Searched refs:keysize (Results 1 - 25 of 45) sorted by relevance

12

/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
H A DMyKeyPairGenerator2.java55 public void initialize(int keysize, SecureRandom random) { argument
56 if (keysize < 64) {
57 throw new InvalidParameterException("Incorrect keysize parameter");
59 keySize = keysize;
H A DMyAlgorithmParameterGeneratorSpi.java38 protected void engineInit(int keysize, SecureRandom random) { argument
39 if (keysize < 0) {
40 throw new IllegalArgumentException("keysize < 0");
H A DMyKeyPairGeneratorSpi.java38 public void initialize(int keysize, SecureRandom random) { argument
39 if (keysize < 100) {
41 "Invalid keysize: less than 100");
H A DMyKeyPairGenerator1.java61 public void initialize(int keysize, SecureRandom random) { argument
62 if ((keysize < 0) || ((keysize % 100) != 0)) {
63 throw new InvalidParameterException("Incorrect keysize parameter");
68 keySize = keysize;
/external/dropbear/libtomcrypt/src/pk/ecc/
H A Decc_make_key.c30 @param keysize The keysize for the new key (in octets from 20 to 65 bytes)
34 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) argument
39 for (x = 0; (keysize > ltc_ecc_sets[x].size) && (ltc_ecc_sets[x].size != 0); x++);
40 keysize = ltc_ecc_sets[x].size;
42 if (keysize > ECC_MAXSIZE || ltc_ecc_sets[x].size == 0) {
56 int keysize; local
69 keysize = dp->size;
79 if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) {
[all...]
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/
H A DMyKeyGeneratorSpi.java53 protected void engineInit(int keysize, SecureRandom random) { argument
54 if (keysize <= 77) {
55 throw new IllegalArgumentException("Invalid keysize");
/external/dropbear/
H A Dalgo.h55 unsigned long keysize; member in struct:dropbear_cipher
61 unsigned long keysize; member in struct:dropbear_hash
H A Ddropbearkey.c101 unsigned int keysize; local
197 keysize = bits / 8;
200 keysize = DSS_SIZE;
202 keysize = RSA_SIZE;
209 fprintf(stderr, "Will output %d bit %s secret key to '%s'\n", keysize*8,
222 key->rsakey = gen_rsa_priv_key(keysize); /* 128 bytes = 1024 bit */
227 key->dsskey = gen_dss_priv_key(keysize); /* 128 bytes = 1024 bit */
H A Dcommon-kex.c280 C2S_keysize = ses.newkeys->trans_algo_crypt->keysize;
281 S2C_keysize = ses.newkeys->recv_algo_crypt->keysize;
289 C2S_keysize = ses.newkeys->recv_algo_crypt->keysize;
290 S2C_keysize = ses.newkeys->trans_algo_crypt->keysize;
305 ses.newkeys->recv_algo_crypt->keysize, 0,
314 ses.newkeys->trans_algo_crypt->keysize, 0,
321 ses.newkeys->trans_algo_mac->keysize, &hs, mactransletter);
323 ses.newkeys->recv_algo_mac->keysize, &hs, macrecvletter);
/external/dropbear/libtomcrypt/src/headers/
H A Dtomcrypt_cipher.h323 /** min keysize (octets) */
325 /** max keysize (octets) */
364 @param keysize [in/out] The size of the key desired and the suggested size
367 int (*keysize)(int *keysize); member in struct:ltc_cipher_descriptor
541 int blowfish_keysize(int *keysize);
551 int rc5_keysize(int *keysize);
561 int rc6_keysize(int *keysize);
571 int rc2_keysize(int *keysize);
581 int saferp_keysize(int *keysize);
[all...]
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/
H A DBlockCipherFactory.java23 int keysize; field in class:BlockCipherFactory.CipherEntry
30 this.keysize = keySize;
128 return ce.keysize;
/external/openssl/apps/
H A Drsautl.c104 int keysize; local
258 keysize = RSA_size(rsa);
260 rsa_in = OPENSSL_malloc(keysize * 2);
261 rsa_out = OPENSSL_malloc(keysize);
264 rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
H A Dpkeyutl.c99 int keysize = -1; local
140 ctx = init_ctx(&keysize,
298 siglen = bio_to_mem(&sig, keysize * 10, sigbio);
310 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
/external/mdnsresponder/mDNSShared/
H A Ddnssd_clientlib.c211 unsigned long keysize, keyvalsize; local
214 keysize = (unsigned long)(k - key);
215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0);
216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid);
233 memcpy(p, key, keysize);
234 p += keysize;
/external/dropbear/libtomcrypt/src/ciphers/
H A Dxtea.c190 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable.
193 int xtea_keysize(int *keysize) argument
195 LTC_ARGCHK(keysize != NULL);
196 if (*keysize < 16) {
199 *keysize = 16;
H A Drc2.c341 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable.
344 int rc2_keysize(int *keysize) argument
346 LTC_ARGCHK(keysize != NULL);
347 if (*keysize < 8) {
349 } else if (*keysize > 128) {
350 *keysize = 128;
H A Drc5.c301 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable.
304 int rc5_keysize(int *keysize) argument
306 LTC_ARGCHK(keysize != NULL);
307 if (*keysize < 8) {
309 } else if (*keysize > 128) {
310 *keysize = 128;
H A Dkasumi.c241 int kasumi_keysize(int *keysize) argument
243 LTC_ARGCHK(keysize != NULL);
244 if (*keysize >= 16) {
245 *keysize = 16;
H A Dnoekeon.c284 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable.
287 int noekeon_keysize(int *keysize) argument
289 LTC_ARGCHK(keysize != NULL);
290 if (*keysize < 16) {
293 *keysize = 16;
H A Drc6.c328 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable.
331 int rc6_keysize(int *keysize) argument
333 LTC_ARGCHK(keysize != NULL);
334 if (*keysize < 8) {
336 } else if (*keysize > 128) {
337 *keysize = 128;
H A Dskipjack.c325 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable.
328 int skipjack_keysize(int *keysize) argument
330 LTC_ARGCHK(keysize != NULL);
331 if (*keysize < 10) {
333 } else if (*keysize > 10) {
334 *keysize = 10;
/external/dropbear/libtomcrypt/src/ciphers/safer/
H A Dsafer.c357 int safer_64_keysize(int *keysize) argument
359 LTC_ARGCHK(keysize != NULL);
360 if (*keysize < 8) {
363 *keysize = 8;
368 int safer_128_keysize(int *keysize) argument
370 LTC_ARGCHK(keysize != NULL);
371 if (*keysize < 16) {
374 *keysize = 16;
/external/openssl/crypto/evp/
H A Devp_locl.h257 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \
258 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \
259 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \
260 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
H A DKeyGeneratorTest.java119 int keysize = 0;
126 keyG.init(keysize, null);
140 keyG.init(keysize, null);
332 * Test for <code>init(int keysize)</code> and
333 * <code>init(int keysize, SecureRandom random)</code> methods
334 * Assertion: throws InvalidParameterException if keysize is wrong
395 * <code>init(int keysize, SecureRandom random)</code> methods
396 * <code>init(int keysize)</code> methods
/external/dropbear/libtomcrypt/src/ciphers/aes/
H A Daes.c736 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable.
739 int ECB_KS(int *keysize) argument
741 LTC_ARGCHK(keysize != NULL);
743 if (*keysize < 16)
745 if (*keysize < 24) {
746 *keysize = 16;
748 } else if (*keysize < 32) {
749 *keysize = 24;
752 *keysize = 32;

Completed in 801 milliseconds

12