/external/icu/icu4c/source/samples/legacy/ |
oldcol.cpp | 92 int32_t keySize = 0; 100 keySize = getSortKey_legacy("ja", data[i], -1, keys[i], 32); 101 fprintf(stderr, "For i=%d, size of sortkey is %d\n", i, keySize);
|
legacy.cpp | 55 void printKeys(const char *comment, uint8_t keys[][32], int32_t keySize) { 59 for(i = 0; i<keySize; i++) {
|
/external/mesa3d/src/gallium/auxiliary/util/ |
u_keymap.h | 45 util_new_keymap(unsigned keySize, unsigned maxEntries,
|
u_keymap.c | 85 hash(const void *key, unsigned keySize) 89 keySize /= 4; /* convert from bytes to uints */ 92 for (i = 0; i < keySize; i++) { 104 * \param keySize size of the keys in bytes 110 util_new_keymap(unsigned keySize, unsigned maxEntries, 125 map->key_size = keySize;
|
/external/tpm2/ |
CpriSym_fp.h | 34 #define _cpri__AESDecryptCTR(dOut, keySize, key, iv, dInSize, dIn) \ 35 _cpri__AESEncryptCTR(((BYTE *)dOut), ((UINT32)keySize), ((BYTE *)key), \ 64 #define _cpri__SM4DecryptCTR(dOut, keySize, key, iv, dInSize, dIn) \ 65 _cpri__SM4EncryptCTR(((BYTE *)dOut), ((UINT32)keySize), ((BYTE *)key), \
|
stubs_hash.c | 13 UINT16 keySize, // IN: the size of the HMAC key 25 if(keySize > blockSize) 30 _cpri__UpdateHash(&localState, keySize, key); 37 memcpy(oPadKey->buffer, key, keySize); 38 oPadKey->size = keySize; 44 // if the keySize is smaller than a block, fill the rest with 0x36
|
/frameworks/ml/nn/driver/cache/nnCache/ |
nnCache.cpp | 75 void NNCache::setBlob(const void* key, ssize_t keySize, 79 if (keySize < 0 || valueSize < 0) { 86 bc->set(key, keySize, value, valueSize); 103 ssize_t NNCache::getBlob(const void* key, ssize_t keySize, 107 if (keySize < 0 || valueSize < 0) { 114 return bc->get(key, keySize, value, valueSize); 119 ssize_t NNCache::getBlob(const void* key, ssize_t keySize, 123 if (keySize < 0) { 130 return bc->get(key, keySize, value, alloc);
|
/libcore/benchmarks/src/benchmarks/regression/ |
CipherBenchmark.java | 74 @Param({"128", "192", "256"}) private int keySize; 104 key = KEY_SIZES.get(keySize); 107 generator.init(keySize); 109 KEY_SIZES.put(keySize, key);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
PBES2AlgorithmParameters.java | 47 private final int keySize; 56 int keySize, 61 this.keySize = keySize; 137 pbeSpec.getSalt(), pbeSpec.getIterationCount(), keySize, kdf)), 180 16, /* keySize */ 191 16, /* keySize */ 202 16, /* keySize */ 213 16, /* keySize */ 224 16, /* keySize */ [all...] |
DES.java | 217 int keySize, 220 super.engineInit(keySize, random); 298 private int keySize; 307 int keySize, 315 this.keySize = keySize; 330 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 335 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 339 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 354 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param) [all...] |
PBEPBKDF2.java | 210 int keySize = pbeSpec.getKeyLength(); 212 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 214 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param); 219 int keySize = pbeSpec.getKeyLength(); 221 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 223 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyPairGenerator1.java | 40 public int keySize; 62 public void initialize(int keysize, SecureRandom random) { 63 if ((keysize < 0) || ((keysize % 100) != 0)) { 64 throw new InvalidParameterException("Incorrect keysize parameter"); 69 keySize = keysize;
|
/frameworks/base/keystore/java/android/security/ |
KeyPairGeneratorSpec.java | 104 * @param keySize size of key to generate 115 public KeyPairGeneratorSpec(Context context, String keyStoreAlias, String keyType, int keySize, 141 mKeySize = keySize; 351 public Builder setKeySize(int keySize) { 352 if (keySize < 0) { 353 throw new IllegalArgumentException("keySize < 0"); 355 mKeySize = keySize;
|
/frameworks/ml/nn/driver/cache/BlobCache/ |
BlobCache.h | 86 // 0 < keySize 89 void set(const void* key, size_t keySize, const void* value, 108 // 0 < keySize 124 // 0 < keySize 130 size_t get(const void* key, size_t keySize, void* value, size_t valueSize); 131 size_t get(const void* key, size_t keySize, void** value, std::function<void*(size_t)> alloc); 133 size_t get(const void* key, size_t keySize, T** value, std::function<void*(size_t)> alloc) { 135 const size_t size = get(key, keySize, &valueVoid, alloc); 295 // ((sizeof(EntryHeader) + keySize + valueSize) + 3) & ~3 310 // BlobCache::set with a keySize parameter larger than mMaxKeySize wil [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
