/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_make_key.c | 30 @param keysize The keysize for the new key (in octets from 20 to 65 bytes) 34 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) 39 for (x = 0; (keysize > ltc_ecc_sets[x].size) && (ltc_ecc_sets[x].size != 0); x++); 40 keysize = ltc_ecc_sets[x].size; 42 if (keysize > ECC_MAXSIZE || ltc_ecc_sets[x].size == 0) { 56 int keysize; local 69 keysize = dp->size; 79 if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) { [all...] |
/libcore/luni/src/main/java/java/security/spec/ |
RSAKeyGenParameterSpec.java | 38 private final int keysize; field in class:RSAKeyGenParameterSpec 46 * @param keysize 51 public RSAKeyGenParameterSpec(int keysize, BigInteger publicExponent) { 52 this.keysize = keysize; 62 return keysize;
|
/external/dropbear/ |
algo.h | 55 unsigned long keysize; member in struct:dropbear_cipher 61 unsigned long keysize; member in struct:dropbear_hash
|
dropbearkey.c | 101 unsigned int keysize; local 197 keysize = bits / 8; 200 keysize = DSS_SIZE; 202 keysize = RSA_SIZE; 209 fprintf(stderr, "Will output %d bit %s secret key to '%s'\n", keysize*8, 222 key->rsakey = gen_rsa_priv_key(keysize); /* 128 bytes = 1024 bit */ 227 key->dsskey = gen_dss_priv_key(keysize); /* 128 bytes = 1024 bit */
|
/bionic/libc/netbsd/nameser/ |
ns_print.c | 631 int mode, err, keysize; local 651 keysize = ns_get16(rdata); rdata += NS_INT16SZ; 652 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
|
/external/openssl/apps/ |
pkeyutl.c | 99 int keysize = -1; local 140 ctx = init_ctx(&keysize, 298 siglen = bio_to_mem(&sig, keysize * 10, sigbio); 310 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
|
rsautl.c | 104 int keysize; local 258 keysize = RSA_size(rsa); 260 rsa_in = OPENSSL_malloc(keysize * 2); 261 rsa_out = OPENSSL_malloc(keysize); 264 rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
|
/external/sqlite/android/ |
sqlite3_android.cpp | 379 uint32_t keysize = result-1; local 380 uint32_t base16Size = keysize*2; 382 base16Encode(base16buf, keybuf, keysize);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyGeneratorTest.java | 137 int keysize = 0; local 144 keyG.init(keysize, null); 158 keyG.init(keysize, null); 398 * Test for <code>init(int keysize)</code> and 399 * <code>init(int keysize, SecureRandom random)</code> methods 400 * Assertion: throws InvalidParameterException if keysize is wrong 500 * <code>init(int keysize, SecureRandom random)</code> methods 501 * <code>init(int keysize)</code> methods
|
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 280 int keysize = 1024; local 282 kpg.initialize(keysize, new SecureRandom());
|
/external/bluetooth/hcidump/parser/ |
lmp.c | 475 uint8_t keysize = LMP_U8(frm); local 478 printf("key size %d\n", keysize);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 323 /** min keysize (octets) */ 325 /** max keysize (octets) */ 364 @param keysize [in/out] The size of the key desired and the suggested size 367 int (*keysize)(int *keysize); member in struct:ltc_cipher_descriptor 541 int blowfish_keysize(int *keysize); 551 int rc5_keysize(int *keysize); 561 int rc6_keysize(int *keysize); 571 int rc2_keysize(int *keysize); 581 int saferp_keysize(int *keysize); [all...] |
/external/openssl/ssl/ |
ssl_lib.c | 2068 int keysize = 0; local [all...] |
/prebuilt/sdk/5/ |
android.jar | |
/prebuilt/sdk/6/ |
android.jar | |
/prebuilt/sdk/8/ |
android.jar | |
/prebuilt/sdk/9/ |
android.jar | |
/prebuilt/sdk/4/ |
android.jar | |
/prebuilt/common/ant/ |
ant.jar | |
/prebuilt/sdk/10/ |
android.jar | |
/prebuilt/sdk/7/ |
android.jar | |