fail() 243 .keyBits.aes = 128, in test_esys_create_fail() 250 .keyBits = 2048, in test_esys_create_fail()
|
D | esys-duplicate.int.c | 88 .keyBits = {.aes = 128}, in test_esys_duplicate() 168 .keyBits.aes = 128, in test_esys_duplicate() 173 .keyBits = 2048, in test_esys_duplicate() 270 .keyBits.aes = 128, in test_esys_duplicate() 277 .keyBits = 2048, in test_esys_duplicate() 338 .keyBits = {.aes = 128}, in test_esys_duplicate() 379 .keyBits = {.aes = 128}, in test_esys_duplicate()
|
D | esys-create-session-auth.int.c | 116 .keyBits.aes = 128, in test_esys_create_session_auth() 154 .keyBits.aes = 128, in test_esys_create_session_auth() 159 .keyBits = 2048, in test_esys_create_session_auth() 222 .keyBits = { .exclusiveOr = TPM2_ALG_SHA1 }, in test_esys_create_session_auth() 226 .keyBits = {.aes = 128}, in test_esys_create_session_auth() 356 .keyBits.aes = 128, in test_esys_create_session_auth() 363 .keyBits = 2048, in test_esys_create_session_auth()
|
D | esys-import.int.c | 85 .keyBits = {.aes = 128}, in test_esys_import() 165 .keyBits.aes = 128, in test_esys_import() 170 .keyBits = 2048, in test_esys_import() 267 .keyBits.aes = 128, in test_esys_import() 274 .keyBits = 2048, in test_esys_import() 339 .keyBits = {.aes = 128}, in test_esys_import() 376 .keyBits = {.aes = 128}, in test_esys_import()
|
D | esys-create-password-auth.int.c | 99 .keyBits.aes = 128, in test_esys_create_password_auth() 137 .keyBits.aes = 128, in test_esys_create_password_auth() 142 .keyBits = 2048, in test_esys_create_password_auth() 243 .keyBits.aes = 128, in test_esys_create_password_auth() 250 .keyBits = 2048, in test_esys_create_password_auth()
|
D | esys-save-and-load-context.int.c | 104 .keyBits.aes = 128, in test_esys_save_and_load_context() 142 .keyBits.aes = 128, in test_esys_save_and_load_context() 147 .keyBits = 2048, in test_esys_save_and_load_context() 248 .keyBits.aes = 128, in test_esys_save_and_load_context() 255 .keyBits = 2048, in test_esys_save_and_load_context()
|
D | esys-testparms.int.c | 40 .keyBits.aes = 128, in test_esys_testparms() 47 .keyBits = 2048, in test_esys_testparms()
|
D | esys-evict-control-serialization.int.c | 95 .keyBits.aes = 128, in test_esys_evict_control_serialization() 100 .keyBits = 2048, in test_esys_evict_control_serialization() 205 .keyBits.aes = 128, in test_esys_evict_control_serialization() 212 .keyBits = 2048, in test_esys_evict_control_serialization()
|
D | esys-object-changeauth.int.c | 74 .keyBits.aes = 128, in test_esys_object_changeauth() 79 .keyBits = 2048, in test_esys_object_changeauth() 171 .keyBits.aes = 128, in test_esys_object_changeauth() 178 .keyBits = 2048, in test_esys_object_changeauth()
|
D | esys-make-credential.int.c | 78 .keyBits = {.aes = 128}, in test_esys_make_credential() 162 .keyBits.aes = 128, in test_esys_make_credential() 167 .keyBits = 2048, in test_esys_make_credential() 253 .keyBits.aes = 128, in test_esys_make_credential() 260 .keyBits = 2048, in test_esys_make_credential()
|
D | esys-createloaded.int.c | 92 .keyBits = {.aes = 128}, in test_esys_createloaded() 130 .keyBits.aes = 128, in test_esys_createloaded() 135 .keyBits = 2048, in test_esys_createloaded() 220 .keyBits.aes = 128, in test_esys_createloaded()
|
D | esys-create-primary-hmac.int.c | 90 .keyBits.aes = 128, in test_esys_create_primary_hmac() 132 .keyBits.aes = 128, in test_esys_create_primary_hmac() 139 .keyBits = 2048, in test_esys_create_primary_hmac()
|
D | esys-policy-authorize.int.c | 88 .keyBits.aes = 128, in test_esys_policy_authorize() 96 .keyBits = 2048, in test_esys_policy_authorize() 139 .keyBits = {.aes = 128}, in test_esys_policy_authorize()
|
D | esys-session-attributes.int.c | 49 .keyBits = { .exclusiveOr = TPM2_ALG_SHA1 }, in test_esys_session_attributes() 84 .keyBits.aes = 128, in test_esys_session_attributes() 91 .keyBits = 2048, in test_esys_session_attributes()
|
/external/wpa_supplicant_8/src/crypto/ |
D | aes-internal.c | 779 int rijndaelKeySetupEnc(u32 rk[], const u8 cipherKey[], int keyBits) in rijndaelKeySetupEnc() argument 789 if (keyBits == 128) { in rijndaelKeySetupEnc() 805 if (keyBits == 192) { in rijndaelKeySetupEnc() 824 if (keyBits == 256) { in rijndaelKeySetupEnc()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ltc/ |
D | TpmToLtcDesSupport.c | 55 UINT32 keyBits, in TDES_setup() argument 63 if(keyBits == 128) in TDES_setup()
|
/external/guava/android/guava-tests/test/com/google/common/hash/ |
D | HashTestUtils.java | 281 int keyBits = 32; in checkNoFunnels() local 285 for (int i = 0; i < keyBits; i++) { in checkNoFunnels() 290 int maxCount = (int) (4 * Math.log(2 * keyBits * hashBits) + 1); in checkNoFunnels() 332 int keyBits = 32; in checkAvalanche() local 334 for (int i = 0; i < keyBits; i++) { in checkAvalanche() 372 int keyBits = 32; in checkNo2BitCharacteristics() local 375 for (int i = 0; i < keyBits; i++) { in checkNo2BitCharacteristics() 376 for (int j = 0; j < keyBits; j++) { in checkNo2BitCharacteristics() 426 int keyBits = 32; in check2BitAvalanche() local 428 for (int bit1 = 0; bit1 < keyBits; bit1++) { in check2BitAvalanche() [all …]
|
/external/guava/guava-tests/test/com/google/common/hash/ |
D | HashTestUtils.java | 281 int keyBits = 32; in checkNoFunnels() local 285 for (int i = 0; i < keyBits; i++) { in checkNoFunnels() 290 int maxCount = (int) (4 * Math.log(2 * keyBits * hashBits) + 1); in checkNoFunnels() 332 int keyBits = 32; in checkAvalanche() local 334 for (int i = 0; i < keyBits; i++) { in checkAvalanche() 372 int keyBits = 32; in checkNo2BitCharacteristics() local 375 for (int i = 0; i < keyBits; i++) { in checkNo2BitCharacteristics() 376 for (int j = 0; j < keyBits; j++) { in checkNo2BitCharacteristics() 426 int keyBits = 32; in check2BitAvalanche() local 428 for (int bit1 = 0; bit1 < keyBits; bit1++) { in check2BitAvalanche() [all …]
|
/external/boringssl/src/util/fipstools/acvp/acvptool/subprocess/ |
D | keyedMac.go | 96 if keyBits := uint32(len(test.KeyHex)) * 4; keyBits != group.KeyBits { 97 …tains key of length %d bits, but expected %d-bit value", group.ID, test.ID, keyBits, group.KeyBits)
|