PBE.java | 212 int keySize, 237 param = generator.generateDerivedParameters(keySize, ivSize); 256 param = generator.generateDerivedParameters(keySize); 382 int keySize) 392 param = generator.generateDerivedMacParameters(keySize); 410 int keySize, 423 param = generator.generateDerivedParameters(keySize, ivSize); 427 param = generator.generateDerivedParameters(keySize); 447 int keySize, 457 param = generator.generateDerivedMacParameters(keySize); [all...] |
/frameworks/native/opengl/libs/EGL/ |
egl_cache.cpp | 61 static void setBlob(const void* key, EGLsizeiANDROID keySize, 63 egl_cache_t::get()->setBlob(key, keySize, value, valueSize); 66 static EGLsizeiANDROID getBlob(const void* key, EGLsizeiANDROID keySize, 68 return egl_cache_t::get()->getBlob(key, keySize, value, valueSize); 131 void egl_cache_t::setBlob(const void* key, EGLsizeiANDROID keySize, 135 if (keySize < 0 || valueSize < 0) { 142 bc->set(key, keySize, value, valueSize); 159 EGLsizeiANDROID egl_cache_t::getBlob(const void* key, EGLsizeiANDROID keySize, 163 if (keySize < 0 || valueSize < 0) { 170 return bc->get(key, keySize, value, valueSize) [all...] |
BlobCache.h | 54 // 0 < keySize 57 void set(const void* key, size_t keySize, const void* value, 74 // 0 < keySize 76 size_t get(const void* key, size_t keySize, void* value, size_t valueSize); 199 // ((sizeof(EntryHeader) + keySize + valueSize) + 3) & ~3 214 // BlobCache::set with a keySize parameter larger than mMaxKeySize will
|
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
DhTest.java | 255 int keySize = p.bitLength(); 256 assertEquals("wrong key size", keySize, expectedKeySize); 263 int minPrivateKeyBits = keySize / 2; 305 // I.e., subgroup confinment attacks can find at least keySize - r.bitLength() bits of the key. 309 assertTrue(minPrivateKeyBits - (keySize - r.bitLength()) > 160); 326 int keySize = 1024; 328 keyGen.initialize(keySize); 330 testKeyPair(keyPair, keySize);
|
EcKeyTest.java | 209 int keySize = EcUtil.fieldSizeInBits(pub.getParams().getCurve()); 210 if (keySize < 224) { 211 fail("Expected a default key size of at least 224 bits. Size of generate key is " + keySize);
|
/frameworks/wilhelm/src/itf/ |
IMetadataExtraction.cpp | 72 SLuint32 index, SLuint32 keySize, SLMetadataInfo *pKey) 83 index, keySize, pKey); 147 SLuint32 keySize, const void *pKey, SLuint32 keyEncoding, 158 thiz->mKeySize = keySize;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
BouncyCastleProviderConfiguration.java | 164 public DHParameterSpec getDHDefaultParameters(int keySize) 176 if (spec.getP().bitLength() == keySize) 187 if (specs[i].getP().bitLength() == keySize)
|
/external/lzma/C/ |
Aes.c | 137 void MY_FAST_CALL Aes_SetKey_Enc(UInt32 *w, const Byte *key, unsigned keySize)
140 wSize = keySize + 28;
141 keySize /= 4;
142 w[0] = ((UInt32)keySize / 2) + 3;
145 for (i = 0; i < keySize; i++, key += 4)
151 unsigned rem = i % keySize;
153 t = Ui32(Sbox[gb1(t)] ^ Rcon[i / keySize], Sbox[gb2(t)], Sbox[gb3(t)], Sbox[gb0(t)]);
154 else if (keySize > 6 && rem == 4)
156 w[i] = w[i - keySize] ^ t;
160 void MY_FAST_CALL Aes_SetKey_Dec(UInt32 *w, const Byte *key, unsigned keySize)
[all...] |
/prebuilts/jdk/jdk8/darwin-x86/jre/lib/security/ |
java.security | 443 # keySize Operator KeyLength 476 # keySize Operator KeyLength 480 # "RSA keySize <= 1024" indicates that any RSA key with key size less 482 # "RSA keySize < 1024, RSA keySize > 2048" indicates that any RSA key 507 # use the following: "RSA keySize == 2048 & denyAfter 2020-02-03" 526 # constraint: "RSA keySize <= 1024 & jdkCA". 529 # property. This requires lower keysize constraints to be specified 530 # before larger keysize constraints of the same algorithm. For example: 531 # "RSA keySize < 1024 & jdkCA, RSA keySize < 2048" [all...] |
/prebuilts/jdk/jdk8/linux-x86/jre/lib/security/ |
java.security | 440 # keySize Operator KeyLength 473 # keySize Operator KeyLength 477 # "RSA keySize <= 1024" indicates that any RSA key with key size less 479 # "RSA keySize < 1024, RSA keySize > 2048" indicates that any RSA key 504 # use the following: "RSA keySize == 2048 & denyAfter 2020-02-03" 523 # constraint: "RSA keySize <= 1024 & jdkCA". 526 # property. This requires lower keysize constraints to be specified 527 # before larger keysize constraints of the same algorithm. For example: 528 # "RSA keySize < 1024 & jdkCA, RSA keySize < 2048" [all...] |
/external/lzma/CPP/7zip/Crypto/ |
MyAes.cpp | 13 CAesCbcCoder::CAesCbcCoder(bool encodeMode, unsigned keySize):
14 _keySize(keySize),
|