Searched refs:keysize (Results 1 - 25 of 32) sorted by relevance

12

/openjdk7/jdk/src/share/classes/java/security/spec/
H A DRSAKeyGenParameterSpec.java44 private int keysize; field in class:RSAKeyGenParameterSpec
59 * given keysize and public-exponent value.
61 * @param keysize the modulus size (specified in number of bits)
64 public RSAKeyGenParameterSpec(int keysize, BigInteger publicExponent) { argument
65 this.keysize = keysize;
70 * Returns the keysize.
72 * @return the keysize.
75 return keysize;
/openjdk7/jdk/src/share/classes/com/sun/crypto/provider/
H A DBlowfishKeyGenerator.java46 private int keysize = 16; // default keysize (in number of bytes) field in class:BlowfishKeyGenerator
82 * Initializes this key generator for a certain keysize, using the given
85 * @param keysize the keysize. This is an algorithm-specific
89 protected void engineInit(int keysize, SecureRandom random) { argument
90 if (((keysize % 8) != 0) || (keysize < 32) || (keysize > 448)) {
96 this.keysize
[all...]
H A DHmacMD5KeyGenerator.java46 private int keysize = 64; // default keysize (in number of bytes) field in class:HmacMD5KeyGenerator
82 * Initializes this key generator for a certain keysize, using the given
85 * @param keysize the keysize. This is an algorithm-specific
89 protected void engineInit(int keysize, SecureRandom random) { argument
90 this.keysize = (keysize+7) / 8;
104 byte[] keyBytes = new byte[this.keysize];
H A DHmacSHA1KeyGenerator.java46 private int keysize = 64; // default keysize (in number of bytes) field in class:HmacSHA1KeyGenerator
82 * Initializes this key generator for a certain keysize, using the given
85 * @param keysize the keysize. This is an algorithm-specific
89 protected void engineInit(int keysize, SecureRandom random) { argument
90 this.keysize = (keysize+7) / 8;
104 byte[] keyBytes = new byte[this.keysize];
H A DDESedeKeyGenerator.java47 private int keysize = 168; field in class:DESedeKeyGenerator
82 * Initializes this key generator for a certain keysize, using the given
85 * @param keysize the keysize. This is an algorithm-specific
86 * metric specified in number of bits. A keysize with 112 bits of entropy
87 * corresponds to a Triple DES key with 2 intermediate keys, and a keysize
92 protected void engineInit(int keysize, SecureRandom random) { argument
93 if ((keysize != 112) && (keysize != 168)) {
94 throw new InvalidParameterException("Wrong keysize
[all...]
H A DAESKeyGenerator.java48 private int keySize = 16; // default keysize (in number of bytes)
83 * Initializes this key generator for a certain keysize, using the given
86 * @param keysize the keysize. This is an algorithm-specific
90 protected void engineInit(int keysize, SecureRandom random) { argument
91 if (((keysize % 8) != 0) ||
92 (!AESCrypt.isKeySizeValid(keysize/8))) {
94 ("Wrong keysize: must be equal to 128, 192 or 256");
96 this.keySize = keysize/8;
H A DDHKeyPairGenerator.java75 * Initializes this key pair generator for a certain keysize and source of
77 * The keysize is specified as the size in bits of the prime modulus.
79 * @param keysize the keysize (size of prime modulus) in bits
82 public void initialize(int keysize, SecureRandom random) { argument
83 if ((keysize < 512) || (keysize > 1024) || (keysize % 64 != 0)) {
89 this.pSize = keysize;
H A DDHParameterGenerator.java63 * Initializes this parameter generator for a certain keysize
65 * The keysize is specified as the size in bits of the prime modulus.
67 * @param keysize the keysize (size of prime modulus) in bits
70 protected void engineInit(int keysize, SecureRandom random) { argument
71 if ((keysize < 512) || (keysize > 1024) || (keysize % 64 != 0)) {
77 this.primeSize = keysize;
H A DDESKeyGenerator.java81 * Initializes this key generator for a certain keysize, using the given
84 * @param keysize the keysize. This is an algorithm-specific
88 protected void engineInit(int keysize, SecureRandom random) { argument
89 if (keysize != 56) {
90 throw new InvalidParameterException("Wrong keysize: must "
H A DDHKeyAgreement.java381 int keysize = secret.length;
382 if (keysize >= BlowfishConstants.BLOWFISH_MAX_KEYSIZE)
383 keysize = BlowfishConstants.BLOWFISH_MAX_KEYSIZE;
384 SecretKeySpec skey = new SecretKeySpec(secret, 0, keysize,
389 int keysize = secret.length;
396 if (keysize >= AESConstants.AES_KEYSIZES[idx]) {
397 keysize = AESConstants.AES_KEYSIZES[idx];
398 skey = new SecretKeySpec(secret, 0, keysize, "AES");
H A DTlsRsaPremasterSecretGenerator.java66 protected void engineInit(int keysize, SecureRandom random) { argument
H A DKeyGeneratorCore.java88 void implInit(int keysize, SecureRandom random) { argument
89 if (keysize < 40) {
93 this.keySize = keysize;
H A DTlsMasterSecretGenerator.java78 protected void engineInit(int keysize, SecureRandom random) { argument
/openjdk7/jdk/src/share/classes/java/security/
