/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | OpenSSLMac.java | 46 private byte[] keyBytes; field in OpenSSLMac 79 keyBytes = key.getEncoded(); in engineInit() 80 if (keyBytes == null) { in engineInit() 89 if (keyBytes != null) { in resetContext() 90 NativeCrypto.HMAC_Init_ex(ctxLocal, keyBytes, evp_md); in resetContext()
|
D | KeyGeneratorImpl.java | 73 protected byte[] doKeyGeneration(int keyBytes) { in doKeyGeneration() argument 74 byte[] keyData = new byte[keyBytes]; in doKeyGeneration() 138 protected byte[] doKeyGeneration(int keyBytes) { in doKeyGeneration() argument 147 if (keyBytes == 14) { in doKeyGeneration()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
D | RC4Engine.java | 113 private void setKey(byte[] keyBytes) in setKey() argument 115 workingKey = keyBytes; in setKey() 138 i2 = ((keyBytes[i1] & 0xff) + engineState[i] + i2) & 0xff; in setKey() 143 i1 = (i1+1) % keyBytes.length; in setKey()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
D | BaseAgreementSpi.java | 270 byte[] keyBytes = new byte[keySize / 8]; in engineGenerateSecret() 296 kdf.generateBytes(keyBytes, 0, keyBytes.length); in engineGenerateSecret() 298 secret = keyBytes; in engineGenerateSecret() 304 byte[] keyBytes = new byte[keySize / 8]; in engineGenerateSecret() 306 System.arraycopy(secret, 0, keyBytes, 0, keyBytes.length); in engineGenerateSecret() 308 secret = keyBytes; in engineGenerateSecret()
|
/external/icu/android_icu4j/src/main/java/android/icu/impl/ |
D | ICUResourceBundleReader.java | 134 private byte[] keyBytes; field in ICUResourceBundleReader 297 keyBytes = new byte[(keysTop - keysBottom) << 2]; in init() 301 keyBytes = new byte[localKeyLimit]; in init() 303 bytes.get(keyBytes); in init() 447 private static String makeKeyStringFromBytes(byte[] keyBytes, int keyOffset) { in makeKeyStringFromBytes() argument 450 while((b = keyBytes[keyOffset]) != 0) { in makeKeyStringFromBytes() 458 return makeKeyStringFromBytes(keyBytes, keyOffset); in getKey16String() 460 return makeKeyStringFromBytes(poolBundleReader.keyBytes, keyOffset - localKeyLimit); in getKey16String() 465 return makeKeyStringFromBytes(keyBytes, keyOffset); in getKey32String() 467 return makeKeyStringFromBytes(poolBundleReader.keyBytes, keyOffset & 0x7fffffff); in getKey32String() [all …]
|
D | UResource.java | 56 private Key(byte[] keyBytes, int keyOffset, int keyLength) { in Key() argument 57 bytes = keyBytes; in Key() 72 public Key setBytes(byte[] keyBytes, int keyOffset) { in setBytes() argument 73 bytes = keyBytes; in setBytes() 75 for (length = 0; keyBytes[keyOffset + length] != 0; ++length) {} in setBytes()
|
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/ |
D | ICUResourceBundleReader.java | 132 private byte[] keyBytes; field in ICUResourceBundleReader 295 keyBytes = new byte[(keysTop - keysBottom) << 2]; in init() 299 keyBytes = new byte[localKeyLimit]; in init() 301 bytes.get(keyBytes); in init() 445 private static String makeKeyStringFromBytes(byte[] keyBytes, int keyOffset) { in makeKeyStringFromBytes() argument 448 while((b = keyBytes[keyOffset]) != 0) { in makeKeyStringFromBytes() 456 return makeKeyStringFromBytes(keyBytes, keyOffset); in getKey16String() 458 return makeKeyStringFromBytes(poolBundleReader.keyBytes, keyOffset - localKeyLimit); in getKey16String() 463 return makeKeyStringFromBytes(keyBytes, keyOffset); in getKey32String() 465 return makeKeyStringFromBytes(poolBundleReader.keyBytes, keyOffset & 0x7fffffff); in getKey32String() [all …]
|
D | UResource.java | 54 private Key(byte[] keyBytes, int keyOffset, int keyLength) { in Key() argument 55 bytes = keyBytes; in Key() 70 public Key setBytes(byte[] keyBytes, int keyOffset) { in setBytes() argument 71 bytes = keyBytes; in setBytes() 73 for (length = 0; keyBytes[keyOffset + length] != 0; ++length) {} in setBytes()
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
D | HMAC_SHA1.java | 69 byte[] keyBytes = keyString.getBytes(ENCODING); in computeSignature() 70 this.key = new SecretKeySpec(keyBytes, MAC_NAME); in computeSignature()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
