/external/tpm2/ |
EncryptDecrypt.c | 28 UINT16 keySize; 61 keySize = symKey->publicArea.parameters.symDetail.sym.keyBits.sym; 63 blockSize = CryptGetSymmetricBlockSize(alg, keySize); 90 keySize, in->mode, key, 100 keySize,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
PBESecretKeyFactory.java | 19 private int keySize; 28 int keySize, 36 this.keySize = keySize; 51 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 56 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 60 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 63 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
|
BaseKeyGenerator.java | 19 protected int keySize; 31 this.keySize = this.defaultKeySize = defaultKeySize; 54 int keySize, 63 engine.init(new KeyGenerationParameters(random, keySize));
|
BCPBEKey.java | 19 int keySize; 33 int keySize, 42 this.keySize = keySize; 104 return keySize;
|
BaseMac.java | 42 private int keySize = 160; 54 int keySize) 59 this.keySize = keySize; 103 int keySize = 160; 108 // keySize = 256; 120 keySize = 224; 125 keySize = 256; 130 keySize = 384; 135 keySize = 512 [all...] |
/external/icu/icu4c/source/samples/legacy/ |
newcol.cpp | 76 int32_t keySize = 0; 83 keySize = getSortKey_current("ja", data[i], -1, keys[i], 32); 84 fprintf(stderr, "For i=%d, size of sortkey is %d\n", i, keySize);
|
oldcol.cpp | 92 int32_t keySize = 0; 100 keySize = getSortKey_legacy("ja", data[i], -1, keys[i], 32); 101 fprintf(stderr, "For i=%d, size of sortkey is %d\n", i, keySize);
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyPairGenerator2.java | 36 int keySize; 56 public void initialize(int keysize, SecureRandom random) { 57 if (keysize < 64) { 58 throw new InvalidParameterException("Incorrect keysize parameter"); 60 keySize = keysize;
|
MyKeyPairGenerator1.java | 40 public int keySize; 62 public void initialize(int keysize, SecureRandom random) { 63 if ((keysize < 0) || ((keysize % 100) != 0)) { 64 throw new InvalidParameterException("Incorrect keysize parameter"); 69 keySize = keysize;
|
/libcore/support/src/test/java/tests/security/ |
AlgorithmParameterSymmetricHelper.java | 36 private final int keySize; 39 public AlgorithmParameterSymmetricHelper(String algorithmName, int keySize) { 41 this.keySize = keySize; 44 public AlgorithmParameterSymmetricHelper(String algorithmName, String blockmode, int keySize) { 45 this(algorithmName, keySize); 52 generator.init(keySize);
|
/external/nos/host/android/hals/keymaster/ |
import_key.cpp | 64 const uint32_t *keySize = nullptr; 67 keySize = &v[0].f.integer; 91 if (keySize != nullptr && parsedKeySize != *keySize) {
|
/frameworks/base/libs/hwui/pipeline/skia/ |
ShaderCache.cpp | 69 size_t keySize = key.size(); 82 size_t valueSize = bc->get(key.data(), keySize, valueBuffer, mObservedBlobValueSize); 92 valueSize = bc->get(key.data(), keySize, valueBuffer, mObservedBlobValueSize); 116 size_t keySize = key.size(); 117 if (keySize == 0 || valueSize == 0 || valueSize >= maxValueSize) { 118 ALOGW("ShaderCache::store: sizes %d %d not allowed", (int)keySize, (int)valueSize); 125 bc->set(key.data(), keySize, value, valueSize);
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSecretKeyFactorySpi.java | 91 int keySize; 119 keySize = (int) keySizeUnsigned; 198 keySize,
|
/frameworks/ml/nn/driver/cache/BlobCache/ |
BlobCache.cpp | 79 void BlobCache::set(const void* key, size_t keySize, const void* value, 81 if (mMaxKeySize < keySize) { 83 keySize, mMaxKeySize); 91 if (mMaxTotalSize < keySize + valueSize) { 93 "large: %zu (limit: %zu)", keySize + valueSize, mMaxTotalSize); 96 if (keySize == 0) { 97 ALOGW("set: not caching because keySize is 0"); 105 std::shared_ptr<Blob> dummyKey(new Blob(key, keySize, false)); 112 std::shared_ptr<Blob> keyBlob(new Blob(key, keySize, true)); 114 size_t newEntrySize = keySize + valueSize [all...] |
