/external/chromium_org/third_party/openssl/openssl/crypto/dsa/ |
dsa_prn.c | 100 EVP_PKEY *pk; local 102 pk = EVP_PKEY_new(); 103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) 105 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 106 EVP_PKEY_free(pk); 112 EVP_PKEY *pk; local 114 pk = EVP_PKEY_new(); 115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x) [all...] |
/external/openssl/crypto/dsa/ |
dsa_prn.c | 100 EVP_PKEY *pk; local 102 pk = EVP_PKEY_new(); 103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) 105 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 106 EVP_PKEY_free(pk); 112 EVP_PKEY *pk; local 114 pk = EVP_PKEY_new(); 115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_prn.c | 84 EVP_PKEY *pk; local 86 pk = EVP_PKEY_new(); 87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x)) 89 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 90 EVP_PKEY_free(pk);
|
/external/openssl/crypto/rsa/ |
rsa_prn.c | 84 EVP_PKEY *pk; local 86 pk = EVP_PKEY_new(); 87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x)) 89 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 90 EVP_PKEY_free(pk);
|
/build/tools/signapk/test/ |
run | 19 umask 0077 && openssl gendsa -out $@.pk~ $(DSAPARAM) 21 -in $@.pk~ -out $@.pk 22 umask 0077 && openssl req -new -x509 -key $@.pk -out $@ -days 1095 \ 30 -key $(cert).pk -cert $(cert) -tempdir out
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509type.c | 67 EVP_PKEY *pk; local 73 pk=X509_get_pubkey(x); 75 pk=pkey; 77 if (pk == NULL) return(0); 79 switch (pk->type) 125 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look 128 if(pkey==NULL) EVP_PKEY_free(pk);
|
/external/openssl/crypto/x509/ |
x509type.c | 67 EVP_PKEY *pk; local 73 pk=X509_get_pubkey(x); 75 pk=pkey; 77 if (pk == NULL) return(0); 79 switch (pk->type) 125 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look 128 if(pkey==NULL) EVP_PKEY_free(pk);
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
asn1_locl.h | 83 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub); 84 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk); 89 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf); 90 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); 94 int (*pkey_size)(const EVP_PKEY *pk); 95 int (*pkey_bits)(const EVP_PKEY *pk); 100 int (*param_missing)(const EVP_PKEY *pk); 144 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
|
p8_pkey.c | 125 const unsigned char **pk, int *ppklen, 134 if (pk) 136 *pk = p8->pkey->value.octet_string->data; 143 if (pk) 145 *pk = p8->pkey->value.sequence->data;
|
/external/openssl/crypto/asn1/ |
asn1_locl.h | 83 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub); 84 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk); 89 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf); 90 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); 94 int (*pkey_size)(const EVP_PKEY *pk); 95 int (*pkey_bits)(const EVP_PKEY *pk); 100 int (*param_missing)(const EVP_PKEY *pk); 144 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
|
p8_pkey.c | 125 const unsigned char **pk, int *ppklen, 134 if (pk) 136 *pk = p8->pkey->value.octet_string->data; 143 if (pk) 145 *pk = p8->pkey->value.sequence->data;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyPairTest.java | 108 PrivateKey pk = TestKeyPair.getPrivate(); 109 KeyPair kp = new KeyPair(null, pk); 110 assertSame(pk, kp.getPrivate()); 128 PublicKey pk = TestKeyPair.getPublic(); 129 KeyPair kp = new KeyPair(pk, null); 130 assertSame(pk, kp.getPublic());
|
KSPrivateKeyEntryTest.java | 70 PrivateKey pk = null; local 72 new KeyStore.PrivateKeyEntry(pk, certs); 86 PrivateKey pk = new tmpPrivateKey(); local 88 new KeyStore.PrivateKeyEntry(pk, chain); 94 new KeyStore.PrivateKeyEntry(pk, chain);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/packets/ |
PacketUserauthRequestPublicKey.java | 23 byte[] pk; field in class:PacketUserauthRequestPublicKey 27 String pkAlgorithmName, byte[] pk, byte[] sig) 32 this.pk = pk; 63 tw.writeString(pk, 0, pk.length);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchorTest.java | 63 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 66 new TrustAnchor(validCaNameRfc2253, pk, getFullEncoding()); 68 new TrustAnchor(validCaNameRfc2253, pk, getEncodingPSOnly()); 70 new TrustAnchor(validCaNameRfc2253, pk, getEncodingESOnly()); 72 new TrustAnchor(validCaNameRfc2253, pk, getEncodingNoMinMax()); 85 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 87 new TrustAnchor(validCaNameRfc2253, pk, null); 100 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 105 TrustAnchor ta = new TrustAnchor(validCaNameRfc2253, pk, ncCopy); 123 PublicKey pk = new TestKeyPair(keyAlg).getPublic() local 171 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 194 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 211 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 236 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 274 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 297 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 320 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 344 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/x509v3/ |
