/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
H A D | x509type.c | 67 EVP_PKEY *pk; local 73 pk=X509_get_pubkey(x); 75 pk=pkey; 77 if (pk == NULL) return(0); 79 switch (pk->type) 125 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look 128 if(pkey==NULL) EVP_PKEY_free(pk);
|
/external/openssl/crypto/x509/ |
H A D | x509type.c | 67 EVP_PKEY *pk; local 73 pk=X509_get_pubkey(x); 75 pk=pkey; 77 if (pk == NULL) return(0); 79 switch (pk->type) 125 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look 128 if(pkey==NULL) EVP_PKEY_free(pk);
|
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
H A D | rsa_prn.c | 84 EVP_PKEY *pk; local 86 pk = EVP_PKEY_new(); 87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x)) 89 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 90 EVP_PKEY_free(pk);
|
H A D | rsa_pmeth.c | 137 static int setup_tbuf(RSA_PKEY_CTX *ctx, EVP_PKEY_CTX *pk) argument 141 ctx->tbuf = OPENSSL_malloc(EVP_PKEY_size(pk->pkey));
|
/external/openssl/crypto/rsa/ |
H A D | rsa_prn.c | 84 EVP_PKEY *pk; local 86 pk = EVP_PKEY_new(); 87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x)) 89 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 90 EVP_PKEY_free(pk);
|
/external/chromium_org/third_party/openssl/openssl/crypto/dsa/ |
H A D | dsa_prn.c | 100 EVP_PKEY *pk; local 102 pk = EVP_PKEY_new(); 103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) 105 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 106 EVP_PKEY_free(pk); 112 EVP_PKEY *pk; local 114 pk = EVP_PKEY_new(); 115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DS [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/x509v3/ |
H A D | v3_skey.c | 105 ASN1_BIT_STRING *pk; local 124 pk = ctx->subject_req->req_info->pubkey->public_key; 125 else pk = ctx->subject_cert->cert_info->key->public_key; 127 if(!pk) { 132 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
|
/external/openssl/crypto/dsa/ |
H A D | dsa_prn.c | 100 EVP_PKEY *pk; local 102 pk = EVP_PKEY_new(); 103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) 105 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 106 EVP_PKEY_free(pk); 112 EVP_PKEY *pk; local 114 pk = EVP_PKEY_new(); 115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DS [all...] |
/external/openssl/crypto/x509v3/ |
H A D | v3_skey.c | 105 ASN1_BIT_STRING *pk; local 124 pk = ctx->subject_req->req_info->pubkey->public_key; 125 else pk = ctx->subject_cert->cert_info->key->public_key; 127 if(!pk) { 132 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/packets/ |
H A D | PacketUserauthRequestPublicKey.java | 23 byte[] pk; field in class:PacketUserauthRequestPublicKey 27 String pkAlgorithmName, byte[] pk, byte[] sig) 32 this.pk = pk; 63 tw.writeString(pk, 0, pk.length); 26 PacketUserauthRequestPublicKey(String serviceName, String user, String pkAlgorithmName, byte[] pk, byte[] sig) argument
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/signature/ |
H A D | DSASHA1Verify.java | 46 public static byte[] encodeSSHDSAPublicKey(DSAPublicKey pk) throws IOException argument 51 tw.writeMPInt(pk.getP()); 52 tw.writeMPInt(pk.getQ()); 53 tw.writeMPInt(pk.getG()); 54 tw.writeMPInt(pk.getY()); 185 public static DSASignature generateSignature(byte[] message, DSAPrivateKey pk, SecureRandom rnd) argument 194 int qBitLength = pk.getQ().bitLength(); 200 while (k.compareTo(pk.getQ()) >= 0); 202 BigInteger r = pk.getG().modPow(k, pk [all...] |
H A D | RSASHA1Verify.java | 44 public static byte[] encodeSSHRSAPublicKey(RSAPublicKey pk) throws IOException argument 49 tw.writeMPInt(pk.getE()); 50 tw.writeMPInt(pk.getN()); 108 public static RSASignature generateSignature(byte[] message, RSAPrivateKey pk) throws IOException argument 118 int rsa_block_len = (pk.getN().bitLength() + 7) / 8; 141 BigInteger s = m.modPow(pk.getD(), pk.getN());
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | IdentityScope2Test.java | 44 public IdentityScopeSubclass(String name, PublicKey pk) { argument 47 setPublicKey(pk); 83 public Identity getIdentity(PublicKey pk) { argument 87 if (current.getPublicKey() == pk)
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
H A D | dsa.c | 339 EVP_PKEY *pk; local 340 pk = EVP_PKEY_new(); 341 EVP_PKEY_set1_DSA(pk, dsa); 343 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 345 i = i2b_PublicKey_bio(out, pk); 347 i = i2b_PrivateKey_bio(out, pk); 348 EVP_PKEY_free(pk);
