/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyAlgorithmParameterGeneratorSpi.java | 39 public void engineInit(int keysize, SecureRandom random) { 40 if (keysize < 0) { 41 throw new IllegalArgumentException("keysize < 0");
|
MyKeyPairGeneratorSpi.java | 39 public void initialize(int keysize, SecureRandom random) { 40 if (keysize < 100) { 42 "Invalid keysize: less than 100");
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
BCPBEKey.java | 19 int keySize; 33 int keySize, 42 this.keySize = keySize; 104 return keySize;
|
/libcore/ojluni/src/main/java/javax/crypto/ |
KeyGeneratorSpi.java | 68 * Initializes this key generator for a certain keysize, using the given 71 * @param keysize the keysize. This is an algorithm-specific metric, 75 * @exception InvalidParameterException if the keysize is wrong or not 78 protected abstract void engineInit(int keysize, SecureRandom random);
|
KeyGenerator.java | 53 * <p>All key generators share the concepts of a <i>keysize</i> and a 59 * <code>keysize</code> argument, and uses the SecureRandom implementation 517 * Initializes this key generator for a certain keysize. 527 * @param keysize the keysize. This is an algorithm-specific metric, 530 * @exception InvalidParameterException if the keysize is wrong or not 533 public final void init(int keysize) { 534 init(keysize, JceSecurity.RANDOM); 538 * Initializes this key generator for a certain keysize, using a 541 * @param keysize the keysize. This is an algorithm-specific metric [all...] |
/libcore/ojluni/src/main/java/java/security/ |
KeyPairGeneratorSpi.java | 42 * For example, the <i>Sun</i> provider uses a default modulus size (keysize) 55 * Initializes the key pair generator for a certain keysize, using 58 * @param keysize the keysize. This is an 64 * @exception InvalidParameterException if the <code>keysize</code> is not 67 public abstract void initialize(int keysize, SecureRandom random);
|
KeyPairGenerator.java | 53 * <p>All key pair generators share the concepts of a keysize and a 54 * source of randomness. The keysize is interpreted differently for different 55 * algorithms (e.g., in the case of the <i>DSA</i> algorithm, the keysize 61 * <code>keysize</code> argument, and uses the <code>SecureRandom</code> 72 * <p>If the algorithm is the <i>DSA</i> algorithm, and the keysize (modulus 98 * For example, the <i>Sun</i> provider uses a default modulus size (keysize) 342 * Initializes the key pair generator for a certain keysize using 350 * @param keysize the keysize. This is an 354 * @exception InvalidParameterException if the <code>keysize</code> is no [all...] |
/external/icu/icu4c/source/samples/legacy/ |
newcol.cpp | 70 int32_t keySize = 0; 77 keySize = getSortKey_current("ja", data[i], -1, keys[i], 32); 78 fprintf(stderr, "For i=%d, size of sortkey is %d\n", i, keySize);
|
oldcol.cpp | 86 int32_t keySize = 0; 94 keySize = getSortKey_legacy("ja", data[i], -1, keys[i], 32); 95 fprintf(stderr, "For i=%d, size of sortkey is %d\n", i, keySize);
|
/external/mesa3d/src/mesa/program/ |
prog_cache.h | 53 const void *key, GLuint keysize); 58 const void *key, GLuint keysize, 64 const void *key, GLuint keysize,
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherDESedeTest.java | 24 "DESede", new int[] {112, 168},// Keysize must be 112 or 168. 41 "DESede", new int[] {112, 168},// Keysize must be 112 or 168.
|
CipherDesTest.java | 24 new int[] {56},// Keysize must be 56. 40 new int[] {56},// Keysize must be 56.
|
CipherAesTest.java | 24 new int[] {128, 192, 256}, // Keysize must be 128, 192, 256. 44 new int[] {128, 192, 256}, // Keysize must be 128, 192, 256.
