/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | MyKeyPairGenerator2.java | 55 public void initialize(int keysize, SecureRandom random) { argument 56 if (keysize < 64) { 57 throw new InvalidParameterException("Incorrect keysize parameter"); 59 keySize = keysize;
|
H A D | MyAlgorithmParameterGeneratorSpi.java | 38 protected void engineInit(int keysize, SecureRandom random) { argument 39 if (keysize < 0) { 40 throw new IllegalArgumentException("keysize < 0");
|
H A D | MyKeyPairGeneratorSpi.java | 38 public void initialize(int keysize, SecureRandom random) { argument 39 if (keysize < 100) { 41 "Invalid keysize: less than 100");
|
H A D | MyKeyPairGenerator1.java | 61 public void initialize(int keysize, SecureRandom random) { argument 62 if ((keysize < 0) || ((keysize % 100) != 0)) { 63 throw new InvalidParameterException("Incorrect keysize parameter"); 68 keySize = keysize;
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_make_key.c | 30 @param keysize The keysize for the new key (in octets from 20 to 65 bytes) 34 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) argument 39 for (x = 0; (keysize > ltc_ecc_sets[x].size) && (ltc_ecc_sets[x].size != 0); x++); 40 keysize = ltc_ecc_sets[x].size; 42 if (keysize > ECC_MAXSIZE || ltc_ecc_sets[x].size == 0) { 56 int keysize; local 69 keysize = dp->size; 79 if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) { [all...] |
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/ |
H A D | MyKeyGeneratorSpi.java | 53 protected void engineInit(int keysize, SecureRandom random) { argument 54 if (keysize <= 77) { 55 throw new IllegalArgumentException("Invalid keysize");
|
/external/dropbear/ |
H A D | algo.h | 55 unsigned long keysize; member in struct:dropbear_cipher 61 unsigned long keysize; member in struct:dropbear_hash
|
H A D | dropbearkey.c | 101 unsigned int keysize; local 197 keysize = bits / 8; 200 keysize = DSS_SIZE; 202 keysize = RSA_SIZE; 209 fprintf(stderr, "Will output %d bit %s secret key to '%s'\n", keysize*8, 222 key->rsakey = gen_rsa_priv_key(keysize); /* 128 bytes = 1024 bit */ 227 key->dsskey = gen_dss_priv_key(keysize); /* 128 bytes = 1024 bit */
|
H A D | common-kex.c | 280 C2S_keysize = ses.newkeys->trans_algo_crypt->keysize; 281 S2C_keysize = ses.newkeys->recv_algo_crypt->keysize; 289 C2S_keysize = ses.newkeys->recv_algo_crypt->keysize; 290 S2C_keysize = ses.newkeys->trans_algo_crypt->keysize; 305 ses.newkeys->recv_algo_crypt->keysize, 0, 314 ses.newkeys->trans_algo_crypt->keysize, 0, 321 ses.newkeys->trans_algo_mac->keysize, &hs, mactransletter); 323 ses.newkeys->recv_algo_mac->keysize, &hs, macrecvletter);
|
/external/dropbear/libtomcrypt/src/headers/ |
H A D | tomcrypt_cipher.h | 323 /** min keysize (octets) */ 325 /** max keysize (octets) */ 364 @param keysize [in/out] The size of the key desired and the suggested size 367 int (*keysize)(int *keysize); member in struct:ltc_cipher_descriptor 541 int blowfish_keysize(int *keysize); 551 int rc5_keysize(int *keysize); 561 int rc6_keysize(int *keysize); 571 int rc2_keysize(int *keysize); 581 int saferp_keysize(int *keysize); [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
H A D | BlockCipherFactory.java | 23 int keysize; field in class:BlockCipherFactory.CipherEntry 30 this.keysize = keySize; 128 return ce.keysize;
|
/external/openssl/apps/ |
H A D | rsautl.c | 104 int keysize; local 258 keysize = RSA_size(rsa); 260 rsa_in = OPENSSL_malloc(keysize * 2); 261 rsa_out = OPENSSL_malloc(keysize); 264 rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
|
H A D | pkeyutl.c | 99 int keysize = -1; local 140 ctx = init_ctx(&keysize, 298 siglen = bio_to_mem(&sig, keysize * 10, sigbio); 310 buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
|
/external/mdnsresponder/mDNSShared/ |
H A D | dnssd_clientlib.c | 211 unsigned long keysize, keyvalsize; local 214 keysize = (unsigned long)(k - key); 215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); 216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); 233 memcpy(p, key, keysize); 234 p += keysize;
|
/external/dropbear/libtomcrypt/src/ciphers/ |
H A D | xtea.c | 190 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 193 int xtea_keysize(int *keysize) argument 195 LTC_ARGCHK(keysize != NULL); 196 if (*keysize < 16) { 199 *keysize = 16;
|
H A D | rc2.c | 341 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 344 int rc2_keysize(int *keysize) argument 346 LTC_ARGCHK(keysize != NULL); 347 if (*keysize < 8) { 349 } else if (*keysize > 128) { 350 *keysize = 128;
|
H A D | rc5.c | 301 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 304 int rc5_keysize(int *keysize) argument 306 LTC_ARGCHK(keysize != NULL); 307 if (*keysize < 8) { 309 } else if (*keysize > 128) { 310 *keysize = 128;
|
H A D | kasumi.c | 241 int kasumi_keysize(int *keysize) argument 243 LTC_ARGCHK(keysize != NULL); 244 if (*keysize >= 16) { 245 *keysize = 16;
|
H A D | noekeon.c | 284 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 287 int noekeon_keysize(int *keysize) argument 289 LTC_ARGCHK(keysize != NULL); 290 if (*keysize < 16) { 293 *keysize = 16;
|
H A D | rc6.c | 328 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 331 int rc6_keysize(int *keysize) argument 333 LTC_ARGCHK(keysize != NULL); 334 if (*keysize < 8) { 336 } else if (*keysize > 128) { 337 *keysize = 128;
|
H A D | skipjack.c | 325 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 328 int skipjack_keysize(int *keysize) argument 330 LTC_ARGCHK(keysize != NULL); 331 if (*keysize < 10) { 333 } else if (*keysize > 10) { 334 *keysize = 10;
|
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
H A D | safer.c | 357 int safer_64_keysize(int *keysize) argument 359 LTC_ARGCHK(keysize != NULL); 360 if (*keysize < 8) { 363 *keysize = 8; 368 int safer_128_keysize(int *keysize) argument 370 LTC_ARGCHK(keysize != NULL); 371 if (*keysize < 16) { 374 *keysize = 16;
|
/external/openssl/crypto/evp/ |
H A D | evp_locl.h | 257 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \ 258 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 259 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 260 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | KeyGeneratorTest.java | 119 int keysize = 0; 126 keyG.init(keysize, null); 140 keyG.init(keysize, null); 332 * Test for <code>init(int keysize)</code> and 333 * <code>init(int keysize, SecureRandom random)</code> methods 334 * Assertion: throws InvalidParameterException if keysize is wrong 395 * <code>init(int keysize, SecureRandom random)</code> methods 396 * <code>init(int keysize)</code> methods
|
/external/dropbear/libtomcrypt/src/ciphers/aes/ |
H A D | aes.c | 736 @param keysize [in/out] The length of the recommended key (in bytes). This function will store the suitable size back in this variable. 739 int ECB_KS(int *keysize) argument 741 LTC_ARGCHK(keysize != NULL); 743 if (*keysize < 16) 745 if (*keysize < 24) { 746 *keysize = 16; 748 } else if (*keysize < 32) { 749 *keysize = 24; 752 *keysize = 32;
|