|
H A D | rsa.c | 414 EVP_PKEY *pk; local 415 pk = EVP_PKEY_new(); 416 EVP_PKEY_set1_RSA(pk, rsa); 418 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 420 i = i2b_PublicKey_bio(out, pk); 422 i = i2b_PrivateKey_bio(out, pk); 423 EVP_PKEY_free(pk);
|
/external/chromium_org/third_party/openssl/openssl/crypto/ec/ |
H A D | eck_prn.c | 122 EVP_PKEY *pk; local 124 pk = EVP_PKEY_new(); 125 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x)) 127 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 128 EVP_PKEY_free(pk); 134 EVP_PKEY *pk; local 136 pk = EVP_PKEY_new(); 137 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KE [all...] |
/external/openssl/apps/ |
H A D | dsa.c | 339 EVP_PKEY *pk; local 340 pk = EVP_PKEY_new(); 341 EVP_PKEY_set1_DSA(pk, dsa); 343 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 345 i = i2b_PublicKey_bio(out, pk); 347 i = i2b_PrivateKey_bio(out, pk); 348 EVP_PKEY_free(pk);
|
H A D | rsa.c | 414 EVP_PKEY *pk; local 415 pk = EVP_PKEY_new(); 416 EVP_PKEY_set1_RSA(pk, rsa); 418 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 420 i = i2b_PublicKey_bio(out, pk); 422 i = i2b_PrivateKey_bio(out, pk); 423 EVP_PKEY_free(pk);
|
/external/openssl/crypto/ec/ |
H A D | eck_prn.c | 122 EVP_PKEY *pk; local 124 pk = EVP_PKEY_new(); 125 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x)) 127 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 128 EVP_PKEY_free(pk); 134 EVP_PKEY *pk; local 136 pk = EVP_PKEY_new(); 137 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KE [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 144 * @pk: Buffer for returning the allocated public key 151 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument 158 *pk = crypto_public_key_from_cert(buf, len); 159 if (*pk) 181 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 184 if (*pk == NULL) {
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.c | 144 * @pk: Buffer for returning the allocated public key 151 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument 158 *pk = crypto_public_key_from_cert(buf, len); 159 if (*pk) 181 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 184 if (*pk == NULL) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 144 * @pk: Buffer for returning the allocated public key 151 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument 158 *pk = crypto_public_key_from_cert(buf, len); 159 if (*pk) 181 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 184 if (*pk == NULL) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
H A D | ameth_lib.c | 404 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub), 405 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk), 409 int (*pkey_size)(const EVP_PKEY *pk), 410 int (*pkey_bits)(const EVP_PKEY *pk)) 421 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf), 422 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk), 435 int (*param_missing)(const EVP_PKEY *pk), 403 EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub), int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk), int (*pub_cmp)(const EVP_PKEY *a, const EVP_PKEY *b), int (*pub_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx), int (*pkey_size)(const EVP_PKEY *pk), int (*pkey_bits)(const EVP_PKEY *pk)) argument 420 EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf), int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk), int (*priv_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument 431 EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, int (*param_decode)(EVP_PKEY *pkey, const unsigned char **pder, int derlen), int (*param_encode)(const EVP_PKEY *pkey, unsigned char **pder), int (*param_missing)(const EVP_PKEY *pk), int (*param_copy)(EVP_PKEY *to, const EVP_PKEY *from), int (*param_cmp)(const EVP_PKEY *a, const EVP_PKEY *b), int (*param_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument
|
/external/chromium_org/third_party/openssl/openssl/crypto/dh/ |
H A D | dh_ameth.c | 129 static int dh_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey) argument 165 if (X509_PUBKEY_set0_param(pk, OBJ_nid2obj(EVP_PKEY_DH),
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 474 void PKCS7_SIGNER_INFO_get0_algs(PKCS7_SIGNER_INFO *si, EVP_PKEY **pk, argument 477 if (pk) 478 *pk = si->pkey;
|