/aosp_15_r20/hardware/interfaces/security/keymint/aidl/vts/performance/ |
H A D | KeyMintBenchmark.cpp | 197 optional<EcCurve> getCurveFromLength(int keySize) { in getCurveFromLength() 212 bool GenerateKey(string transform, int keySize, bool sign = false) { in GenerateKey() 535 #define BENCHMARK_KM(func, transform, keySize) \ argument 537 #define BENCHMARK_KM_MSG(func, transform, keySize, msgSize) \ argument 542 #define BENCHMARK_KM_ALL_MSGS(func, transform, keySize) \ argument 547 #define BENCHMARK_KM_CIPHER(transform, keySize, msgSize) \ argument 552 #define BENCHMARK_KM_ASYM_CIPHER(transform, keySize, msgSize) \ argument 555 #define BENCHMARK_KM_CIPHER_ALL_MSGS(transform, keySize) \ argument 559 #define BENCHMARK_KM_SIGNATURE_ALL_MSGS(transform, keySize) \ argument 564 #define BENCHMARK_KM_ASYM_SIGNATURE_ALL_MSGS(transform, keySize) \ argument [all …]
|
/aosp_15_r20/external/boringssl/src/third_party/wycheproof_testvectors/ |
H A D | ecdsa_test.json | 22 "keySize" : 256, number 2490 "keySize" : 256, number 4958 "keySize" : 224, number 4990 "keySize" : 224, number 5014 "keySize" : 224, number 5038 "keySize" : 224, number 5062 "keySize" : 224, number 5086 "keySize" : 224, number 5110 "keySize" : 224, number 5142 "keySize" : 224, number [all …]
|
H A D | ecdsa_secp224r1_sha224_p1363_test.json | 19 "keySize" : 224, number 805 "keySize" : 224, number 837 "keySize" : 224, number 861 "keySize" : 224, number 885 "keySize" : 224, number 909 "keySize" : 224, number 943 "keySize" : 224, number 977 "keySize" : 224, number 1019 "keySize" : 224, number 1043 "keySize" : 224, number [all …]
|
H A D | ecdsa_brainpoolP224r1_sha224_p1363_test.json | 20 "keySize" : 224, number 806 "keySize" : 224, number 838 "keySize" : 224, number 862 "keySize" : 224, number 886 "keySize" : 224, number 910 "keySize" : 224, number 944 "keySize" : 224, number 978 "keySize" : 224, number 1020 "keySize" : 224, number 1044 "keySize" : 224, number [all …]
|
H A D | ecdsa_webcrypto_test.json | 27 "keySize" : 256, number 1044 "keySize" : 256, number 1083 "keySize" : 256, number 1114 "keySize" : 256, number 1145 "keySize" : 256, number 1176 "keySize" : 256, number 1217 "keySize" : 256, number 1258 "keySize" : 256, number 1299 "keySize" : 256, number 1348 "keySize" : 256, number [all …]
|
H A D | ecdsa_secp224r1_sha256_p1363_test.json | 19 "keySize" : 224, number 1037 "keySize" : 224, number 1069 "keySize" : 224, number 1093 "keySize" : 224, number 1117 "keySize" : 224, number 1141 "keySize" : 224, number 1175 "keySize" : 224, number 1209 "keySize" : 224, number 1251 "keySize" : 224, number 1275 "keySize" : 224, number [all …]
|
/aosp_15_r20/external/wycheproof/keystore-cts/testvectors/ |
H A D | ecdsa_test.json | 22 "keySize" : 256, number 2490 "keySize" : 256, number 4958 "keySize" : 224, number 4990 "keySize" : 224, number 5014 "keySize" : 224, number 5038 "keySize" : 224, number 5062 "keySize" : 224, number 5086 "keySize" : 224, number 5110 "keySize" : 224, number 5142 "keySize" : 224, number [all …]
|
H A D | ecdsa_secp224r1_sha224_p1363_test.json | 19 "keySize" : 224, number 805 "keySize" : 224, number 837 "keySize" : 224, number 861 "keySize" : 224, number 885 "keySize" : 224, number 909 "keySize" : 224, number 943 "keySize" : 224, number 977 "keySize" : 224, number 1019 "keySize" : 224, number 1043 "keySize" : 224, number [all …]
|
