/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/agent/connect/ |
H A D | generate_test.go | 17 keyBits int member 21 {keyType: "rsa", keyBits: 2048}, 22 {keyType: "rsa", keyBits: 4096}, 23 {keyType: "ec", keyBits: 224}, 24 {keyType: "ec", keyBits: 256}, 25 {keyType: "ec", keyBits: 384}, 26 {keyType: "ec", keyBits: 521}, 29 {keyType: "rsa", keyBits: 0}, 32 {keyType: "ec", keyBits: 0}, 33 {keyType: "ec", keyBits: 512}, [all …]
|
H A D | generate.go | 32 func generateRSAKey(keyBits int) (crypto.Signer, string, error) { 35 pk, err := rsa.GenerateKey(rand.Reader, keyBits) 49 func generateECDSAKey(keyBits int) (crypto.Signer, string, error) { 53 switch keyBits { 63 return nil, "", fmt.Errorf("error generating ECDSA private key: unknown curve length %d", keyBits) 85 func GeneratePrivateKeyWithConfig(keyType string, keyBits int) (crypto.Signer, string, error) { 88 return generateRSAKey(keyBits) 90 return generateECDSAKey(keyBits)
|
H A D | testing_ca_test.go | 29 func testCAAndLeaf(t *testing.T, keyType string, keyBits int) { 35 ca := TestCAWithKeyType(t, nil, keyType, keyBits) 61 func testCAAndLeaf_xc(t *testing.T, keyType string, keyBits int) { 67 ca1 := TestCAWithKeyType(t, nil, keyType, keyBits) 68 ca2 := TestCAWithKeyType(t, ca1, keyType, keyBits) 109 t.Run(fmt.Sprintf("TestTestCAAndLeaf-%s-%d", params.keyType, params.keyBits), 111 testCAAndLeaf(t, params.keyType, params.keyBits) 119 t.Run(fmt.Sprintf("TestTestCAAndLeaf_xc-%s-%d", params.keyType, params.keyBits), 121 testCAAndLeaf_xc(t, params.keyType, params.keyBits)
|
/dports/sysutils/consul/consul-1.10.3/agent/connect/ |
H A D | generate_test.go | 17 keyBits int member 21 {keyType: "rsa", keyBits: 2048}, 22 {keyType: "rsa", keyBits: 4096}, 23 {keyType: "ec", keyBits: 224}, 24 {keyType: "ec", keyBits: 256}, 25 {keyType: "ec", keyBits: 384}, 26 {keyType: "ec", keyBits: 521}, 29 {keyType: "rsa", keyBits: 0}, 32 {keyType: "ec", keyBits: 0}, 33 {keyType: "ec", keyBits: 512}, [all …]
|
H A D | generate.go | 32 func generateRSAKey(keyBits int) (crypto.Signer, string, error) { 35 pk, err := rsa.GenerateKey(rand.Reader, keyBits) 49 func generateECDSAKey(keyBits int) (crypto.Signer, string, error) { 53 switch keyBits { 63 return nil, "", fmt.Errorf("error generating ECDSA private key: unknown curve length %d", keyBits) 85 func GeneratePrivateKeyWithConfig(keyType string, keyBits int) (crypto.Signer, string, error) { 88 return generateRSAKey(keyBits) 90 return generateECDSAKey(keyBits)
|
H A D | testing_ca_test.go | 29 func testCAAndLeaf(t *testing.T, keyType string, keyBits int) { 35 ca := TestCAWithKeyType(t, nil, keyType, keyBits) 61 func testCAAndLeaf_xc(t *testing.T, keyType string, keyBits int) { 67 ca1 := TestCAWithKeyType(t, nil, keyType, keyBits) 68 ca2 := TestCAWithKeyType(t, ca1, keyType, keyBits) 113 t.Run(fmt.Sprintf("TestTestCAAndLeaf-%s-%d", params.keyType, params.keyBits), 115 testCAAndLeaf(t, params.keyType, params.keyBits) 127 t.Run(fmt.Sprintf("TestTestCAAndLeaf_xc-%s-%d", params.keyType, params.keyBits), 129 testCAAndLeaf_xc(t, params.keyType, params.keyBits)
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/agent/connect/ |
H A D | generate_test.go | 17 keyBits int member 21 {keyType: "rsa", keyBits: 2048}, 22 {keyType: "rsa", keyBits: 4096}, 23 {keyType: "ec", keyBits: 224}, 24 {keyType: "ec", keyBits: 256}, 25 {keyType: "ec", keyBits: 384}, 26 {keyType: "ec", keyBits: 521}, 29 {keyType: "rsa", keyBits: 0}, 32 {keyType: "ec", keyBits: 0}, 33 {keyType: "ec", keyBits: 512}, [all …]
|
