/external/boringssl/src/crypto/x509/ |
H A D | x509type.c | 64 EVP_PKEY *pk; local 70 pk=X509_get_pubkey(x); 72 pk=pkey; 74 if (pk == NULL) return(0); 76 switch (pk->type) 122 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look 125 if(pkey==NULL) EVP_PKEY_free(pk);
|
H A D | x509.c | 102 int PKCS8_pkey_get0(ASN1_OBJECT **ppkalg, const uint8_t **pk, int *ppklen, argument 110 if (pk) { 111 *pk = p8->pkey->value.octet_string->data; 116 if (pk) { 117 *pk = p8->pkey->value.sequence->data;
|
H A D | x_pubkey.c | 91 X509_PUBKEY *pk=NULL; 95 if ((pk=X509_PUBKEY_new()) == NULL) goto error; 101 if (!pkey->ameth->pub_encode(pk, pkey)) 122 *x=pk; 126 if (pk != NULL) X509_PUBKEY_free(pk); 370 const unsigned char **pk, int *ppklen, 376 if (pk) 378 *pk = pub->public_key->data; 369 X509_PUBKEY_get0_param(ASN1_OBJECT **ppkalg, const unsigned char **pk, int *ppklen, X509_ALGOR **pa, X509_PUBKEY *pub) argument
|
H A D | x509_cmp.c | 398 EVP_PKEY *pk = NULL; local 420 pk = X509_get_pubkey(x); 422 rv = check_suite_b(pk, -1, &tflags); 438 EVP_PKEY_free(pk); 439 pk = X509_get_pubkey(x); 440 rv = check_suite_b(pk, sign_nid, &tflags); 446 rv = check_suite_b(pk, X509_get_signature_nid(x), &tflags); 448 if (pk) 449 EVP_PKEY_free(pk); 467 int X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigne argument [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyPairTest.java | 116 PrivateKey pk = TestKeyPair.getPrivate(); 117 KeyPair kp = new KeyPair(null, pk); 118 assertSame(pk, kp.getPrivate()); 137 PublicKey pk = TestKeyPair.getPublic(); 138 KeyPair kp = new KeyPair(pk, null); 139 assertSame(pk, kp.getPublic());
|
H A D | KSPrivateKeyEntryTest.java | 71 PrivateKey pk = null; 73 new KeyStore.PrivateKeyEntry(pk, certs); 87 PrivateKey pk = new tmpPrivateKey(); 89 new KeyStore.PrivateKeyEntry(pk, chain); 95 new KeyStore.PrivateKeyEntry(pk, chain);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | TrustAnchorTest.java | 64 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); 67 new TrustAnchor(validCaNameRfc2253, pk, getFullEncoding()); 69 new TrustAnchor(validCaNameRfc2253, pk, getEncodingPSOnly()); 71 new TrustAnchor(validCaNameRfc2253, pk, getEncodingESOnly()); 73 new TrustAnchor(validCaNameRfc2253, pk, getEncodingNoMinMax()); 87 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); 89 new TrustAnchor(validCaNameRfc2253, pk, null); 103 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); 108 TrustAnchor ta = new TrustAnchor(validCaNameRfc2253, pk, ncCopy); 126 PublicKey pk [all...] |
H A D | PKIXCertPathValidatorResultTest.java | 185 PublicKey pk = testPublicKey; 190 pk); 194 assertSame(pk, vr.getPublicKey());
|
/external/boringssl/src/crypto/x509v3/ |
H A D | v3_skey.c | 108 ASN1_BIT_STRING *pk; local 127 pk = ctx->subject_req->req_info->pubkey->public_key; 128 else pk = ctx->subject_cert->cert_info->key->public_key; 130 if(!pk) { 135 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
|
/external/openssh/ |
H A D | ed25519.c | 14 static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigned char *playground, unsigned long long smlen) argument 19 for (i = 32;i < 64;++i) playground[i] = pk[i-32]; 27 unsigned char *pk, 45 ge25519_pack(pk, &gepk); 47 sk[32 + i] = pk[i]; 106 const unsigned char *pk 119 if (ge25519_unpackneg_vartime(&get1, pk)) return -1; 121 get_hram(hram,sm,pk,m,smlen); 26 crypto_sign_ed25519_keypair( unsigned char *pk, unsigned char *sk ) argument
|
/external/zlib/src/contrib/blast/ |
H A D | Makefile | 5 blast < test.pk | cmp - test.txt
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/optimization/general/ |
