HomeSort by relevance Sort by last modified time
    Searched defs:pk (Results 1 - 25 of 43) sorted by null

1 2

  /external/boringssl/src/crypto/x509v3/
v3_skey.c 111 ASN1_BIT_STRING *pk; local
132 pk = ctx->subject_req->req_info->pubkey->public_key;
134 pk = ctx->subject_cert->cert_info->key->public_key;
136 if (!pk) {
142 (pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
  /art/test/992-source-data/src/art/
Test992.java 49 String pk = printClass(k); local
51 System.out.println(pk + " is defined in file \"" + getSourceFileName(k) + "\"");
53 System.out.println(pk + " does not have a known source file because " + e);
56 System.out.println(pk + " has extension \"" + getSourceDebugExtension(k) + "\"");
58 System.out.println(pk + " does not have a known source file extension because " + e);
  /device/linaro/bootloader/arm-trusted-firmware/drivers/auth/mbedtls/
mbedtls_crypto.c 62 mbedtls_pk_context pk = {0}; local
77 /* Get the actual signature algorithm (MD + PK) */
84 mbedtls_pk_init(&pk);
87 rc = mbedtls_pk_parse_subpubkey(&p, end, &pk);
118 rc = mbedtls_pk_verify_ext(pk_alg, sig_opts, &pk, md_alg, hash,
130 mbedtls_pk_free(&pk);
mbedtls_x509_parser.c 40 static mbedtls_asn1_buf pk; variable
57 ZERO_AND_CLEAN(pk);
253 pk.p = p;
259 pk.len = (p + len) - pk.p;
435 * extracted the relevant data (v3_ext, pk, sig_alg, etc) */
454 *param = (void *)pk.p;
455 *param_len = (unsigned int)pk.len;
  /device/linaro/bootloader/arm-trusted-firmware/drivers/auth/cryptocell/
cryptocell_crypto.c 93 CCSbNParams_t pk; local
113 /* Get the actual signature algorithm (MD + PK) */
179 memcpy(pk.N, p, RSA_MOD_SIZE_IN_BYTES);
194 UTIL_ReverseMemCopy((uint8_t *)RevN, (uint8_t *)pk.N, sizeof(RevN));
196 RSA_CalcNp((uintptr_t)PLAT_CRYPTOCELL_BASE, RevN, pk.Np);
199 UTIL_ReverseBuff((uint8_t *)pk.Np, sizeof(pk.Np));
225 (uint32_t *)data_ptr, &pk, &signature,
  /external/libpcap/
dlpisubs.c 126 u_char *ep, *pk; local
168 pk = bufp + sizeof(*sbp);
175 pk = bufp;
179 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) {
191 (*callback)(user, &pkthdr, pk);
  /external/conscrypt/repackaged/testing/src/main/java/com/android/org/conscrypt/javax/net/ssl/
TestKeyManager.java 177 PrivateKey pk = keyManager.getPrivateKey(alias); local
179 out.println(String.valueOf(pk));
180 return pk;
  /external/conscrypt/testing/src/main/java/org/conscrypt/javax/net/ssl/
TestKeyManager.java 175 PrivateKey pk = keyManager.getPrivateKey(alias); local
177 out.println(String.valueOf(pk));
178 return pk;
  /external/openssh/regress/unittests/sshkey/
test_sshkey.c 58 struct sshbuf *ca_buf, *pk, *principals, *critopts, *exts; local
70 pk = sshbuf_new();
71 ASSERT_PTR_NE(pk, NULL);
72 ASSERT_INT_EQ(sshkey_putb_plain(k, pk), 0);
73 ASSERT_INT_EQ(sshbuf_skip_string(pk), 0);
91 ASSERT_INT_EQ(sshbuf_putb(b, pk), 0); /* public key serialisation */
111 sshbuf_free(pk);
  /device/linaro/bootloader/arm-trusted-firmware/include/drivers/auth/
auth_common.h 59 AUTH_METHOD_SIG, /* Authenticate by PK operation */
76 auth_param_type_desc_t *pk; /* Public key */ member in struct:auth_method_param_sig_s
  /external/boringssl/src/crypto/x509/
x509_cmp.c 391 EVP_PKEY *pk = NULL; local
410 pk = X509_get_pubkey(x);
412 rv = check_suite_b(pk, -1, &tflags);
425 EVP_PKEY_free(pk);
426 pk = X509_get_pubkey(x);
427 rv = check_suite_b(pk, sign_nid, &tflags);
433 rv = check_suite_b(pk, X509_get_signature_nid(x), &tflags);
435 if (pk)
436 EVP_PKEY_free(pk);
454 int X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigned long flags
    [all...]
  /external/clang/test/Analysis/
misc-ps.c 100 int *pk = bazR10376675(); local
101 pm = pk; //expected-warning {{never read}}
  /external/eigen/unsupported/Eigen/src/Splines/
Spline.h 437 DenseIndex rk,pk,j1,j2; local
