/external/openssl/crypto/des/ |
des_enc.c | 62 void DES_encrypt1(DES_LONG *data, DES_key_schedule *ks, int enc) 88 s=ks->ks->deslong; 156 void DES_encrypt2(DES_LONG *data, DES_key_schedule *ks, int enc) 180 s=ks->ks->deslong;
|
fcrypt_b.c | 80 void fcrypt_body(DES_LONG *out, DES_key_schedule *ks, DES_LONG Eswap0, 94 s=(DES_LONG *)ks;
|
des.h | 91 } ks[16]; member in struct:DES_ks 151 DES_key_schedule *ks,int enc); 159 Data is a pointer to 2 unsigned long's and ks is the 162 void DES_encrypt1(DES_LONG *data,DES_key_schedule *ks, int enc); 170 void DES_encrypt2(DES_LONG *data,DES_key_schedule *ks, int enc);
|
fcrypt.c | 105 DES_key_schedule ks; local 143 DES_set_key_unchecked(&key,&ks); 144 fcrypt_body(&(out[0]),&ks,Eswap0,Eswap1);
|
/external/jmonkeyengine/engine/src/terrain/com/jme3/terrain/noise/filter/ |
HydraulicErodeFilter.java | 41 private float Ks;
58 public void setKs(float ks) {
59 this.Ks = ks;
95 float stemp = this.Ks; // * sa[idx];
|
/libcore/luni/src/main/java/javax/net/ssl/ |
KeyManagerFactory.java | 187 * @param ks 199 public final void init(KeyStore ks, char[] password) throws KeyStoreException, 201 spiImpl.engineInit(ks, password);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStore3Test.java | 169 .getResourceAsStream("builderimpl.ks"); 170 KeyStore ks = KeyStore.getInstance(alias); local 171 ks.load(fis, pwd); 172 Builder b = Builder.newInstance(ks, new PasswordProtection(pwd)); 179 b = Builder.newInstance(alias, ks.getProvider(),
|
KeyStore2Test.java | 603 KeyStore ks = new MockKeyStore(new MockKeyStoreSpi(), null, local 605 ks.load(null, null); 606 ks.store(null, null); 608 ks = new MockKeyStore(new MockKeyStoreSpi(), null, "MockKeyStore"); 609 ks.load(null); 611 ks.store(null);
|
/external/openssl/include/openssl/ |
des.h | 91 } ks[16]; member in struct:DES_ks 151 DES_key_schedule *ks,int enc); 159 Data is a pointer to 2 unsigned long's and ks is the 162 void DES_encrypt1(DES_LONG *data,DES_key_schedule *ks, int enc); 170 void DES_encrypt2(DES_LONG *data,DES_key_schedule *ks, int enc);
|
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
SSLContext1Test.java | 457 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); local 458 tmf.init(ks); 494 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); local 496 ks.load(null, null); 500 kmf.init(ks, new char[10]); 503 tmf.init(ks); 532 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); local 533 tmf.init(ks); 581 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); local 582 tmf.init(ks); [all...] |
TrustManagerFactory1Test.java | 376 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); local 377 ks.load(null, null); 378 trustMF.init(ks); 409 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); local 414 trustMF[0].init(ks);
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SecretKeyFactoryTest.java | 355 KeySpec ks = (defaultAlgorithm.equals(defaultAlgorithm2) ? (KeySpec)new DESKeySpec(bb) : local 369 secKey = skF[i].generateSecret(ks); 376 skF[i].getKeySpec(null, ks.getClass()); 400 rks = skF[i].getKeySpec(secKeySpec, ks.getClass()); 409 rks = skF[i].getKeySpec(secKey, ks.getClass());
|
/external/skia/src/effects/ |
SkLightingImageFilter.cpp | 78 SpecularLightingType(SkScalar ks, SkScalar shininess) 79 : fKS(ks), fShininess(shininess) {} 284 SkSpecularLightingImageFilter(SkLight* light, SkScalar surfaceScale, SkScalar ks, SkScalar shininess, SkImageFilter* input); 288 SkScalar ks() const { return fKS; } function in class:__anon14990::SkSpecularLightingImageFilter 366 SkScalar ks, 371 ks, 380 SkScalar ks() const { return fKS; } function in class:__anon14990::GrSpecularLightingEffect 389 SkScalar ks, 769 SkScalar ks, SkScalar shininess, SkImageFilter* input) { 772 surfaceScale, ks, shininess, input)) 