/libcore/ojluni/src/main/java/java/security/spec/ |
EncodedKeySpec.java | 45 private byte[] encodedKey; 50 * @param encodedKey the encoded key. The contents of the 52 * @exception NullPointerException if <code>encodedKey</code> 55 public EncodedKeySpec(byte[] encodedKey) { 56 this.encodedKey = encodedKey.clone(); 66 return this.encodedKey.clone();
|
PKCS8EncodedKeySpec.java | 67 * @param encodedKey the key, which is assumed to be 70 * @exception NullPointerException if <code>encodedKey</code> 73 public PKCS8EncodedKeySpec(byte[] encodedKey) { 74 super(encodedKey);
|
X509EncodedKeySpec.java | 57 * @param encodedKey the key, which is assumed to be 60 * @exception NullPointerException if <code>encodedKey</code> 63 public X509EncodedKeySpec(byte[] encodedKey) { 64 super(encodedKey);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ |
EncodedKeySpecTest.java | 51 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 52 EncodedKeySpec meks = new MyEncodedKeySpec(encodedKey); 59 for (int i = 0; i < encodedKey.length; i++) { 60 if (encodedKey[i] != ek[i]) { 75 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 77 EncodedKeySpec meks = new MyEncodedKeySpec(encodedKey); 80 encodedKey[3] = (byte) 5; 96 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 97 EncodedKeySpec meks = new MyEncodedKeySpec(encodedKey);
|
PKCS8EncodedKeySpecTest.java | 54 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 56 EncodedKeySpec eks = new PKCS8EncodedKeySpec(encodedKey); 66 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 68 PKCS8EncodedKeySpec meks = new PKCS8EncodedKeySpec(encodedKey); 72 assertTrue(Arrays.equals(encodedKey, ek)); 80 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 82 PKCS8EncodedKeySpec meks = new PKCS8EncodedKeySpec(encodedKey); 94 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 96 byte[] encodedKeyCopy = encodedKey.clone(); 108 assertTrue(Arrays.equals(encodedKey, ek)) [all...] |
X509EncodedKeySpecTest.java | 54 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 56 EncodedKeySpec eks = new X509EncodedKeySpec(encodedKey); 66 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 68 X509EncodedKeySpec eks = new X509EncodedKeySpec(encodedKey); 72 assertTrue(Arrays.equals(encodedKey, ek)); 80 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 82 X509EncodedKeySpec meks = new X509EncodedKeySpec(encodedKey); 94 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 96 byte[] encodedKeyCopy = encodedKey.clone(); 108 assertTrue(Arrays.equals(encodedKey, ek)) [all...] |
/libcore/luni/src/test/java/tests/security/spec/ |
EncodedKeySpecTest.java | 42 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 43 EncodedKeySpec eks = new MyEncodedKeySpec(encodedKey); 45 assertTrue("wrong encoded key was returned", Arrays.equals(encodedKey, 49 encodedKey = null; 51 eks = new MyEncodedKeySpec(encodedKey); 63 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 }; 64 EncodedKeySpec meks = new MyEncodedKeySpec(encodedKey); 71 for (int i = 0; i < encodedKey.length; i++) { 72 if (encodedKey[i] != ek[i]) { 87 byte[] encodedKey = new byte[] { (byte) 1, (byte) 2, (byte) 3, (byte) 4 } [all...] |
PKCS8EncodedKeySpecTest.java | 47 byte[] encodedKey = new byte[] {(byte)1,(byte)2,(byte)3,(byte)4}; 49 EncodedKeySpec eks = new PKCS8EncodedKeySpec(encodedKey); 65 byte[] encodedKey = new byte[] {(byte)1,(byte)2,(byte)3,(byte)4}; 67 PKCS8EncodedKeySpec meks = new PKCS8EncodedKeySpec(encodedKey); 71 assertTrue(Arrays.equals(encodedKey, ek)); 79 byte[] encodedKey = new byte[] {(byte)1,(byte)2,(byte)3,(byte)4}; 81 PKCS8EncodedKeySpec meks = new PKCS8EncodedKeySpec(encodedKey); 93 byte[] encodedKey = new byte[] {(byte)1,(byte)2,(byte)3,(byte)4}; 95 byte[] encodedKeyCopy = encodedKey.clone(); 107 assertTrue(Arrays.equals(encodedKey, ek)) [all...] |
