/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
D | MacSpiTest.java | 62 SecretKeySpec sks = new SecretKeySpec(bb1, "SHA1"); in testMacSpiTests01() local 72 mSpi.engineInit(sks, null); in testMacSpiTests01() 94 mSpi1.engineInit(sks, null); in testMacSpiTests01() 107 mSpi2.engineInit(sks, null); in testMacSpiTests01()
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
D | MacTest.java | 355 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); in testMac10() local 357 macs[i].init(sks); in testMac10() 571 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); in testInit() local 576 macs[i].init(sks, algPS); in testInit() 611 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); in testUpdateByteBuffer01() local 617 macs[i].init(sks); in testUpdateByteBuffer01() 629 macs[i].init(sks); in testUpdateByteBuffer01() 654 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); in testUpdateByteBuffer02() local 663 macs[i].init(sks); in testUpdateByteBuffer02() 667 macs[i].init(sks); in testUpdateByteBuffer02() [all …]
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
D | SecretKeySpecTest.java | 205 SecretKeySpec sks = new SecretKeySpec(key, offset, len, algorithm); in testGetEncoded() local 206 assertEquals("Key length is incorrect", len, sks.getEncoded().length); in testGetEncoded()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_fast.c | 270 u8 *sks; in eap_fast_derive_key_auth() local 276 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", in eap_fast_derive_key_auth() 278 if (sks == NULL) { in eap_fast_derive_key_auth() 290 sks, EAP_FAST_SKS_LEN); in eap_fast_derive_key_auth() 292 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); in eap_fast_derive_key_auth() 293 os_free(sks); in eap_fast_derive_key_auth()
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
D | KeyStore_Impl2Test.java | 265 SecretKeySpec sks = new SecretKeySpec(new byte[10], "type"); in checkKeyStoreException() local 267 keyS.setKeyEntry(alias, sks, new char[0], chain); in checkKeyStoreException()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_fast.c | 261 u8 *sks; in eap_fast_derive_key_auth() local 267 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", in eap_fast_derive_key_auth() 269 if (sks == NULL) { in eap_fast_derive_key_auth() 281 sks, EAP_FAST_SKS_LEN); in eap_fast_derive_key_auth() 283 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); in eap_fast_derive_key_auth() 284 os_free(sks); in eap_fast_derive_key_auth()
|
/external/kernel-headers/original/linux/ |
D | cdrom.h | 719 __u8 sks[3]; member
|
/external/chromium_org/third_party/icu/source/i18n/ |
D | ucol.cpp | 5028 …int32_t sks = sortKeySize+(int32_t)((primaries - primStart)+(secondaries - secStart)+(tertiaries -… in ucol_calcSortKey() local 5029 … primStart = reallocateBuffer(&primaries, *result, prim, &resultLength, 2*sks, status); in ucol_calcSortKey() 5520 …int32_t sks = sortKeySize+(int32_t)((primaries - primStart)+(secondaries - secStart)+(tertiaries -… in ucol_calcSortKeySimpleTertiary() local 5521 … primStart = reallocateBuffer(&primaries, *result, prim, &resultLength, 2*sks, status); in ucol_calcSortKeySimpleTertiary()
|
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_source_files/pkb/de-DE/ |
D | de-DE_gl0_kpdf_mgc.pkb | 3778 4(L*>0DDzzx�L`u�E?OTewu(-*A6><?=^,0-,=MY^sks��#8AMDTT')7+-6<BGLc_]hq��&�������u���Z��…
|