H A D | generate.go | 32 func generateRSAKey(keyBits int) (crypto.Signer, string, error) { 35 pk, err := rsa.GenerateKey(rand.Reader, keyBits) 49 func generateECDSAKey(keyBits int) (crypto.Signer, string, error) { 53 switch keyBits { 63 return nil, "", fmt.Errorf("error generating ECDSA private key: unknown curve length %d", keyBits) 85 func GeneratePrivateKeyWithConfig(keyType string, keyBits int) (crypto.Signer, string, error) { 88 return generateRSAKey(keyBits) 90 return generateECDSAKey(keyBits)
|
H A D | testing_ca_test.go | 29 func testCAAndLeaf(t *testing.T, keyType string, keyBits int) { 35 ca := TestCAWithKeyType(t, nil, keyType, keyBits) 61 func testCAAndLeaf_xc(t *testing.T, keyType string, keyBits int) { 67 ca1 := TestCAWithKeyType(t, nil, keyType, keyBits) 68 ca2 := TestCAWithKeyType(t, ca1, keyType, keyBits) 113 t.Run(fmt.Sprintf("TestTestCAAndLeaf-%s-%d", params.keyType, params.keyBits), 115 testCAAndLeaf(t, params.keyType, params.keyBits) 127 t.Run(fmt.Sprintf("TestTestCAAndLeaf_xc-%s-%d", params.keyType, params.keyBits), 129 testCAAndLeaf_xc(t, params.keyType, params.keyBits)
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/agent/connect/ |
H A D | generate_test.go | 17 keyBits int member 21 {keyType: "rsa", keyBits: 2048}, 22 {keyType: "rsa", keyBits: 4096}, 23 {keyType: "ec", keyBits: 224}, 24 {keyType: "ec", keyBits: 256}, 25 {keyType: "ec", keyBits: 384}, 26 {keyType: "ec", keyBits: 521}, 29 {keyType: "rsa", keyBits: 0}, 32 {keyType: "ec", keyBits: 0}, 33 {keyType: "ec", keyBits: 512}, [all …]
|
H A D | generate.go | 32 func generateRSAKey(keyBits int) (crypto.Signer, string, error) { 35 pk, err := rsa.GenerateKey(rand.Reader, keyBits) 49 func generateECDSAKey(keyBits int) (crypto.Signer, string, error) { 53 switch keyBits { 63 return nil, "", fmt.Errorf("error generating ECDSA private key: unknown curve length %d", keyBits) 85 func GeneratePrivateKeyWithConfig(keyType string, keyBits int) (crypto.Signer, string, error) { 88 return generateRSAKey(keyBits) 90 return generateECDSAKey(keyBits)
|
H A D | testing_ca_test.go | 29 func testCAAndLeaf(t *testing.T, keyType string, keyBits int) { 35 ca := TestCAWithKeyType(t, nil, keyType, keyBits) 61 func testCAAndLeaf_xc(t *testing.T, keyType string, keyBits int) { 67 ca1 := TestCAWithKeyType(t, nil, keyType, keyBits) 68 ca2 := TestCAWithKeyType(t, ca1, keyType, keyBits) 113 t.Run(fmt.Sprintf("TestTestCAAndLeaf-%s-%d", params.keyType, params.keyBits), 115 testCAAndLeaf(t, params.keyType, params.keyBits) 127 t.Run(fmt.Sprintf("TestTestCAAndLeaf_xc-%s-%d", params.keyType, params.keyBits), 129 testCAAndLeaf_xc(t, params.keyType, params.keyBits)
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/agent/connect/ |
H A D | generate_test.go | 17 keyBits int member 24 {keyType: "rsa", keyBits: 2048}, 25 {keyType: "rsa", keyBits: 4096}, 26 {keyType: "ec", keyBits: 224}, 27 {keyType: "ec", keyBits: 256}, 28 {keyType: "ec", keyBits: 384}, 29 {keyType: "ec", keyBits: 521}, 32 {keyType: "rsa", keyBits: 0}, 35 {keyType: "ec", keyBits: 0}, 36 {keyType: "ec", keyBits: 512}, [all …]
|
H A D | testing_ca_test.go | 20 {keyType: "rsa", keyBits: 2048}, 21 {keyType: "rsa", keyBits: 4096}, 22 {keyType: "ec", keyBits: 224}, 23 {keyType: "ec", keyBits: 256}, 24 {keyType: "ec", keyBits: 384}, 25 {keyType: "ec", keyBits: 521}, 42 ca := TestCAWithKeyType(t, nil, keyType, keyBits) 77 ca1 := TestCAWithKeyType(t, nil, keyType, keyBits) 78 ca2 := TestCAWithKeyType(t, ca1, keyType, keyBits) 121 testCAAndLeaf(t, params.keyType, params.keyBits) [all …]
|
