/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
MyKeyPairGenerator2.java | 35 int keySize; 55 public void initialize(int keysize, SecureRandom random) { 56 if (keysize < 64) { 57 throw new InvalidParameterException("Incorrect keysize parameter"); 59 keySize = keysize;
|
MyKeyPairGenerator1.java | 39 public int keySize; 61 public void initialize(int keysize, SecureRandom random) { 62 if ((keysize < 0) || ((keysize % 100) != 0)) { 63 throw new InvalidParameterException("Incorrect keysize parameter"); 68 keySize = keysize;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
PBESecretKeyFactory.java | 19 private int keySize; 28 int keySize, 36 this.keySize = keySize; 51 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 56 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 60 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 63 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
|
BaseKeyGenerator.java | 19 protected int keySize; 31 this.keySize = this.defaultKeySize = defaultKeySize; 54 int keySize, 63 engine.init(new KeyGenerationParameters(random, keySize));
|
BaseMac.java | 24 private int keySize = 160; 36 int keySize) 41 this.keySize = keySize;
|
BCPBEKey.java | 19 int keySize; 33 int keySize, 42 this.keySize = keySize; 104 return keySize;
|
/external/icu4c/samples/legacy/ |
newcol.cpp | 70 int32_t keySize = 0; 77 keySize = getSortKey_current("ja", data[i], -1, keys[i], 32); 78 fprintf(stderr, "For i=%d, size of sortkey is %d\n", i, keySize);
|
oldcol.cpp | 86 int32_t keySize = 0; 94 keySize = getSortKey_legacy("ja", data[i], -1, keys[i], 32); 95 fprintf(stderr, "For i=%d, size of sortkey is %d\n", i, keySize);
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyPairGenerator2.java | 36 int keySize; 56 public void initialize(int keysize, SecureRandom random) { 57 if (keysize < 64) { 58 throw new InvalidParameterException("Incorrect keysize parameter"); 60 keySize = keysize;
|
MyKeyPairGenerator1.java | 40 public int keySize; 62 public void initialize(int keysize, SecureRandom random) { 63 if ((keysize < 0) || ((keysize % 100) != 0)) { 64 throw new InvalidParameterException("Incorrect keysize parameter"); 69 keySize = keysize;
|
/libcore/support/src/test/java/tests/security/ |
AlgorithmParameterSymmetricHelper.java | 36 private final int keySize; 39 public AlgorithmParameterSymmetricHelper(String algorithmName, int keySize) { 41 this.keySize = keySize; 44 public AlgorithmParameterSymmetricHelper(String algorithmName, String blockmode, int keySize) { 45 this(algorithmName, keySize); 59 generator.init(keySize);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
SHA1.java | 139 int keySize = pbeSpec.getKeyLength(); 141 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 143 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
DES.java | 218 int keySize, 221 super.engineInit(keySize, random); 299 private int keySize; 308 int keySize, 316 this.keySize = keySize; 331 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 336 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 340 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 355 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param) [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
derive.c | 80 unsigned int keySize; /* actual size of cipher keys */ 114 keySize = cipher_def->key_size; 117 if (keySize == 0) { 228 if (!keySize) { 243 buildSSLKey(&key_block[i], keySize, &pwSpec->client.write_key_item, \ 245 i += keySize; 250 buildSSLKey(&key_block[i], keySize, &pwSpec->server.write_key_item, \ 252 i += keySize; 299 buildSSLKey(key_block2, keySize, &pwSpec->client.write_key_item, \ 301 key_block2 += keySize; [all...] |
sslcon.c | 649 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, int keySize, 674 msg[2] = MSB(keySize); 675 msg[3] = LSB(keySize); [all...] |
/libcore/benchmarks/src/benchmarks/regression/ |
CipherBenchmark.java | 78 @Param({"128", "192", "256"}) private int keySize; 107 key = KEY_SIZES.get(keySize); 110 generator.init(keySize); 112 KEY_SIZES.put(keySize, key);
|
/system/core/libutils/ |
BlobCache.cpp | 54 void BlobCache::set(const void* key, size_t keySize, const void* value, 56 if (mMaxKeySize < keySize) { 58 keySize, mMaxKeySize); 66 if (mMaxTotalSize < keySize + valueSize) { 68 "large: %d (limit: %d)", keySize + valueSize, mMaxTotalSize); 71 if (keySize == 0) { 72 ALOGW("set: not caching because keySize is 0"); 80 sp<Blob> dummyKey(new Blob(key, keySize, false)); 87 sp<Blob> keyBlob(new Blob(key, keySize, true)); 89 size_t newTotalSize = mTotalSize + keySize + valueSize [all...] |
/frameworks/wilhelm/tests/examples/ |
slesTestDecodeToBuffQueue.cpp | 465 SLuint32 i, keySize, valueSize; 468 keyInfo = NULL; keySize = 0; 470 result = (*mdExtrItf)->GetKeySize(mdExtrItf, i, &keySize); 474 keyInfo = (SLMetadataInfo*) malloc(keySize); 476 result = (*mdExtrItf)->GetKey(mdExtrItf, i, keySize, keyInfo);
|
slesTestDecodeAac.cpp | 679 SLuint32 keySize, valueSize; 682 keyInfo = NULL; keySize = 0; 684 res = (*mdExtrItf)->GetKeySize(mdExtrItf, i, &keySize); 688 keyInfo = (SLMetadataInfo*) malloc(keySize); 690 res = (*mdExtrItf)->GetKey(mdExtrItf, i, keySize, keyInfo); [all...] |
/system/security/keystore/ |
IKeystoreService.cpp | 288 virtual int32_t generate(const String16& name, int32_t uid, int32_t keyType, int32_t keySize, 296 data.writeInt32(keySize); 709 int32_t keySize = data.readInt32(); 724 int32_t ret = generate(name, uid, keyType, keySize, flags, &args);
|
keystore.cpp | 814 void generateKeyFromPassword(uint8_t* key, ssize_t keySize, const android::String8& pw, 827 saltSize, 8192, keySize, key); [all...] |
/frameworks/ex/variablespeed/jni/ |
variablespeed.cc | 236 SLuint32 i, keySize, valueSize; 240 keySize = valueSize = 0; 241 OpenSL(decoderMetadata, GetKeySize, i, &keySize); 242 keyInfo = static_cast<SLMetadataInfo*>(malloc(keySize)); 244 OpenSL(decoderMetadata, GetKey, i, keySize, keyInfo);
|
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 416 int keySize; 419 keySize = 1024; 421 keySize = 512; 423 keySize = 256; 425 keySize = 256; 432 kpg.initialize(keySize, new SecureRandom()); [all...] |
/external/chromium_org/third_party/mesa/src/src/mesa/main/ |
ff_fragment_shader.cpp | 113 /* NOTE: This array of structs must be last! (see "keySize" below) */ 423 GLuint keySize; 508 keySize = sizeof(*key) - sizeof(key->unit) 511 return keySize; [all...] |
/external/mesa3d/src/mesa/main/ |
ff_fragment_shader.cpp | 113 /* NOTE: This array of structs must be last! (see "keySize" below) */ 423 GLuint keySize; 508 keySize = sizeof(*key) - sizeof(key->unit) 511 return keySize; [all...] |