/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
H A D | PBKDF2Params.java | 25 * keyLength INTEGER (1..MAX) OPTIONAL, 36 private ASN1Integer keyLength; field in class:PBKDF2Params 76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf. 80 * @param keyLength intended key length to be produced. 85 int keyLength) 89 this.keyLength = new ASN1Integer(keyLength); 93 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf. 97 * @param keyLength intended key length to be produced. 103 int keyLength, 82 PBKDF2Params( byte[] salt, int iterationCount, int keyLength) argument 100 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
H A D | PBEKeySpecTest.java | 61 * keyLength) method testing. Tests the behavior of the method in the case 69 int keyLength = 10; 73 iterationCount, keyLength); 83 new PBEKeySpec(password, null, iterationCount, keyLength); 92 new PBEKeySpec(password, new byte[0], iterationCount, keyLength); 99 new PBEKeySpec(password, salt, -1, keyLength); 108 + "in the case of negative keyLength."); 113 new PBEKeySpec(password, salt, 0, keyLength); 122 + "in the case of zero keyLength."); 127 iterationCount, keyLength); [all...] |
/external/chromium_org/third_party/icu/source/i18n/ |
H A D | rbt_rule.cpp | 84 keyLength = input.length() - anteContextLength; 92 keyLength = postContextPos - anteContextLength; 129 if (keyLength > 0) { 130 key = new StringMatcher(pattern, anteContextLength, anteContextLength + keyLength, 139 int32_t postContextLength = pattern.length() - keyLength - anteContextLength; 142 postContext = new StringMatcher(pattern, anteContextLength + keyLength, pattern.length(), 169 keyLength(other.keyLength), 303 keyLength <= r2.keyLength [all...] |
H A D | rbt_rule.h | 59 // TODO Eliminate the pattern and keyLength data members. They 62 // methods and pattern/keyLength can be isolated into a separate 93 * @see keyLength 122 * anteContextLength + keyLength) is the key. 125 int32_t keyLength; member in class:TransliterationRule
|
H A D | tznames_impl.cpp | 186 int32_t keyLength; local 191 keyLength = foldedKey.length(); 194 keyLength = key.length(); 199 for (index = 0; index < keyLength; ++index) {
|
/external/icu/icu4c/source/i18n/ |
H A D | rbt_rule.cpp | 84 keyLength = input.length() - anteContextLength; 92 keyLength = postContextPos - anteContextLength; 129 if (keyLength > 0) { 130 key = new StringMatcher(pattern, anteContextLength, anteContextLength + keyLength, 139 int32_t postContextLength = pattern.length() - keyLength - anteContextLength; 142 postContext = new StringMatcher(pattern, anteContextLength + keyLength, pattern.length(), 169 keyLength(other.keyLength), 303 keyLength <= r2.keyLength [all...] |
H A D | rbt_rule.h | 59 // TODO Eliminate the pattern and keyLength data members. They 62 // methods and pattern/keyLength can be isolated into a separate 93 * @see keyLength 122 * anteContextLength + keyLength) is the key. 125 int32_t keyLength; member in class:TransliterationRule
|
H A D | tznames_impl.cpp | 186 int32_t keyLength; local 191 keyLength = foldedKey.length(); 194 keyLength = key.length(); 199 for (index = 0; index < keyLength; ++index) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
H A D | HMac.java | 121 int keyLength = key.length; 123 if (keyLength > blockLength) 125 digest.update(key, 0, keyLength); 128 keyLength = digestSize; 132 System.arraycopy(key, 0, inputPad, 0, keyLength); 135 for (int i = keyLength; i < inputPad.length; i++)
|
/external/chromium_org/third_party/libaddressinput/src/java/src/com/android/i18n/addressinput/ |
H A D | Util.java | 156 int keyLength = keys.length; 161 if (names.length > keyLength) { 166 for (int i = 0; i < keyLength; i++) { 177 if (lnames.length > keyLength) { 182 for (int i = 0; i < keyLength; i++) {
|
/external/skia/src/gpu/gl/ |
