/cts/tests/tests/keystore/src/android/keystore/cts/ |
AuthorizationList.java | 155 private Integer keySize; 199 keySize = Asn1Utils.getIntegerFromAsn1(value); 200 Log.i("Attestation", "Found KEY SIZE, value: " + keySize); 357 return keySize; 492 if (keySize != null) { 493 s.append("\nKeySize: ").append(keySize);
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSecretKeyFactorySpi.java | 88 int keySize; 116 keySize = (int) keySizeUnsigned; 190 keySize,
|
AndroidKeyStoreKeyPairGeneratorSpi.java | 177 public void initialize(int keysize, SecureRandom random) { [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
ProviderServiceTest.java | 104 hm.put("KeySize", "1024"); 114 if (!s.getAttribute("KeySize").equals("1024")) { 115 fail("getAttribute(KeySize) failed");
|
/system/core/libcutils/ |
hashmap.c | 162 int hashmapHash(void* key, size_t keySize) { 163 int h = keySize; 166 for (i = 0; i < keySize; i++) {
|
/system/update_engine/payload_consumer/ |
payload_verifier.cc | 151 unsigned int keysize = RSA_size(rsa); local 152 if (sig_data.size() > 2 * keysize) { 159 brillo::Blob hash_data(keysize);
|
/libcore/ojluni/src/main/java/sun/security/ssl/ |
RSAClientKeyExchange.java | 196 int keySize = KeyUtil.getKeySize(secretKey); 197 if (keySize > 0 && keySize != 384) { // 384 = 48 * 8 201 (keySize/8));
|
CipherSuite.java | 411 final int keySize; 414 // for non-exportable ciphers, this is the same as keySize 426 BulkCipher(String transformation, int keySize, 433 this.description = this.algorithm + "/" + (keySize << 3); 434 this.keySize = keySize; 442 BulkCipher(String transformation, int keySize, 449 this.description = this.algorithm + "/" + (keySize << 3); 450 this.keySize = keySize; [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
iscsidsc.h | 306 HRESULT WINAPI AddIScsiConnectionA(PISCSI_UNIQUE_SESSION_ID UniqueSessionId,PVOID Reserved,ULONG InitiatorPortNumber,PISCSI_TARGET_PORTALA TargetPortal,ISCSI_SECURITY_FLAGS SecurityFlags,PSCSI_LOGIN_OPTIONS LoginOptions,ULONG KeySize,PCHAR Key,PISCSI_UNIQUE_CONNECTION_ID ConnectionId); 307 HRESULT WINAPI AddIScsiConnectionW(PISCSI_UNIQUE_SESSION_ID UniqueSessionId,PVOID Reserved,ULONG InitiatorPortNumber,PISCSI_TARGET_PORTALW TargetPortal,ISCSI_SECURITY_FLAGS SecurityFlags,PSCSI_LOGIN_OPTIONS LoginOptions,ULONG KeySize,PCHAR Key,PISCSI_UNIQUE_CONNECTION_ID ConnectionId); 436 ULONG KeySize, 452 ULONG KeySize,
|
/external/mesa3d/src/gallium/drivers/svga/ |
svga_state_vs.c | 49 unsigned keysize = svga_vs_key_size( a ); local 50 return memcmp( a, b, keysize );
|
/frameworks/native/opengl/libs/EGL/ |
egl_cache.h | 55 void setBlob(const void* key, EGLsizeiANDROID keySize, const void* value, 61 EGLsizeiANDROID getBlob(const void* key, EGLsizeiANDROID keySize,
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpcsvc/ |
key_prot.x | 73 const KEYSIZE = 192; /* KEYSIZE == bit length of key */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpcsvc/ |
key_prot.x | 73 const KEYSIZE = 192; /* KEYSIZE == bit length of key */
|
/system/security/keystore/ |
user_state.cpp | 228 void UserState::generateKeyFromPassword(uint8_t* key, ssize_t keySize, const android::String8& pw, 241 8192, keySize, key);
|
key_store_service.cpp | 273 int32_t keySize, int32_t flags, Vector<sp<KeystoreArg>>* args) { 287 if (keySize == -1) { 288 keySize = EC_DEFAULT_KEY_SIZE; 289 } else if (keySize < EC_MIN_KEY_SIZE || keySize > EC_MAX_KEY_SIZE) { 290 ALOGI("invalid key size %d", keySize); 293 params.params.push_back(keymaster_param_int(KM_TAG_KEY_SIZE, keySize)); 298 if (keySize == -1) { 299 keySize = RSA_DEFAULT_KEY_SIZE; 300 } else if (keySize < RSA_MIN_KEY_SIZE || keySize > RSA_MAX_KEY_SIZE) [all...] |
/external/skia/src/core/ |
SkPictureShader.cpp | 45 static const size_t keySize = sizeof(fPictureID) + 51 SkASSERT(sizeof(uint32_t) * (&fEndOfStruct - &fPictureID) == keySize); 52 this->init(&gBitmapSkaderKeyNamespaceLabel, 0, keySize);
|
/frameworks/av/media/ndk/ |
NdkMediaExtractor.cpp | 345 size_t keysize; local 346 if (meta->findData(kKeyCryptoIV, &type, &key, &keysize)) { 347 if (keysize != 16) {
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/ |
Security_ImplTest.java | 126 put("MyService.MyAlgorithm KeySize", "1024");
|
/external/icu/icu4c/source/i18n/ |
ucol.cpp | 201 int32_t keySize = Collator::fromUCollator(coll)-> 204 UTRACE_DATA2(UTRACE_VERBOSE, "Sort Key = %vb", result, keySize); 205 UTRACE_EXIT_VALUE(keySize); 206 return keySize;
|
/external/tpm2/ |
CpriHash_fp.h | 67 UINT16 keySize, // IN: the size of the HMAC key
|
CpriHash.c | 569 UINT16 keySize, // IN: the size of the HMAC key 581 if(keySize > blockSize) 586 _cpri__UpdateHash(&localState, keySize, key); 593 memcpy(oPadKey->buffer, key, keySize); 594 oPadKey->size = keySize; 600 // if the keySize is smaller than a block, fill the rest with 0x36 [all...] |
/frameworks/base/core/java/android/security/ |
IKeystoreService.aidl | 45 int generate(String name, int uid, int keyType, int keySize, int flags,
|
/frameworks/base/keystore/tests/src/android/security/keystore/ |
AndroidKeyPairGeneratorTest.java | 330 private void assertKeyPairCorrect(KeyPair pair, String alias, String keyType, int keySize, 338 assertEquals("Curve should be what was specified during initialization", keySize, 343 (keySize + 7) & ~7, (rsaPubKey.getModulus().bitLength() + 7) & ~7); 346 assertEquals((keySize + 7) & ~7, (params.getKeysize() + 7) & ~7);
|
/system/core/include/cutils/ |
hashmap.h | 53 int hashmapHash(void* key, size_t keySize);
|
/libcore/luni/src/test/java/libcore/java/security/ |
KeyPairGeneratorTest.java | 184 private static void putKeySize(String algorithm, int keySize) { 191 keySizes.add(keySize); 241 for (int keySize : keySizes) { 242 kpg.initialize(keySize); 246 kpg.initialize(keySize, (SecureRandom) null); 250 kpg.initialize(keySize, new SecureRandom());
|