D | PBE.java | 453 byte[] keyBytes = key.getEncoded(); in makePBEMacParameters() 459 for (int i = 0; i != keyBytes.length; i++) in makePBEMacParameters() 461 keyBytes[i] = 0; in makePBEMacParameters()
|
/external/skia/src/utils/ |
D | SkShadowUtils.cpp | 364 int keyBytes() const { return fShapeForKey.unstyledKeySize() * sizeof(uint32_t); } in keyBytes() function in __anon33e536640111::ShadowedPath 370 int keyBytes() const { return -1; } in keyBytes() function in __anon33e536640111::ShadowedPath 398 int keyDataBytes = path.keyBytes(); in draw_shadow()
|
/external/icu/android_icu4j/src/main/tests/android/icu/dev/test/collator/ |
D | CollationTest.java | 1386 byte[] keyBytes = key.toByteArray(); 1387 if (keyBytes.length == 0 || keyBytes[keyBytes.length - 1] != 0) { 1405 for (int i = 0; i < (keyBytes.length - 1); ++i) { 1406 byte b = keyBytes[i];
|
/external/icu/icu4j/main/tests/collate/src/com/ibm/icu/dev/test/collator/ |
D | CollationTest.java | 1385 byte[] keyBytes = key.toByteArray(); 1386 if (keyBytes.length == 0 || keyBytes[keyBytes.length - 1] != 0) { 1404 for (int i = 0; i < (keyBytes.length - 1); ++i) { 1405 byte b = keyBytes[i];
|
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
D | WifiManagerFacade.java | 463 byte[] keyBytes = base64StrToBytes(key); in strToPrivateKey() 464 PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(keyBytes); in strToPrivateKey() 472 byte[] keyBytes = base64StrToBytes(key); in strToPublicKey() 473 X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes); in strToPublicKey()
|
/external/webrtc/webrtc/examples/objc/AppRTCDemo/third_party/SocketRocket/ |
D | SRWebSocket.m | 506 NSMutableData *keyBytes = [[NSMutableData alloc] initWithLength:16]; 507 SecRandomCopyBytes(kSecRandomDefault, keyBytes.length, keyBytes.mutableBytes); 509 if ([keyBytes respondsToSelector:@selector(base64EncodedStringWithOptions:)]) { 510 _secKey = [keyBytes base64EncodedStringWithOptions:0]; 512 _secKey = [keyBytes base64Encoding];
|
/external/icu/icu4c/source/test/intltest/ |
D | collationtest.cpp | 1366 const uint8_t *keyBytes = key.getByteArray(keyLength); in getCollationKey() local 1367 if(keyLength == 0 || keyBytes[keyLength - 1] != 0) { in getCollationKey() 1388 uint8_t b = keyBytes[i]; in getCollationKey() 1419 if(keyLength != parts.length() || uprv_memcmp(keyBytes, parts.data(), keyLength) != 0) { in getCollationKey()
|
/external/icu/icu4c/source/tools/genrb/ |
D | reslist.cpp | 1232 SRBRoot::addKeyBytes(const char *keyBytes, int32_t length, UErrorCode &errorCode) { in addKeyBytes() argument 1238 if (length < 0 || (keyBytes == NULL && length != 0)) { in addKeyBytes() 1258 uprv_memcpy(fKeys + keypos, keyBytes, length); in addKeyBytes()
|
D | reslist.h | 83 int32_t addKeyBytes(const char *keyBytes, int32_t length, UErrorCode &errorCode);
|
/external/conscrypt/common/src/jni/main/cpp/ |
D | NativeCrypto.cpp | 2942 ScopedByteArrayRO keyBytes(env, keyArray); in NativeCrypto_EVP_CipherInit_ex() local 2943 if (keyBytes.get() == nullptr) { in NativeCrypto_EVP_CipherInit_ex() 2947 keyPtr.reset(new unsigned char[keyBytes.size()]); in NativeCrypto_EVP_CipherInit_ex() 2948 memcpy(keyPtr.get(), keyBytes.get(), keyBytes.size()); in NativeCrypto_EVP_CipherInit_ex() 3217 ScopedByteArrayRO keyBytes(env, keyArray); in evp_aead_ctx_op() local 3218 if (keyBytes.get() == nullptr) { in evp_aead_ctx_op() 3268 const uint8_t* keyTmp = reinterpret_cast<const uint8_t*>(keyBytes.get()); in evp_aead_ctx_op() 3269 if (!EVP_AEAD_CTX_init(aeadCtx.get(), evpAead, keyTmp, keyBytes.size(), in evp_aead_ctx_op() 3343 ScopedByteArrayRO keyBytes(env, keyArray); in NativeCrypto_HMAC_Init_ex() local 3344 if (keyBytes.get() == nullptr) { in NativeCrypto_HMAC_Init_ex() [all …]
|
/external/bouncycastle/patches/ |
D | bcprov.patch | 2340 - byte[] keyBytes = new byte[keySize / 8]; 2342 - kdf.generateBytes(keyBytes, 0, keyBytes.length); 2343 - secret = keyBytes; 2358 + // byte[] keyBytes = new byte[keySize / 8]; 2360 + // kdf.generateBytes(keyBytes, 0, keyBytes.length); 2361 + // secret = keyBytes;
|