/external/boringssl/src/crypto/cipher/ |
H A D | e_des.c | 67 DES_key_schedule ks; member in union:__anon526::__anon527 68 } ks; member in struct:__anon526 76 DES_set_key(deskey, &dat->ks.ks); 84 DES_ncbc_encrypt(in, out, in_len, &dat->ks.ks, (DES_cblock *)ctx->iv, 110 &dat->ks.ks, ctx->encrypt); 127 DES_key_schedule ks[3]; member in union:__anon528::__anon529 128 } ks; member in struct:__anon528 [all...] |
H A D | e_aes.c | 73 AES_KEY ks; member in union:__anon517::__anon518 74 } ks; member in struct:__anon517 85 AES_KEY ks; member in union:__anon520::__anon521 86 } ks; /* AES key schedule to use */ member in struct:__anon520 299 ret = aes_v8_set_decrypt_key(key, ctx->key_len * 8, &dat->ks.ks); 306 ret = AES_set_decrypt_key(key, ctx->key_len * 8, &dat->ks.ks); 310 ret = vpaes_set_decrypt_key(key, ctx->key_len * 8, &dat->ks.ks); 1055 AES_KEY ks; member in union:aead_aes_gcm_ctx::__anon522 1056 } ks; member in struct:aead_aes_gcm_ctx 1288 AES_KEY ks; member in union:__anon523 1289 } ks; local 1377 AES_KEY ks; member in union:__anon524 1378 } ks; local 1496 AES_KEY ks; member in union:aead_aes_ctr_hmac_sha256_ctx::__anon525 1497 } ks; member in struct:aead_aes_ctr_hmac_sha256_ctx [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | PKIXBuilderParameters_ImplTest.java | 54 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 55 if (ks == null) { 60 new PKIXBuilderParameters(ks, new X509CertSelector()); 77 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 78 if (ks == null) { 83 new PKIXBuilderParameters(ks, null); 102 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED_AND_UNTRUSTED); 103 if (ks == null) { 108 new PKIXBuilderParameters(ks, null); 120 KeyStore ks [all...] |
H A D | PKIXParameters_ImplTest.java | 60 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 61 if (ks == null) { 67 CertPathParameters cpp = new PKIXParameters(ks); 82 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED_AND_UNTRUSTED); 83 if (ks == null) { 89 PKIXParameters cpp = new PKIXParameters(ks); 99 KeyStore ks = TestUtils.getKeyStore(false, 0); 100 if (ks == null) { 106 new PKIXParameters(ks); 119 KeyStore ks [all...] |
H A D | TrustAnchor_ImplTest.java | 61 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 62 if (ks == null) { 69 (X509Certificate) ks.getCertificate(certAlias), 73 (X509Certificate) ks.getCertificate(certAlias), 77 (X509Certificate) ks.getCertificate(certAlias), 81 (X509Certificate) ks.getCertificate(certAlias), 93 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 94 if (ks == null) { 100 (X509Certificate) ks.getCertificate(certAlias), 112 KeyStore ks [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ |
H A D | RSAPrivateCrtKeySpecTest.java | 51 KeySpec ks = new RSAPrivateCrtKeySpec( 60 assertTrue(ks instanceof RSAPrivateCrtKeySpec); 69 KeySpec ks = new RSAPrivateCrtKeySpec( 78 assertTrue(ks instanceof RSAPrivateKeySpec); 103 RSAPrivateCrtKeySpec ks = new RSAPrivateCrtKeySpec( 112 assertTrue(BigInteger.valueOf(5L).equals(ks.getCrtCoefficient())); 120 RSAPrivateCrtKeySpec ks = new RSAPrivateCrtKeySpec( 129 assertTrue(BigInteger.valueOf(5L).equals(ks.getPrimeExponentP())); 137 RSAPrivateCrtKeySpec ks = new RSAPrivateCrtKeySpec( 146 assertTrue(BigInteger.valueOf(5L).equals(ks [all...] |
H A D | RSAMultiPrimePrivateCrtKeySpecTest.java | 72 KeySpec ks = new RSAMultiPrimePrivateCrtKeySpec( 82 assertTrue(ks instanceof RSAMultiPrimePrivateCrtKeySpec); 408 KeySpec ks = new RSAMultiPrimePrivateCrtKeySpec( 418 assertTrue(ks instanceof RSAPrivateKeySpec); 426 RSAMultiPrimePrivateCrtKeySpec ks = 437 assertTrue(BigInteger.ONE.equals(ks.getCrtCoefficient())); 445 RSAMultiPrimePrivateCrtKeySpec ks = 456 assertTrue(BigInteger.ONE.equals(ks.getPrimeExponentP())); 464 RSAMultiPrimePrivateCrtKeySpec ks = 475 assertTrue(BigInteger.ONE.equals(ks [all...] |
H A D | RSAPublicKeySpecTest.java | 51 KeySpec ks = 55 assertTrue(ks instanceof RSAPublicKeySpec); 64 KeySpec ks = 67 assertTrue(ks instanceof RSAPublicKeySpec);
|
H A D | RSAPrivateKeySpecTest.java | 50 KeySpec ks = new RSAPrivateKeySpec(BigInteger.valueOf(1234567890L), 52 assertTrue(ks instanceof RSAPrivateKeySpec);
|
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/ |
H A D | MyKeyManagerFactorySpi.java | 38 protected void engineInit(KeyStore ks, char[] password) argument 44 if (ks == null) { 76 public Parameters(KeyStore ks, char[] pass) { argument 77 this.keyStore = ks;
|
