/external/boringssl/src/crypto/x509v3/ |
v3_skey.c | 111 ASN1_BIT_STRING *pk; local 132 pk = ctx->subject_req->req_info->pubkey->public_key; 134 pk = ctx->subject_cert->cert_info->key->public_key; 136 if (!pk) { 142 (pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
|
/art/test/992-source-data/src/art/ |
Test992.java | 49 String pk = printClass(k); local 51 System.out.println(pk + " is defined in file \"" + getSourceFileName(k) + "\""); 53 System.out.println(pk + " does not have a known source file because " + e); 56 System.out.println(pk + " has extension \"" + getSourceDebugExtension(k) + "\""); 58 System.out.println(pk + " does not have a known source file extension because " + e);
|
/device/linaro/bootloader/arm-trusted-firmware/drivers/auth/mbedtls/ |
mbedtls_crypto.c | 62 mbedtls_pk_context pk = {0}; local 77 /* Get the actual signature algorithm (MD + PK) */ 84 mbedtls_pk_init(&pk); 87 rc = mbedtls_pk_parse_subpubkey(&p, end, &pk); 118 rc = mbedtls_pk_verify_ext(pk_alg, sig_opts, &pk, md_alg, hash, 130 mbedtls_pk_free(&pk);
|
mbedtls_x509_parser.c | 40 static mbedtls_asn1_buf pk; variable 57 ZERO_AND_CLEAN(pk); 253 pk.p = p; 259 pk.len = (p + len) - pk.p; 435 * extracted the relevant data (v3_ext, pk, sig_alg, etc) */ 454 *param = (void *)pk.p; 455 *param_len = (unsigned int)pk.len;
|
/device/linaro/bootloader/arm-trusted-firmware/drivers/auth/cryptocell/ |
cryptocell_crypto.c | 93 CCSbNParams_t pk; local 113 /* Get the actual signature algorithm (MD + PK) */ 179 memcpy(pk.N, p, RSA_MOD_SIZE_IN_BYTES); 194 UTIL_ReverseMemCopy((uint8_t *)RevN, (uint8_t *)pk.N, sizeof(RevN)); 196 RSA_CalcNp((uintptr_t)PLAT_CRYPTOCELL_BASE, RevN, pk.Np); 199 UTIL_ReverseBuff((uint8_t *)pk.Np, sizeof(pk.Np)); 225 (uint32_t *)data_ptr, &pk, &signature,
|
/external/libpcap/ |
dlpisubs.c | 126 u_char *ep, *pk; local 168 pk = bufp + sizeof(*sbp); 175 pk = bufp; 179 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) { 191 (*callback)(user, &pkthdr, pk);
|
/external/conscrypt/repackaged/testing/src/main/java/com/android/org/conscrypt/javax/net/ssl/ |
TestKeyManager.java | 177 PrivateKey pk = keyManager.getPrivateKey(alias); local 179 out.println(String.valueOf(pk)); 180 return pk;
|
/external/conscrypt/testing/src/main/java/org/conscrypt/javax/net/ssl/ |
TestKeyManager.java | 175 PrivateKey pk = keyManager.getPrivateKey(alias); local 177 out.println(String.valueOf(pk)); 178 return pk;
|
/external/openssh/regress/unittests/sshkey/ |
test_sshkey.c | 58 struct sshbuf *ca_buf, *pk, *principals, *critopts, *exts; local 70 pk = sshbuf_new(); 71 ASSERT_PTR_NE(pk, NULL); 72 ASSERT_INT_EQ(sshkey_putb_plain(k, pk), 0); 73 ASSERT_INT_EQ(sshbuf_skip_string(pk), 0); 91 ASSERT_INT_EQ(sshbuf_putb(b, pk), 0); /* public key serialisation */ 111 sshbuf_free(pk);
|
/device/linaro/bootloader/arm-trusted-firmware/include/drivers/auth/ |
auth_common.h | 59 AUTH_METHOD_SIG, /* Authenticate by PK operation */ 76 auth_param_type_desc_t *pk; /* Public key */ member in struct:auth_method_param_sig_s
|
/external/boringssl/src/crypto/x509/ |
x509_cmp.c | 391 EVP_PKEY *pk = NULL; local 410 pk = X509_get_pubkey(x); 412 rv = check_suite_b(pk, -1, &tflags); 425 EVP_PKEY_free(pk); 426 pk = X509_get_pubkey(x); 427 rv = check_suite_b(pk, sign_nid, &tflags); 433 rv = check_suite_b(pk, X509_get_signature_nid(x), &tflags); 435 if (pk) 436 EVP_PKEY_free(pk); 454 int X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigned long flags [all...] |
/external/clang/test/Analysis/ |
misc-ps.c | 100 int *pk = bazR10376675(); local 101 pm = pk; //expected-warning {{never read}}
|
/external/eigen/unsupported/Eigen/src/Splines/ |
