/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | TrustManagerImplTest.java | 74 KeyStore ks = KeyStore.getInstance("BKS"); 75 ks.load(null, null); 77 TrustManagerImpl tm = new TrustManagerImpl(ks); 83 KeyStore ks = JSSETestData.getKeyStore(); 85 TrustManagerImpl tm = new TrustManagerImpl(ks);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
H A D | KSBuilder_ImplTest.java | 81 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 83 ks.load(null, null); 84 ks.store(fos, pass); 127 KeyStore ks = KeyStore.getInstance(defaultType); 129 KeyStore.Builder.newInstance(ks, null); 149 ks = KeyStore.getInstance(defaultType); 151 KeyStore.Builder.newInstance(ks, pp[i]); 155 ks.load(null, pass); 156 ksB = KeyStore.Builder.newInstance(ks, pp[i]); 160 ks [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/math/ec/ |
H A D | ECFieldElement.java | 1016 private int[] ks; field in class:ECFieldElement.F2m 1049 this.ks = new int[]{ k1 }; 1064 this.ks = new int[]{ k1, k2, k3 }; 1087 private F2m(int m, int[] ks, LongArray x) argument 1090 this.representation = (ks.length == 1) ? TPB : PPB; 1091 this.ks = ks; 1155 if ((aF2m.m != bF2m.m) || !Arrays.areEqual(aF2m.ks, bF2m.ks)) 1169 return new F2m(m, ks, iarrClon [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
H A D | EC5Util.java | 30 int ks[]; 34 ks = new int[] { curveF2m.getK1() }; 36 return new EllipticCurve(new ECFieldF2m(curveF2m.getM(), ks), curve.getA().toBigInteger(), curve.getB().toBigInteger(), null); 40 ks = new int[] { curveF2m.getK3(), curveF2m.getK2(), curveF2m.getK1() }; 42 return new EllipticCurve(new ECFieldF2m(curveF2m.getM(), ks), curve.getA().toBigInteger(), curve.getB().toBigInteger(), null); 62 int ks[] = ECUtil.convertMidTerms(fieldF2m.getMidTermsOfReductionPolynomial()); 63 return new ECCurve.F2m(m, ks[0], ks[1], ks[2], a, b);
|
/external/openssl/crypto/des/ |
H A D | DES.xs | 50 des_ecb_encrypt(input,ks,encrypt) 52 des_key_schedule * ks 55 des_ecb_encrypt(input,&RETVAL,*ks,encrypt); 60 des_cbc_encrypt(input,ks,ivec,encrypt) 62 des_key_schedule * ks 79 l,*ks,ivec,encrypt); 111 des_cbc_cksum(input,ks,ivec) 113 des_key_schedule * ks 126 l,*ks,ivec); 137 des_cfb_encrypt(input,numbits,ks,ive [all...] |
H A D | destest.c | 339 des_key_schedule ks,ks2,ks3; local 357 if ((j=DES_set_key_checked(&cbc_key,&ks)) != 0) 379 DES_ede3_cbcm_encrypt(cbc_data,cbc_out,16L,&ks,&ks2,&ks3,&iv3,&iv2, 381 DES_ede3_cbcm_encrypt(&cbc_data[16],&cbc_out[16],i-16,&ks,&ks2,&ks3, 392 DES_ede3_cbcm_encrypt(cbc_out,cbc_in,i,&ks,&ks2,&ks3,&iv3,&iv2,DES_DECRYPT); 411 DES_set_key_unchecked(&key_data[i],&ks); 415 des_ecb_encrypt(&in,&out,ks,DES_ENCRYPT); 416 des_ecb_encrypt(&out,&outin,ks,DES_DECRYPT); 437 DES_set_key_unchecked(&key_data[i],&ks); 443 des_ecb2_encrypt(&in,&out,ks,ks 854 des_key_schedule ks; local 883 des_key_schedule ks; local 916 des_key_schedule ks; local [all...] |
H A D | ecb_enc.c | 109 DES_key_schedule *ks, int enc) 118 DES_encrypt1(ll,ks,enc); 108 DES_ecb_encrypt(const_DES_cblock *input, DES_cblock *output, DES_key_schedule *ks, int enc) argument
