/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
H A D | MacSpiTest.java | 62 SecretKeySpec sks = new SecretKeySpec(bb1, "SHA1"); 72 mSpi.engineInit(sks, null); 94 mSpi1.engineInit(sks, null); 107 mSpi2.engineInit(sks, null);
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | MacTest.java | 355 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); 357 macs[i].init(sks); 571 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); 576 macs[i].init(sks, algPS); 611 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); 617 macs[i].init(sks); 629 macs[i].init(sks); 654 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); 663 macs[i].init(sks); 667 macs[i].init(sks); [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
H A D | SecretKeySpecTest.java | 205 SecretKeySpec sks = new SecretKeySpec(key, offset, len, algorithm); 206 assertEquals("Key length is incorrect", len, sks.getEncoded().length);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_sha1.c | 66 const u8 sks[] = { local 148 sha1_t_prf(sks, sizeof(sks), "Inner Methods Compound Keys",
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_fast.c | 275 u8 *sks; local 281 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 283 if (sks == NULL) { 295 sks, EAP_FAST_SKS_LEN); 297 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 298 os_free(sks);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_fast.c | 270 u8 *sks; local 276 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 278 if (sks == NULL) { 290 sks, EAP_FAST_SKS_LEN); 292 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 293 os_free(sks);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_fast.c | 270 u8 *sks; local 276 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 278 if (sks == NULL) { 290 sks, EAP_FAST_SKS_LEN); 292 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 293 os_free(sks);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_fast.c | 270 u8 *sks; local 276 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 278 if (sks == NULL) { 290 sks, EAP_FAST_SKS_LEN); 292 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 293 os_free(sks);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStore_Impl2Test.java | 265 SecretKeySpec sks = new SecretKeySpec(new byte[10], "type"); 267 keyS.setKeyEntry(alias, sks, new char[0], chain);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast.c | 264 u8 *sks; local 270 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 272 if (sks == NULL) { 284 sks, EAP_FAST_SKS_LEN); 286 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 287 os_free(sks);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 258 u8 *sks; local 264 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 266 if (sks == NULL) { 278 sks, EAP_FAST_SKS_LEN); 280 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 281 os_free(sks);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast.c | 258 u8 *sks; local 264 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 266 if (sks == NULL) { 278 sks, EAP_FAST_SKS_LEN); 280 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 281 os_free(sks);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast.c | 258 u8 *sks; local 264 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 266 if (sks == NULL) { 278 sks, EAP_FAST_SKS_LEN); 280 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); 281 os_free(sks);
|
/external/kernel-headers/original/linux/ |
H A D | cdrom.h | 719 __u8 sks[3]; member in struct:request_sense
|