v3_skey.c | 105 ASN1_BIT_STRING *pk; local 124 pk = ctx->subject_req->req_info->pubkey->public_key; 125 else pk = ctx->subject_cert->cert_info->key->public_key; 127 if(!pk) { 132 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
|
/external/openssl/crypto/x509v3/ |
v3_skey.c | 105 ASN1_BIT_STRING *pk; local 124 pk = ctx->subject_req->req_info->pubkey->public_key; 125 else pk = ctx->subject_cert->cert_info->key->public_key; 127 if(!pk) { 132 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyPairTest.java | 109 PrivateKey pk = TestKeyPair.getPrivate(); 110 KeyPair kp = new KeyPair(null, pk); 111 assertSame(pk, kp.getPrivate()); 129 PublicKey pk = TestKeyPair.getPublic(); 130 KeyPair kp = new KeyPair(pk, null); 131 assertSame(pk, kp.getPublic());
|
KSPrivateKeyEntryTest.java | 64 PrivateKey pk = null; local 66 new KeyStore.PrivateKeyEntry(pk, certs); 80 PrivateKey pk = new tmpPrivateKey(); local 82 new KeyStore.PrivateKeyEntry(pk, chain); 88 new KeyStore.PrivateKeyEntry(pk, chain);
|
/libcore/luni/src/test/java/tests/security/cert/ |
TrustAnchorTest.java | 66 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 69 new TrustAnchor(validCaNameRfc2253, pk, getFullEncoding()); 71 new TrustAnchor(validCaNameRfc2253, pk, getEncodingPSOnly()); 73 new TrustAnchor(validCaNameRfc2253, pk, getEncodingESOnly()); 75 new TrustAnchor(validCaNameRfc2253, pk, getEncodingNoMinMax()); 88 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 90 new TrustAnchor(validCaNameRfc2253, pk, null); 103 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 108 TrustAnchor ta = new TrustAnchor(validCaNameRfc2253, pk, ncCopy); 126 PublicKey pk = new TestKeyPair(keyAlg).getPublic() local 174 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 197 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 214 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 239 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 408 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 431 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 454 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 478 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 505 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 530 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 559 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local [all...] |
/external/zlib/src/contrib/blast/ |
Makefile | 5 blast < test.pk | cmp - test.txt
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/signature/ |
DSASHA1Verify.java | 46 public static byte[] encodeSSHDSAPublicKey(DSAPublicKey pk) throws IOException 51 tw.writeMPInt(pk.getP()); 52 tw.writeMPInt(pk.getQ()); 53 tw.writeMPInt(pk.getG()); 54 tw.writeMPInt(pk.getY()); 185 public static DSASignature generateSignature(byte[] message, DSAPrivateKey pk, SecureRandom rnd) 194 int qBitLength = pk.getQ().bitLength(); 200 while (k.compareTo(pk.getQ()) >= 0); 202 BigInteger r = pk.getG().modPow(k, pk.getP()).mod(pk.getQ()) [all...] |
/external/bluetooth/bluedroid/stack/avrc/ |
avrc_int.h | 91 #define AVRC_CTRL_PKT_LEN(pf, pk) {pf = (UINT8 *)((pk) + 1) + (pk)->offset + 2;}
|
/external/chromium_org/third_party/openssl/openssl/crypto/ec/ |
eck_prn.c | 122 EVP_PKEY *pk; local 124 pk = EVP_PKEY_new(); 125 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x)) 127 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 128 EVP_PKEY_free(pk); 134 EVP_PKEY *pk; local 136 pk = EVP_PKEY_new(); 137 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x) [all...] |
/external/openssl/crypto/ec/ |
eck_prn.c | 122 EVP_PKEY *pk; local 124 pk = EVP_PKEY_new(); 125 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x)) 127 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 128 EVP_PKEY_free(pk); 134 EVP_PKEY *pk; local 136 pk = EVP_PKEY_new(); 137 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x) [all...] |