|
/external/curl/tests/certs/scripts/ |
genroot.sh | 18 KEYSIZE=2048 41 echo SERIAL=$SERIAL PREFIX=$PREFIX DURATION=$DURATION KEYSIZE=$KEYSIZE 43 echo "openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout XXX" 44 openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout pass:secret
|
genserv.sh | 18 KEYSIZE=1024 62 echo SERIAL=$SERIAL PREFIX=$PREFIX CAPREFIX=$CAPREFIX DURATION=$DURATION KEYSIZE=$KEYSIZE 65 echo "openssl dhparam -2 -out $PREFIX-sv.dhp $KEYSIZE" 66 $OPENSSL dhparam -2 -out $PREFIX-sv.dhp $KEYSIZE 70 echo "openssl req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.csr -passout XXX" 71 $OPENSSL req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.csr -passout pass:secret
|
/external/tpm2/ |
EncryptDecrypt.c | 28 UINT16 keySize; 61 keySize = symKey->publicArea.parameters.symDetail.sym.keyBits.sym; 63 blockSize = CryptGetSymmetricBlockSize(alg, keySize); 90 keySize, in->mode, key, 100 keySize,
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/ |
Provider_ImplTest.java | 53 hm.put("KeySize", "1024"); 62 if (!p.implementsAlg("Type", "Algorithm", "KeySize", "512")) { 65 if (p.implementsAlg("Type", "Algorithm", "KeySize", "1025")) {
|
/libcore/luni/src/main/java/java/security/ |
security.properties | 64 jdk.certpath.disabledAlgorithms=MD2, MD4, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 160
|
/frameworks/wilhelm/src/itf/ |
IMetadataExtraction.c | 72 SLuint32 index, SLuint32 keySize, SLMetadataInfo *pKey) 83 index, keySize, pKey); 147 SLuint32 keySize, const void *pKey, SLuint32 keyEncoding, 158 thiz->mKeySize = keySize;
|
/libcore/benchmarks/src/benchmarks/regression/ |
CipherBenchmark.java | 74 @Param({"128", "192", "256"}) private int keySize; 104 key = KEY_SIZES.get(keySize); 107 generator.init(keySize); 109 KEY_SIZES.put(keySize, key);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
SecurityTest.java | 215 filter = "MyService.MyAlgorithm KeySize:512"; 219 filter = "MyService.MyAlgorithm KeySize:1025"; 231 filter = "MyService.NoKeySize KeySize:512"; 278 m.put("MyService.MyAlgorithm KeySize", "512"); 280 assertTrue("MyService.MyAlgorithm KeySize:512", Arrays.equals( 284 m.put("MyService.MyAlgorithm KeySize", "1025"); 286 assertNull("MyService.MyAlgorithm KeySize:1025", Security 301 m.put("MyService.NoKeySize KeySize", "512"); 302 assertNull("No KeySize attribute", Security.getProviders(m)); 362 put("MyService.MyAlgorithm KeySize", "1024") [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
SecurityTest.java | 246 filter = "MyService.MyAlgorithm KeySize:512"; 250 filter = "MyService.MyAlgorithm KeySize:1025"; 265 filter = "MyService.NoKeySize KeySize:512"; 313 m.put("MyService.MyAlgorithm KeySize", "512"); 315 assertTrue("MyService.MyAlgorithm KeySize:512", Arrays.equals( 319 m.put("MyService.MyAlgorithm KeySize", "1025"); 321 assertNull("MyService.MyAlgorithm KeySize:1025", Security 336 m.put("MyService.NoKeySize KeySize", "512"); 337 assertNull("No KeySize attribute", Security.getProviders(m)); 426 put("MyService.MyAlgorithm KeySize", "1024") [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLRSAKeyPairGenerator.java | 54 public void initialize(int keysize, SecureRandom random) { 55 this.modulusBits = keysize;
|
/external/jetty/src/java/org/eclipse/jetty/server/ssl/ |
SslCertificates.java | 112 Integer keySize; 119 keySize=cachedInfo.getKeySize(); 125 keySize=new Integer(ServletSSL.deduceKeyLength(cipherSuite)); 129 cachedInfo=new CachedInfo(keySize,certs,idStr); 137 request.setAttribute("javax.servlet.request.key_size",keySize); 151 * effective keySize and the client certificate chain. 159 CachedInfo(Integer keySize, X509Certificate[] certs,String idStr) 161 this._keySize=keySize;
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
KeyGeneratorTest.java | 83 private static void putKeySize(String algorithm, int keySize) { 90 keySizes.add(keySize); 149 for (int keySize : keySizes) { 150 kg.init(keySize); 153 kg.init(keySize, (SecureRandom) null); 156 kg.init(keySize, new SecureRandom());
|