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | DefaultSSLContextImpl.java | 75 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 79 ks.load(is, pwd); 88 kmf.init(ks, pwd); 108 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 112 ks.load(is, pwd); 120 tmf.init(ks);
|
H A D | KeyManagerFactoryImpl.java | 47 * @see KeyManagerFactorySpi#engineInit(KeyStore ks, char[] password) 50 protected void engineInit(KeyStore ks, char[] password) argument 53 if (ks != null) { 54 keyStore = ks;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ |
H A D | RSAPrivateKeySpecTest.java | 50 KeySpec ks = new RSAPrivateKeySpec(BigInteger.valueOf(1234567890L), 52 assertTrue(ks instanceof RSAPrivateKeySpec);
|
H A D | DSAPrivateKeySpecTest.java | 48 KeySpec ks = new DSAPrivateKeySpec( 54 assertTrue(ks instanceof DSAPrivateKeySpec);
|
H A D | DSAPublicKeySpecTest.java | 48 KeySpec ks = new DSAPublicKeySpec( 54 assertTrue(ks instanceof DSAPublicKeySpec);
|
/external/openssl/crypto/evp/ |
H A D | e_xcbc_d.c | 77 DES_key_schedule ks;/* key schedule */ member in struct:__anon28304 109 DES_set_key_unchecked(deskey,&data(ctx)->ks); 121 DES_xcbc_encrypt(in,out,(long)EVP_MAXCHUNK,&data(ctx)->ks, 131 DES_xcbc_encrypt(in,out,(long)inl,&data(ctx)->ks,
|
H A D | e_rc4.c | 74 RC4_KEY ks; /* working key */ member in struct:__anon28300 126 RC4_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx), 134 RC4(&data(ctx)->ks,inl,in,out);
|
H A D | e_rc5.c | 76 RC5_32_KEY ks; /* key schedule */ member in struct:__anon28302 81 IMPLEMENT_BLOCK_CIPHER(rc5_32_12_16, ks, RC5_32, EVP_RC5_KEY, NID_rc5, 121 RC5_32_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx),
|
H A D | e_aes.c | 65 union { double align; AES_KEY ks; } ks; member in struct:__anon28281 75 union { double align; AES_KEY ks; } ks; /* AES key schedule to use */ member in struct:__anon28284 89 union { double align; AES_KEY ks; } ks1, ks2; /* AES key schedules to use */ member in union:__anon28286::__anon28287 99 union { double align; AES_KEY ks; } ks; /* AES key schedule to use */ member in struct:__anon28288 313 aesni_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks.ks); 314 CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, [all...] |
H A D | e_rc4_hmac_md5.c | 73 RC4_KEY ks; member in struct:__anon28301 91 RC4_set_key(&key->ks,EVP_CIPHER_CTX_key_length(ctx), 121 size_t rc4_off = 32-1-(key->ks.x&(32-1)), /* 32 is $MOD from rc4_md5-x86_64.pl */ 140 RC4(&key->ks,rc4_off,in,out); 142 rc4_md5_enc(&key->ks,in+rc4_off,out+rc4_off, 167 RC4(&key->ks,len-rc4_off,out+rc4_off,out+rc4_off); 169 RC4(&key->ks,len-rc4_off,in+rc4_off,out+rc4_off); 180 RC4(&key->ks,rc4_off,in,out); 183 rc4_md5_enc(&key->ks,in+rc4_off,out+rc4_off, 198 RC4(&key->ks,le [all...] |
/external/netperf/ |