1297 SkScalar ks = random->nextUScalar1(); local 1314 const char* ks; local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore4Test.java | 66 KeyStore ks = KeyStore.getInstance("TestKeyStore"); local 67 assertNotNull("keystore is null", ks); 68 assertEquals("KeyStore is not of expected Type", "TestKeyStore", ks.getType()); 92 KeyStore ks = KeyStore.getInstance("TestKeyStore", provider.getName()); local 93 assertNotNull("keystore is null", ks); 94 assertEquals("KeyStore is not of expected type", "TestKeyStore", ks.getType()); 155 KeyStore ks = KeyStore.getInstance("TestKeyStore", provider); local 156 assertNotNull("KeyStore is null", ks); 157 assertEquals("KeyStore is not of expected type", "TestKeyStore", ks.getType());
|
/external/eigen/Eigen/src/Eigen2Support/ |
SVD.h | 279 int ks; local 280 for (ks = p-1; ks >= k; --ks) 282 if (ks == k) 284 Scalar t = (ks != p ? ei_abs(e[ks]) : Scalar(0)) + (ks != k+1 ? ei_abs(e[ks-1]) : Scalar(0)); 285 if (ei_abs(m_sigma[ks]) <= eps*t [all...] |
/libcore/luni/src/main/java/java/security/ |
KeyStore.java | 953 final KeyStore ks = (providerForKeyStore == null ? KeyStore local [all...] |
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
KeyManagerFactory1Test.java | 391 KeyStore ks; local 392 ks = KeyStore.getInstance(KeyStore.getDefaultType()); 393 ks.load(null, null); 397 keyMF[i].init(ks, new char[10]);
|
TrustManagerFactory1Test.java | 380 KeyStore ks; local 382 ks = KeyStore.getInstance(KeyStore.getDefaultType()); 383 ks.load(null, null); 393 trustMF[i].init(ks);
|
/external/dropbear/libtomcrypt/src/prngs/ |
yarrow.c | 186 int ks, err; local 202 ks = (int)hash_descriptor[prng->yarrow.hash].hashsize; 203 if ((err = cipher_descriptor[prng->yarrow.cipher].keysize(&ks)) != CRYPT_OK) { 210 prng->yarrow.pool, ks, /* KEY and key size */
|
/external/openssl/crypto/engine/ |
eng_openssl.c | 226 RC4_KEY ks; member in struct:__anon12601 236 RC4_set_key(&test(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx), 246 RC4(&test(ctx)->ks,inl,in,out);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SecretKeyFactoryTest.java | 357 KeySpec ks = (defaultAlgorithm.equals(defaultAlgorithm2) ? (KeySpec)new DESKeySpec(bb) : local 371 secKey = skF[i].generateSecret(ks); 378 skF[i].getKeySpec(null, ks.getClass()); 402 rks = skF[i].getKeySpec(secKeySpec, ks.getClass()); 411 rks = skF[i].getKeySpec(secKey, ks.getClass());
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl1Test.java | 84 KeyStore ks; local 86 ks = KeyStore.getInstance(validValues[i]); 87 assertEquals("Incorrect type", ks.getType(), validValues[i]); 164 KeyStore ks; local 166 ks = KeyStore.getInstance(validValues[i], defaultProviderName); 167 assertEquals("Incorrect type", ks.getType(), validValues[i]); 168 assertEquals("Incorrect provider", ks.getProvider().getName(), 223 KeyStore ks; local 225 ks = KeyStore.getInstance(validValues[i], defaultProvider); 226 assertEquals("Incorrect type", ks.getType(), validValues[i]) [all...] |
/external/openssl/crypto/evp/ |
e_aes_cbc_hmac_sha1.c | 77 AES_KEY ks; member in struct:__anon12609 125 ret=aesni_set_encrypt_key(inkey,ctx->key_len*8,&key->ks); 127 ret=aesni_set_decrypt_key(inkey,ctx->key_len*8,&key->ks); 210 aesni_cbc_sha1_enc(in,out,blocks,&key->ks, 240 &key->ks,ctx->iv,1); 243 &key->ks,ctx->iv,1); 254 &key->ks,ctx->iv,0);
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
TestUtils.java | 62 + ".ks"; 151 KeyStore ks = KeyStore.getInstance(keyStoreType); local 154 ks.load(Support_Resources.getResourceStream(fileName), 157 return ks;
|
/external/guava/guava/src/com/google/common/collect/ |
RegularImmutableMap.java | 219 ImmutableSet<K> ks = keySet; local 220 return (ks == null) ? (keySet = new KeySet<K, V>(this)) : ks;
|