/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl3Test.java | 112 PrivateKey pk = new KeyStoreTestSupport.MyPrivateKey(tType, "", new byte[10]); local 113 KeyStore.PrivateKeyEntry pKey = new KeyStore.PrivateKeyEntry(pk, certs); 134 kss[i].setKeyEntry(aliases[3], pk, pwd, certs);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchor_ImplTest.java | 537 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 541 ta = new TrustAnchor(validCaNameRfc2253, pk, getEncodingESOnly()); 547 ta = new TrustAnchor(x500p, pk, getEncodingNoMinMax()); 552 ta = new TrustAnchor(x500p, pk, null);
|
/external/chromium_org/chrome/browser/devtools/adb/ |
android_rsa.cc | 214 base::StringPiece pk; local 215 if (!net::asn1::ExtractSubjectPublicKeyFromSPKI(asn1, &pk)) 219 std::vector<uint8> pk_data(pk.data() + 10, pk.data() + pk.length());
|
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_ameth.c | 70 static int rsa_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey) 77 if (X509_PUBKEY_set0_param(pk, OBJ_nid2obj(EVP_PKEY_RSA), 583 EVP_PKEY *pk = EVP_PKEY_CTX_get0_pkey(pkctx); local 594 saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2; 595 if (((EVP_PKEY_bits(pk) - 1) & 0x7) == 0)
|
/external/clang/test/Analysis/ |
misc-ps.c | 100 int *pk = bazR10376675(); local 101 pm = pk; //expected-warning {{never read}}
|
/external/eigen/Eigen/src/OrderingMethods/ |
Amd.h | 101 ok, nel = 0, p, p1, p2, p3, p4, pj, pk, pk1, pk2, pn, q, t; local 259 for(pk = pk1; pk < pk2; pk++) /* scan 1: find |Le\Lk| */ 261 i = Ci[pk]; 280 for(pk = pk1; pk < pk2; pk++) /* scan2: degree update */ 282 i = Ci[pk]; /* consider node i in Lk */ 344 for(pk = pk1; pk < pk2; pk++ [all...] |
/external/eigen/unsupported/Eigen/src/Splines/ |
Spline.h | 402 DenseIndex rk,pk,j1,j2; local 403 rk = r-k; pk = p-k; 407 a(s2,0) = a(s1,0)/ndu(pk+1,rk); 408 d = a(s2,0)*ndu(rk,pk); 414 if (r-1 <= pk) j2 = k-1; 419 a(s2,j) = (a(s1,j)-a(s1,j-1))/ndu(pk+1,rk+j); 420 d += a(s2,j)*ndu(rk+j,pk); 423 if (r<=pk) 425 a(s2,k) = -a(s1,k-1)/ndu(pk+1,r); 426 d += a(s2,k)*ndu(r,pk); [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/ |
AuthenticationManager.java | 194 DSAPrivateKey pk = (DSAPrivateKey) key; local 196 byte[] pk_enc = DSASHA1Verify.encodeSSHDSAPublicKey(pk.getPublicKey()); 213 DSASignature ds = DSASHA1Verify.generateSignature(msg, pk, rnd); 223 RSAPrivateKey pk = (RSAPrivateKey) key; local 225 byte[] pk_enc = RSASHA1Verify.encodeSSHRSAPublicKey(pk.getPublicKey()); 243 RSASignature ds = RSASHA1Verify.generateSignature(msg, pk);
|
/external/openssh/ |
authfile.c | 522 EVP_PKEY *pk = NULL; local 533 pk = PEM_read_bio_PrivateKey(bio, NULL, NULL, (char *)passphrase); 535 if (pk == NULL) { 538 } else if (pk->type == EVP_PKEY_RSA && 541 prv->rsa = EVP_PKEY_get1_RSA(pk); 552 } else if (pk->type == EVP_PKEY_DSA && 555 prv->dsa = EVP_PKEY_get1_DSA(pk); 562 } else if (pk->type == EVP_PKEY_EC && 565 prv->ecdsa = EVP_PKEY_get1_EC_KEY(pk); 584 "unknown EVP_PKEY save_type %d", __func__, pk->save_type) [all...] |
/external/openssl/crypto/rsa/ |
rsa_ameth.c | 70 static int rsa_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey) 77 if (X509_PUBKEY_set0_param(pk, OBJ_nid2obj(EVP_PKEY_RSA), 583 EVP_PKEY *pk = EVP_PKEY_CTX_get0_pkey(pkctx); local 594 saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2; 595 if (((EVP_PKEY_bits(pk) - 1) & 0x7) == 0)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 25 u8 pk[EAP_GPSK_MAX_PK_LEN]; member in struct:eap_gpsk_data 414 data->pk, &data->pk_len) < 0) {
|
/libcore/luni/src/test/java/tests/java/security/ |
IdentityTest.java | 216 PublicKey pk = new PublicKeyStub("aaa", "fff", new byte[]{1,2,3,4,5}); local 218 i.setPublicKey(pk); 226 new IdentityStub(name, pk), Boolean.TRUE 233 i2.setPublicKey(pk); 283 // PublicKey pk = new PublicKeyStub("kkk", "fff", new byte[]{1,2,3,4,5}); 284 // i1.setPublicKey(pk); 286 // i2.setPublicKey(pk); 317 PublicKey pk = new PublicKeyStub("kkk", "Identity.testGetPublicKey", null); local 318 i.setPublicKey(pk); 319 assertSame(pk, i.getPublicKey()) [all...] |
/libcore/luni/src/test/java/tests/java/sql/ |
