/libcore/luni/src/main/java/javax/crypto/spec/ |
PBEKeySpec.java | 35 private final int keyLength; 52 keyLength = 0; 65 * @param keyLength 74 int keyLength) { 84 if (keyLength <= 0) { 85 throw new IllegalArgumentException("keyLength <= 0"); 97 this.keyLength = keyLength; 135 this.keyLength = 0; 192 return keyLength; [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/asn1/pkcs/ |
PBKDF2Params.java | 20 DERInteger keyLength; 56 keyLength = (DERInteger)e.nextElement(); 60 keyLength = null; 76 if (keyLength != null) 78 return keyLength.getValue(); 91 if (keyLength != null) 93 v.add(keyLength);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/ |
KeyMaterial.java | 26 int keyLength) 28 byte[] res = new byte[keyLength]; 31 int numRounds = (keyLength + dglen - 1) / dglen; 44 int produced = Math.min(dglen, keyLength); 48 keyLength -= produced; 61 produced = Math.min(dglen, keyLength); 63 keyLength -= produced;
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
PBEKeySpecTest.java | 61 * keyLength) method testing. Tests the behavior of the method in the case 69 int keyLength = 10; 73 iterationCount, keyLength); 83 new PBEKeySpec(password, null, iterationCount, keyLength); 92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength); 99 new PBEKeySpec(password, salt, -1, keyLength); 108 + "in the case of negative keyLength."); 113 new PBEKeySpec(password, salt, 0, keyLength); 122 + "in the case of zero keyLength."); 127 iterationCount, keyLength); [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
PBEKeySpecTest.java | 61 * keyLength) method testing. Tests the behavior of the method in the case 69 int keyLength = 10; 73 iterationCount, keyLength); 83 new PBEKeySpec(password, null, iterationCount, keyLength); 92 new PBEKeySpec(password, new byte [0], iterationCount, keyLength); 99 new PBEKeySpec(password, salt, -1, keyLength); 108 + "in the case of negative keyLength."); 113 new PBEKeySpec(password, salt, 0, keyLength); 122 + "in the case of zero keyLength."); 127 iterationCount, keyLength); [all...] |
/libcore/luni/src/main/java/java/util/ |
Properties.java | 283 int offset = 0, keyLength = -1, intVal; 372 if (offset > 0 || (offset == 0 && keyLength == 0)) { 373 if (keyLength == -1) { 374 keyLength = offset; 377 put(temp.substring(0, keyLength), temp 378 .substring(keyLength)); 380 keyLength = -1; 385 keyLength = offset; 391 if (keyLength == -1) { // if parsing the key 393 keyLength = offset [all...] |
/external/icu4c/i18n/ |
rbt_rule.cpp | 83 keyLength = input.length() - anteContextLength; 91 keyLength = postContextPos - anteContextLength; 128 if (keyLength > 0) { 129 key = new StringMatcher(pattern, anteContextLength, anteContextLength + keyLength, 138 int32_t postContextLength = pattern.length() - keyLength - anteContextLength; 141 postContext = new StringMatcher(pattern, anteContextLength + keyLength, pattern.length(), 168 keyLength(other.keyLength), 302 keyLength <= r2.keyLength & [all...] |
rbt_rule.h | 59 // TODO Eliminate the pattern and keyLength data members. They 62 // methods and pattern/keyLength can be isolated into a separate 93 * @see keyLength 122 * anteContextLength + keyLength) is the key. 125 int32_t keyLength;
|
tznames_impl.cpp | 185 int32_t keyLength; 190 keyLength = foldedKey.length(); 193 keyLength = key.length(); 198 for (index = 0; index < keyLength; ++index) { [all...] |
colldata.cpp | 518 int32_t keyLength = KEY_BUFFER_SIZE; 519 char *key = getKey(collator, keyBuffer, &keyLength); 529 newData = new CollData(collator, key, keyLength, status);
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
SecretKeyFactoryTest.java | 131 int keyLength = 64; 136 test_PBKDF2(password, salt, iterations, keyLength, expected); 152 int keyLength = 192; 159 test_PBKDF2(password, salt, iterations, keyLength, expected); 162 private void test_PBKDF2(char[] password, byte[] salt, int iterations, int keyLength, 165 KeySpec ks = new PBEKeySpec(password, salt, iterations, keyLength);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherThread.java | 33 private int keyLength = 0; 64 keyLength = getNextKey(); 108 return keyLength; 124 return "Alg name:" + algName + " Key:" + keyLength + " Mode:" + mode +
|
/frameworks/base/drm/java/android/drm/ |
DrmUtils.java | 157 int keyLength = readByte(constraintData, index); 165 String strKey = readMultipleBytes(constraintData, keyLength, index); 166 index += keyLength;
|
/external/bouncycastle/src/main/java/org/bouncycastle/openssl/ |
PEMUtilities.java | 253 int keyLength, 256 return getKey(password, algorithm, keyLength, salt, false); 262 int keyLength, 271 keyParam = (KeyParameter) pGen.generateDerivedParameters(keyLength * 8);
|
/packages/inputmethods/OpenWnn/libs/libwnnDictionary/ |
OpenWnnDictionaryImplJni.c | [all...] |
/external/icu4c/common/ |
normalizer2.cpp | 602 int32_t keyLength=uprv_strlen(name)+1; 603 char *nameCopy=(char *)uprv_malloc(keyLength); 608 uprv_memcpy(nameCopy, name, keyLength);
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/ |
BlowfishEngine.java | 455 int keyLength = key.length; 468 if (keyIndex >= keyLength)
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
BlowFish.java | 296 int keyLength = key.length; 309 if (keyIndex >= keyLength)
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.registry_3.5.0.v20100503.jar | |
org.eclipse.core.resources.compatibility_3.4.0.v20090505.jar | |
org.apache.jasper_5.5.17.v201004212143.jar | |
org.eclipse.core.resources_3.6.1.R36x_v20101007-1215.jar | |
com.ibm.icu_4.2.1.v20100412.jar | |
/prebuilt/common/ecj/ |
ecj.jar | |
/prebuilts/tools/common/http-client/ |
httpclient-4.1.1.jar | |