Searched defs:pk (Results 1 - 25 of 81) sorted by relevance

1234

/external/chromium_org/third_party/openssl/openssl/crypto/x509/
H A Dx509type.c67 EVP_PKEY *pk; local
73 pk=X509_get_pubkey(x);
75 pk=pkey;
77 if (pk == NULL) return(0);
79 switch (pk->type)
125 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
128 if(pkey==NULL) EVP_PKEY_free(pk);
/external/openssl/crypto/x509/
H A Dx509type.c67 EVP_PKEY *pk; local
73 pk=X509_get_pubkey(x);
75 pk=pkey;
77 if (pk == NULL) return(0);
79 switch (pk->type)
125 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
128 if(pkey==NULL) EVP_PKEY_free(pk);
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/
H A Drsa_prn.c84 EVP_PKEY *pk; local
86 pk = EVP_PKEY_new();
87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x))
89 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
90 EVP_PKEY_free(pk);
H A Drsa_pmeth.c137 static int setup_tbuf(RSA_PKEY_CTX *ctx, EVP_PKEY_CTX *pk) argument
141 ctx->tbuf = OPENSSL_malloc(EVP_PKEY_size(pk->pkey));
/external/openssl/crypto/rsa/
H A Drsa_prn.c84 EVP_PKEY *pk; local
86 pk = EVP_PKEY_new();
87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x))
89 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
90 EVP_PKEY_free(pk);
/external/chromium_org/third_party/openssl/openssl/crypto/dsa/
H A Ddsa_prn.c100 EVP_PKEY *pk; local
102 pk = EVP_PKEY_new();
103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x))
105 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
106 EVP_PKEY_free(pk);
112 EVP_PKEY *pk; local
114 pk = EVP_PKEY_new();
115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DS
[all...]
/external/chromium_org/third_party/openssl/openssl/crypto/x509v3/
H A Dv3_skey.c105 ASN1_BIT_STRING *pk; local
124 pk = ctx->subject_req->req_info->pubkey->public_key;
125 else pk = ctx->subject_cert->cert_info->key->public_key;
127 if(!pk) {
132 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
/external/openssl/crypto/dsa/
H A Ddsa_prn.c100 EVP_PKEY *pk; local
102 pk = EVP_PKEY_new();
103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x))
105 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
106 EVP_PKEY_free(pk);
112 EVP_PKEY *pk; local
114 pk = EVP_PKEY_new();
115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DS
[all...]
/external/openssl/crypto/x509v3/
H A Dv3_skey.c105 ASN1_BIT_STRING *pk; local
124 pk = ctx->subject_req->req_info->pubkey->public_key;
125 else pk = ctx->subject_cert->cert_info->key->public_key;
127 if(!pk) {
132 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/packets/
H A DPacketUserauthRequestPublicKey.java23 byte[] pk; field in class:PacketUserauthRequestPublicKey
27 String pkAlgorithmName, byte[] pk, byte[] sig)
32 this.pk = pk;
63 tw.writeString(pk, 0, pk.length);
26 PacketUserauthRequestPublicKey(String serviceName, String user, String pkAlgorithmName, byte[] pk, byte[] sig) argument
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/signature/
H A DDSASHA1Verify.java46 public static byte[] encodeSSHDSAPublicKey(DSAPublicKey pk) throws IOException argument
51 tw.writeMPInt(pk.getP());
52 tw.writeMPInt(pk.getQ());
53 tw.writeMPInt(pk.getG());
54 tw.writeMPInt(pk.getY());
185 public static DSASignature generateSignature(byte[] message, DSAPrivateKey pk, SecureRandom rnd) argument
194 int qBitLength = pk.getQ().bitLength();
200 while (k.compareTo(pk.getQ()) >= 0);
202 BigInteger r = pk.getG().modPow(k, pk
[all...]
H A DRSASHA1Verify.java44 public static byte[] encodeSSHRSAPublicKey(RSAPublicKey pk) throws IOException argument
49 tw.writeMPInt(pk.getE());
50 tw.writeMPInt(pk.getN());
108 public static RSASignature generateSignature(byte[] message, RSAPrivateKey pk) throws IOException argument
118 int rsa_block_len = (pk.getN().bitLength() + 7) / 8;
141 BigInteger s = m.modPow(pk.getD(), pk.getN());
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DIdentityScope2Test.java44 public IdentityScopeSubclass(String name, PublicKey pk) { argument
47 setPublicKey(pk);
83 public Identity getIdentity(PublicKey pk) { argument
87 if (current.getPublicKey() == pk)
/external/chromium_org/third_party/openssl/openssl/apps/
H A Ddsa.c339 EVP_PKEY *pk; local
340 pk = EVP_PKEY_new();
341 EVP_PKEY_set1_DSA(pk, dsa);
343 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
345 i = i2b_PublicKey_bio(out, pk);
347 i = i2b_PrivateKey_bio(out, pk);
