/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/ |
H A D | MyKeyGeneratorSpi.java | 53 protected void engineInit(int keysize, SecureRandom random) { argument 54 if (keysize <= 77) { 55 throw new IllegalArgumentException("Invalid keysize");
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | MyAlgorithmParameterGeneratorSpi.java | 38 protected void engineInit(int keysize, SecureRandom random) { argument 39 if (keysize < 0) { 40 throw new IllegalArgumentException("keysize < 0");
|
H A D | MyKeyPairGenerator2.java | 55 public void initialize(int keysize, SecureRandom random) { argument 56 if (keysize < 64) { 57 throw new InvalidParameterException("Incorrect keysize parameter"); 59 keySize = keysize;
|
H A D | MyKeyPairGeneratorSpi.java | 38 public void initialize(int keysize, SecureRandom random) { argument 39 if (keysize < 100) { 41 "Invalid keysize: less than 100");
|
H A D | MyKeyPairGenerator1.java | 61 public void initialize(int keysize, SecureRandom random) { argument 62 if ((keysize < 0) || ((keysize % 100) != 0)) { 63 throw new InvalidParameterException("Incorrect keysize parameter"); 68 keySize = keysize;
|
/external/dropbear/ |
H A D | algo.h | 55 unsigned long keysize; member in struct:dropbear_cipher 61 unsigned long keysize; member in struct:dropbear_hash
|
H A D | dropbearkey.c | 101 unsigned int keysize; local 197 keysize = bits / 8; 200 keysize = DSS_SIZE; 202 keysize = RSA_SIZE; 209 fprintf(stderr, "Will output %d bit %s secret key to '%s'\n", keysize*8, 222 key->rsakey = gen_rsa_priv_key(keysize); /* 128 bytes = 1024 bit */ 227 key->dsskey = gen_dss_priv_key(keysize); /* 128 bytes = 1024 bit */
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_make_key.c | 30 @param keysize The keysize for the new key (in octets from 20 to 65 bytes) 34 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) argument 39 for (x = 0; (keysize > ltc_ecc_sets[x].size) && (ltc_ecc_sets[x].size != 0); x++); 40 keysize = ltc_ecc_sets[x].size; 42 if (keysize > ECC_MAXSIZE || ltc_ecc_sets[x].size == 0) { 56 int keysize; local 69 keysize = dp->size; 79 if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) { [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
H A D | xtea.c | 190 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 193 int xtea_keysize(int *keysize) argument 195 LTC_ARGCHK(keysize != NULL); 196 if (*keysize < 16) { 199 *keysize = 16;
|
H A D | rc2.c | 341 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 344 int rc2_keysize(int *keysize) argument 346 LTC_ARGCHK(keysize != NULL); 347 if (*keysize < 8) { 349 } else if (*keysize > 128) { 350 *keysize = 128;
|
H A D | blowfish.c | 574 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 577 int blowfish_keysize(int *keysize) argument 579 LTC_ARGCHK(keysize != NULL); 581 if (*keysize < 8) { 583 } else if (*keysize > 56) { 584 *keysize = 56;
|
H A D | kasumi.c | 241 int kasumi_keysize(int *keysize) argument 243 LTC_ARGCHK(keysize != NULL); 244 if (*keysize >= 16) { 245 *keysize = 16;
|
H A D | khazad.c | 837 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 840 int khazad_keysize(int *keysize) argument 842 LTC_ARGCHK(keysize != NULL); 843 if (*keysize >= 16) { 844 *keysize = 16;
|
H A D | kseed.c | 358 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 361 int kseed_keysize(int *keysize) argument 363 LTC_ARGCHK(keysize != NULL); 364 if (*keysize >= 16) { 365 *keysize = 16;
|
H A D | noekeon.c | 284 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 287 int noekeon_keysize(int *keysize) argument 289 LTC_ARGCHK(keysize != NULL); 290 if (*keysize < 16) { 293 *keysize = 16;
|
H A D | rc5.c | 301 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 304 int rc5_keysize(int *keysize) argument 306 LTC_ARGCHK(keysize != NULL); 307 if (*keysize < 8) { 309 } else if (*keysize > 128) { 310 *keysize = 128;
|
H A D | rc6.c | 328 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 331 int rc6_keysize(int *keysize) argument 333 LTC_ARGCHK(keysize != NULL); 334 if (*keysize < 8) { 336 } else if (*keysize > 128) { 337 *keysize = 128;
|
H A D | skipjack.c | 325 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 328 int skipjack_keysize(int *keysize) argument 330 LTC_ARGCHK(keysize != NULL); 331 if (*keysize < 10) { 333 } else if (*keysize > 10) { 334 *keysize = 10;
|
H A D | anubis.c | 1527 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 1530 int anubis_keysize(int *keysize) argument 1532 LTC_ARGCHK(keysize != NULL); 1533 if (*keysize >= 40) { 1534 *keysize = 40; 1535 } else if (*keysize >= 36) { 1536 *keysize = 36; 1537 } else if (*keysize >= 32) { 1538 *keysize = 32; 1539 } else if (*keysize > [all...] |
H A D | cast5.c | 702 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 705 int cast5_keysize(int *keysize) argument 707 LTC_ARGCHK(keysize != NULL); 708 if (*keysize < 5) { 710 } else if (*keysize > 16) { 711 *keysize = 16;
|
H A D | des.c | 1880 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 1883 int des_keysize(int *keysize) 1885 LTC_ARGCHK(keysize != NULL); 1886 if(*keysize < 8) { 1889 *keysize = 8; 1896 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 1899 int des3_keysize(int *keysize) argument 1901 LTC_ARGCHK(keysize != NULL); 1902 if(*keysize < 24) { 1905 *keysize [all...] |
/external/dropbear/libtomcrypt/src/ciphers/aes/ |
H A D | aes.c | 736 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 739 int ECB_KS(int *keysize) argument 741 LTC_ARGCHK(keysize != NULL); 743 if (*keysize < 16) 745 if (*keysize < 24) { 746 *keysize = 16; 748 } else if (*keysize < 32) { 749 *keysize = 24; 752 *keysize = 32;
|
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
H A D | saferp.c | 534 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 537 int saferp_keysize(int *keysize) argument 539 LTC_ARGCHK(keysize != NULL); 541 if (*keysize < 16) 543 if (*keysize < 24) { 544 *keysize = 16; 545 } else if (*keysize < 32) { 546 *keysize = 24; 548 *keysize = 32;
|
H A D | safer.c | 357 int safer_64_keysize(int *keysize) argument 359 LTC_ARGCHK(keysize != NULL); 360 if (*keysize < 8) { 363 *keysize = 8; 368 int safer_128_keysize(int *keysize) argument 370 LTC_ARGCHK(keysize != NULL); 371 if (*keysize < 16) { 374 *keysize = 16;
|
/external/openssl/apps/ |
H A D | pkeyutl.c | 99 int keysize = -1; local 140 ctx = init_ctx(&keysize, 298 siglen = bio_to_mem(&sig, keysize * 10, sigbio); 310 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
|