Spline.h | 437 DenseIndex rk,pk,j1,j2; local 438 rk = r-k; pk = p-k; 442 a(s2,0) = a(s1,0)/ndu(pk+1,rk); 443 d = a(s2,0)*ndu(rk,pk); 449 if (r-1 <= pk) j2 = k-1; 454 a(s2,j) = (a(s1,j)-a(s1,j-1))/ndu(pk+1,rk+j); 455 d += a(s2,j)*ndu(rk+j,pk); 458 if (r<=pk) 460 a(s2,k) = -a(s1,k-1)/ndu(pk+1,r); 461 d += a(s2,k)*ndu(r,pk); [all...] |
/external/skia/src/compute/skc/platforms/cl_12/ |
raster_builder_cl_12.h | 97 skc_uint pk; // # of pk keys member in struct:skc_raster_cohort_meta_in::__anon38034 110 skc_uint keys; // # of rk & pk keys -- initially just rk
|
/external/skia/src/compute/skc/ |
raster.h | 54 skc_ttpk_t pk; member in union:skc_raster_node_elem 78 skc_uint keys; // # of sk+pk keys -- uint2.hi
|
/external/skqp/src/compute/skc/platforms/cl_12/ |
raster_builder_cl_12.h | 97 skc_uint pk; // # of pk keys member in struct:skc_raster_cohort_meta_in::__anon38837 110 skc_uint keys; // # of rk & pk keys -- initially just rk
|
/external/skqp/src/compute/skc/ |
raster.h | 54 skc_ttpk_t pk; member in union:skc_raster_node_elem 78 skc_uint keys; // # of sk+pk keys -- uint2.hi
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 25 u8 pk[EAP_GPSK_MAX_PK_LEN]; member in struct:eap_gpsk_data 415 data->pk, &data->pk_len) < 0) {
|
/external/curl/lib/vtls/ |
mbedtls.c | 72 mbedtls_pk_context pk; member in struct:ssl_backend_data 158 0xFFFFFFF, /* Any PK alg */ 340 mbedtls_pk_init(&BACKEND->pk); 343 ret = mbedtls_pk_parse_keyfile(&BACKEND->pk, SSL_SET_OPTION(key), 345 if(ret == 0 && !mbedtls_pk_can_do(&BACKEND->pk, MBEDTLS_PK_RSA)) 472 &BACKEND->clicert, &BACKEND->pk); 642 size = mbedtls_pk_write_pubkey_der(&p->pk, pubkey, PUB_DER_MAX_BYTES); 773 mbedtls_pk_free(&BACKEND->pk);
|
polarssl.c | 303 pk_context pk; local 304 pk_init(&pk); 305 ret = pk_parse_keyfile(&pk, SSL_SET_OPTION(key), 307 if(ret == 0 && !pk_can_do(&pk, POLARSSL_PK_RSA)) 310 rsa_copy(&BACKEND->rsa, pk_rsa(pk)); 313 pk_free(&pk); 553 size = pk_write_pubkey_der(&p->pk, pubkey, PUB_DER_MAX_BYTES);
|
/external/libvpx/libvpx/vp9/encoder/ |
vp9_resize.c | 193 const int pk = int_pel - INTERP_TAPS / 2 + 1 + k; local 195 input[(pk < 0 ? 0 : (pk >= inlength ? inlength - 1 : pk))]; 495 const int pk = int_pel - INTERP_TAPS / 2 + 1 + k; local 497 input[(pk < 0 ? 0 : (pk >= inlength ? inlength - 1 : pk))];
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 423 struct crypto_public_key *pk; local 425 pk = os_zalloc(sizeof(*pk)); 426 if (pk == NULL) 429 res = rsa_import(key, len, &pk->rsa); 434 os_free(pk); 438 if (pk->rsa.type != PK_PUBLIC) { 441 rsa_free(&pk->rsa); 442 os_free(pk); 446 return pk; 455 struct crypto_private_key *pk; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 24 u8 pk[EAP_GPSK_MAX_PK_LEN]; member in struct:eap_gpsk_data 371 data->pk, &data->pk_len) < 0) {
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/estimation/ |
LevenbergMarquardtEstimator.java | 289 int pk = permutation[k]; local 290 jacobian[k * cols + pk] = diagR[pk]; 509 int pk = permutation[k]; local 510 double ypk = lmDir[pk] / diagR[pk]; 511 int index = pk; 516 lmDir[pk] = ypk; 703 int pk = permutation[k]; local 711 double rkk = jacobian[k * cols + pk]; 839 int pk = permutation[nextColumn]; local 880 int pk = permutation[k]; local [all...] |
/external/apache-commons-math/src/main/java/org/apache/commons/math/optimization/general/ |
LevenbergMarquardtOptimizer.java | 289 int pk = permutation[k]; local 290 wjacobian[k][pk] = diagR[pk]; 516 int pk = permutation[k]; local 517 double ypk = lmDir[pk] / diagR[pk]; 519 lmDir[permutation[i]] -= ypk * wjacobian[i][pk]; 521 lmDir[pk] = ypk; 704 int pk = permutation[k]; local 712 double rkk = wjacobian[k][pk]; 837 int pk = permutation[nextColumn]; local 876 int pk = permutation[k]; local [all...] |