/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
D | MacSpiTest.java | 61 SecretKeySpec sks = new SecretKeySpec(bb1, "SHA1"); in testMacSpiTests01() local 71 mSpi.engineInit(sks, null); in testMacSpiTests01() 93 mSpi1.engineInit(sks, null); in testMacSpiTests01() 106 mSpi2.engineInit(sks, null); in testMacSpiTests01()
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
D | MacTest.java | 359 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); in testMac10() local 361 macs[i].init(sks); in testMac10() 579 SecretKeySpec sks = new SecretKeySpec(b, "SHA1"); in testInit() local 584 macs[i].init(sks, algPS); in testInit() 619 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); in testUpdateByteBuffer01() local 625 macs[i].init(sks); in testUpdateByteBuffer01() 637 macs[i].init(sks); in testUpdateByteBuffer01() 663 SecretKeySpec sks = new SecretKeySpec(bb, "SHA1"); in testUpdateByteBuffer02() local 672 macs[i].init(sks); in testUpdateByteBuffer02() 676 macs[i].init(sks); in testUpdateByteBuffer02() [all …]
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
D | SecretKeySpecTest.java | 205 SecretKeySpec sks = new SecretKeySpec(key, offset, len, algorithm); in testGetEncoded() local 206 assertEquals("Key length is incorrect", len, sks.getEncoded().length); in testGetEncoded()
|
/external/testng/ |
D | README.dev | 8 gpg --keyserver hkp://pool.sks-keyservers.net --send-keys <public_key>
|
/external/skia/tests/ |
D | PDFPrimitivesTest.cpp | 59 const SkString& sks = SKSTRING; \ 60 if (!eq(sks, strptr, LEN)) { \ 64 SkStringPrintf("'%s' != '%s'", strptr, sks.c_str())); \
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_fast.c | 275 u8 *sks; in eap_fast_derive_key_auth() local 281 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", in eap_fast_derive_key_auth() 283 if (sks == NULL) { in eap_fast_derive_key_auth() 295 sks, EAP_FAST_SKS_LEN); in eap_fast_derive_key_auth() 297 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); in eap_fast_derive_key_auth() 298 os_free(sks); in eap_fast_derive_key_auth()
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
D | KeyStore_Impl2Test.java | 264 SecretKeySpec sks = new SecretKeySpec(new byte[10], "type"); in checkKeyStoreException() local 266 keyS.setKeyEntry(alias, sks, new char[0], chain); in checkKeyStoreException()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_fast.c | 272 u8 *sks; in eap_fast_derive_key_auth() local 278 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", in eap_fast_derive_key_auth() 280 if (sks == NULL) { in eap_fast_derive_key_auth() 292 sks, EAP_FAST_SKS_LEN); in eap_fast_derive_key_auth() 294 os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN); in eap_fast_derive_key_auth() 295 os_free(sks); in eap_fast_derive_key_auth()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_module_tests.c | 876 const u8 sks[] = { in test_eap_fast() local 962 if (sha1_t_prf(sks, sizeof(sks), "Inner Methods Compound Keys", in test_eap_fast()
|
/external/kernel-headers/original/uapi/linux/ |
D | cdrom.h | 723 __u8 sks[3]; member
|
/external/hyphenation-patterns/en-GB/ |
D | hyph-en-gb.pat.txt | 7058 4sks
|
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_source_files/pkb/de-DE/ |
D | de-DE_gl0_kpdf_mgc.pkb | 3778 4(L*>0DDzzx�L`u�E?OTewu(-*A6><?=^,0-,=MY^sks��#8AMDTT')7+-6<BGLc_]hq��&�������u���Z��…
|