H A D | netcpu_kstat.c | 71 kstat_t *ks; local 132 ks = kstat_lookup(kc, "unix", 0, "system_misc"); 133 if (kstat_read(kc, ks, 0) == -1) { 147 kn = kstat_data_lookup(ks, "ncpus"); 153 for (ks = kc->kc_chain; ks; 154 ks = ks->ks_next) 156 if (strncmp(ks->ks_name, "cpu_stat", 8) == 0) 158 nkcid = kstat_read(kc, ks, NUL [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
H A D | DESedeKeySpecTest.java | 107 DESedeKeySpec ks; 109 ks = new DESedeKeySpec(key); 114 byte[] res = ks.getKey(); 124 ks = new DESedeKeySpec(key1, 2); 129 res = ks.getKey();
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/spec/ |
H A D | ECNamedCurveSpec.java | 31 int ks[]; 35 ks = new int[] { curveF2m.getK1() }; 37 return new EllipticCurve(new ECFieldF2m(curveF2m.getM(), ks), curve.getA().toBigInteger(), curve.getB().toBigInteger(), seed); 41 ks = new int[] { curveF2m.getK3(), curveF2m.getK2(), curveF2m.getK1() }; 43 return new EllipticCurve(new ECFieldF2m(curveF2m.getM(), ks), curve.getA().toBigInteger(), curve.getB().toBigInteger(), seed);
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
H A D | e_aes.c | 66 AES_KEY ks; member in union:__anon11613::__anon11614 67 } ks; member in struct:__anon11613 78 AES_KEY ks; member in union:__anon11616::__anon11617 79 } ks; /* AES key schedule to use */ member in struct:__anon11616 231 ret = AES_set_decrypt_key(key, ctx->key_len * 8, &dat->ks.ks); 235 ret = vpaes_set_decrypt_key(key, ctx->key_len * 8, &dat->ks.ks); 240 ret = AES_set_decrypt_key(key, ctx->key_len * 8, &dat->ks.ks); 842 AES_KEY ks; member in union:aead_aes_gcm_ctx::__anon11618 843 } ks; member in struct:aead_aes_gcm_ctx 1073 AES_KEY ks; member in union:__anon11619 1074 } ks; local 1168 AES_KEY ks; member in union:__anon11620 1169 } ks; local [all...] |
/external/qemu/distrib/sdl-1.2.15/src/video/gem/ |
H A D | SDL_gemevents.c | 53 static void do_keyboard(short kc, short ks); 54 static void do_mouse(_THIS, short mx, short my, short mb, short ks); 278 static void do_keyboard(short kc, short ks) argument 288 if (ks & K_RSHIFT) 290 if (ks & K_LSHIFT) 292 if (ks & K_CTRL) 294 if (ks & K_ALT) 298 static void do_mouse(_THIS, short mx, short my, short mb, short ks) argument 367 if (ks & K_RSHIFT) 369 if (ks [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/spec/ |
H A D | ECFieldF2m_ImplTest.java | 65 * The <code>ks</code> parameter for <code>ECFieldF2m</code> 68 final int[] ks; field in class:ECFieldF2m_ImplTest.ECFieldF2mDomainParams 82 * @param ks 87 final int[] ks, 91 this.ks = ks; 85 ECFieldF2mDomainParams(final int m, final BigInteger rp, final int[] ks, final Exception expectedException) argument
|
H A D | ECPrivateKeySpec_ImplTest.java | 124 ECPrivateKeySpec ks = new ECPrivateKeySpec(BigInteger.ZERO, params); 125 ECParameterSpec paramsRet = ks.getParams(); 151 ECPrivateKeySpec ks = new ECPrivateKeySpec(s, params); 152 BigInteger sRet = ks.getS();
|
/external/chromium_org/net/android/javatests/src/org/chromium/net/ |
H A D | AndroidKeyStoreTestUtil.java | 50 KeySpec ks = new PKCS8EncodedKeySpec(encodedKey); 51 PrivateKey key = factory.generatePrivate(ks);
|