/external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS5S1ParametersGenerator.java | 58 * @param keySize the size of the key we want (in bits) 63 int keySize) 65 keySize = keySize / 8; 67 if (keySize > digest.getDigestSize()) 70 "Can't generate a derived key " + keySize + " bytes long."); 75 return new KeyParameter(dKey, 0, keySize); 83 * @param keySize the size of the key we want (in bits) 86 * @exception IllegalArgumentException if keySize + ivSize is larger than the base hash size. 89 int keySize, [all...] |
OpenSSLPBEParametersGenerator.java | 82 * @param keySize the size of the key we want (in bits) 87 int keySize) 89 keySize = keySize / 8; 91 byte[] dKey = generateDerivedKey(keySize); 93 return new KeyParameter(dKey, 0, keySize); 101 * @param keySize the size of the key we want (in bits) 104 * @exception IllegalArgumentException if keySize + ivSize is larger than the base hash size. 107 int keySize, 110 keySize = keySize / 8 [all...] |
PKCS5S2ParametersGenerator.java | 105 * @param keySize the size of the key we want (in bits) 109 int keySize) 111 keySize = keySize / 8; 113 byte[] dKey = generateDerivedKey(keySize); 115 return new KeyParameter(dKey, 0, keySize); 123 * @param keySize the size of the key we want (in bits) 128 int keySize, 131 keySize = keySize / 8 [all...] |
PKCS12ParametersGenerator.java | 169 * @param keySize the size of the key we want (in bits) 173 int keySize) 175 keySize = keySize / 8; 177 byte[] dKey = generateDerivedKey(KEY_MATERIAL, keySize); 179 return new KeyParameter(dKey, 0, keySize); 187 * @param keySize the size of the key we want (in bits) 192 int keySize, 195 keySize = keySize / 8 [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyPairGenerator2.java | 36 int keySize; 56 public void initialize(int keysize, SecureRandom random) { 57 if (keysize < 64) { 58 throw new InvalidParameterException("Incorrect keysize parameter"); 60 keySize = keysize;
|
MyKeyPairGenerator1.java | 40 public int keySize; 62 public void initialize(int keysize, SecureRandom random) { 63 if ((keysize < 0) || ((keysize % 100) != 0)) { 64 throw new InvalidParameterException("Incorrect keysize parameter"); 69 keySize = keysize;
|
MyAlgorithmParameterGeneratorSpi.java | 39 public void engineInit(int keysize, SecureRandom random) { 40 if (keysize < 0) { 41 throw new IllegalArgumentException("keysize < 0");
|
MyKeyPairGeneratorSpi.java | 39 public void initialize(int keysize, SecureRandom random) { 40 if (keysize < 100) { 42 "Invalid keysize: less than 100");
|
/libcore/luni/src/main/java/java/security/spec/ |
RSAKeyGenParameterSpec.java | 38 private final int keysize; field in class:RSAKeyGenParameterSpec 46 * @param keysize 51 public RSAKeyGenParameterSpec(int keysize, BigInteger publicExponent) { 52 this.keysize = keysize; 62 return keysize;
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_make_key.c | 30 @param keysize The keysize for the new key (in octets from 20 to 65 bytes) 34 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) 39 for (x = 0; (keysize > ltc_ecc_sets[x].size) && (ltc_ecc_sets[x].size != 0); x++); 40 keysize = ltc_ecc_sets[x].size; 42 if (keysize > ECC_MAXSIZE || ltc_ecc_sets[x].size == 0) { 56 int keysize; local 69 keysize = dp->size; 79 if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) { [all...] |
/libcore/support/src/test/java/tests/security/ |
AlgorithmParameterSymmetricHelper.java | 36 private final int keySize; 39 public AlgorithmParameterSymmetricHelper(String algorithmName, int keySize) { 41 this.keySize = keySize; 44 public AlgorithmParameterSymmetricHelper(String algorithmName, String blockmode, int keySize) { 45 this(algorithmName, keySize); 59 generator.init(keySize);
