/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
MacThread.java | 41 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); local 42 m.init(sks); 46 m.init(sks); 49 m.init(sks);
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
SecretKeySpecTest.java | 205 SecretKeySpec sks = new SecretKeySpec(key, offset, len, algorithm); local 206 assertEquals("Key length is incorrect", len, sks.getEncoded().length);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
SecretKeySpecTest.java | 204 SecretKeySpec sks = new SecretKeySpec(key, offset, len, algorithm); local 205 assertEquals("Key length is incorrect", len, sks.getEncoded().length);
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
MacSpiTest.java | 62 SecretKeySpec sks = new SecretKeySpec(bb1, "SHA1"); local 72 mSpi.engineInit(sks, null); 94 mSpi1.engineInit(sks, null); 107 mSpi2.engineInit(sks, null);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 66 const u8 sks[] = { local 148 sha1_t_prf(sks, sizeof(sks), "Inner Methods Compound Keys",
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl2Test.java | 265 SecretKeySpec sks = new SecretKeySpec(new byte[10], "type"); local 267 keyS.setKeyEntry(alias, sks, new char[0], chain);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
MacSpiTest.java | 164 SecretKeySpec sks = new SecretKeySpec(bb1, "SHA1"); local 174 mSpi.engineInit(sks, null); 196 mSpi1.engineInit(sks, null); 209 mSpi2.engineInit(sks, null);
|
MacTest.java | 305 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); local 343 macs[i].init(sks); 369 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); local 371 macs[i].init(sks); 585 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); local 591 macs[i].init(sks); 598 macs[i].init(sks, algPS); 614 // macs[i].init(sks, null); 634 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); local 640 macs[i].init(sks); 677 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); local 747 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); local [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
MacTest.java | 355 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); local 357 macs[i].init(sks); 571 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); local 576 macs[i].init(sks, algPS); 611 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); local 617 macs[i].init(sks); 629 macs[i].init(sks); 654 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); local 663 macs[i].init(sks); 667 macs[i].init(sks); 724 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_fast.c | 264 u8 *sks; local 270 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 272 if (sks == NULL) { 283 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 284 sks, EAP_FAST_SKS_LEN); 286 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 287 os_free(sks); 308 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_fast.c | 275 u8 *sks; local 281 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 283 if (sks == NULL) { 294 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 295 sks, EAP_FAST_SKS_LEN); 297 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 298 os_free(sks); 319 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 258 u8 *sks; local 264 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 266 if (sks == NULL) { 277 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 278 sks, EAP_FAST_SKS_LEN); 280 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 281 os_free(sks); 302 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 270 u8 *sks; local 276 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 278 if (sks == NULL) { 289 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 290 sks, EAP_FAST_SKS_LEN); 292 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 293 os_free(sks); 314 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", [all...] |
/bionic/libc/kernel/common/linux/ |
cdrom.h | 580 __u8 sks[3]; member in struct:request_sense
|
/development/ndk/platforms/android-3/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/prebuilts/gcc/darwin-x86/mips/mipsel-linux-android-4.4.3/sysroot/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
cdrom.h | 719 __u8 sks[3]; member in struct:request_sense
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
cdrom.h | 719 __u8 sks[3]; member in struct:request_sense
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
cdrom.h | 719 __u8 sks[3]; member in struct:request_sense
|
/prebuilts/gcc/linux-x86/mips/mipsel-linux-android-4.4.3/sysroot/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/prebuilts/ndk/android-ndk-r4/platforms/android-3/arch-arm/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/prebuilts/ndk/android-ndk-r4/platforms/android-4/arch-arm/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/prebuilts/ndk/android-ndk-r4/platforms/android-5/arch-arm/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/prebuilts/ndk/android-ndk-r4/platforms/android-5/arch-x86/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|
/prebuilts/ndk/android-ndk-r4/platforms/android-8/arch-arm/usr/include/linux/ |
cdrom.h | 544 __u8 sks[3]; member in struct:request_sense
|