/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeMacIntegrity.java | 67 int keyLength, in IkeMacIntegrity() argument 71 super(algorithmId, keyLength, algorithmName, isJceSupported); in IkeMacIntegrity() 84 int keyLength = 0; in create() local 93 keyLength = 20; in create() 98 keyLength = 16; in create() 104 keyLength = 16; in create() 109 keyLength = 32; in create() 114 keyLength = 48; in create() 119 keyLength = 64; in create() 129 algorithmId, keyLength, algorithmName, isJceSupported, checksumLength); in create()
|
D | IkeMacPrf.java | 52 int keyLength, in IkeMacPrf() argument 55 super(algorithmId, keyLength, algorithmName, isJceSupported); in IkeMacPrf() 67 int keyLength = 0; in create() local 73 keyLength = 20; in create() 77 keyLength = 16; in create() 82 keyLength = 16; in create() 86 keyLength = 32; in create() 90 keyLength = 48; in create() 94 keyLength = 64; in create() 101 return new IkeMacPrf(algorithmId, keyLength, algorithmName, isJceSupported); in create()
|
D | IkeNormalModeCipher.java | 45 IkeNormalModeCipher(int algorithmId, int keyLength, int ivLength, String algorithmName) { in IkeNormalModeCipher() argument 46 this(algorithmId, keyLength, ivLength, algorithmName, SALT_LEN_NOT_INCLUDED); in IkeNormalModeCipher() 51 int algorithmId, int keyLength, int ivLength, String algorithmName, int saltLen) { in IkeNormalModeCipher() argument 54 keyLength, in IkeNormalModeCipher()
|
D | IkeCombinedModeCipher.java | 54 int algorithmId, int keyLength, int ivLength, String algorithmName, int saltLen) { in IkeCombinedModeCipher() argument 55 this(algorithmId, keyLength, ivLength, algorithmName, saltLen, BLOCK_SIZE_NOT_SPECIFIED); in IkeCombinedModeCipher() 61 int keyLength, in IkeCombinedModeCipher() argument 66 super(algorithmId, keyLength, ivLength, algorithmName, true /*isAead*/, saltLen, blockSize); in IkeCombinedModeCipher()
|
D | IkeCrypto.java | 31 protected IkeCrypto(int algorithmId, int keyLength, String algorithmName) { in IkeCrypto() argument 33 mKeyLength = keyLength; in IkeCrypto()
|
D | IkeMac.java | 37 protected IkeMac(int algorithmId, int keyLength, String algorithmName, boolean isJceSupported) { in IkeMac() argument 38 super(algorithmId, keyLength, algorithmName); in IkeMac()
|
D | IkeCipher.java | 86 int keyLength, in IkeCipher() argument 92 super(algorithmId, keyLength, algorithmName); in IkeCipher()
|
/packages/modules/AdServices/adservices/service-core/jni/java/com/android/adservices/ohttp/ |
D | ObliviousHttpClient.java | 151 ohttpJniWrapper.hkdfExpand(messageDigest, prk, keyContext, aead.keyLength()); in decryptObliviousHttpResponse() 180 int lengthNonce = Math.max(aead.nonceLength(), aead.keyLength()); in extractResponseNonce() 190 int lengthNonce = Math.max(aead.nonceLength(), aead.keyLength()); in extractCipherText() 229 hpkectx, labelBytes, mHpkeAlgorithmSpec.aead().keyLength()); in export()
|
D | OhttpJniWrapper.java | 256 int keyLength) { in hkdfExpand() argument 259 hkdfExpand(hkdfMessageDigestNativeRef.getAddress(), prkArray, infoArray, keyLength); in hkdfExpand() 344 long hkdfMessageDigestNativeRef, byte[] prkArray, byte[] infoArray, int keyLength); in hkdfExpand() argument
|
D | ObliviousHttpGateway.java | 239 hpkeContextNativeRef, labelBytes, aeadAlgorithmSpec.keyLength()); in encrypt() 242 int lengthNonce = Math.max(aeadAlgorithmSpec.nonceLength(), aeadAlgorithmSpec.keyLength()); in encrypt() 256 messageDigest, prk, keyContext, aeadAlgorithmSpec.keyLength()); in encrypt()
|