H A D | MyTrustManagerFactorySpi.java | 35 protected void engineInit(KeyStore ks) throws KeyStoreException { argument 36 if (ks == null) { 67 public Parameters(KeyStore ks) { argument 68 this.keyStore = ks;
|
/external/apache-harmony/x-net/src/test/support/common/java/org/apache/harmony/xnet/tests/support/ |
H A D | MyTrustManagerFactorySpi.java | 35 protected void engineInit(KeyStore ks) throws KeyStoreException { argument 36 if (ks == null) { 67 public Parameters(KeyStore ks) { argument 68 this.keyStore = ks;
|
H A D | MyKeyManagerFactorySpi.java | 38 protected void engineInit(KeyStore ks, char[] password) argument 44 if (ks == null) { 76 public Parameters(KeyStore ks, char[] pass) { argument 77 this.keyStore = ks;
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
H A D | TrustManagerFactoryImpl.java | 44 public void engineInit(KeyStore ks) throws KeyStoreException { argument 45 if (ks != null) { 46 keyStore = ks;
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | KeyManagerImplTest.java | 33 KeyStore ks = null; 34 ks = KeyStore.getInstance("BKS"); 35 ks.load(null, null); 37 KeyManagerImpl km = new KeyManagerImpl(ks, new char[0]); 61 KeyStore ks = JSSETestData.getKeyStore(); 64 KeyManagerImpl km = new KeyManagerImpl(ks, pwd);
|
H A D | TrustManagerImplTest.java | 74 KeyStore ks = KeyStore.getInstance("BKS"); 75 ks.load(null, null); 77 TrustManagerImpl tm = new TrustManagerImpl(ks); 83 KeyStore ks = JSSETestData.getKeyStore(); 85 TrustManagerImpl tm = new TrustManagerImpl(ks);
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
H A D | SecretKeySpecTest.java | 68 SecretKeySpec ks = new SecretKeySpec(key, algorithm); 72 key[0] == ks.getEncoded()[0]); 141 SecretKeySpec ks = new SecretKeySpec(key, algorithm); 145 key[offset] == ks.getEncoded()[0]); 164 SecretKeySpec ks = new SecretKeySpec(key, algorithm); 167 algorithm, ks.getAlgorithm()); 177 SecretKeySpec ks = new SecretKeySpec(key, algorithm); 179 ks.getFormat() == "RAW"); 191 SecretKeySpec ks = new SecretKeySpec(key, algorithm); 192 byte[] result = ks [all...] |
H A D | DESedeKeySpecTest.java | 107 DESedeKeySpec ks; 109 ks = new DESedeKeySpec(key); 114 byte[] res = ks.getKey(); 124 ks = new DESedeKeySpec(key1, 2); 129 res = ks.getKey();
|
/external/apache-harmony/x-net/src/test/impl/java/org/apache/harmony/xnet/tests/provider/jsse/ |
H A D | KeyManagerFactoryImplTest.java | 80 KeyStore ks; 81 ks = KeyStore.getInstance("BKS"); 82 ks.load(null, null); 83 kmf.engineInit(ks, null);
|
H A D | TrustManagerFactoryImplTest.java | 79 KeyStore ks; 80 ks = KeyStore.getInstance("BKS"); 81 ks.load(null, null); 82 tmf.engineInit(ks);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
H A D | KSBuilder_ImplTest.java | 81 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 83 ks.load(null, null); 84 ks.store(fos, pass); 127 KeyStore ks = KeyStore.getInstance(defaultType); 129 KeyStore.Builder.newInstance(ks, null); 149 ks = KeyStore.getInstance(defaultType); 151 KeyStore.Builder.newInstance(ks, pp[i]); 155 ks.load(null, pass); 156 ksB = KeyStore.Builder.newInstance(ks, pp[i]); 160 ks [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | DefaultSSLContextImpl.java | 74 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 78 ks.load(is, pwd); 87 kmf.init(ks, pwd); 107 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 111 ks.load(is, pwd); 119 tmf.init(ks);
|
/external/boringssl/src/crypto/des/ |
H A D | des.c | 381 static void DES_encrypt1(uint32_t *data, const DES_key_schedule *ks, int enc) { argument 401 D_ENCRYPT(ks, l, r, 0); 402 D_ENCRYPT(ks, r, l, 1); 403 D_ENCRYPT(ks, l, r, 2); 404 D_ENCRYPT(ks, r, l, 3); 405 D_ENCRYPT(ks, l, r, 4); 406 D_ENCRYPT(ks, r, l, 5); 407 D_ENCRYPT(ks, l, r, 6); 408 D_ENCRYPT(ks, r, l, 7); 409 D_ENCRYPT(ks, 445 DES_encrypt2(uint32_t *data, const DES_key_schedule *ks, int enc) argument [all...] |
/external/netperf/src/ |
H A D | netcpu_kstat.c | 71 kstat_t *ks; local 132 ks = kstat_lookup(kc, "unix", 0, "system_misc"); 133 if (kstat_read(kc, ks, 0) == -1) { 147 kn = kstat_data_lookup(ks, "ncpus"); 153 for (ks = kc->kc_chain; ks; 154 ks = ks->ks_next) 156 if (strncmp(ks->ks_name, "cpu_stat", 8) == 0) 158 nkcid = kstat_read(kc, ks, NUL [all...] |
/external/boringssl/src/crypto/err/ |
H A D | err_data_generate.go | 117 func (ks keySlice) Len() int { 118 return len(ks) 121 func (ks keySlice) Less(i, j int) bool { 122 return (ks[i] >> 15) < (ks[j] >> 15) 125 func (ks keySlice) Swap(i, j int) { 126 ks[i], ks[j] = ks[j], ks[ [all...] |