Searched refs:pk (Results 1 - 25 of 89) sorted by relevance

1234

/external/boringssl/src/crypto/x509/
H A Dx509type.c64 EVP_PKEY *pk; local
70 pk=X509_get_pubkey(x);
72 pk=pkey;
74 if (pk == NULL) return(0);
76 switch (pk->type)
122 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
125 if(pkey==NULL) EVP_PKEY_free(pk);
H A Dx509.c102 int PKCS8_pkey_get0(ASN1_OBJECT **ppkalg, const uint8_t **pk, int *ppklen, argument
110 if (pk) {
111 *pk = p8->pkey->value.octet_string->data;
116 if (pk) {
117 *pk = p8->pkey->value.sequence->data;
H A Dx_pubkey.c91 X509_PUBKEY *pk=NULL;
95 if ((pk=X509_PUBKEY_new()) == NULL) goto error;
101 if (!pkey->ameth->pub_encode(pk, pkey))
122 *x=pk;
126 if (pk != NULL) X509_PUBKEY_free(pk);
370 const unsigned char **pk, int *ppklen,
376 if (pk)
378 *pk = pub->public_key->data;
369 X509_PUBKEY_get0_param(ASN1_OBJECT **ppkalg, const unsigned char **pk, int *ppklen, X509_ALGOR **pa, X509_PUBKEY *pub) argument
H A Dx509_cmp.c398 EVP_PKEY *pk = NULL; local
420 pk = X509_get_pubkey(x);
422 rv = check_suite_b(pk, -1, &tflags);
438 EVP_PKEY_free(pk);
439 pk = X509_get_pubkey(x);
440 rv = check_suite_b(pk, sign_nid, &tflags);
446 rv = check_suite_b(pk, X509_get_signature_nid(x), &tflags);
448 if (pk)
449 EVP_PKEY_free(pk);
467 int X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigne argument
[all...]
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKeyPairTest.java116 PrivateKey pk = TestKeyPair.getPrivate();
117 KeyPair kp = new KeyPair(null, pk);
118 assertSame(pk, kp.getPrivate());
137 PublicKey pk = TestKeyPair.getPublic();
138 KeyPair kp = new KeyPair(pk, null);
139 assertSame(pk, kp.getPublic());
H A DKSPrivateKeyEntryTest.java71 PrivateKey pk = null;
73 new KeyStore.PrivateKeyEntry(pk, certs);
87 PrivateKey pk = new tmpPrivateKey();
89 new KeyStore.PrivateKeyEntry(pk, chain);
95 new KeyStore.PrivateKeyEntry(pk, chain);
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
H A DTrustAnchorTest.java64 PublicKey pk = new TestKeyPair(keyAlg).getPublic();
67 new TrustAnchor(validCaNameRfc2253, pk, getFullEncoding());
69 new TrustAnchor(validCaNameRfc2253, pk, getEncodingPSOnly());
71 new TrustAnchor(validCaNameRfc2253, pk, getEncodingESOnly());
73 new TrustAnchor(validCaNameRfc2253, pk, getEncodingNoMinMax());
87 PublicKey pk = new TestKeyPair(keyAlg).getPublic();
89 new TrustAnchor(validCaNameRfc2253, pk, null);
103 PublicKey pk = new TestKeyPair(keyAlg).getPublic();
108 TrustAnchor ta = new TrustAnchor(validCaNameRfc2253, pk, ncCopy);
126 PublicKey pk
[all...]
H A DPKIXCertPathValidatorResultTest.java185 PublicKey pk = testPublicKey;
190 pk);
194 assertSame(pk, vr.getPublicKey());
/external/boringssl/src/crypto/x509v3/
H A Dv3_skey.c108 ASN1_BIT_STRING *pk; local
127 pk = ctx->subject_req->req_info->pubkey->public_key;
128 else pk = ctx->subject_cert->cert_info->key->public_key;
130 if(!pk) {
135 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
/external/openssh/
H A Ded25519.c14 static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigned char *playground, unsigned long long smlen) argument
19 for (i = 32;i < 64;++i) playground[i] = pk[i-32];
27 unsigned char *pk,
45 ge25519_pack(pk, &gepk);
47 sk[32 + i] = pk[i];
106 const unsigned char *pk
119 if (ge25519_unpackneg_vartime(&get1, pk)) return -1;
121 get_hram(hram,sm,pk,m,smlen);
26 crypto_sign_ed25519_keypair( unsigned char *pk, unsigned char *sk ) argument
/external/zlib/src/contrib/blast/
H A DMakefile5 blast < test.pk | cmp - test.txt
/external/apache-commons-math/src/main/java/org/apache/commons/math/optimization/general/
H A DLevenbergMarquardtOptimizer.java289 int pk = permutation[k];
290 wjacobian[k][pk] = diagR[pk];
516 int pk = permutation[k];
517 double ypk = lmDir[pk] / diagR[pk];