D | IOhttpJniWrapper.java | 130 int keyLength); in hkdfExpand() argument
|
/packages/inputmethods/LatinIME/native/jni/src/dictionary/header/ |
D | header_read_write_utils.cpp | 81 const int keyLength = ByteArrayUtils::readStringAndAdvancePosition(dictBuf, in fetchAllHeaderAttributes() local 84 key.insert(key.end(), keyBuffer, keyBuffer + keyLength); in fetchAllHeaderAttributes()
|
/packages/modules/AdServices/adservices/service-core/jni/java/com/android/adservices/ohttp/algorithms/ |
D | AeadAlgorithmSpec.java | 42 public abstract int keyLength(); in keyLength() method in AeadAlgorithmSpec
|
/packages/modules/AdServices/adservices/tests/unittest/service-core/src/jni/java/com/android/adservices/ohttp/algorithms/ |
D | AeadAlgorithmSpecTest.java | 34 Assert.assertEquals(aeadAlgorithmSpec.keyLength(), 32); in get_supportedId_returnsCorrectSpec()
|
/packages/modules/IPsec/src/java/android/net/ipsec/ike/ |
D | IkeSaProposal.java | 249 public Builder addEncryptionAlgorithm(@EncryptionAlgorithm int algorithm, int keyLength) { in addEncryptionAlgorithm() argument 250 validateAndAddEncryptAlgo(algorithm, keyLength, false /* isChild */); in addEncryptionAlgorithm()
|
D | ChildSaProposal.java | 305 public Builder addEncryptionAlgorithm(@EncryptionAlgorithm int algorithm, int keyLength) { in addEncryptionAlgorithm() argument 306 validateAndAddEncryptAlgo(algorithm, keyLength, true /* isChild */); in addEncryptionAlgorithm()
|
D | SaProposal.java | 536 @EncryptionAlgorithm int algorithm, int keyLength, boolean isChild) { in validateAndAddEncryptAlgo() argument 539 EncryptionTransform encryptionTransform = new EncryptionTransform(algorithm, keyLength); in validateAndAddEncryptAlgo()
|
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/ |
D | AbstractSessionStateMachine.java | 275 int keyLength, in recordMetricsEvent_SaNegotiation() argument 288 keyLength, in recordMetricsEvent_SaNegotiation() local
|
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/message/ |
D | IkeSaPayload.java | 1262 mSpecifiedKeyLength = attr.keyLength; in EncryptionTransform() 1858 public final int keyLength; field in IkeSaPayload.KeyLengthAttribute 1864 protected KeyLengthAttribute(int keyLength) { in KeyLengthAttribute() argument 1866 this.keyLength = keyLength; in KeyLengthAttribute() 1873 .putShort((short) keyLength); in encodeToByteBuffer()
|
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/utils/ |
D | IkeMetrics.java | 708 @KeyLengths int keyLength, in logSaNegotiation() argument 719 keyLength, in logSaNegotiation()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/ |
D | IkeSessionTestBase.java | 263 int keyLength, in verifyIkeSaMetricsLogged() argument 274 eq(keyLength), in verifyIkeSaMetricsLogged()
|
/packages/modules/AdServices/adservices/service-core/jni/cpp/ |
D | ohttp_jni.cpp | 270 size_t keyLength = env->GetArrayLength(privKeyArray); in Java_com_android_adservices_ohttp_OhttpJniWrapper_hpkeSetupRecipient() local 285 keyLength)) { in Java_com_android_adservices_ohttp_OhttpJniWrapper_hpkeSetupRecipient()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/message/ |
D | IkeSaPayloadTest.java | 283 assertEquals(SaProposal.KEY_LEN_AES_128, ((KeyLengthAttribute) attribute).keyLength); in testDecodeAttribute()
|
/packages/apps/Car/DebuggingRestrictionController/libs/ |
D | okhttp-3.12.1.jar | META-INF/MANIFEST.MF
META-INF/
META-INF/proguard/
okhttp3/
... |
D | httpclient-4.5.12.jar | META-INF/MANIFEST.MF
META-INF/
org/
org/apache/
org/ ... |