H A D | ecdsa_brainpoolP224r1_sha224_p1363_test.json | 20 "keySize" : 224, number 806 "keySize" : 224, number 838 "keySize" : 224, number 862 "keySize" : 224, number 886 "keySize" : 224, number 910 "keySize" : 224, number 944 "keySize" : 224, number 978 "keySize" : 224, number 1020 "keySize" : 224, number 1044 "keySize" : 224, number [all …]
|
H A D | ecdsa_secp224r1_sha256_p1363_test.json | 19 "keySize" : 224, number 1037 "keySize" : 224, number 1069 "keySize" : 224, number 1093 "keySize" : 224, number 1117 "keySize" : 224, number 1141 "keySize" : 224, number 1175 "keySize" : 224, number 1209 "keySize" : 224, number 1251 "keySize" : 224, number 1275 "keySize" : 224, number [all …]
|
H A D | ecdsa_brainpoolP320r1_sha384_p1363_test.json | 19 "keySize" : 320, number 1293 "keySize" : 320, number 1325 "keySize" : 320, number 1349 "keySize" : 320, number 1373 "keySize" : 320, number 1397 "keySize" : 320, number 1431 "keySize" : 320, number 1465 "keySize" : 320, number 1507 "keySize" : 320, number 1531 "keySize" : 320, number [all …]
|
/aosp_15_r20/external/cronet/third_party/rust/chromium_crates_io/vendor/wycheproof-0.4.0/src/data/ |
H A D | ecdsa_test.json | 22 "keySize" : 256, number 2490 "keySize" : 256, number 4958 "keySize" : 224, number 4990 "keySize" : 224, number 5014 "keySize" : 224, number 5038 "keySize" : 224, number 5062 "keySize" : 224, number 5086 "keySize" : 224, number 5110 "keySize" : 224, number 5142 "keySize" : 224, number [all …]
|
H A D | ecdsa_secp224r1_sha224_p1363_test.json | 19 "keySize" : 224, number 805 "keySize" : 224, number 837 "keySize" : 224, number 861 "keySize" : 224, number 885 "keySize" : 224, number 909 "keySize" : 224, number 943 "keySize" : 224, number 977 "keySize" : 224, number 1019 "keySize" : 224, number 1043 "keySize" : 224, number [all …]
|
H A D | ecdsa_brainpoolP224r1_sha224_p1363_test.json | 20 "keySize" : 224, number 806 "keySize" : 224, number 838 "keySize" : 224, number 862 "keySize" : 224, number 886 "keySize" : 224, number 910 "keySize" : 224, number 944 "keySize" : 224, number 978 "keySize" : 224, number 1020 "keySize" : 224, number 1044 "keySize" : 224, number [all …]
|
H A D | ecdsa_webcrypto_test.json | 27 "keySize" : 256, number 1044 "keySize" : 256, number 1083 "keySize" : 256, number 1114 "keySize" : 256, number 1145 "keySize" : 256, number 1176 "keySize" : 256, number 1217 "keySize" : 256, number 1258 "keySize" : 256, number 1299 "keySize" : 256, number 1348 "keySize" : 256, number [all …]
|
H A D | ecdsa_secp224r1_sha256_p1363_test.json | 19 "keySize" : 224, number 1037 "keySize" : 224, number 1069 "keySize" : 224, number 1093 "keySize" : 224, number 1117 "keySize" : 224, number 1141 "keySize" : 224, number 1175 "keySize" : 224, number 1209 "keySize" : 224, number 1251 "keySize" : 224, number 1275 "keySize" : 224, number [all …]
|
/aosp_15_r20/external/cronet/third_party/boringssl/src/third_party/wycheproof_testvectors/ |
H A D | ecdsa_test.json | 22 "keySize" : 256, number 2490 "keySize" : 256, number 4958 "keySize" : 224, number 4990 "keySize" : 224, number 5014 "keySize" : 224, number 5038 "keySize" : 224, number 5062 "keySize" : 224, number 5086 "keySize" : 224, number 5110 "keySize" : 224, number 5142 "keySize" : 224, number [all …]
|
H A D | ecdsa_secp224r1_sha224_p1363_test.json | 19 "keySize" : 224, number 805 "keySize" : 224, number 837 "keySize" : 224, number 861 "keySize" : 224, number 885 "keySize" : 224, number 909 "keySize" : 224, number 943 "keySize" : 224, number 977 "keySize" : 224, number 1019 "keySize" : 224, number 1043 "keySize" : 224, number [all …]
|
