HomeSort by relevance Sort by last modified time
    Searched refs:keySize (Results 26 - 50 of 315) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/icu/icu4c/source/samples/legacy/
oldcol.cpp 92 int32_t keySize = 0;
100 keySize = getSortKey_legacy("ja", data[i], -1, keys[i], 32);
101 fprintf(stderr, "For i=%d, size of sortkey is %d\n", i, keySize);
legacy.cpp 55 void printKeys(const char *comment, uint8_t keys[][32], int32_t keySize) {
59 for(i = 0; i<keySize; i++) {
  /external/mesa3d/src/gallium/auxiliary/util/
u_keymap.h 45 util_new_keymap(unsigned keySize, unsigned maxEntries,
u_keymap.c 85 hash(const void *key, unsigned keySize)
89 keySize /= 4; /* convert from bytes to uints */
92 for (i = 0; i < keySize; i++) {
104 * \param keySize size of the keys in bytes
110 util_new_keymap(unsigned keySize, unsigned maxEntries,
125 map->key_size = keySize;
  /external/tpm2/
CpriSym_fp.h 34 #define _cpri__AESDecryptCTR(dOut, keySize, key, iv, dInSize, dIn) \
35 _cpri__AESEncryptCTR(((BYTE *)dOut), ((UINT32)keySize), ((BYTE *)key), \
64 #define _cpri__SM4DecryptCTR(dOut, keySize, key, iv, dInSize, dIn) \
65 _cpri__SM4EncryptCTR(((BYTE *)dOut), ((UINT32)keySize), ((BYTE *)key), \
stubs_hash.c 13 UINT16 keySize, // IN: the size of the HMAC key
25 if(keySize > blockSize)
30 _cpri__UpdateHash(&localState, keySize, key);
37 memcpy(oPadKey->buffer, key, keySize);
38 oPadKey->size = keySize;
44 // if the keySize is smaller than a block, fill the rest with 0x36
  /frameworks/ml/nn/driver/cache/nnCache/
nnCache.cpp 75 void NNCache::setBlob(const void* key, ssize_t keySize,
79 if (keySize < 0 || valueSize < 0) {
86 bc->set(key, keySize, value, valueSize);
103 ssize_t NNCache::getBlob(const void* key, ssize_t keySize,
107 if (keySize < 0 || valueSize < 0) {
114 return bc->get(key, keySize, value, valueSize);
119 ssize_t NNCache::getBlob(const void* key, ssize_t keySize,
123 if (keySize < 0) {
130 return bc->get(key, keySize, value, alloc);
  /libcore/benchmarks/src/benchmarks/regression/
CipherBenchmark.java 74 @Param({"128", "192", "256"}) private int keySize;
104 key = KEY_SIZES.get(keySize);
107 generator.init(keySize);
109 KEY_SIZES.put(keySize, key);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
PBES2AlgorithmParameters.java 47 private final int keySize;
56 int keySize,
61 this.keySize = keySize;
137 pbeSpec.getSalt(), pbeSpec.getIterationCount(), keySize, kdf)),
180 16, /* keySize */
191 16, /* keySize */
202 16, /* keySize */
213 16, /* keySize */
224 16, /* keySize */
    [all...]
DES.java 217 int keySize,
220 super.engineInit(keySize, random);
298 private int keySize;
307 int keySize,
315 this.keySize = keySize;
330 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null);
335 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize);
339 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize);
354 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param)
    [all...]
PBEPBKDF2.java 210 int keySize = pbeSpec.getKeyLength();
212 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize);
214 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
219 int keySize = pbeSpec.getKeyLength();
221 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize);
223 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MyKeyPairGenerator1.java 40 public int keySize;
62 public void initialize(int keysize, SecureRandom random) {
63 if ((keysize < 0) || ((keysize % 100) != 0)) {
64 throw new InvalidParameterException("Incorrect keysize parameter");
69 keySize = keysize;
  /frameworks/base/keystore/java/android/security/
KeyPairGeneratorSpec.java 104 * @param keySize size of key to generate
115 public KeyPairGeneratorSpec(Context context, String keyStoreAlias, String keyType, int keySize,
141 mKeySize = keySize;
351 public Builder setKeySize(int keySize) {
352 if (keySize < 0) {
353 throw new IllegalArgumentException("keySize < 0");
355 mKeySize = keySize;
  /frameworks/ml/nn/driver/cache/BlobCache/
BlobCache.h 86 // 0 < keySize
89 void set(const void* key, size_t keySize, const void* value,
108 // 0 < keySize
124 // 0 < keySize
130 size_t get(const void* key, size_t keySize, void* value, size_t valueSize);
131 size_t get(const void* key, size_t keySize, void** value, std::function<void*(size_t)> alloc);
133 size_t get(const void* key, size_t keySize, T** value, std::function<void*(size_t)> alloc) {
135 const size_t size = get(key, keySize, &valueVoid, alloc);
295 // ((sizeof(EntryHeader) + keySize + valueSize) + 3) & ~3
310 // BlobCache::set with a keySize parameter larger than mMaxKeySize wil
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
PBE.java 212 int keySize,
237 param = generator.generateDerivedParameters(keySize, ivSize);
256 param = generator.generateDerivedParameters(keySize);
382 int keySize)
392 param = generator.generateDerivedMacParameters(keySize);
410 int keySize,
423 param = generator.generateDerivedParameters(keySize, ivSize);
427 param = generator.generateDerivedParameters(keySize);
447 int keySize,
457 param = generator.generateDerivedMacParameters(keySize);
    [all...]
