/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
PBE.java | 188 int keySize, 213 param = generator.generateDerivedParameters(keySize, ivSize); 217 param = generator.generateDerivedParameters(keySize); 343 int keySize) 353 param = generator.generateDerivedMacParameters(keySize); 371 int keySize, 384 param = generator.generateDerivedParameters(keySize, ivSize); 388 param = generator.generateDerivedParameters(keySize); 408 int keySize, 418 param = generator.generateDerivedMacParameters(keySize); [all...] |
/frameworks/native/opengl/libs/EGL/ |
egl_cache.cpp | 63 static void setBlob(const void* key, EGLsizeiANDROID keySize, 65 egl_cache_t::get()->setBlob(key, keySize, value, valueSize); 68 static EGLsizeiANDROID getBlob(const void* key, EGLsizeiANDROID keySize, 70 return egl_cache_t::get()->getBlob(key, keySize, value, valueSize); 134 void egl_cache_t::setBlob(const void* key, EGLsizeiANDROID keySize, 138 if (keySize < 0 || valueSize < 0) { 145 bc->set(key, keySize, value, valueSize); 173 EGLsizeiANDROID egl_cache_t::getBlob(const void* key, EGLsizeiANDROID keySize, 177 if (keySize < 0 || valueSize < 0) { 184 return bc->get(key, keySize, value, valueSize) [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
pem_decrypt.go | 40 keySize int 50 keySize: 8, 56 keySize: 24, 62 keySize: 16, 68 keySize: 24, 74 keySize: 32, 84 out := make([]byte, c.keySize)
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
pem_decrypt.go | 40 keySize int 50 keySize: 8, 56 keySize: 24, 62 keySize: 16, 68 keySize: 24, 74 keySize: 32, 84 out := make([]byte, c.keySize)
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
ProviderServiceTest.java | 90 hm.put("KeySize", "1024"); 98 assertEquals("getAttribute(KeySize) failed", "1024", s 99 .getAttribute("KeySize"));
|
KeyPairGenerator1Test.java | 335 * <code>initialize(int keysize)</code> 336 * <code>initialize(int keysize, SecureRandom random)</code> 340 * InvalidAlgorithmParameterException when parameters keysize or param are 374 * Test for methods: <code>initialize(int keysize)</code> 375 * <code>initialize(int keysize, SecureRandom random)</code> 381 * InvalidAlgorithmParameterException when parameters keysize or param are 419 assertEquals("Incorrect keysize", 100, 420 ((MyKeyPairGenerator1) mKPG).keySize); 449 * Test for methods: <code>initialize(int keysize)</code> 450 * <code>initialize(int keysize, SecureRandom random)</code [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
BouncyCastleProviderConfiguration.java | 135 public DHParameterSpec getDHDefaultParameters(int keySize) 147 if (spec.getP().bitLength() == keySize) 158 if (specs[i].getP().bitLength() == keySize)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/ |
CHANGELOG.txt | 33 - Changed the meaning of the keysize to mean the size of ``n`` rather than 35 RSA keysize. To get the old behaviour, double the keysize when generating a
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLECKeyPairGenerator.java | 69 public void initialize(int keysize, SecureRandom random) { 70 final String name = SIZE_TO_CURVE_NAME.get(keysize); 72 throw new InvalidParameterException("unknown key size " + keysize);
|
/external/lzma/C/ |
Aes.c | 130 void MY_FAST_CALL Aes_SetKey_Enc(UInt32 *w, const Byte *key, unsigned keySize)
133 wSize = keySize + 28;
134 keySize /= 4;
135 w[0] = ((UInt32)keySize / 2) + 3;
138 for (i = 0; i < keySize; i++, key += 4)
144 unsigned rem = i % keySize;
146 t = Ui32(Sbox[gb1(t)] ^ Rcon[i / keySize], Sbox[gb2(t)], Sbox[gb3(t)], Sbox[gb0(t)]);
147 else if (keySize > 6 && rem == 4)
149 w[i] = w[i - keySize] ^ t;
153 void MY_FAST_CALL Aes_SetKey_Dec(UInt32 *w, const Byte *key, unsigned keySize)
[all...] |
/external/mesa3d/src/gallium/auxiliary/translate/ |
translate.h | 141 int keysize = translate_keysize(a); local 143 memset(ptr + keysize, 0, sizeof(*a) - keysize);
|
/external/skia/src/gpu/ |
GrLayerCache.h | 85 const int* key, int keySize, bool copyKey = false) 86 : fKeySize(keySize) 93 int* tempKey = new int[keySize]; 94 memcpy(tempKey, key, keySize*sizeof(int)); 124 int keySize() const { SkASSERT(fFreeKey); return fKeySize; } 157 int keySize, 159 : fKey(pictureID, ctm, key, keySize, true) 194 int keySize() const { return fKey.keySize(); } 315 const int* key, int keySize); [all...] |
/external/mesa3d/src/gallium/auxiliary/util/ |
