Lines Matching refs:strength
88 * Default strength of a DRBG instance if it is not configured.
182 * Security strength for this instance. Must be assigned in
184 * strength. Might be smaller than the highest strength
191 * The real strength is based on it. Do not modify it in a mechanism.
247 * Decides what algorithm and strength to use (SHA-256 or AES-256,
252 * {@link #DEFAULT_STRENGTH} to decide which algorithm and strength to use.
256 * the algorithm will use the strength (an exception will be thrown if
257 * the strength is not supported), otherwise, the smaller one of
258 * the highest supported strength of the algorithm and the default strength
268 * Here are some examples of the algorithm and strength chosen (suppose
299 * Note that the other parameters (nonce, strength, ps) are already
361 throw new IllegalArgumentException("strength too high: "
491 // (does it need only strength or seedlen of entropy?)
545 // another DRBG with weaker strength. So we choose highest
546 // strength we support.
611 * strength, pr_false, no personalization string) is used.
628 params = DrbgParameters.instantiation(m.strength,
640 throw new IllegalArgumentException("strength too big: "
719 // 128 bits of nonce can be used by 256-bit strength DRBG
747 * Returns the smallest standard strength (112, 128, 192, 256) that is
750 * @param input the input strength
751 * @return the standard strength