H A D | GrGLProgramDesc.h | 45 uint32_t keyLength() const { return *this->atOffset<uint32_t, kLengthOffset>(); } function in class:GrGLProgramDesc 95 return 0 == memcmp(this->asKey(), other.asKey(), this->keyLength() & ~0x3); 103 return memcmp(a.asKey(), b.asKey(), a.keyLength() & ~0x3) < 0;
|
H A D | GrGLProgramDesc.cpp | 280 size_t keyLength = other.keyLength(); 281 fKey.reset(keyLength); 282 memcpy(fKey.get(), other.fKey.get(), keyLength);
|
/external/chromium_org/third_party/skia/src/gpu/gl/ |
H A D | GrGLProgramDesc.cpp | 407 int keyLength = fKey.count(); 408 SkASSERT(0 == (keyLength % 4)); 409 *this->atOffset<uint32_t, kLengthOffset>() = SkToU32(keyLength); 413 *checksum = SkChecksum::Compute(reinterpret_cast<uint32_t*>(fKey.begin()), keyLength); 417 size_t keyLength = other.keyLength(); 418 fKey.reset(keyLength); 419 memcpy(fKey.begin(), other.fKey.begin(), keyLength);
|
H A D | GrGLProgramDesc.h | 42 uint32_t keyLength() const { return *this->atOffset<uint32_t, kLengthOffset>(); } function in class:GrGLProgramDesc 94 return 0 == memcmp(this->asKey(), other.asKey(), this->keyLength() & ~0x3); 102 return memcmp(a.asKey(), b.asKey(), a.keyLength() & ~0x3) < 0;
|
/external/skia/tests/ |
H A D | GLProgramsTest.cpp | 34 size_t keyLength = KeyLength(numEffects); local 35 fKey.reset(keyLength); 36 *this->atOffset<uint32_t, kLengthOffset>() = static_cast<uint32_t>(keyLength); 122 *this->checksum() = SkChecksum::Compute(reinterpret_cast<uint32_t*>(fKey.get()), keyLength);
|
/external/chromium_org/third_party/WebKit/public/platform/ |
H A D | WebMediaPlayer.h | 161 virtual MediaKeyException addKey(const WebString& keySystem, const unsigned char* key, unsigned keyLength, const unsigned char* initData, unsigned initDataLength, const WebString& sessionId) { return MediaKeyExceptionKeySystemNotSupported; } argument
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLCipher.java | 592 protected void checkSupportedKeySize(int keyLength) throws InvalidKeyException { argument 593 switch (keyLength) { 599 throw new InvalidKeyException("Unsupported key size: " + keyLength + " bytes"); 637 protected String getCipherName(int keyLength, Mode mode) { argument 638 return "aes-" + (keyLength * 8) + "-" + mode.toString().toLowerCase(Locale.US);
|
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | tlsrecordlayer.py | 1060 keyLength = 16 1064 keyLength = 32 1068 keyLength = 16 1072 keyLength = 24 1090 outputLength = (macLength*2) + (keyLength*2) + (ivLength*2) 1111 clientKeyBlock = p.getFixBytes(keyLength) 1112 serverKeyBlock = p.getFixBytes(keyLength)
|
/external/icu/icu4c/source/test/intltest/ |
H A D | collationtest.cpp | 1317 int32_t keyLength; local 1318 const uint8_t *keyBytes = key.getByteArray(keyLength); 1319 if(keyLength == 0 || keyBytes[keyLength - 1] != 0) { 1339 for(int32_t i = 0; i < (keyLength - 1); ++i) { 1411 (mergedKeyLength != keyLength || 1412 uprv_memcmp(mergedKey.getAlias(), keyBytes, keyLength) != 0)) { 1435 if(keyLength != parts.length() || uprv_memcmp(keyBytes, parts.data(), keyLength) != 0) { 1639 int32_t keyLength; local [all...] |
/external/chromium_org/third_party/icu/source/common/ |
H A D | normalizer2.cpp | 664 int32_t keyLength=uprv_strlen(name)+1; local 665 char *nameCopy=(char *)uprv_malloc(keyLength); 670 uprv_memcpy(nameCopy, name, keyLength);
|
/external/icu/icu4c/source/common/ |
H A D | normalizer2.cpp | 664 int32_t keyLength=uprv_strlen(name)+1; local 665 char *nameCopy=(char *)uprv_malloc(keyLength); 670 uprv_memcpy(nameCopy, name, keyLength);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
H A D | BlowfishEngine.java | 456 int keyLength = key.length; 469 if (keyIndex >= keyLength)
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.registry_3.5.0.v20100503.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.core.resources.compatibility_3.4.0.v20090505.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.apache.jasper_5.5.17.v201004212143.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |