/openjdk7/jdk/src/share/classes/java/security/spec/ |
H A D | RSAKeyGenParameterSpec.java | 44 private int keysize; field in class:RSAKeyGenParameterSpec 59 * given keysize and public-exponent value. 61 * @param keysize the modulus size (specified in number of bits) 64 public RSAKeyGenParameterSpec(int keysize, BigInteger publicExponent) { argument 65 this.keysize = keysize; 70 * Returns the keysize. 72 * @return the keysize. 75 return keysize;
|
/openjdk7/jdk/src/share/classes/com/sun/crypto/provider/ |
H A D | BlowfishKeyGenerator.java | 46 private int keysize = 16; // default keysize (in number of bytes) field in class:BlowfishKeyGenerator 82 * Initializes this key generator for a certain keysize, using the given 85 * @param keysize the keysize. This is an algorithm-specific 89 protected void engineInit(int keysize, SecureRandom random) { argument 90 if (((keysize % 8) != 0) || (keysize < 32) || (keysize > 448)) { 96 this.keysize [all...] |
H A D | HmacMD5KeyGenerator.java | 46 private int keysize = 64; // default keysize (in number of bytes) field in class:HmacMD5KeyGenerator 82 * Initializes this key generator for a certain keysize, using the given 85 * @param keysize the keysize. This is an algorithm-specific 89 protected void engineInit(int keysize, SecureRandom random) { argument 90 this.keysize = (keysize+7) / 8; 104 byte[] keyBytes = new byte[this.keysize];
|
H A D | HmacSHA1KeyGenerator.java | 46 private int keysize = 64; // default keysize (in number of bytes) field in class:HmacSHA1KeyGenerator 82 * Initializes this key generator for a certain keysize, using the given 85 * @param keysize the keysize. This is an algorithm-specific 89 protected void engineInit(int keysize, SecureRandom random) { argument 90 this.keysize = (keysize+7) / 8; 104 byte[] keyBytes = new byte[this.keysize];
|
H A D | DESedeKeyGenerator.java | 47 private int keysize = 168; field in class:DESedeKeyGenerator 82 * Initializes this key generator for a certain keysize, using the given 85 * @param keysize the keysize. This is an algorithm-specific 86 * metric specified in number of bits. A keysize with 112 bits of entropy 87 * corresponds to a Triple DES key with 2 intermediate keys, and a keysize 92 protected void engineInit(int keysize, SecureRandom random) { argument 93 if ((keysize != 112) && (keysize != 168)) { 94 throw new InvalidParameterException("Wrong keysize [all...] |
H A D | AESKeyGenerator.java | 48 private int keySize = 16; // default keysize (in number of bytes) 83 * Initializes this key generator for a certain keysize, using the given 86 * @param keysize the keysize. This is an algorithm-specific 90 protected void engineInit(int keysize, SecureRandom random) { argument 91 if (((keysize % 8) != 0) || 92 (!AESCrypt.isKeySizeValid(keysize/8))) { 94 ("Wrong keysize: must be equal to 128, 192 or 256"); 96 this.keySize = keysize/8;
|
H A D | DHKeyPairGenerator.java | 75 * Initializes this key pair generator for a certain keysize and source of 77 * The keysize is specified as the size in bits of the prime modulus. 79 * @param keysize the keysize (size of prime modulus) in bits 82 public void initialize(int keysize, SecureRandom random) { argument 83 if ((keysize < 512) || (keysize > 1024) || (keysize % 64 != 0)) { 89 this.pSize = keysize;
|
H A D | DHParameterGenerator.java | 63 * Initializes this parameter generator for a certain keysize 65 * The keysize is specified as the size in bits of the prime modulus. 67 * @param keysize the keysize (size of prime modulus) in bits 70 protected void engineInit(int keysize, SecureRandom random) { argument 71 if ((keysize < 512) || (keysize > 1024) || (keysize % 64 != 0)) { 77 this.primeSize = keysize;
|
H A D | DESKeyGenerator.java | 81 * Initializes this key generator for a certain keysize, using the given 84 * @param keysize the keysize. This is an algorithm-specific 88 protected void engineInit(int keysize, SecureRandom random) { argument 89 if (keysize != 56) { 90 throw new InvalidParameterException("Wrong keysize: must "
|
H A D | DHKeyAgreement.java | 381 int keysize = secret.length; 382 if (keysize >= BlowfishConstants.BLOWFISH_MAX_KEYSIZE) 383 keysize = BlowfishConstants.BLOWFISH_MAX_KEYSIZE; 384 SecretKeySpec skey = new SecretKeySpec(secret, 0, keysize, 389 int keysize = secret.length; 396 if (keysize >= AESConstants.AES_KEYSIZES[idx]) { 397 keysize = AESConstants.AES_KEYSIZES[idx]; 398 skey = new SecretKeySpec(secret, 0, keysize, "AES");
|
H A D | TlsRsaPremasterSecretGenerator.java | 66 protected void engineInit(int keysize, SecureRandom random) { argument
|
H A D | KeyGeneratorCore.java | 88 void implInit(int keysize, SecureRandom random) { argument 89 if (keysize < 40) { 93 this.keySize = keysize;
|
H A D | TlsMasterSecretGenerator.java | 78 protected void engineInit(int keysize, SecureRandom random) { argument
|
/openjdk7/jdk/src/share/classes/java/security/ |
