/external/openssl/crypto/rsa/ |
rsa_ameth.c | 70 static int rsa_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey) 77 if (X509_PUBKEY_set0_param(pk, OBJ_nid2obj(EVP_PKEY_RSA), 583 EVP_PKEY *pk = EVP_PKEY_CTX_get0_pkey(pkctx); local 594 saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2; 595 if (((EVP_PKEY_bits(pk) - 1) & 0x7) == 0)
|
rsa_pmeth.c | 137 static int setup_tbuf(RSA_PKEY_CTX *ctx, EVP_PKEY_CTX *pk) 141 ctx->tbuf = OPENSSL_malloc(EVP_PKEY_size(pk->pkey));
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchor_ImplTest.java | 537 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 541 ta = new TrustAnchor(validCaNameRfc2253, pk, getEncodingESOnly()); 547 ta = new TrustAnchor(x500p, pk, getEncodingNoMinMax()); 552 ta = new TrustAnchor(x500p, pk, null);
|
/external/v8/test/mjsunit/harmony/ |
proxies-for.js | 75 get: function(pr, pk) { 165 get: function(pr, pk) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_common.h | 210 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk);
|
x509v3.c | 1321 struct crypto_public_key *pk; local 1338 pk = crypto_public_key_import(issuer->public_key, 1340 if (pk == NULL) 1346 crypto_public_key_free(pk); [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.h | 251 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk);
|
x509v3.c | 1584 struct crypto_public_key *pk; local [all...] |
/external/openssl/crypto/evp/ |
evp.h | [all...] |
/external/openssl/include/openssl/ |
evp.h | [all...] |
pem.h | 549 int i2b_PrivateKey_bio(BIO *out, EVP_PKEY *pk); 550 int i2b_PublicKey_bio(BIO *out, EVP_PKEY *pk); 553 int i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel,
|
/external/libpcap/ |
pcap-dlpi.c | 247 register u_char *bp, *ep, *pk; local 338 pk = bp + sizeof(*sbp); 345 pk = bp; 349 if (bpf_filter(fcode, pk, origlen, caplen)) { 361 (*callback)(user, &pkthdr, pk); [all...] |
/external/openssl/apps/ |
x509.c | 991 EVP_PKEY *pk; local 1001 pk=load_key(bio_err, 1004 if (pk == NULL) goto end; 1009 rq=X509_to_X509_REQ(x,pk,digest); 1010 EVP_PKEY_free(pk); [all...] |
/external/openssl/crypto/pem/ |
pem.h | 549 int i2b_PrivateKey_bio(BIO *out, EVP_PKEY *pk); 550 int i2b_PublicKey_bio(BIO *out, EVP_PKEY *pk); 553 int i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel,
|
/external/openssl/crypto/pkcs7/ |
pk7_lib.c | 474 void PKCS7_SIGNER_INFO_get0_algs(PKCS7_SIGNER_INFO *si, EVP_PKEY **pk, 477 if (pk) 478 *pk = si->pkey;
|
/external/openssl/crypto/dh/ |
dh_ameth.c | 129 static int dh_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey) 165 if (X509_PUBKEY_set0_param(pk, OBJ_nid2obj(EVP_PKEY_DH),
|
/external/openssl/crypto/ec/ |
ec_ameth.c | 103 static int eckey_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey) 126 if (X509_PUBKEY_set0_param(pk, OBJ_nid2obj(EVP_PKEY_EC),
|
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
TrustManagerFactory1Test.java | 447 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 448 TrustAnchor ta = new TrustAnchor(validCaNameRfc2253, pk, getFullEncoding());
|
/external/javasqlite/src/main/java/SQLite/JDBC2z/ |
JDBCResultSet.java | 44 * When updatable these are the PK column names of uptable. 49 * When updatable these are the PK column indices (0-based) of uptable. 102 JDBCResultSet pk = (JDBCResultSet) 104 if (pk.tr.nrows > 0) { 106 pkcols = new String[pk.tr.nrows]; 107 pkcoli = new int[pk.tr.nrows]; 108 for (int i = 0; i < pk.tr.nrows; i++) { 109 String rd[] = (String []) pk.tr.rows.elementAt(i); 121 pk.close(); [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
SHA1withDSA_SignatureTest.java | 405 PublicKey pk = null; 409 signs[i].initVerify(pk); [all...] |
/external/openssl/crypto/dsa/ |
dsa_ameth.c | 138 static int dsa_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey) 173 if (X509_PUBKEY_set0_param(pk, OBJ_nid2obj(EVP_PKEY_DSA),
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 29 u8 pk[EAP_GPSK_MAX_PK_LEN]; member in struct:eap_gpsk_data 355 data->pk, &data->pk_len) < 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gpsk.c | 30 u8 pk[EAP_GPSK_MAX_PK_LEN]; member in struct:eap_gpsk_data 427 data->pk, &data->pk_len) < 0) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 24 u8 pk[EAP_GPSK_MAX_PK_LEN]; member in struct:eap_gpsk_data 350 data->pk, &data->pk_len) < 0) {
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 25 u8 pk[EAP_GPSK_MAX_PK_LEN]; member in struct:eap_gpsk_data 422 data->pk, &data->pk_len) < 0) {
|