H A D | ecdsa_brainpoolP224r1_sha224_p1363_test.json | 20 "keySize" : 224, number 806 "keySize" : 224, number 838 "keySize" : 224, number 862 "keySize" : 224, number 886 "keySize" : 224, number 910 "keySize" : 224, number 944 "keySize" : 224, number 978 "keySize" : 224, number 1020 "keySize" : 224, number 1044 "keySize" : 224, number [all …]
|
H A D | ecdsa_webcrypto_test.json | 27 "keySize" : 256, number 1044 "keySize" : 256, number 1083 "keySize" : 256, number 1114 "keySize" : 256, number 1145 "keySize" : 256, number 1176 "keySize" : 256, number 1217 "keySize" : 256, number 1258 "keySize" : 256, number 1299 "keySize" : 256, number 1348 "keySize" : 256, number [all …]
|
H A D | ecdsa_secp224r1_sha256_p1363_test.json | 19 "keySize" : 224, number 1037 "keySize" : 224, number 1069 "keySize" : 224, number 1093 "keySize" : 224, number 1117 "keySize" : 224, number 1141 "keySize" : 224, number 1175 "keySize" : 224, number 1209 "keySize" : 224, number 1251 "keySize" : 224, number 1275 "keySize" : 224, number [all …]
|
H A D | ecdsa_brainpoolP320r1_sha384_p1363_test.json | 19 "keySize" : 320, number 1293 "keySize" : 320, number 1325 "keySize" : 320, number 1349 "keySize" : 320, number 1373 "keySize" : 320, number 1397 "keySize" : 320, number 1431 "keySize" : 320, number 1465 "keySize" : 320, number 1507 "keySize" : 320, number 1531 "keySize" : 320, number [all …]
|
/aosp_15_r20/external/tink/java_src/src/test/java/com/google/crypto/tink/aead/ |
H A D | AesCtrHmacAeadKeyManagerTest.java | 104 private static AesCtrHmacAeadKeyFormat createKeyFormatForKeySize(int keySize) { in createKeyFormatForKeySize() 155 final int keySize = 32; in deriveKey_size32() local 170 final int keySize = 16; in deriveKey_size16() local 185 int keySize = 32; in deriveKey_handlesDataFragmentationCorrectly() local 216 final int keySize = 32; in deriveKey_notEnoughAesCtrKeyMaterial_throws() local 227 final int keySize = 32; in deriveKey_notEnoughHmacKeyMaterial_throws() local 238 final int keySize = 32; in deriveKey_badVersion_throws() local 263 final int keySize = 32; in deriveKey_justEnoughKeyMaterial() local
|
/aosp_15_r20/hardware/interfaces/keymaster/4.0/vts/performance/ |
H A D | Benchmark.cpp | 138 bool GenerateKey(Algorithm algorithm, int keySize, Digest digest = Digest::NONE, in GenerateKey() 187 bool GenerateKey(string transform, int keySize, bool sign = false) { in GenerateKey() 419 #define BENCHMARK_KM(func, transform, keySize) \ argument 421 #define BENCHMARK_KM_MSG(func, transform, keySize, msgSize) \ argument 426 #define BENCHMARK_KM_ALL_MSGS(func, transform, keySize) \ argument 431 #define BENCHMARK_KM_CIPHER(transform, keySize, msgSize) \ argument 435 #define BENCHMARK_KM_CIPHER_ALL_MSGS(transform, keySize) \ argument 439 #define BENCHMARK_KM_SIGNATURE_ALL_MSGS(transform, keySize) \ argument 447 static void keygen(benchmark::State& state, string transform, int keySize) { in keygen() 484 static void sign(benchmark::State& state, string transform, int keySize, int msgSize) { in sign() [all …]
|
/aosp_15_r20/libcore/ojluni/src/test/java/security/KeyAgreement/ |
H A D | NegativeTest.java | 75 int keySize = 1024; in testDHNegative() local 89 int keySize = 256; in testECDHNegative() local 196 int keySize) throws Exception { in testInvalidKpgAlgo() 216 int keySize) throws Exception { in testInvalidKaAlgo() 236 int keySize) throws Exception { in testInvalidProvider() 342 String kpgAlgo, int keySize) throws Exception { in startKeyAgreement() 370 int[] keySize = new int[]{}; in selectInvalidKeylength() local
|