/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
H A D | PrimeCertaintyCalculator.java | 13 * @param keySizeInBits size of the key being generated. 16 public static int getDefaultCertainty(int keySizeInBits) argument 19 return keySizeInBits <= 1024 ? 80 : (96 + 16 * ((keySizeInBits - 1) / 1024));
|
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
H A D | RsaKeyTest.java | 1436 private void checkKeyPair(KeyPair keypair, int keySizeInBits) throws Exception { argument 1440 checkPrivateCrtKey((RSAPrivateCrtKey) priv, keySizeInBits); 1450 public void testKeyGenerationSize(int keySizeInBits) throws Exception { argument 1452 keyGen.initialize(keySizeInBits); 1454 checkKeyPair(keypair, keySizeInBits);
|
/external/tpm2/ |
H A D | OsslCryptoEngine.h | 74 UINT16 keySizeInBits; member in struct:__anon27119
|
H A D | CpriSym.c | 45 UINT16 keySizeInBits // IN: the key size 56 if(keySizeInBits != 0) // This is mostly to have a reference to 57 // keySizeInBits for the compiler 84 UINT32 keySizeInBits, // IN: key size in bit 86 // bytes is (keySizeInBits + 7) / 8 107 if (AES_set_encrypt_key(key, keySizeInBits, &AesKey) != 0) 139 UINT32 keySizeInBits, // IN: key size in bit 141 // bytes is (keySizeInBits + 7) / 8 164 if (AES_set_decrypt_key(key, keySizeInBits, &AesKey) != 0) 200 UINT32 keySizeInBits, // I 82 _cpri__AESEncryptCBC( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument 137 _cpri__AESDecryptCBC( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument 198 _cpri__AESEncryptCFB( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument 252 _cpri__AESDecryptCFB( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument 308 _cpri__AESEncryptCTR( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument 356 _cpri__AESEncryptECB( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, UINT32 dInSize, BYTE *dIn ) argument 399 _cpri__AESDecryptECB( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, UINT32 dInSize, BYTE *dIn ) argument 447 _cpri__AESEncryptOFB( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument 499 _cpri__SM4EncryptCBC( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument 554 _cpri__SM4DecryptCBC( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument 615 _cpri__SM4EncryptCFB( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument 665 _cpri__SM4DecryptCFB( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument 721 _cpri__SM4EncryptCTR( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument 769 _cpri__SM4EncryptECB( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, UINT32 dInSize, BYTE *dIn ) argument 815 _cpri__SM4DecryptECB( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, UINT32 dInSize, BYTE *dIn ) argument 860 _cpri__SM4EncryptOFB( BYTE *dOut, UINT32 keySizeInBits, BYTE *key, BYTE *iv, UINT32 dInSize, BYTE *dIn ) argument [all...] |
H A D | CpriRSA.c | 1168 UINT16 keySizeInBits, // IN: Size of the public modulus in bit 1243 n->size = (keySizeInBits +7)/8; 1278 _cpri__UpdateHash(&h, 2, (BYTE *)&keySizeInBits); 1332 if(BN_num_bits(bnN) != keySizeInBits) 1165 _cpri__GenerateKeyRSA( TPM2B *n, TPM2B *p, UINT16 keySizeInBits, UINT32 e, TPM_ALG_ID hashAlg, TPM2B *seed, const char *label, TPM2B *extra, UINT32 *counter ) argument
|
H A D | RSAKeySieve.c | 184 _cpri__UpdateHash(&h, 2, (BYTE *)&ktx->keySizeInBits); 739 ktx->keySizeInBits = keySizeInBits; 779 UINT16 keySizeInBits, // IN: Size of the public modulus in bits 811 ktxPtr = KDFaContextStart(&ktx, seed, hashAlg, extra, pCtr, keySizeInBits); 812 n->size = keySizeInBits/8; 888 || BN_num_bits(bnN) != keySizeInBits) 918 _cpri__GenerateRandom(keySizeInBits/8, r.t.buffer); 776 _cpri__GenerateKeyRSA( TPM2B *n, TPM2B *p, UINT16 keySizeInBits, UINT32 e, TPM_ALG_ID hashAlg, TPM2B *seed, const char *label, TPM2B *extra, UINT32 *counter ,UINT16 primes, UINT16 fieldSize ) argument
|
H A D | CryptUtil.c | 1247 UINT16 keySizeInBits = 0; 1249 keySizeInBits = curve->keySizeBits; 1250 return keySizeInBits; 1790 UINT16 keySizeInBits, // IN: key key size in bit 1803 UINT16 keySize = (keySizeInBits + 7) / 8; 1805 iv.t.size = CryptGetSymmetricBlockSize(symAlg, keySizeInBits); 1811 keySizeInBits + (iv.t.size * 8), symParmString, NULL); 1814 CryptSymmetricDecrypt(data, symAlg, keySizeInBits, TPM_ALG_CFB, 1829 UINT16 keySizeInBits, // IN: AES key size in bit 1841 UINT16 keySize = (keySizeInBits 1246 UINT16 keySizeInBits = 0; local 1786 ParmDecryptSym( TPM_ALG_ID symAlg, TPM_ALG_ID hash, UINT16 keySizeInBits, TPM2B *key, TPM2B *nonceCaller, TPM2B *nonceTpm, UINT32 dataSize, BYTE *data ) argument 1825 ParmEncryptSym( TPM_ALG_ID symAlg, TPM_ALG_ID hash, UINT16 keySizeInBits, TPM2B *key, TPM2B *nonceCaller, TPM2B *nonceTpm, UINT32 dataSize, BYTE *data ) argument 2167 CryptSymmetricEncrypt( BYTE *encrypted, TPM_ALG_ID algorithm, UINT16 keySizeInBits, TPMI_ALG_SYM_MODE mode, BYTE *key, TPM2B_IV *ivIn, UINT32 dataSize, BYTE *data ) argument 2270 CryptSymmetricDecrypt( BYTE *decrypted, TPM_ALG_ID algorithm, UINT16 keySizeInBits, TPMI_ALG_SYM_MODE mode, BYTE *key, TPM2B_IV *ivIn, UINT32 dataSize, BYTE *data ) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
H A D | BaseStreamCipher.java | 47 private int keySizeInBits; field in class:BaseStreamCipher 66 int keySizeInBits, 71 this.keySizeInBits = keySizeInBits; 177 param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName()); 63 BaseStreamCipher( StreamCipher engine, int ivLength, int keySizeInBits, int digest) argument
|
H A D | BaseBlockCipher.java | 108 private int keySizeInBits; field in class:BaseBlockCipher 147 int keySizeInBits, 154 this.keySizeInBits = keySizeInBits; 582 // param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName()); 593 param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName()); 615 param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS5S1, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName()); 677 param = PBE.Util.makePBEParameters(k.getEncoded(), scheme, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName()); 143 BaseBlockCipher( BlockCipher engine, int scheme, int digest, int keySizeInBits, int ivLength) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
H A D | PBEPBKDF2.java | 128 private int keySizeInBits; field in class:PBEPBKDF2.BasePBKDF2 141 String name, int scheme, int digest, int keySizeInBits, int ivSizeInBits) 148 this.keySizeInBits = keySizeInBits; 174 && keySizeInBits != 0) { 176 this.algName, this.algOid, scheme, defaultDigest, keySizeInBits, 140 BasePBKDF2( String name, int scheme, int digest, int keySizeInBits, int ivSizeInBits) argument
|