u_keymap.c | 85 hash(const void *key, unsigned keySize) 89 keySize /= 4; /* convert from bytes to uints */ 92 for (i = 0; i < keySize; i++) { 104 * \param keySize size of the keys in bytes 110 util_new_keymap(unsigned keySize, unsigned maxEntries, 125 map->key_size = keySize;
|
/frameworks/native/opengl/specs/ |
EGL_ANDROID_blob_cache.txt | 78 EGLsizeiANDROID keySize, const void* value, EGLsizeiANDROID valueSize) 86 EGLsizeiANDROID keySize, void* value, EGLsizeiANDROID valueSize) 141 void (*set) (const void* key, EGLsizeiANDROID keySize, 145 respectively, that are to be inserted. <keySize> and <valueSize> specify 160 EGLsizeiANDROID (*get) (const void* key, EGLsizeiANDROID keySize, 163 <key> is a pointer to the beginning of the key. <keySize> specifies the
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyGeneratorTest.java | 118 int keysize = 0; local 125 keyG.init(keysize, null); 139 keyG.init(keysize, null); 332 * Test for <code>init(int keysize)</code> and 333 * <code>init(int keysize, SecureRandom random)</code> methods 334 * Assertion: throws InvalidParameterException if keysize is wrong 395 * <code>init(int keysize, SecureRandom random)</code> methods 396 * <code>init(int keysize)</code> methods
|
/external/icu/icu4c/source/samples/legacy/ |
legacy.cpp | 49 void printKeys(const char *comment, uint8_t keys[][32], int32_t keySize) { 53 for(i = 0; i<keySize; i++) {
|
/external/lzma/CPP/7zip/Crypto/ |
MyAes.cpp | 13 CAesCbcCoder::CAesCbcCoder(bool encodeMode, unsigned keySize):
14 _keySize(keySize),
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyGeneratorSpiTest.java | 59 protected void engineInit(int keysize, SecureRandom random) { 60 super.engineInit(keysize, random);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGenerator1Test.java | 335 * <code>initialize(int keysize)</code> 336 * <code>initialize(int keysize, SecureRandom random)</code> 340 * InvalidAlgorithmParameterException when parameters keysize or param are 374 * Test for methods: <code>initialize(int keysize)</code> 375 * <code>initialize(int keysize, SecureRandom random)</code> 381 * InvalidAlgorithmParameterException when parameters keysize or param are 419 assertEquals("Incorrect keysize", 100, 420 ((MyKeyPairGenerator1) mKPG).keySize); 449 * Test for methods: <code>initialize(int keysize)</code> 450 * <code>initialize(int keysize, SecureRandom random)</code [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyAttestationTest.java | 252 for (int keySize : keySizes) { 256 testRsaAttestations(keySize, challenge, purpose, encryptionPaddingModes); 258 testRsaAttestations(keySize, challenge, purpose, signaturePaddingModes); 339 private void testRsaAttestations(int keySize, byte[] challenge, int purpose, 343 testRsaAttestation(challenge, true /* includeValidityDates */, keySize, purpose, 345 testRsaAttestation(challenge, false /* includeValidityDates */, keySize, purpose, 348 throw new Exception("Failed on key size " + keySize + " challenge [" + 358 private void testRsaAttestation(byte[] challenge, boolean includeValidityDates, int keySize, 367 .setKeySize(keySize) 397 checkRsaKeyDetails(attestation, keySize, purposes, ImmutableSet.copyOf(paddingModes)) [all...] |
/external/apache-harmony/security/src/test/api/java.injected/java/security/ |
ProviderTest.java | 118 p.put("serv.alg KeySize", "11111"); 119 p.put("serv1.alg1 KeySize", "222222"); 150 hm.put("KeySize", "1024"); 161 if (!"1024".equals(p.getProperty("Type.Algorithm KeySize"))) {
|
/external/tpm2/ |
CpriSym_fp.h | 34 #define _cpri__AESDecryptCTR(dOut, keySize, key, iv, dInSize, dIn) \ 35 _cpri__AESEncryptCTR(((BYTE *)dOut), ((UINT32)keySize), ((BYTE *)key), \ 64 #define _cpri__SM4DecryptCTR(dOut, keySize, key, iv, dInSize, dIn) \ 65 _cpri__SM4EncryptCTR(((BYTE *)dOut), ((UINT32)keySize), ((BYTE *)key), \
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherAesWrapTest.java | 29 128, 192, 256}, // Keysize must be 128, 192, 256.
|
CipherDESedeWrapTest.java | 24 new int[] {112, 168}, // Keysize must be 112 or 168.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
DES.java | 217 int keySize, 220 super.engineInit(keySize, random); 298 private int keySize; 307 int keySize, 315 this.keySize = keySize; 330 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 335 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 339 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 354 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param) [all...] |