H A D | KeyPairGeneratorSpi.java | 42 * For example, the <i>Sun</i> provider uses a default modulus size (keysize) 55 * Initializes the key pair generator for a certain keysize, using 58 * @param keysize the keysize. This is an 64 * @exception InvalidParameterException if the <code>keysize</code> is not 67 public abstract void initialize(int keysize, SecureRandom random); argument
|
H A D | KeyPairGenerator.java | 53 * <p>All key pair generators share the concepts of a keysize and a 54 * source of randomness. The keysize is interpreted differently for different 55 * algorithms (e.g., in the case of the <i>DSA</i> algorithm, the keysize 61 * <code>keysize</code> argument, and uses the <code>SecureRandom</code> 72 * <p>If the algorithm is the <i>DSA</i> algorithm, and the keysize (modulus 98 * For example, the <i>Sun</i> provider uses a default modulus size (keysize) 324 * Initializes the key pair generator for a certain keysize using 332 * @param keysize the keysize. This is an 336 * @exception InvalidParameterException if the <code>keysize</cod 339 initialize(int keysize) argument 357 initialize(int keysize, SecureRandom random) argument 622 initialize(int keysize, SecureRandom random) argument [all...] |
/openjdk7/jdk/test/com/sun/crypto/provider/KeyGenerator/ |
H A D | TestExplicitKeyLength.java | 43 public static void runTest(String algo, int keysize) throws Exception { argument 45 kg.init(keysize); 48 if (actualSizeInBits != keysize) { 58 KEY_SIZES[i] + "-bit keysize");
|
/openjdk7/jdk/src/share/classes/javax/crypto/ |
H A D | KeyGeneratorSpi.java | 68 * Initializes this key generator for a certain keysize, using the given 71 * @param keysize the keysize. This is an algorithm-specific metric, 75 * @exception InvalidParameterException if the keysize is wrong or not 78 protected abstract void engineInit(int keysize, SecureRandom random); argument
|
H A D | KeyGenerator.java | 53 * <p>All key generators share the concepts of a <i>keysize</i> and a 59 * <code>keysize</code> argument, and uses the SecureRandom implementation 461 * Initializes this key generator for a certain keysize. 471 * @param keysize the keysize. This is an algorithm-specific metric, 474 * @exception InvalidParameterException if the keysize is wrong or not 477 public final void init(int keysize) { argument 478 init(keysize, JceSecurity.RANDOM); 482 * Initializes this key generator for a certain keysize, using a 485 * @param keysize th 492 init(int keysize, SecureRandom random) argument [all...] |
/openjdk7/jdk/test/sun/security/tools/keytool/ |
H A D | StandardAlgName.sh | 72 ${TESTJAVA}${FS}bin${FS}keytool -genkey -v -alias pkcs12testCA -keyalg "RsA" -keysize 2048 -sigalg "ShA1wItHRSA" -dname "cn=PKCS12 Test CA, ou=Security SQE, o=JavaSoft, c=US" -validity 3650 -keypass storepass -keystore keystoreCA.jceks.data -storepass storepass -storetype jceKS 2>&1 | egrep 'RsA|ShA1wItHRSA' 79 ${TESTJAVA}${FS}bin${FS}keytool -genkey -v -alias pkcs12testLead -keyalg "rSA" -keysize 1024 -sigalg "mD5withRSA" -dname "cn=PKCS12 Test Lead, ou=Security SQE, o=JavaSoft, c=US" -validity 3650 -keypass storepass -keystore keystoreLead.jceks.data -storepass storepass -storetype jCeks 2>&1 | egrep 'rSA|mD5withRSA' 85 ${TESTJAVA}${FS}bin${FS}keytool -genkey -v -alias pkcs12testEndUser1 -keyalg "RSa" -keysize 1024 -sigalg "sHa1wIThRSA" -dname "cn=PKCS12 Test End User 1, ou=Security SQE, o=JavaSoft, c=US" -validity 3650 -keypass storepass -keystore keystoreEndUser1.jceks.data -storepass storepass -storetype Jceks 2>&1 | egrep 'RSa|sHa1wIThRSA'
|
H A D | AltProviderPath.sh | 73 -keyalg "RSA" -keysize 1024 -sigalg "ShA1WithRSA" \
|
/openjdk7/jdk/src/share/classes/com/sun/jmx/snmp/ |
H A D | SnmpUsmKeyHandler.java | 69 * @param keysize The privacy algorithm key size. 73 public byte[] localizePrivKey(String algoName, byte[] key, SnmpEngineId engineId,int keysize) throws IllegalArgumentException; argument
|
/openjdk7/jdk/test/com/sun/crypto/provider/Cipher/AES/ |
H A D | TestKATForECB_VK.java | 658 private static byte[] constructKeyValue(int keysize, int rounds) { argument 659 byte[] tempKeyValue = new byte[keysize]; 664 if ((whichByte >= keysize) || (whichDigit < 0) || 666 throw new IllegalArgumentException("Invalid keysize/rounds " + 667 "combination :" + keysize +
|
/openjdk7/jdk/test/java/security/KeyPairGenerator/ |
H A D | Failover.java | 129 public void initialize(int keysize, SecureRandom random) { argument 130 System.out.println("KeyPairGeneratorPass.initialize(" + keysize + ", " + random + ")"); 147 public void initialize(int keysize, SecureRandom random) { argument 148 if (keysize != 512) {
|
/openjdk7/jdk/test/sun/security/mscapi/ |
H A D | ShortRSAKey1024.sh | 69 -keysize $BITS \
|
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/ |
H A D | P11TlsRsaPremasterSecretGenerator.java | 82 protected void engineInit(int keysize, SecureRandom random) { argument
|