H A D | generate.go | 32 func generateRSAKey(keyBits int) (crypto.Signer, string, error) { 35 pk, err := rsa.GenerateKey(rand.Reader, keyBits) 49 func generateECDSAKey(keyBits int) (crypto.Signer, string, error) { 53 switch keyBits { 63 return nil, "", fmt.Errorf("error generating ECDSA private key: unknown curve length %d", keyBits) 85 func GeneratePrivateKeyWithConfig(keyType string, keyBits int) (crypto.Signer, string, error) { 88 return generateRSAKey(keyBits) 90 return generateECDSAKey(keyBits)
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/blink/renderer/platform/wtf/ |
H A D | bloom_filter.h | 36 template <unsigned keyBits> 43 static const size_t kTableSize = 1 << keyBits; 44 static const unsigned kKeyMask = (1 << keyBits) - 1; 81 template <unsigned keyBits> 91 template <unsigned keyBits> 104 template <unsigned keyBits> 105 inline void BloomFilter<keyBits>::Clear() { in Clear() 110 template <unsigned keyBits> 111 bool BloomFilter<keyBits>::LikelyEmpty() const { in LikelyEmpty() 119 template <unsigned keyBits> [all …]
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/blink/renderer/platform/wtf/ |
H A D | bloom_filter.h | 36 template <unsigned keyBits> 43 static const size_t kTableSize = 1 << keyBits; 44 static const unsigned kKeyMask = (1 << keyBits) - 1; 81 template <unsigned keyBits> 91 template <unsigned keyBits> 104 template <unsigned keyBits> 105 inline void BloomFilter<keyBits>::Clear() { in Clear() 110 template <unsigned keyBits> 111 bool BloomFilter<keyBits>::LikelyEmpty() const { in LikelyEmpty() 119 template <unsigned keyBits> [all …]
|
/dports/converters/wkhtmltopdf/qt-5db36ec/src/3rdparty/webkit/Source/JavaScriptCore/wtf/ |
H A D | BloomFilter.h | 37 template <unsigned keyBits> 42 static const size_t tableSize = 1 << keyBits; 82 template <unsigned keyBits> 83 inline void BloomFilter<keyBits>::add(unsigned hash) in add() 93 template <unsigned keyBits> 107 template <unsigned keyBits> 108 inline void BloomFilter<keyBits>::clear() in clear() 114 template <unsigned keyBits> 115 bool BloomFilter<keyBits>::likelyEmpty() const in likelyEmpty() 124 template <unsigned keyBits> [all …]
|
/dports/net-p2p/vuze/vuze-5.7.4.0_2/org/gudy/bouncycastle/openssl/ |
H A D | PEMUtilities.java | 78 int keyBits = 128; in crypt() local 81 keyBits = 40; in crypt() 85 keyBits = 64; in crypt() 87 sKey = getKey(password, alg, keyBits / 8, iv); in crypt() 90 paramSpec = new RC2ParameterSpec(keyBits); in crypt() 94 paramSpec = new RC2ParameterSpec(keyBits, iv); in crypt() 107 int keyBits; in crypt() local 110 keyBits = 128; in crypt() 114 keyBits = 192; in crypt() 118 keyBits = 256; in crypt() [all …]
|
/dports/net/traefik/traefik-2.6.1/vendor/github.com/hashicorp/consul/agent/connect/ |
H A D | generate.go | 32 func generateRSAKey(keyBits int) (crypto.Signer, string, error) { 35 pk, err := rsa.GenerateKey(rand.Reader, keyBits) 49 func generateECDSAKey(keyBits int) (crypto.Signer, string, error) { 53 switch keyBits { 63 return nil, "", fmt.Errorf("error generating ECDSA private key: unknown curve length %d", keyBits) 85 func GeneratePrivateKeyWithConfig(keyType string, keyBits int) (crypto.Signer, string, error) { 88 return generateRSAKey(keyBits) 90 return generateECDSAKey(keyBits)
|
/dports/security/ccrypt/ccrypt-1.11/check/ |
