/dalvik/libcore/crypto/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
MacThread.java | 41 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); local 42 m.init(sks); 46 m.init(sks); 49 m.init(sks);
|
/dalvik/libcore/crypto/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
MacSpiTest.java | 191 SecretKeySpec sks = new SecretKeySpec(bb1, "SHA1"); local 201 mSpi.engineInit(sks, null); 223 mSpi1.engineInit(sks, null); 236 mSpi2.engineInit(sks, null);
|
MacTest.java | 425 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); local 463 macs[i].init(sks); 495 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); local 497 macs[i].init(sks); 823 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); local 829 macs[i].init(sks); 836 macs[i].init(sks, algPS) 893 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); local 957 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); local 1063 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); local [all...] |
/frameworks/base/keystore/java/android/security/ |
SystemKeyStore.java | 39 private static final String KEY_FILE_EXTENSION = ".sks";
|
/external/wpa_supplicant/tests/ |
test_sha1.c | 66 const u8 sks[] = { local 137 sha1_t_prf(sks, sizeof(sks), "Inner Methods Compound Keys",
|
/dalvik/libcore/crypto/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
SecretKeySpecTest.java | 246 SecretKeySpec sks = new SecretKeySpec(key, offset, len, algorithm); local 247 assertEquals("Key length is incorrect", len, sks.getEncoded().length);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_fast.c | 264 u8 *sks; local 270 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 272 if (sks == NULL) { 283 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 284 sks, EAP_FAST_SKS_LEN); 286 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 287 os_free(sks); 308 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_fast.c | 275 u8 *sks; local 281 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 283 if (sks == NULL) { 294 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 295 sks, EAP_FAST_SKS_LEN); 297 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 298 os_free(sks); 319 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", [all...] |
/external/wpa_supplicant/ |
eap_fast.c | 974 u8 *sks; local 981 sks = eap_fast_derive_key(sm, &data->ssl, "key expansion", 983 if (sks == NULL) { 994 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 995 sks, EAP_FAST_SKS_LEN); 997 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 998 os_free(sks); 1018 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 66 const u8 sks[] = { local 148 sha1_t_prf(sks, sizeof(sks), "Inner Methods Compound Keys",
|
/bionic/libc/kernel/common/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/ndk/build/platforms/android-3/arch-arm/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/ndk/build/platforms/android-4/arch-arm/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/ndk/build/platforms/android-5/arch-arm/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/ndk/build/platforms/android-5/arch-x86/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/ndk/build/platforms/android-8/arch-arm/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/ndk/build/platforms/android-8/arch-x86/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/external/kernel-headers/original/linux/ |
cdrom.h | 719 __u8 sks[3]; member in struct:request_sense [all...] |
/external/icu4c/i18n/ |
ucol.cpp | 5152 int32_t sks = sortKeySize+(primaries - primStart)+(secondaries - secStart)+(tertiaries - terStart)+(cases-caseStart)+(quads-quadStart); local 5665 int32_t sks = sortKeySize+(primaries - primStart)+(secondaries - secStart)+(tertiaries - terStart); local [all...] |