/external/bouncycastle/src/main/java/org/bouncycastle/asn1/pkcs/ |
PBKDF2Params.java | 20 DERInteger keyLength; 56 keyLength = (DERInteger)e.nextElement(); 60 keyLength = null; 76 if (keyLength != null) 78 return keyLength.getValue(); 91 if (keyLength != null) 93 v.add(keyLength);
|
/external/chromium/third_party/icu/source/i18n/ |
rbt_rule.h | 59 // TODO Eliminate the pattern and keyLength data members. They 62 // methods and pattern/keyLength can be isolated into a separate 93 * @see keyLength 122 * anteContextLength + keyLength) is the key. 125 int32_t keyLength;
|
colldata.cpp | 518 int32_t keyLength = KEY_BUFFER_SIZE; 519 char *key = getKey(collator, keyBuffer, &keyLength); 529 newData = new CollData(collator, key, keyLength, status);
|
zstrfmt.cpp | 231 int32_t keyLength; 236 keyLength = foldedKey.length(); 239 keyLength = key.length(); 244 for (index = 0; index < keyLength; ++index) { [all...] |
/external/icu4c/i18n/ |
rbt_rule.h | 59 // TODO Eliminate the pattern and keyLength data members. They 62 // methods and pattern/keyLength can be isolated into a separate 93 * @see keyLength 122 * anteContextLength + keyLength) is the key. 125 int32_t keyLength;
|
colldata.cpp | 516 int32_t keyLength = KEY_BUFFER_SIZE; 517 char *key = getKey(collator, keyBuffer, &keyLength); 527 newData = new CollData(collator, key, keyLength, status);
|
zstrfmt.cpp | 272 int32_t keyLength; 277 keyLength = foldedKey.length(); 280 keyLength = key.length(); 285 for (index = 0; index < keyLength; ++index) { [all...] |
/libcore/luni/src/main/java/javax/crypto/spec/ |
PBEKeySpec.java | 34 private final int keyLength; 51 keyLength = 0; 64 * @param keyLength 73 int keyLength) { 83 if (keyLength <= 0) { 84 throw new IllegalArgumentException("keyLength <= 0"); 96 this.keyLength = keyLength; 134 this.keyLength = 0; 191 return keyLength; [all...] |
/libcore/luni/src/test/java/libcore/javax/crypto/ |
SecretKeyFactoryTest.java | 131 int keyLength = 64; 136 test_PBKDF2(password, salt, iterations, keyLength, expected); 152 int keyLength = 192; 159 test_PBKDF2(password, salt, iterations, keyLength, expected); 162 private void test_PBKDF2(char[] password, byte[] salt, int iterations, int keyLength, 165 KeySpec ks = new PBEKeySpec(password, salt, iterations, keyLength);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
PBEKeySpecTest.java | 74 * keyLength) method testing. Tests the behavior of the method in the case 88 int keyLength = 10; 92 iterationCount, keyLength); 102 new PBEKeySpec(password, null, iterationCount, keyLength); 111 new PBEKeySpec(password, new byte [0], iterationCount, keyLength); 118 new PBEKeySpec(password, salt, -1, keyLength); 127 + "in the case of negative keyLength."); 132 new PBEKeySpec(password, salt, 0, keyLength); 141 + "in the case of zero keyLength."); 146 iterationCount, keyLength); [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/ |
BlowfishEngine.java | 455 int keyLength = key.length; 468 if (keyIndex >= keyLength)
|
/external/icu4c/common/ |
normalizer2.cpp | 581 int32_t keyLength=uprv_strlen(name)+1; 582 char *nameCopy=(char *)uprv_malloc(keyLength); 587 uprv_memcpy(nameCopy, name, keyLength);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherThread.java | 33 private int keyLength = 0; 64 keyLength = getNextKey(); 108 return keyLength; 124 return "Alg name:" + algName + " Key:" + keyLength + " Mode:" + mode +
|
/external/chromium/third_party/icu/source/tools/toolutil/ |
pkgitems.cpp | 183 int32_t keyLength; 185 keyLength=(int32_t)strlen(inKey); 186 if(keyLength!=gAliasKeyLength) { 202 int32_t keyLength; 204 keyLength=(int32_t)strlen(parentKey); 205 if(keyLength!=gDependencyKeyLength) {
|
/packages/inputmethods/OpenWnn/libs/libwnnDictionary/ |
OpenWnnDictionaryImplJni.c | [all...] |
/libcore/luni/src/main/java/java/util/ |
Properties.java | 301 int offset = 0, keyLength = -1, intVal; 390 if (offset > 0 || (offset == 0 && keyLength == 0)) { 391 if (keyLength == -1) { 392 keyLength = offset; 395 put(temp.substring(0, keyLength), temp 396 .substring(keyLength)); 398 keyLength = -1; 403 keyLength = offset; 409 if (keyLength == -1) { // if parsing the key 411 keyLength = offset [all...] |
/external/chromium/net/third_party/nss/ssl/ |
ssl3con.c | [all...] |
/prebuilt/common/ecj/ |
ecj.jar | |
/prebuilt/sdk/4/ |
android.jar | |
/prebuilt/sdk/5/ |
android.jar | |
/prebuilt/sdk/6/ |
android.jar | |
/prebuilt/sdk/8/ |
android.jar | |