X509EncodedKeySpecTest.java | 48 byte[] encodedKey = new byte[] {(byte)1,(byte)2,(byte)3,(byte)4}; 50 EncodedKeySpec eks = new X509EncodedKeySpec(encodedKey); 66 byte[] encodedKey = new byte[] {(byte)1,(byte)2,(byte)3,(byte)4}; 68 X509EncodedKeySpec eks = new X509EncodedKeySpec(encodedKey); 72 assertTrue(Arrays.equals(encodedKey, ek)); 80 byte[] encodedKey = new byte[] {(byte)1,(byte)2,(byte)3,(byte)4}; 82 X509EncodedKeySpec meks = new X509EncodedKeySpec(encodedKey); 94 byte[] encodedKey = new byte[] {(byte)1,(byte)2,(byte)3,(byte)4}; 96 byte[] encodedKeyCopy = encodedKey.clone(); 108 assertTrue(Arrays.equals(encodedKey, ek)) [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/spec/ |
MyEncodedKeySpec.java | 35 * @param encodedKey 37 public MyEncodedKeySpec(byte[] encodedKey) { 38 super(encodedKey);
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/spec/ |
MyEncodedKeySpec.java | 35 * @param encodedKey 37 public MyEncodedKeySpec(byte[] encodedKey) { 38 super(encodedKey);
|
/frameworks/av/drm/mediadrm/plugins/clearkey/ |
JsonWebKey.cpp | 68 String8 encodedKey, encodedKeyId; 74 encodedKey.clear(); 79 if (findKey(mJsonObjects[i], &encodedKeyId, &encodedKey)) { 80 if (encodedKeyId.isEmpty() || encodedKey.isEmpty()) { 90 if (!decodeBase64String(encodedKey, &decodedKey)) { 91 ALOGE("Failed to decode key(%s)", encodedKey.string()); 133 String8* encodedKey) { 149 findValue(kKeyTag, encodedKey);
|
JsonWebKey.h | 51 String8* encodedKey);
|
/libcore/ojluni/src/main/java/sun/security/pkcs/ |
PKCS8Key.java | 64 protected byte[] encodedKey; 291 if (encodedKey == null) { 297 encodedKey = out.toByteArray(); 304 return encodedKey.clone(); 366 public void decode(byte[] encodedKey) throws InvalidKeyException { 367 decode(new ByteArrayInputStream(encodedKey)); 425 if (encodedKey != null) { 426 b1 = encodedKey;
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLCipher.java | 88 protected byte[] encodedKey; 117 * initialized for encryption or decryption. The {@code encodedKey} will be 120 protected abstract void engineInitInternal(byte[] encodedKey, AlgorithmParameterSpec params, 262 engineInitInternal(this.encodedKey, null, random); 273 engineInitInternal(this.encodedKey, params, random); 438 final byte[] encodedKey = key.getEncoded(); 439 if (encodedKey == null) { 442 checkSupportedKeySize(encodedKey.length); 443 this.encodedKey = encodedKey; [all...] |
/libcore/ojluni/src/main/java/sun/security/x509/ |
X509Key.java | 89 protected byte[] encodedKey; 316 byte[] encoded = encodedKey; 326 encodedKey = encoded; 402 public void decode(byte[] encodedKey) throws InvalidKeyException { 403 decode(new ByteArrayInputStream(encodedKey));
|
/libcore/ojluni/src/main/java/javax/crypto/ |
EncryptedPrivateKeyInfo.java | 427 private static void checkPKCS8Encoding(byte[] encodedKey) 429 DerInputStream in = new DerInputStream(encodedKey);
|
/frameworks/base/core/java/android/net/ |
Uri.java | [all...] |
/external/robolectric/v1/src/main/java/android/net/ |
Uri__FromAndroid.java | [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
KeySetManagerService.java | 658 String encodedKey = encodePublicKey(pkh.getKey()); 661 serializer.attribute(null, "value", encodedKey);
|
/libcore/ojluni/src/main/java/java/security/cert/ |
X509CertSelector.java | [all...] |
/frameworks/base/core/java/android/content/pm/ |
PackageParser.java | [all...] |
/prebuilts/tools/common/m2/repository/com/google/http-client/google-http-client/1.19.0/ |
google-http-client-1.19.0.jar | |
/prebuilts/tools/common/m2/repository/io/netty/netty-handler/4.1.0.CR3/ |
netty-handler-4.1.0.CR3.jar | |
/prebuilts/sdk/tools/lib/ |
signapk.jar | |