519 lmDir[permutation[i]] -= ypk * wjacobian[i][pk];
521 lmDir[pk] = ypk;
704 int pk = permutation[k];
712 double rkk = wjacobian[k][pk];
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dpkcs1.h24 int pkcs1_v15_sig_ver(struct crypto_public_key *pk,
/external/wpa_supplicant_8/src/tls/
H A Dpkcs1.h24 int pkcs1_v15_sig_ver(struct crypto_public_key *pk,
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dpkcs1.h24 int pkcs1_v15_sig_ver(struct crypto_public_key *pk,
/external/apache-commons-math/src/main/java/org/apache/commons/math/estimation/
H A DLevenbergMarquardtEstimator.java289 int pk = permutation[k];
290 jacobian[k * cols + pk] = diagR[pk];
509 int pk = permutation[k];
510 double ypk = lmDir[pk] / diagR[pk];
511 int index = pk;
516 lmDir[pk] = ypk;
703 int pk = permutation[k];
711 double rkk = jacobian[k * cols + pk];
[all...]
/external/boringssl/src/crypto/evp/
H A Dinternal.h95 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub);
96 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk);
100 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf);
101 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk);
105 /* pkey_opaque returns 1 if the |pk| is opaque. Opaque keys are backed by
107 int (*pkey_opaque)(const EVP_PKEY *pk);
115 int (*pkey_size)(const EVP_PKEY *pk);
116 int (*pkey_bits)(const EVP_PKEY *pk);
120 int (*param_missing)(const EVP_PKEY *pk);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_libtomcrypt.c419 struct crypto_public_key *pk; local
421 pk = os_zalloc(sizeof(*pk));
422 if (pk == NULL)
425 res = rsa_import(key, len, &pk->rsa);
430 os_free(pk);
434 if (pk->rsa.type != PK_PUBLIC) {
437 rsa_free(&pk->rsa);
438 os_free(pk);
442 return pk;
451 struct crypto_private_key *pk; local
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_libtomcrypt.c419 struct crypto_public_key *pk; local
421 pk = os_zalloc(sizeof(*pk));
422 if (pk == NULL)
425 res = rsa_import(key, len, &pk->rsa);
430 os_free(pk);
434 if (pk->rsa.type != PK_PUBLIC) {
437 rsa_free(&pk->rsa);
438 os_free(pk);
442 return pk;
451 struct crypto_private_key *pk; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_libtomcrypt.c419 struct crypto_public_key *pk; local
421 pk = os_zalloc(sizeof(*pk));
422 if (pk == NULL)
425 res = rsa_import(key, len, &pk->rsa);
430 os_free(pk);
434 if (pk->rsa.type != PK_PUBLIC) {
437 rsa_free(&pk->rsa);
438 os_free(pk);
442 return pk;
451 struct crypto_private_key *pk; local
[all...]
/external/apache-harmony/security/src/test/api/java.injected/java/security/
H A DIdentityTest.java212 PublicKey pk = new PublicKeyStub("aaa", "fff", new byte[] { 1, 2, 3, 4, 5 });
214 i.setPublicKey(pk);
222 new IdentityStub(name, pk), Boolean.TRUE
230 i2.setPublicKey(pk);
280 // PublicKey pk = new PublicKeyStub("kkk", "fff", new byte[]{1,2,3,4,5});
281 // i1.setPublicKey(pk);
283 // i2.setPublicKey(pk);
314 PublicKey pk = new PublicKeyStub("kkk", "Identity.testGetPublicKey", null);
315 i.setPublicKey(pk);
316 assertSame(pk,
[all...]
/external/eigen/Eigen/src/OrderingMethods/
H A DAmd.h97 ok, nel = 0, p, p1, p2, p3, p4, pj, pk, pk1, pk2, pn, q, t; local
255 for(pk = pk1; pk < pk2; pk++) /* scan 1: find |Le\Lk| */
257 i = Ci[pk];
276 for(pk = pk1; pk < pk2; pk++) /* scan2: degree update */
278 i = Ci[pk]; /* consider node i in Lk */
340 for(pk
[all...]
/external/libpcap/
H A Ddlpisubs.c130 u_char *ep, *pk; local
172 pk = bufp + sizeof(*sbp);
179 pk = bufp;
183 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) {
195 (*callback)(user, &pkthdr, pk);
/external/clang/test/Analysis/
H A Dmisc-ps.c100 int *pk = bazR10376675(); local
101 pm = pk; //expected-warning {{never read}}
/external/v8/test/mjsunit/harmony/
H A Dproxies-for.js75 get: function(pr, pk) {
165 get: function(pr, pk) {

Completed in 3687 milliseconds

1234