  /frameworks/native/opengl/libs/EGL/
egl_cache.cpp 61 static void setBlob(const void* key, EGLsizeiANDROID keySize,
63 egl_cache_t::get()->setBlob(key, keySize, value, valueSize);
66 static EGLsizeiANDROID getBlob(const void* key, EGLsizeiANDROID keySize,
68 return egl_cache_t::get()->getBlob(key, keySize, value, valueSize);
131 void egl_cache_t::setBlob(const void* key, EGLsizeiANDROID keySize,
135 if (keySize < 0 || valueSize < 0) {
142 bc->set(key, keySize, value, valueSize);
159 EGLsizeiANDROID egl_cache_t::getBlob(const void* key, EGLsizeiANDROID keySize,
163 if (keySize < 0 || valueSize < 0) {
170 return bc->get(key, keySize, value, valueSize)
    [all...]
BlobCache.h 54 // 0 < keySize
57 void set(const void* key, size_t keySize, const void* value,
74 // 0 < keySize
76 size_t get(const void* key, size_t keySize, void* value, size_t valueSize);
199 // ((sizeof(EntryHeader) + keySize + valueSize) + 3) & ~3
214 // BlobCache::set with a keySize parameter larger than mMaxKeySize will
  /external/wycheproof/java/com/google/security/wycheproof/testcases/
DhTest.java 255 int keySize = p.bitLength();
256 assertEquals("wrong key size", keySize, expectedKeySize);
263 int minPrivateKeyBits = keySize / 2;
305 // I.e., subgroup confinment attacks can find at least keySize - r.bitLength() bits of the key.
309 assertTrue(minPrivateKeyBits - (keySize - r.bitLength()) > 160);
326 int keySize = 1024;
328 keyGen.initialize(keySize);
330 testKeyPair(keyPair, keySize);
EcKeyTest.java 209 int keySize = EcUtil.fieldSizeInBits(pub.getParams().getCurve());
210 if (keySize < 224) {
211 fail("Expected a default key size of at least 224 bits. Size of generate key is " + keySize);
  /frameworks/wilhelm/src/itf/
IMetadataExtraction.cpp 72 SLuint32 index, SLuint32 keySize, SLMetadataInfo *pKey)
83 index, keySize, pKey);
147 SLuint32 keySize, const void *pKey, SLuint32 keyEncoding,
158 thiz->mKeySize = keySize;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
BouncyCastleProviderConfiguration.java 164 public DHParameterSpec getDHDefaultParameters(int keySize)
176 if (spec.getP().bitLength() == keySize)
187 if (specs[i].getP().bitLength() == keySize)
  /external/lzma/C/
Aes.c 137 void MY_FAST_CALL Aes_SetKey_Enc(UInt32 *w, const Byte *key, unsigned keySize)
140 wSize = keySize + 28;
141 keySize /= 4;
142 w[0] = ((UInt32)keySize / 2) + 3;
145 for (i = 0; i < keySize; i++, key += 4)
151 unsigned rem = i % keySize;
153 t = Ui32(Sbox[gb1(t)] ^ Rcon[i / keySize], Sbox[gb2(t)], Sbox[gb3(t)], Sbox[gb0(t)]);
154 else if (keySize > 6 && rem == 4)
156 w[i] = w[i - keySize] ^ t;
160 void MY_FAST_CALL Aes_SetKey_Dec(UInt32 *w, const Byte *key, unsigned keySize)
    [all...]
  /prebuilts/jdk/jdk8/darwin-x86/jre/lib/security/
java.security 443 # keySize Operator KeyLength
476 # keySize Operator KeyLength
480 # "RSA keySize <= 1024" indicates that any RSA key with key size less
482 # "RSA keySize < 1024, RSA keySize > 2048" indicates that any RSA key
507 # use the following: "RSA keySize == 2048 & denyAfter 2020-02-03"
526 # constraint: "RSA keySize <= 1024 & jdkCA".
529 # property. This requires lower keysize constraints to be specified
530 # before larger keysize constraints of the same algorithm. For example:
531 # "RSA keySize < 1024 & jdkCA, RSA keySize < 2048"
    [all...]
  /prebuilts/jdk/jdk8/linux-x86/jre/lib/security/
java.security 440 # keySize Operator KeyLength
473 # keySize Operator KeyLength
477 # "RSA keySize <= 1024" indicates that any RSA key with key size less
479 # "RSA keySize < 1024, RSA keySize > 2048" indicates that any RSA key
504 # use the following: "RSA keySize == 2048 & denyAfter 2020-02-03"
523 # constraint: "RSA keySize <= 1024 & jdkCA".
526 # property. This requires lower keysize constraints to be specified
527 # before larger keysize constraints of the same algorithm. For example:
528 # "RSA keySize < 1024 & jdkCA, RSA keySize < 2048"
    [all...]
  /external/lzma/CPP/7zip/Crypto/
MyAes.cpp 13 CAesCbcCoder::CAesCbcCoder(bool encodeMode, unsigned keySize):
14 _keySize(keySize),

Completed in 1082 milliseconds

12 3 4 5 6 7 8 91011>>