/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
H A D | PBKDF2Params.java | 25 * keyLength INTEGER (1..MAX) OPTIONAL, 36 private ASN1Integer keyLength; field in class:PBKDF2Params 76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf. 80 * @param keyLength intended key length to be produced. 85 int keyLength) 89 this.keyLength = new ASN1Integer(keyLength); 93 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf. 97 * @param keyLength intended key length to be produced. 103 int keyLength, 82 PBKDF2Params( byte[] salt, int iterationCount, int keyLength) argument 100 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument [all...] |
/external/skia/src/gpu/ |
H A D | GrProgramDesc.h | 30 uint32_t keyLength() const { return *this->atOffset<uint32_t, kLengthOffset>(); } function in class:GrProgramDesc 36 uint32_t keyLength = other.keyLength(); local 37 fKey.reset(SkToInt(keyLength)); 38 memcpy(fKey.begin(), other.fKey.begin(), keyLength); 44 return 0 == memcmp(this->asKey(), other.asKey(), this->keyLength() & ~0x3); 52 return memcmp(a.asKey(), b.asKey(), a.keyLength() & ~0x3) < 0; 88 int keyLength = fKey.count(); local 89 SkASSERT(0 == (keyLength % 4)); 90 *(this->atOffset<uint32_t, GrProgramDesc::kLengthOffset>()) = SkToU32(keyLength); [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
H A D | PBEKeySpecTest.java | 61 * keyLength) method testing. Tests the behavior of the method in the case 69 int keyLength = 10; 73 iterationCount, keyLength); 83 new PBEKeySpec(password, null, iterationCount, keyLength); 92 new PBEKeySpec(password, new byte[0], iterationCount, keyLength); 99 new PBEKeySpec(password, salt, -1, keyLength); 108 + "in the case of negative keyLength."); 113 new PBEKeySpec(password, salt, 0, keyLength); 122 + "in the case of zero keyLength."); 127 iterationCount, keyLength); [all...] |
/external/okhttp/okhttp-ws/src/main/java/com/squareup/okhttp/internal/ws/ |
H A D | WebSocketProtocol.java | 86 int keyLength = key.length; 88 int keyIndex = (int) (frameBytesRead % keyLength);
|
/external/icu/icu4c/source/i18n/ |
H A D | rbt_rule.cpp | 84 keyLength = input.length() - anteContextLength; 92 keyLength = postContextPos - anteContextLength; 129 if (keyLength > 0) { 130 key = new StringMatcher(pattern, anteContextLength, anteContextLength + keyLength, 139 int32_t postContextLength = pattern.length() - keyLength - anteContextLength; 142 postContext = new StringMatcher(pattern, anteContextLength + keyLength, pattern.length(), 169 keyLength(other.keyLength), 303 keyLength <= r2.keyLength [all...] |
H A D | rbt_rule.h | 59 // TODO Eliminate the pattern and keyLength data members. They 62 // methods and pattern/keyLength can be isolated into a separate 93 * @see keyLength 122 * anteContextLength + keyLength) is the key. 125 int32_t keyLength; member in class:TransliterationRule
|
H A D | tznames_impl.cpp | 216 int32_t keyLength; local 221 keyLength = foldedKey.length(); 224 keyLength = key.length(); 229 for (index = 0; index < keyLength; ++index) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
H A D | HMac.java | 121 int keyLength = key.length; 123 if (keyLength > blockLength) 125 digest.update(key, 0, keyLength); 128 keyLength = digestSize; 132 System.arraycopy(key, 0, inputPad, 0, keyLength); 135 for (int i = keyLength; i < inputPad.length; i++)
|
/external/icu/icu4j/main/classes/translit/src/com/ibm/icu/text/ |
H A D | TransliterationRule.java | 46 // TODO Eliminate the pattern and keyLength data members. They 49 // methods and pattern/keyLength can be isolated into a separate 80 * @see keyLength 102 * anteContextLength + keyLength) is the key. 104 private int keyLength; field in class:TransliterationRule 171 keyLength = input.length() - anteContextLength; 177 keyLength = postContextPos - anteContextLength; 207 if (keyLength > 0) { 208 key = new StringMatcher(pattern.substring(anteContextLength, anteContextLength + keyLength), 212 int postContextLength = pattern.length() - keyLength [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLCipher.java | 679 protected void checkSupportedKeySize(int keyLength) throws InvalidKeyException { argument 680 switch (keyLength) { 686 throw new InvalidKeyException("Unsupported key size: " + keyLength 721 protected String getCipherName(int keyLength, Mode mode) { argument 722 return "aes-" + (keyLength * 8) + "-" + mode.toString().toLowerCase(Locale.US); 1064 protected abstract long getEVP_AEAD(int keyLength) throws InvalidKeyException; argument 1074 protected void checkSupportedKeySize(int keyLength) throws InvalidKeyException { argument 1075 switch (keyLength) { 1080 throw new InvalidKeyException("Unsupported key size: " + keyLength 1116 protected long getEVP_AEAD(int keyLength) throw argument [all...] |
/external/icu/icu4c/source/common/ |
H A D | loadednormalizer2impl.cpp | 247 int32_t keyLength=uprv_strlen(name)+1; local 248 char *nameCopy=(char *)uprv_malloc(keyLength); 253 uprv_memcpy(nameCopy, name, keyLength);
|
/external/icu/icu4c/source/test/intltest/ |
H A D | collationtest.cpp | 1366 int32_t keyLength; 1367 const uint8_t *keyBytes = key.getByteArray(keyLength); 1368 if(keyLength == 0 || keyBytes[keyLength - 1] != 0) { 1388 for(int32_t i = 0; i < (keyLength - 1); ++i) { 1420 if(keyLength != parts.length() || uprv_memcmp(keyBytes, parts.data(), keyLength) != 0) { 1529 int32_t keyLength; 1530 const uint8_t *bytes = key.getByteArray(keyLength);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
H A D | BlowfishEngine.java | 456 int keyLength = key.length; 469 if (keyIndex >= keyLength)
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.registry_3.5.0.v20100503.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.core.resources.compatibility_3.4.0.v20090505.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.apache.jasper_5.5.17.v201004212143.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.core.resources_3.6.1.R36x_v20101007-1215.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.jdt.core_3.6.2.v_A76_R36x.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | com.ibm.icu_4.2.1.v20100412.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.pde.core_3.6.1.v20100902_r361.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/google-tv-pairing-protocol/java/jar/ |
H A D | bcprov-jdk15-143.jar | META-INF/MANIFEST.MF META-INF/BCKEY.SF META-INF/BCKEY.DSA META ... |
/external/robolectric/lib/main/ |
H A D | android.jar | META-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ... |