348 EVP_PKEY_free(pk);
H A Drsa.c414 EVP_PKEY *pk; local
415 pk = EVP_PKEY_new();
416 EVP_PKEY_set1_RSA(pk, rsa);
418 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
420 i = i2b_PublicKey_bio(out, pk);
422 i = i2b_PrivateKey_bio(out, pk);
423 EVP_PKEY_free(pk);
/external/chromium_org/third_party/openssl/openssl/crypto/ec/
H A Deck_prn.c122 EVP_PKEY *pk; local
124 pk = EVP_PKEY_new();
125 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x))
127 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
128 EVP_PKEY_free(pk);
134 EVP_PKEY *pk; local
136 pk = EVP_PKEY_new();
137 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KE
[all...]
/external/openssl/apps/
H A Ddsa.c339 EVP_PKEY *pk; local
340 pk = EVP_PKEY_new();
341 EVP_PKEY_set1_DSA(pk, dsa);
343 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
345 i = i2b_PublicKey_bio(out, pk);
347 i = i2b_PrivateKey_bio(out, pk);
348 EVP_PKEY_free(pk);
H A Drsa.c414 EVP_PKEY *pk; local
415 pk = EVP_PKEY_new();
416 EVP_PKEY_set1_RSA(pk, rsa);
418 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
420 i = i2b_PublicKey_bio(out, pk);
422 i = i2b_PrivateKey_bio(out, pk);
423 EVP_PKEY_free(pk);
/external/openssl/crypto/ec/
H A Deck_prn.c122 EVP_PKEY *pk; local
124 pk = EVP_PKEY_new();
125 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x))
127 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
128 EVP_PKEY_free(pk);
134 EVP_PKEY *pk; local
136 pk = EVP_PKEY_new();
137 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KE
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_common.c144 * @pk: Buffer for returning the allocated public key
151 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument
158 *pk = crypto_public_key_from_cert(buf, len);
159 if (*pk)
181 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
184 if (*pk == NULL) {
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_common.c144 * @pk: Buffer for returning the allocated public key
151 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument
158 *pk = crypto_public_key_from_cert(buf, len);
159 if (*pk)
181 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
184 if (*pk == NULL) {
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_common.c144 * @pk: Buffer for returning the allocated public key
151 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument
158 *pk = crypto_public_key_from_cert(buf, len);
159 if (*pk)
181 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
184 if (*pk == NULL) {
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/
H A Dameth_lib.c404 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub),
405 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk),
409 int (*pkey_size)(const EVP_PKEY *pk),
410 int (*pkey_bits)(const EVP_PKEY *pk))
421 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf),
422 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk),
435 int (*param_missing)(const EVP_PKEY *pk),
403 EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub), int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk), int (*pub_cmp)(const EVP_PKEY *a, const EVP_PKEY *b), int (*pub_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx), int (*pkey_size)(const EVP_PKEY *pk), int (*pkey_bits)(const EVP_PKEY *pk)) argument
420 EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf), int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk), int (*priv_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument
431 EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, int (*param_decode)(EVP_PKEY *pkey, const unsigned char **pder, int derlen), int (*param_encode)(const EVP_PKEY *pkey, unsigned char **pder), int (*param_missing)(const EVP_PKEY *pk), int (*param_copy)(EVP_PKEY *to, const EVP_PKEY *from), int (*param_cmp)(const EVP_PKEY *a, const EVP_PKEY *b), int (*param_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument
/external/chromium_org/third_party/openssl/openssl/crypto/dh/
H A Ddh_ameth.c129 static int dh_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey) argument
165 if (X509_PUBKEY_set0_param(pk, OBJ_nid2obj(EVP_PKEY_DH),
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/
H A Dpk7_lib.c474 void PKCS7_SIGNER_INFO_get0_algs(PKCS7_SIGNER_INFO *si, EVP_PKEY **pk, argument
477 if (pk)
478 *pk = si->pkey;

Completed in 852 milliseconds

1234