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JCEPBEKey.java | 19 int keySize; 33 int keySize, 42 this.keySize = keySize; 100 return keySize;
|
JCESecretKeyFactory.java | 112 private int keySize; 121 int keySize, 129 this.keySize = keySize; 144 return new JCEPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 149 param = Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 153 param = Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 156 return new JCEPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param); 169 private int keySize; 178 int keySize, [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 70 * generate derived parameters for a key of length keySize. 72 * @param keySize the length, in bits, of the key required. 75 public abstract CipherParameters generateDerivedParameters(int keySize); 78 * generate derived parameters for a key of length keySize, and 81 * @param keySize the length, in bits, of the key required. 85 public abstract CipherParameters generateDerivedParameters(int keySize, int ivSize); 88 * generate derived parameters for a key of length keySize, specifically 91 * @param keySize the length, in bits, of the key required. 94 public abstract CipherParameters generateDerivedMacParameters(int keySize);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/ |
MyKeyGeneratorSpi.java | 54 protected void engineInit(int keysize, SecureRandom random) { 55 if (keysize <= 77) { 56 throw new IllegalArgumentException("Invalid keysize");
|
/external/webkit/WebKit/mac/WebCoreSupport/ |
WebKeyGenerator.m | 65 UInt32 keySize; 68 keySize = 2048; 71 keySize = 1024; 74 keySize = 512; 81 return [(NSString *)WKSignedPublicKeyAndChallengeString(keySize, (CFStringRef)challenge, (CFStringRef)keyDescription) autorelease];
|
/external/icu4c/samples/legacy/ |
newcol.cpp | 70 int32_t keySize = 0; 77 keySize = getSortKey_current("ja", data[i], -1, keys[i], 32); 78 fprintf(stderr, "For i=%d, size of sortkey is %d\n", i, keySize);
|
oldcol.cpp | 86 int32_t keySize = 0; 94 keySize = getSortKey_legacy("ja", data[i], -1, keys[i], 32); 95 fprintf(stderr, "For i=%d, size of sortkey is %d\n", i, keySize);
|
/libcore/luni/src/main/java/java/security/ |
KeyPairGenerator.java | 180 * @param keysize 183 public void initialize(int keysize) { 184 initialize(keysize, random); 231 * @param keysize 237 public void initialize(int keysize, SecureRandom random) { 277 // implementation of initialize(int keysize, SecureRandom random) 280 public void initialize(int keysize, SecureRandom random) { 281 spiImpl.initialize(keysize, random); 291 // implementation of initialize(int keysize, SecureRandom random)
|
KeyPairGeneratorSpi.java | 47 * @param keysize 52 public abstract void initialize(int keysize, SecureRandom random);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 323 /** min keysize (octets) */ 325 /** max keysize (octets) */ 364 @param keysize [in/out] The size of the key desired and the suggested size 367 int (*keysize)(int *keysize); member in struct:ltc_cipher_descriptor 541 int blowfish_keysize(int *keysize); 551 int rc5_keysize(int *keysize); 561 int rc6_keysize(int *keysize); 571 int rc2_keysize(int *keysize); 581 int saferp_keysize(int *keysize); [all...] |
/external/dropbear/ |
algo.h | 55 unsigned long keysize; member in struct:dropbear_cipher 61 unsigned long keysize; member in struct:dropbear_hash
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherAesTest.java | 34 new int[] {128, 192, 256}, // Keysize must be 128, 192, 256. 59 new int[] {128, 192, 256}, // Keysize must be 128, 192, 256.
|
CipherDESedeTest.java | 34 "DESede", new int[] {112, 168},// Keysize must be 112 or 168. 56 "DESede", new int[] {112, 168},// Keysize must be 112 or 168.
|
CipherDesTest.java | 34 new int[] {56},// Keysize must be 56. 56 new int[] {56},// Keysize must be 56.
|