/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_make_key.c | 30 @param keysize The keysize for the new key (in octets from 20 to 65 bytes) 34 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) 39 for (x = 0; (keysize > ltc_ecc_sets[x].size) && (ltc_ecc_sets[x].size != 0); x++); 40 keysize = ltc_ecc_sets[x].size; 42 if (keysize > ECC_MAXSIZE || ltc_ecc_sets[x].size == 0) { 56 int keysize; local 69 keysize = dp->size; 79 if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) { [all...] |
/libcore/luni/src/main/java/java/security/spec/ |
RSAKeyGenParameterSpec.java | 38 private final int keysize; field in class:RSAKeyGenParameterSpec 46 * @param keysize 51 public RSAKeyGenParameterSpec(int keysize, BigInteger publicExponent) { 52 this.keysize = keysize; 62 return keysize;
|
/external/dropbear/ |
algo.h | 55 unsigned long keysize; member in struct:dropbear_cipher 61 unsigned long keysize; member in struct:dropbear_hash
|
dropbearkey.c | 101 unsigned int keysize; local 197 keysize = bits / 8; 200 keysize = DSS_SIZE; 202 keysize = RSA_SIZE; 209 fprintf(stderr, "Will output %d bit %s secret key to '%s'\n", keysize*8, 222 key->rsakey = gen_rsa_priv_key(keysize); /* 128 bytes = 1024 bit */ 227 key->dsskey = gen_dss_priv_key(keysize); /* 128 bytes = 1024 bit */
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
BlockCipherFactory.java | 23 int keysize; field in class:BlockCipherFactory.CipherEntry 26 public CipherEntry(String type, int blockSize, int keySize, String cipherClass) 30 this.keysize = keySize; 128 return ce.keysize;
|
/system/vold/ |
cryptfs.h | 20 * The keysize field tells how long the key is, in bytes. 51 __le32 keysize; /* in bytes */ member in struct:crypt_mnt_ftr
|
/bionic/libc/netbsd/nameser/ |
ns_print.c | 631 int mode, err, keysize; local 651 keysize = ns_get16(rdata); rdata += NS_INT16SZ; 652 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyGeneratorTest.java | 119 int keysize = 0; local 126 keyG.init(keysize, null); 140 keyG.init(keysize, null); 332 * Test for <code>init(int keysize)</code> and 333 * <code>init(int keysize, SecureRandom random)</code> methods 334 * Assertion: throws InvalidParameterException if keysize is wrong 395 * <code>init(int keysize, SecureRandom random)</code> methods 396 * <code>init(int keysize)</code> methods
|
/external/mdnsresponder/mDNSShared/ |
dnssd_clientlib.c | 211 unsigned long keysize, keyvalsize; local 214 keysize = (unsigned long)(k - key); 215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); 216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); 233 memcpy(p, key, keysize); 234 p += keysize;
|
/external/openssl/apps/ |
pkeyutl.c | 99 int keysize = -1; local 140 ctx = init_ctx(&keysize, 298 siglen = bio_to_mem(&sig, keysize * 10, sigbio); 310 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
|
rsautl.c | 104 int keysize; local 258 keysize = RSA_size(rsa); 260 rsa_in = OPENSSL_malloc(keysize * 2); 261 rsa_out = OPENSSL_malloc(keysize); 264 rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
|
/hardware/samsung_slsi/exynos5/libkeymaster/ |
tlcTeeKeymaster_if.h | 123 uint32_t keysize; /**< Key size, e.g. 1024, 2048 */ member in struct:__anon21245 142 * @param keySize [in] Key size 150 uint32_t keySize,
|
tlTeeKeymaster_Api.h | 83 uint32_t keysize; /**< Key size in bits, e.g. 1024, 2048,.. */ member in struct:__anon21223 187 uint32_t keysize; /**< RSA key size */ member in struct:__anon21231
|
/external/sqlite/android/ |
sqlite3_android.cpp | 369 uint32_t keysize = result-1; local 370 uint32_t base16Size = keysize*2; 372 base16Encode(base16buf, keybuf, keysize);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyGeneratorTest.java | 124 int keysize = 0; local 131 keyG.init(keysize, null); 145 keyG.init(keysize, null); 337 * Test for <code>init(int keysize)</code> and 338 * <code>init(int keysize, SecureRandom random)</code> methods 339 * Assertion: throws InvalidParameterException if keysize is wrong 406 * <code>init(int keysize, SecureRandom random)</code> methods 407 * <code>init(int keysize)</code> methods
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 323 /** min keysize (octets) */ 325 /** max keysize (octets) */ 364 @param keysize [in/out] The size of the key desired and the suggested size 367 int (*keysize)(int *keysize); member in struct:ltc_cipher_descriptor 541 int blowfish_keysize(int *keysize); 551 int rc5_keysize(int *keysize); 561 int rc6_keysize(int *keysize); 571 int rc2_keysize(int *keysize); 581 int saferp_keysize(int *keysize); [all...] |
/external/openssl/ssl/ |
ssl_lib.c | 2260 int keysize = 0; local [all...] |
/frameworks/av/media/libstagefright/ |
MPEG4Extractor.cpp | 2315 size_t keysize; local [all...] |
/prebuilts/devtools/tools/lib/ |
jobb.jar | |
/prebuilts/sdk/11/ |
android.jar | |
/prebuilts/sdk/13/ |
android.jar | |
/prebuilts/sdk/16/ |
android.jar | |
/prebuilts/sdk/5/ |
android.jar | |
/prebuilts/sdk/6/ |
android.jar | |
/prebuilts/sdk/8/ |
android.jar | |