StressTest.java | 165 int pk = 1; local 171 insertNewRecord(c, pk++); 314 private void insertNewRecord(Connection c, int pk) { 321 ps.setInt(1, pk);
|
/libcore/luni/src/test/java/tests/security/cert/ |
PKIXCertPathValidatorResultTest.java | 175 PublicKey pk = testPublicKey; local 180 pk); 184 assertSame(pk, vr.getPublicKey());
|
TrustAnchorTest.java | 66 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 69 new TrustAnchor(validCaNameRfc2253, pk, getFullEncoding()); 71 new TrustAnchor(validCaNameRfc2253, pk, getEncodingPSOnly()); 73 new TrustAnchor(validCaNameRfc2253, pk, getEncodingESOnly()); 75 new TrustAnchor(validCaNameRfc2253, pk, getEncodingNoMinMax()); 88 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 90 new TrustAnchor(validCaNameRfc2253, pk, null); 103 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 108 TrustAnchor ta = new TrustAnchor(validCaNameRfc2253, pk, ncCopy); 126 PublicKey pk = new TestKeyPair(keyAlg).getPublic() local 174 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 197 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 214 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 239 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 408 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 431 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 454 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 478 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 505 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 530 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 559 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_cryptoapi.c | 661 struct crypto_public_key *pk; local 664 pk = os_zalloc(sizeof(*pk)); 665 if (pk == NULL) 672 os_free(pk); 676 if (!CryptAcquireContext(&pk->prov, NULL, MS_DEF_PROV, PROV_RSA_FULL, 679 os_free(pk); 684 if (!CryptImportPublicKeyInfo(pk->prov, X509_ASN_ENCODING | 687 &pk->rsa)) { 689 CryptReleaseContext(pk->prov, 0) [all...] |
crypto_libtomcrypt.c | 419 struct crypto_public_key *pk; local 421 pk = os_zalloc(sizeof(*pk)); 422 if (pk == NULL) 425 res = rsa_import(key, len, &pk->rsa); 430 os_free(pk); 434 if (pk->rsa.type != PK_PUBLIC) { 437 rsa_free(&pk->rsa); 438 os_free(pk); 442 return pk; 451 struct crypto_private_key *pk; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 24 u8 pk[EAP_GPSK_MAX_PK_LEN]; member in struct:eap_gpsk_data 350 data->pk, &data->pk_len) < 0) {
|
/libcore/crypto/src/main/java/org/conscrypt/ |
ServerHandshakeImpl.java | 479 PublicKey pk = serverCert.certs[0].getPublicKey(); local 480 if (getRSAKeyLength(pk) > 512) {
|
/libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/ |
CertBlacklistTest.java | 230 PublicKey pk = createPublicKey(TEST_CERT); local 237 assertEquals(bl.isPublicKeyBlackListed(pk), false); 242 PublicKey pk = createPublicKey(TEST_CERT); local 244 String hash = getHash(pk); 253 assertTrue(bl.isPublicKeyBlackListed(pk)); 395 PublicKey pk = createPublicKey(TURKTRUST_1); local 401 assertEquals(bl.isPublicKeyBlackListed(pk), true); 411 PublicKey pk = createPublicKey(TURKTRUST_2); local 415 assertEquals(bl.isPublicKeyBlackListed(pk), true);
|
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
TrustManagerFactory1Test.java | 447 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); local 448 TrustAnchor ta = new TrustAnchor(validCaNameRfc2253, pk, getFullEncoding());
|
/external/libpcap/ |
pcap-dlpi.c | 247 register u_char *bp, *ep, *pk; local 338 pk = bp + sizeof(*sbp); 345 pk = bp; 349 if (bpf_filter(fcode, pk, origlen, caplen)) { 361 (*callback)(user, &pkthdr, pk); [all...] |
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 1583 struct crypto_public_key *pk; local [all...] |
/libcore/luni/src/test/java/libcore/java/security/ |
SignatureTest.java | 187 PublicKey pk = keyFactory.generatePublic(keySpec); local 190 sig.initVerify(pk); [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
x509.c | 991 EVP_PKEY *pk; local 1001 pk=load_key(bio_err, 1004 if (pk == NULL) goto end; 1009 rq=X509_to_X509_REQ(x,pk,digest); 1010 EVP_PKEY_free(pk); [all...] |