H A D | LevenbergMarquardtOptimizer.java | 289 int pk = permutation[k]; 290 wjacobian[k][pk] = diagR[pk]; 516 int pk = permutation[k]; 517 double ypk = lmDir[pk] / diagR[pk]; 519 lmDir[permutation[i]] -= ypk * wjacobian[i][pk]; 521 lmDir[pk] = ypk; 704 int pk = permutation[k]; 712 double rkk = wjacobian[k][pk]; [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.h | 24 int pkcs1_v15_sig_ver(struct crypto_public_key *pk,
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.h | 24 int pkcs1_v15_sig_ver(struct crypto_public_key *pk,
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs1.h | 24 int pkcs1_v15_sig_ver(struct crypto_public_key *pk,
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/estimation/ |
H A D | LevenbergMarquardtEstimator.java | 289 int pk = permutation[k]; 290 jacobian[k * cols + pk] = diagR[pk]; 509 int pk = permutation[k]; 510 double ypk = lmDir[pk] / diagR[pk]; 511 int index = pk; 516 lmDir[pk] = ypk; 703 int pk = permutation[k]; 711 double rkk = jacobian[k * cols + pk]; [all...] |
/external/boringssl/src/crypto/evp/ |
H A D | internal.h | 95 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub); 96 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk); 100 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf); 101 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); 105 /* pkey_opaque returns 1 if the |pk| is opaque. Opaque keys are backed by 107 int (*pkey_opaque)(const EVP_PKEY *pk); 115 int (*pkey_size)(const EVP_PKEY *pk); 116 int (*pkey_bits)(const EVP_PKEY *pk); 120 int (*param_missing)(const EVP_PKEY *pk);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_libtomcrypt.c | 419 struct crypto_public_key *pk; local 421 pk = os_zalloc(sizeof(*pk)); 422 if (pk == NULL) 425 res = rsa_import(key, len, &pk->rsa); 430 os_free(pk); 434 if (pk->rsa.type != PK_PUBLIC) { 437 rsa_free(&pk->rsa); 438 os_free(pk); 442 return pk; 451 struct crypto_private_key *pk; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_libtomcrypt.c | 419 struct crypto_public_key *pk; local 421 pk = os_zalloc(sizeof(*pk)); 422 if (pk == NULL) 425 res = rsa_import(key, len, &pk->rsa); 430 os_free(pk); 434 if (pk->rsa.type != PK_PUBLIC) { 437 rsa_free(&pk->rsa); 438 os_free(pk); 442 return pk; 451 struct crypto_private_key *pk; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_libtomcrypt.c | 419 struct crypto_public_key *pk; local 421 pk = os_zalloc(sizeof(*pk)); 422 if (pk == NULL) 425 res = rsa_import(key, len, &pk->rsa); 430 os_free(pk); 434 if (pk->rsa.type != PK_PUBLIC) { 437 rsa_free(&pk->rsa); 438 os_free(pk); 442 return pk; 451 struct crypto_private_key *pk; local [all...] |
/external/apache-harmony/security/src/test/api/java.injected/java/security/ |
H A D | IdentityTest.java | 212 PublicKey pk = new PublicKeyStub("aaa", "fff", new byte[] { 1, 2, 3, 4, 5 }); 214 i.setPublicKey(pk); 222 new IdentityStub(name, pk), Boolean.TRUE 230 i2.setPublicKey(pk); 280 // PublicKey pk = new PublicKeyStub("kkk", "fff", new byte[]{1,2,3,4,5}); 281 // i1.setPublicKey(pk); 283 // i2.setPublicKey(pk); 314 PublicKey pk = new PublicKeyStub("kkk", "Identity.testGetPublicKey", null); 315 i.setPublicKey(pk); 316 assertSame(pk, [all...] |
/external/eigen/Eigen/src/OrderingMethods/ |
H A D | Amd.h | 97 ok, nel = 0, p, p1, p2, p3, p4, pj, pk, pk1, pk2, pn, q, t; local 255 for(pk = pk1; pk < pk2; pk++) /* scan 1: find |Le\Lk| */ 257 i = Ci[pk]; 276 for(pk = pk1; pk < pk2; pk++) /* scan2: degree update */ 278 i = Ci[pk]; /* consider node i in Lk */ 340 for(pk [all...] |
/external/libpcap/ |
H A D | dlpisubs.c | 130 u_char *ep, *pk; local 172 pk = bufp + sizeof(*sbp); 179 pk = bufp; 183 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) { 195 (*callback)(user, &pkthdr, pk);
|
/external/clang/test/Analysis/ |
H A D | misc-ps.c | 100 int *pk = bazR10376675(); local 101 pm = pk; //expected-warning {{never read}}
|
/external/v8/test/mjsunit/harmony/ |
H A D | proxies-for.js | 75 get: function(pr, pk) { 165 get: function(pr, pk) {
|