H A D | rijndael-alg-ref.c | 142 int rijndaelKeySched (word8 k[4][MAXKC], int keyBits, int blockBits, word8 W[MAXROUNDS+1][4][MAXBC]… in rijndaelKeySched() argument 150 switch (keyBits) { in rijndaelKeySched() 164 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelKeySched() 204 int rijndaelEncrypt (word8 a[4][MAXBC], int keyBits, int blockBits, word8 rk[MAXROUNDS+1][4][MAXBC]) in rijndaelEncrypt() argument 217 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelEncrypt() 248 int rijndaelEncryptRound (word8 a[4][MAXBC], int keyBits, int blockBits, in rijndaelEncryptRound() argument 263 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelEncryptRound() 298 int rijndaelDecrypt (word8 a[4][MAXBC], int keyBits, int blockBits, word8 rk[MAXROUNDS+1][4][MAXBC]) in rijndaelDecrypt() argument 309 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelDecrypt() 350 int rijndaelDecryptRound (word8 a[4][MAXBC], int keyBits, int blockBits, in rijndaelDecryptRound() argument [all …]
|
/dports/irc/scrollz/ScrollZ-ScrollZ-2.3/source/ |
H A D | rijndael-alg-ref.c | 118 int rijndaelKeySched (word8 k[4][MAXKC], int keyBits, int blockBits, word8 W[MAXROUNDS+1][4][MAXBC]… in rijndaelKeySched() argument 126 switch (keyBits) { in rijndaelKeySched() 140 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelKeySched() 180 int rijndaelEncrypt (word8 a[4][MAXBC], int keyBits, int blockBits, word8 rk[MAXROUNDS+1][4][MAXBC]) in rijndaelEncrypt() argument 193 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelEncrypt() 224 int rijndaelEncryptRound (word8 a[4][MAXBC], int keyBits, int blockBits, in rijndaelEncryptRound() argument 239 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelEncryptRound() 274 int rijndaelDecrypt (word8 a[4][MAXBC], int keyBits, int blockBits, word8 rk[MAXROUNDS+1][4][MAXBC]) in rijndaelDecrypt() argument 285 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelDecrypt() 326 int rijndaelDecryptRound (word8 a[4][MAXBC], int keyBits, int blockBits, in rijndaelDecryptRound() argument [all …]
|
/dports/irc/ircII/ircii-20210314/source/rijndael/ |
H A D | rijndael-alg-ref.c | 115 int rijndaelKeySched (word8 k[4][MAXKC], int keyBits, int blockBits, word8 W[MAXROUNDS+1][4][MAXBC]… in rijndaelKeySched() argument 123 switch (keyBits) { in rijndaelKeySched() 137 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelKeySched() 177 int rijndaelEncrypt (word8 a[4][MAXBC], int keyBits, int blockBits, word8 rk[MAXROUNDS+1][4][MAXBC]) in rijndaelEncrypt() argument 190 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelEncrypt() 221 int rijndaelEncryptRound (word8 a[4][MAXBC], int keyBits, int blockBits, in rijndaelEncryptRound() argument 236 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelEncryptRound() 271 int rijndaelDecrypt (word8 a[4][MAXBC], int keyBits, int blockBits, word8 rk[MAXROUNDS+1][4][MAXBC]) in rijndaelDecrypt() argument 282 switch (keyBits >= blockBits ? keyBits : blockBits) { in rijndaelDecrypt() 323 int rijndaelDecryptRound (word8 a[4][MAXBC], int keyBits, int blockBits, in rijndaelDecryptRound() argument [all …]
|
/dports/security/softhsm2/softhsm-2.6.1/src/lib/crypto/ |
H A D | BotanDES.cpp | 129 ByteString keyBits; in generateKey() local 132 if (!rng->generateRandom(keyBits, key.getBitLen()/7)) in generateKey() 139 for (i = 0; i < keyBits.size(); i++) in generateKey() 141 keyBits[i] = odd_parity[keyBits[i]]; in generateKey() 145 return key.setKeyBits(keyBits); in generateKey()
|
H A D | OSSLDES.cpp | 142 ByteString keyBits; in generateKey() local 145 if (!rng->generateRandom(keyBits, key.getBitLen()/7)) in generateKey() 152 for (i = 0; i < keyBits.size(); i++) in generateKey() 154 keyBits[i] = odd_parity[keyBits[i]]; in generateKey() 157 return key.setKeyBits(keyBits); in generateKey()
|