/external/openssl/crypto/dsa/ |
dsa_prn.c | 100 EVP_PKEY *pk; local 102 pk = EVP_PKEY_new(); 103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) 105 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 106 EVP_PKEY_free(pk); 112 EVP_PKEY *pk; local 114 pk = EVP_PKEY_new(); 115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x) [all...] |
/external/openssl/crypto/x509/ |
x509type.c | 67 EVP_PKEY *pk; local 73 pk=X509_get_pubkey(x); 75 pk=pkey; 77 if (pk == NULL) return(0); 79 switch (pk->type) 119 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look 122 if(pkey==NULL) EVP_PKEY_free(pk);
|
/external/openssl/crypto/rsa/ |
rsa_prn.c | 84 EVP_PKEY *pk; local 86 pk = EVP_PKEY_new(); 87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x)) 89 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 90 EVP_PKEY_free(pk);
|
/build/tools/signapk/test/ |
run | 19 umask 0077 && openssl gendsa -out $@.pk~ $(DSAPARAM) 21 -in $@.pk~ -out $@.pk 22 umask 0077 && openssl req -new -x509 -key $@.pk -out $@ -days 1095 \ 30 -key $(cert).pk -cert $(cert) -tempdir out
|
/external/openssl/crypto/asn1/ |
asn1_locl.h | 83 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub); 84 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk); 89 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf); 90 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); 94 int (*pkey_size)(const EVP_PKEY *pk); 95 int (*pkey_bits)(const EVP_PKEY *pk); 100 int (*param_missing)(const EVP_PKEY *pk); 133 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
|
p8_pkey.c | 125 const unsigned char **pk, int *ppklen, 134 if (pk) 136 *pk = p8->pkey->value.octet_string->data; 143 if (pk) 145 *pk = p8->pkey->value.sequence->data;
|
x_pubkey.c | 92 X509_PUBKEY *pk=NULL; 96 if ((pk=X509_PUBKEY_new()) == NULL) goto error; 102 if (!pkey->ameth->pub_encode(pk, pkey)) 125 *x=pk; 129 if (pk != NULL) X509_PUBKEY_free(pk); 359 const unsigned char **pk, int *ppklen, 365 if (pk) 367 *pk = pub->public_key->data;
|
ameth_lib.c | 394 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub), 395 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk), 399 int (*pkey_size)(const EVP_PKEY *pk), 400 int (*pkey_bits)(const EVP_PKEY *pk)) 411 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf), 412 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk), 425 int (*param_missing)(const EVP_PKEY *pk),
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyPairTest.java | 108 PrivateKey pk = TestKeyPair.getPrivate(); 109 KeyPair kp = new KeyPair(null, pk); 110 assertSame(pk, kp.getPrivate()); 128 PublicKey pk = TestKeyPair.getPublic(); 129 KeyPair kp = new KeyPair(pk, null); 130 assertSame(pk, kp.getPublic());
|
KSPrivateKeyEntryTest.java | 70 PrivateKey pk = null; local 72 new KeyStore.PrivateKeyEntry(pk, certs); 86 PrivateKey pk = new tmpPrivateKey(); local 88 new KeyStore.PrivateKeyEntry(pk, chain); 94 new KeyStore.PrivateKeyEntry(pk, chain);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchorTest.java | 63 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 66 new TrustAnchor(validCaNameRfc2253, pk, getFullEncoding()); 68 new TrustAnchor(validCaNameRfc2253, pk, getEncodingPSOnly()); 70 new TrustAnchor(validCaNameRfc2253, pk, getEncodingESOnly()); 72 new TrustAnchor(validCaNameRfc2253, pk, getEncodingNoMinMax()); 85 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 87 new TrustAnchor(validCaNameRfc2253, pk, null); 100 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 105 TrustAnchor ta = new TrustAnchor(validCaNameRfc2253, pk, ncCopy); 123 PublicKey pk = new TestKeyPair(keyAlg).getPublic() local 171 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 194 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 211 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 236 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 274 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 297 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 320 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 344 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local [all...] |
/external/openssl/crypto/x509v3/ |
v3_skey.c | 105 ASN1_BIT_STRING *pk; local 124 pk = ctx->subject_req->req_info->pubkey->public_key; 125 else pk = ctx->subject_cert->cert_info->key->public_key; 127 if(!pk) { 132 EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyPairTest.java | 109 PrivateKey pk = TestKeyPair.getPrivate(); 110 KeyPair kp = new KeyPair(null, pk); 111 assertSame(pk, kp.getPrivate()); 129 PublicKey pk = TestKeyPair.getPublic(); 130 KeyPair kp = new KeyPair(pk, null); 131 assertSame(pk, kp.getPublic());
|
KSPrivateKeyEntryTest.java | 64 PrivateKey pk = null; local 66 new KeyStore.PrivateKeyEntry(pk, certs); 80 PrivateKey pk = new tmpPrivateKey(); local 82 new KeyStore.PrivateKeyEntry(pk, chain); 88 new KeyStore.PrivateKeyEntry(pk, chain);