H A DKeyPairGeneratorSpi.java42 * For example, the <i>Sun</i> provider uses a default modulus size (keysize)
55 * Initializes the key pair generator for a certain keysize, using
58 * @param keysize the keysize. This is an
64 * @exception InvalidParameterException if the <code>keysize</code> is not
67 public abstract void initialize(int keysize, SecureRandom random); argument
H A DKeyPairGenerator.java53 * <p>All key pair generators share the concepts of a keysize and a
54 * source of randomness. The keysize is interpreted differently for different
55 * algorithms (e.g., in the case of the <i>DSA</i> algorithm, the keysize
61 * <code>keysize</code> argument, and uses the <code>SecureRandom</code>
72 * <p>If the algorithm is the <i>DSA</i> algorithm, and the keysize (modulus
98 * For example, the <i>Sun</i> provider uses a default modulus size (keysize)
324 * Initializes the key pair generator for a certain keysize using
332 * @param keysize the keysize. This is an
336 * @exception InvalidParameterException if the <code>keysize</cod
339 initialize(int keysize) argument
357 initialize(int keysize, SecureRandom random) argument
622 initialize(int keysize, SecureRandom random) argument
[all...]
/openjdk7/jdk/test/com/sun/crypto/provider/KeyGenerator/
H A DTestExplicitKeyLength.java43 public static void runTest(String algo, int keysize) throws Exception { argument
45 kg.init(keysize);
48 if (actualSizeInBits != keysize) {
58 KEY_SIZES[i] + "-bit keysize");
/openjdk7/jdk/src/share/classes/javax/crypto/
H A DKeyGeneratorSpi.java68 * Initializes this key generator for a certain keysize, using the given
71 * @param keysize the keysize. This is an algorithm-specific metric,
75 * @exception InvalidParameterException if the keysize is wrong or not
78 protected abstract void engineInit(int keysize, SecureRandom random); argument
H A DKeyGenerator.java53 * <p>All key generators share the concepts of a <i>keysize</i> and a
59 * <code>keysize</code> argument, and uses the SecureRandom implementation
461 * Initializes this key generator for a certain keysize.
471 * @param keysize the keysize. This is an algorithm-specific metric,
474 * @exception InvalidParameterException if the keysize is wrong or not
477 public final void init(int keysize) { argument
478 init(keysize, JceSecurity.RANDOM);
482 * Initializes this key generator for a certain keysize, using a
485 * @param keysize th
492 init(int keysize, SecureRandom random) argument
[all...]
/openjdk7/jdk/test/sun/security/tools/keytool/
H A DStandardAlgName.sh72 ${TESTJAVA}${FS}bin${FS}keytool -genkey -v -alias pkcs12testCA -keyalg "RsA" -keysize 2048 -sigalg "ShA1wItHRSA" -dname "cn=PKCS12 Test CA, ou=Security SQE, o=JavaSoft, c=US" -validity 3650 -keypass storepass -keystore keystoreCA.jceks.data -storepass storepass -storetype jceKS 2>&1 | egrep 'RsA|ShA1wItHRSA'
79 ${TESTJAVA}${FS}bin${FS}keytool -genkey -v -alias pkcs12testLead -keyalg "rSA" -keysize 1024 -sigalg "mD5withRSA" -dname "cn=PKCS12 Test Lead, ou=Security SQE, o=JavaSoft, c=US" -validity 3650 -keypass storepass -keystore keystoreLead.jceks.data -storepass storepass -storetype jCeks 2>&1 | egrep 'rSA|mD5withRSA'
85 ${TESTJAVA}${FS}bin${FS}keytool -genkey -v -alias pkcs12testEndUser1 -keyalg "RSa" -keysize 1024 -sigalg "sHa1wIThRSA" -dname "cn=PKCS12 Test End User 1, ou=Security SQE, o=JavaSoft, c=US" -validity 3650 -keypass storepass -keystore keystoreEndUser1.jceks.data -storepass storepass -storetype Jceks 2>&1 | egrep 'RSa|sHa1wIThRSA'
H A DAltProviderPath.sh73 -keyalg "RSA" -keysize 1024 -sigalg "ShA1WithRSA" \
/openjdk7/jdk/src/share/classes/com/sun/jmx/snmp/
H A DSnmpUsmKeyHandler.java69 * @param keysize The privacy algorithm key size.
73 public byte[] localizePrivKey(String algoName, byte[] key, SnmpEngineId engineId,int keysize) throws IllegalArgumentException; argument
/openjdk7/jdk/test/com/sun/crypto/provider/Cipher/AES/
H A DTestKATForECB_VK.java658 private static byte[] constructKeyValue(int keysize, int rounds) { argument
659 byte[] tempKeyValue = new byte[keysize];
664 if ((whichByte >= keysize) || (whichDigit < 0) ||
666 throw new IllegalArgumentException("Invalid keysize/rounds " +
667 "combination :" + keysize +
/openjdk7/jdk/test/java/security/KeyPairGenerator/
H A DFailover.java129 public void initialize(int keysize, SecureRandom random) { argument
130 System.out.println("KeyPairGeneratorPass.initialize(" + keysize + ", " + random + ")");
147 public void initialize(int keysize, SecureRandom random) { argument
148 if (keysize != 512) {
/openjdk7/jdk/test/sun/security/mscapi/
H A DShortRSAKey1024.sh69 -keysize $BITS \
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/
H A DP11TlsRsaPremasterSecretGenerator.java82 protected void engineInit(int keysize, SecureRandom random) { argument

Completed in 52 milliseconds

12