438 rk = r-k; pk = p-k;
442 a(s2,0) = a(s1,0)/ndu(pk+1,rk);
443 d = a(s2,0)*ndu(rk,pk);
449 if (r-1 <= pk) j2 = k-1;
454 a(s2,j) = (a(s1,j)-a(s1,j-1))/ndu(pk+1,rk+j);
455 d += a(s2,j)*ndu(rk+j,pk);
458 if (r<=pk)
460 a(s2,k) = -a(s1,k-1)/ndu(pk+1,r);
461 d += a(s2,k)*ndu(r,pk);
    [all...]
  /external/skia/src/compute/skc/platforms/cl_12/
raster_builder_cl_12.h 97 skc_uint pk; // # of pk keys member in struct:skc_raster_cohort_meta_in::__anon38034
110 skc_uint keys; // # of rk & pk keys -- initially just rk
  /external/skia/src/compute/skc/
raster.h 54 skc_ttpk_t pk; member in union:skc_raster_node_elem
78 skc_uint keys; // # of sk+pk keys -- uint2.hi
  /external/skqp/src/compute/skc/platforms/cl_12/
raster_builder_cl_12.h 97 skc_uint pk; // # of pk keys member in struct:skc_raster_cohort_meta_in::__anon38837
110 skc_uint keys; // # of rk & pk keys -- initially just rk
  /external/skqp/src/compute/skc/
raster.h 54 skc_ttpk_t pk; member in union:skc_raster_node_elem
78 skc_uint keys; // # of sk+pk keys -- uint2.hi
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gpsk.c 25 u8 pk[EAP_GPSK_MAX_PK_LEN]; member in struct:eap_gpsk_data
415 data->pk, &data->pk_len) < 0) {
  /external/curl/lib/vtls/
mbedtls.c 72 mbedtls_pk_context pk; member in struct:ssl_backend_data
158 0xFFFFFFF, /* Any PK alg */
340 mbedtls_pk_init(&BACKEND->pk);
343 ret = mbedtls_pk_parse_keyfile(&BACKEND->pk, SSL_SET_OPTION(key),
345 if(ret == 0 && !mbedtls_pk_can_do(&BACKEND->pk, MBEDTLS_PK_RSA))
472 &BACKEND->clicert, &BACKEND->pk);
642 size = mbedtls_pk_write_pubkey_der(&p->pk, pubkey, PUB_DER_MAX_BYTES);
773 mbedtls_pk_free(&BACKEND->pk);
polarssl.c 303 pk_context pk; local
304 pk_init(&pk);
305 ret = pk_parse_keyfile(&pk, SSL_SET_OPTION(key),
307 if(ret == 0 && !pk_can_do(&pk, POLARSSL_PK_RSA))
310 rsa_copy(&BACKEND->rsa, pk_rsa(pk));
313 pk_free(&pk);
553 size = pk_write_pubkey_der(&p->pk, pubkey, PUB_DER_MAX_BYTES);
  /external/libvpx/libvpx/vp9/encoder/
vp9_resize.c 193 const int pk = int_pel - INTERP_TAPS / 2 + 1 + k; local
195 input[(pk < 0 ? 0 : (pk >= inlength ? inlength - 1 : pk))];
495 const int pk = int_pel - INTERP_TAPS / 2 + 1 + k; local
497 input[(pk < 0 ? 0 : (pk >= inlength ? inlength - 1 : pk))];
  /external/wpa_supplicant_8/src/crypto/
crypto_libtomcrypt.c 423 struct crypto_public_key *pk; local
425 pk = os_zalloc(sizeof(*pk));
426 if (pk == NULL)
429 res = rsa_import(key, len, &pk->rsa);
434 os_free(pk);
438 if (pk->rsa.type != PK_PUBLIC) {
441 rsa_free(&pk->rsa);
442 os_free(pk);
446 return pk;
455 struct crypto_private_key *pk; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 24 u8 pk[EAP_GPSK_MAX_PK_LEN]; member in struct:eap_gpsk_data
371 data->pk, &data->pk_len) < 0) {
  /external/apache-commons-math/src/main/java/org/apache/commons/math/estimation/
LevenbergMarquardtEstimator.java 289 int pk = permutation[k]; local
290 jacobian[k * cols + pk] = diagR[pk];
509 int pk = permutation[k]; local
510 double ypk = lmDir[pk] / diagR[pk];
511 int index = pk;
516 lmDir[pk] = ypk;
703 int pk = permutation[k]; local
711 double rkk = jacobian[k * cols + pk];
839 int pk = permutation[nextColumn]; local
880 int pk = permutation[k]; local
    [all...]
  /external/apache-commons-math/src/main/java/org/apache/commons/math/optimization/general/
LevenbergMarquardtOptimizer.java 289 int pk = permutation[k]; local
290 wjacobian[k][pk] = diagR[pk];
516 int pk = permutation[k]; local
517 double ypk = lmDir[pk] / diagR[pk];
519 lmDir[permutation[i]] -= ypk * wjacobian[i][pk];
521 lmDir[pk] = ypk;
704 int pk = permutation[k]; local
712 double rkk = wjacobian[k][pk];
837 int pk = permutation[nextColumn]; local
876 int pk = permutation[k]; local
    [all...]

Completed in 1928 milliseconds

1 2