|
/libcore/luni/src/test/java/tests/security/cert/ |
TrustAnchorTest.java | 66 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 69 new TrustAnchor(validCaNameRfc2253, pk, getFullEncoding()); 71 new TrustAnchor(validCaNameRfc2253, pk, getEncodingPSOnly()); 73 new TrustAnchor(validCaNameRfc2253, pk, getEncodingESOnly()); 75 new TrustAnchor(validCaNameRfc2253, pk, getEncodingNoMinMax()); 88 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 90 new TrustAnchor(validCaNameRfc2253, pk, null); 103 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 108 TrustAnchor ta = new TrustAnchor(validCaNameRfc2253, pk, ncCopy); 126 PublicKey pk = new TestKeyPair(keyAlg).getPublic() local 174 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 197 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 214 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 239 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 408 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 431 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 454 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 478 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 505 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 530 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 559 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local [all...] |
/external/zlib/contrib/blast/ |
Makefile | 5 blast < test.pk | cmp - test.txt
|
/external/openssl/crypto/ec/ |
eck_prn.c | 122 EVP_PKEY *pk; local 124 pk = EVP_PKEY_new(); 125 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x)) 127 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 128 EVP_PKEY_free(pk); 134 EVP_PKEY *pk; local 136 pk = EVP_PKEY_new(); 137 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x) [all...] |
/external/wpa_supplicant/ |
crypto_libtomcrypt.c | 426 struct crypto_public_key *pk; local 428 pk = os_zalloc(sizeof(*pk)); 429 if (pk == NULL) 432 res = rsa_import(key, len, &pk->rsa); 437 os_free(pk); 441 if (pk->rsa.type != PK_PUBLIC) { 444 rsa_free(&pk->rsa); 445 os_free(pk); 449 return pk; 457 struct crypto_private_key *pk; local [all...] |
eap_gpsk_common.c | 121 u8 *pk, size_t pk_len) 187 if (pk) { 188 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); 189 os_memcpy(pk, pos, pk_len); 199 u8 *pk, size_t *pk_len) 214 * PK = GKDF-160 (MK, inputString)[144..159] 227 pk, *pk_len); 282 * @pk: Buffer for PK (at least EAP_GPSK_MAX_PK_LEN bytes) 283 * @pk_len: Buffer for returning length of PK [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_libtomcrypt.c | 426 struct crypto_public_key *pk; local 428 pk = os_zalloc(sizeof(*pk)); 429 if (pk == NULL) 432 res = rsa_import(key, len, &pk->rsa); 437 os_free(pk); 441 if (pk->rsa.type != PK_PUBLIC) { 444 rsa_free(&pk->rsa); 445 os_free(pk); 449 return pk; 457 struct crypto_private_key *pk; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 425 struct crypto_public_key *pk; local 427 pk = os_zalloc(sizeof(*pk)); 428 if (pk == NULL) 431 res = rsa_import(key, len, &pk->rsa); 436 os_free(pk); 440 if (pk->rsa.type != PK_PUBLIC) { 443 rsa_free(&pk->rsa); 444 os_free(pk); 448 return pk; 457 struct crypto_private_key *pk; local [all...] |
/external/apache-harmony/security/src/test/api/java.injected/java/security/ |
IdentityTest.java | 211 PublicKey pk = new PublicKeyStub("aaa", "fff", new byte[]{1,2,3,4,5}); local 213 i.setPublicKey(pk); 221 new IdentityStub(name, pk), Boolean.TRUE 228 i2.setPublicKey(pk); 279 // PublicKey pk = new PublicKeyStub("kkk", "fff", new byte[]{1,2,3,4,5}); 280 // i1.setPublicKey(pk); 282 // i2.setPublicKey(pk); 314 PublicKey pk = new PublicKeyStub("kkk", "Identity.testGetPublicKey", null); local 315 i.setPublicKey(pk); 316 assertSame(pk, i.getPublicKey()) [all...] |
/external/openssl/apps/ |
dsa.c | 339 EVP_PKEY *pk; local 340 pk = EVP_PKEY_new(); 341 EVP_PKEY_set1_DSA(pk, dsa); 343 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 345 i = i2b_PublicKey_bio(out, pk); 347 i = i2b_PrivateKey_bio(out, pk); 348 EVP_PKEY_free(pk);
|
rsa.c | 414 EVP_PKEY *pk; local 415 pk = EVP_PKEY_new(); 416 EVP_PKEY_set1_RSA(pk, rsa); 418 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 420 i = i2b_PublicKey_bio(out, pk); 422 i = i2b_PrivateKey_bio(out, pk); 423 EVP_PKEY_free(pk);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
DSAKeyFactoryImplTest.java | 190 private void checkPublicIntegers(DSAPublicKey pk) { 192 DSAParams params = pk.getParams(); 194 assertEquals("failure for 'pk.getY().compareTo(publicY)'", 0, pk.getY() 206 private void checkPublicKeys(DSAPublicKey pk) { 208 checkPublicIntegers(pk); 211 "failure for 'pk.getAlgorithm().compareTo(publicAlgorithm)'", 212 0, pk.getAlgorithm().compareTo(publicAlgorithm)); 213 assertEquals("failure for 'pk.getFormat().compareTo(publicFormat)'", 0, 214 pk.getFormat().compareTo(publicFormat)) [all...] |