Home
last modified time | relevance | path

Searched defs:pk (Results 1 – 25 of 52) sorted by relevance

123

/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securemessage/
DPublicKeyProtoUtil.java171 public static GenericPublicKey encodePublicKey(PublicKey pk) { in encodePublicKey()
199 public static EcP256PublicKey encodeEcPublicKey(PublicKey pk) { in encodeEcPublicKey()
210 public static SimpleRsaPublicKey encodeRsa2048PublicKey(PublicKey pk) { in encodeRsa2048PublicKey()
222 public static DhPublicKey encodeDh2048PublicKey(PublicKey pk) { in encodeDh2048PublicKey()
295 public static RSAPublicKey parseRsa2048PublicKey(SimpleRsaPublicKey pk) in parseRsa2048PublicKey()
321 public static DHPublicKey parseDh2048PublicKey(DhPublicKey pk) throws InvalidKeySpecException { in parseDh2048PublicKey()
478 private static ECPublicKey pkToECPublicKey(PublicKey pk) { in pkToECPublicKey()
488 private static RSAPublicKey pkToRSAPublicKey(PublicKey pk) { in pkToRSAPublicKey()
498 private static DHPublicKey pkToDHPublicKey(PublicKey pk) { in pkToDHPublicKey()
/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securegcm/
DKeyEncoding.java53 public static byte[] encodeUserPublicKey(PublicKey pk) { in encodeUserPublicKey()
74 public static byte[] encodeKeyAgreementPublicKey(PublicKey pk) { in encodeKeyAgreementPublicKey()
99 public static byte[] encodeSigningPublicKey(PublicKey pk) { in encodeSigningPublicKey()
116 public static boolean isLegacyPublicKey(PublicKey pk) { in isLegacyPublicKey()
142 private static byte[] encodePublicKey(PublicKey pk) { in encodePublicKey()
/external/openssh/
Ded25519.c14 static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigne… in get_hram()
27 unsigned char *pk, in crypto_sign_ed25519_keypair()
106 const unsigned char *pk in crypto_sign_ed25519_open()
/external/autotest/frontend/afe/fixtures/
Dinitial_data.json1 [{"pk": "1", "model": "afe.aclgroup", "fields": {"name": "Everyone", "description": ""}}] string
/external/apache-commons-math/src/main/java/org/apache/commons/math/optimization/general/
DLevenbergMarquardtOptimizer.java289 int pk = permutation[k]; in doOptimize() local
516 int pk = permutation[k]; in determineLMParameter() local
704 int pk = permutation[k]; in determineLMDirection() local
837 int pk = permutation[nextColumn]; in qrDecomposition() local
876 int pk = permutation[k]; in qTy() local
/external/apache-commons-math/src/main/java/org/apache/commons/math/estimation/
DLevenbergMarquardtEstimator.java289 int pk = permutation[k]; in estimate() local
509 int pk = permutation[k]; in determineLMParameter() local
703 int pk = permutation[k]; in determineLMDirection() local
839 int pk = permutation[nextColumn]; in qrDecomposition() local
880 int pk = permutation[k]; in qTy() local
/external/syzkaller/vendor/golang.org/x/oauth2/google/
Djwt.go50 pk *rsa.PrivateKey member
/external/boringssl/src/crypto/x509v3/
Dv3_skey.c111 ASN1_BIT_STRING *pk; in s2i_skey_id() local
/external/boringssl/src/crypto/x509/
Dx509.c107 int PKCS8_pkey_get0(ASN1_OBJECT **ppkalg, const uint8_t **pk, int *ppklen, in PKCS8_pkey_get0()
Dx_pubkey.c92 X509_PUBKEY *pk = NULL; variable
356 const unsigned char **pk, int *ppklen, in X509_PUBKEY_get0_param()
Dx509_cmp.c391 EVP_PKEY *pk = NULL; in X509_chain_check_suiteb() local
454 int X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigned long flags) in X509_CRL_check_suiteb()
Drsa_pss.c198 EVP_PKEY *pk = EVP_PKEY_CTX_get0_pkey(ctx->pctx); in x509_rsa_ctx_to_pss() local
/external/wpa_supplicant_8/src/tls/
Dtlsv1_common.c163 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) in tls_parse_cert()
414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, in tls_verify_signature()
Dpkcs1.c196 int pkcs1_v15_sig_ver(struct crypto_public_key *pk, in pkcs1_v15_sig_ver()
/external/boringssl/src/third_party/wycheproof_testvectors/
Deddsa_test.json14 "pk" : "7d4d0e7f6153a69b6242b522abbee685fda4420f8834b108c3bdae369ef549fa", string
604 "pk" : "a12c2beb77265f2aac953b5009349d94155a03ada416aad451319480e983ca4c", string
690 "pk" : "d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a", string
712 "pk" : "3d4017c3e843895a92b70aa74d1b7ebc9c982ccf2ec4968cc0cd55f12af4660c", string
734 "pk" : "fc51cd8e6218a1a38da47ed00230f0580816ed13ba3303ac5deb911548908025", string
756 "pk" : "278117fc144c72340f67d0f2316e8386ceffbf2b2428c9c51fef7c597f1d426e", string
778 "pk" : "8fd659b77b558ed93882c1157438450ac86ec62d421d568e98ee236f3810295a", string
800 "pk" : "2a606bf67ac770c607038b004101b325edb569efd3413d2d1f2c3e6b4e6e3082", string
830 "pk" : "c9c946cbc5544ac74eef491f07c5881c16faf7ec31ce4aa91bb60ae7b4539051", string
860 "pk" : "32ad026f693d0d2afe7f4388d91c4c964426fcb9e3665c3ebd8650009b815c8e", string
[all …]
/external/wpa_supplicant_8/src/eap_common/
Deap_gpsk_common.c114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper()
192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes()
285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys()
/external/libpcap/
Ddlpisubs.c126 u_char *ep, *pk; in pcap_process_pkts() local
/external/conscrypt/testing/src/main/java/org/conscrypt/javax/net/ssl/
DTestKeyManager.java175 PrivateKey pk = keyManager.getPrivateKey(alias); in getPrivateKey() local
/external/openssh/regress/unittests/sshkey/
Dtest_sshkey.c58 struct sshbuf *ca_buf, *pk, *principals, *critopts, *exts; in build_cert() local
/external/conscrypt/repackaged/testing/src/main/java/com/android/org/conscrypt/javax/net/ssl/
DTestKeyManager.java177 PrivateKey pk = keyManager.getPrivateKey(alias); in getPrivateKey() local
/external/skia/src/compute/skc/
Draster.h54 skc_ttpk_t pk; member
/external/skqp/src/compute/skc/
Draster.h54 skc_ttpk_t pk; member
/external/skia/src/compute/skc/platforms/cl_12/
Draster_builder_cl_12.h97 skc_uint pk; // # of pk keys member
/external/skqp/src/compute/skc/platforms/cl_12/
Draster_builder_cl_12.h97 skc_uint pk; // # of pk keys member
/external/clang/test/Analysis/
Dmisc-ps.c100 int *pk = bazR10376675(); in barR10376675() local

123