/frameworks/ml/nn/driver/cache/nnCache/ |
nnCache_test.cpp | 200 const size_t keySize = strlen(key); 204 ASSERT_EQ(ssize_t(valueSize), mCache->getBlob(key, keySize, buf, sizeof(buf))); 216 const size_t keySize = strlen(key); 218 ASSERT_EQ(ssize_t(0), mCache->getBlob(key, keySize, buf, sizeof(buf)));
|
/system/security/keystore/ |
user_state.cpp | 224 void UserState::generateKeyFromPassword(uint8_t* key, ssize_t keySize, const android::String8& pw, 237 8192, keySize, key);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
DES.java | 219 int keySize, 222 super.engineInit(keySize, random); 300 private int keySize; 309 int keySize, 317 this.keySize = keySize; 332 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 337 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 341 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 356 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param) [all...] |
PBEPBKDF2.java | 210 int keySize = pbeSpec.getKeyLength(); 212 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 214 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param); 219 int keySize = pbeSpec.getKeyLength(); 221 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 223 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
|
PBES2AlgorithmParameters.java | 47 private final int keySize; 56 int keySize, 61 this.keySize = keySize; 137 pbeSpec.getSalt(), pbeSpec.getIterationCount(), keySize, kdf)), 180 16, /* keySize */ 191 16, /* keySize */ 202 16, /* keySize */ 213 16, /* keySize */ 224 16, /* keySize */ [all...] |
/external/icu/icu4c/source/i18n/ |
ucol.cpp | 203 int32_t keySize = Collator::fromUCollator(coll)-> 206 UTRACE_DATA2(UTRACE_VERBOSE, "Sort Key = %vb", result, keySize); 207 UTRACE_EXIT_VALUE(keySize); 208 return keySize;
|
/external/skia/src/ports/ |
SkFontMgr_FontConfigInterface.cpp | 76 SkASSERT(SkTAddOffset<char>(this, sizeof(SkResourceCache::Key) + keySize) == content); 84 this->init(nullptr, 0, keySize + contentLen); 88 static const size_t keySize = sizeof(fStyle);
|
/external/skqp/src/ports/ |
SkFontMgr_FontConfigInterface.cpp | 76 SkASSERT(SkTAddOffset<char>(this, sizeof(SkResourceCache::Key) + keySize) == content); 84 this->init(nullptr, 0, keySize + contentLen); 88 static const size_t keySize = sizeof(fStyle);
|
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
DhTest.java | 255 int keySize = p.bitLength(); 256 assertEquals("wrong key size", keySize, expectedKeySize); 263 int minPrivateKeyBits = keySize / 2; 305 // I.e., subgroup confinment attacks can find at least keySize - r.bitLength() bits of the key. 309 assertTrue(minPrivateKeyBits - (keySize - r.bitLength()) > 160); 326 int keySize = 1024; 328 keyGen.initialize(keySize); 330 testKeyPair(keyPair, keySize);
|
EcKeyTest.java | 209 int keySize = EcUtil.fieldSizeInBits(pub.getParams().getCurve()); 210 if (keySize < 224) { 211 fail("Expected a default key size of at least 224 bits. Size of generate key is " + keySize);
|
/frameworks/native/opengl/libs/EGL/ |
BlobCache.cpp | 55 void BlobCache::set(const void* key, size_t keySize, const void* value, 57 if (mMaxKeySize < keySize) { 59 keySize, mMaxKeySize); 67 if (mMaxTotalSize < keySize + valueSize) { 69 "large: %zu (limit: %zu)", keySize + valueSize, mMaxTotalSize); 72 if (keySize == 0) { 73 ALOGW("set: not caching because keySize is 0"); 81 std::shared_ptr<Blob> dummyKey(new Blob(key, keySize, false)); 88 std::shared_ptr<Blob> keyBlob(new Blob(key, keySize, true)); 90 size_t newTotalSize = mTotalSize + keySize + valueSize [all...] |