Home
last modified time | relevance | path

Searched refs:pk (Results 1 – 25 of 324) sorted by relevance

12345678910>>...13

/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securemessage/
DPublicKeyProtoUtil.java171 public static GenericPublicKey encodePublicKey(PublicKey pk) { in encodePublicKey() argument
172 if (pk == null) { in encodePublicKey()
175 if (pk instanceof ECPublicKey) { in encodePublicKey()
178 .setEcP256PublicKey(encodeEcPublicKey(pk)) in encodePublicKey()
181 if (pk instanceof RSAPublicKey) { in encodePublicKey()
184 .setRsa2048PublicKey(encodeRsa2048PublicKey(pk)) in encodePublicKey()
187 if (pk instanceof DHPublicKey) { in encodePublicKey()
190 .setDh2048PublicKey(encodeDh2048PublicKey(pk)) in encodePublicKey()
199 public static EcP256PublicKey encodeEcPublicKey(PublicKey pk) { in encodeEcPublicKey() argument
200 ECPublicKey epk = pkToECPublicKey(pk); in encodeEcPublicKey()
[all …]
/external/python/rsa/tests/
Dtest_key.py19 pk = rsa.key.PrivateKey(3727264081, 65537, 3349121513, 65063, 57287)
22 encrypted = rsa.core.encrypt_int(message, pk.e, pk.n)
24 blinded = pk.blind(encrypted, 4134431) # blind before decrypting
25 decrypted = rsa.core.decrypt_int(blinded, pk.d, pk.n)
26 unblinded = pk.unblind(decrypted, 4134431)
45 pk = rsa.key.PrivateKey(3727264081, 65537, 3349121513, 65063, 57287)
47 self.assertEqual(pk.exp1, 55063)
48 self.assertEqual(pk.exp2, 10095)
49 self.assertEqual(pk.coef, 50797)
Dtest_load_save_keys.py203 pk = rsa.key.PrivateKey(3727264081, 65537, 3349121513, 65063, 57287)
205 pickled = pickle.dumps(pk)
207 self.assertEqual(pk, unpickled)
210 pk = rsa.key.PublicKey(3727264081, 65537)
212 pickled = pickle.dumps(pk)
215 self.assertEqual(pk, unpickled)
/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securegcm/
DKeyEncoding.java53 public static byte[] encodeUserPublicKey(PublicKey pk) { in encodeUserPublicKey() argument
54 return encodePublicKey(pk); in encodeUserPublicKey()
74 public static byte[] encodeKeyAgreementPublicKey(PublicKey pk) { in encodeKeyAgreementPublicKey() argument
75 return encodePublicKey(pk); in encodeKeyAgreementPublicKey()
99 public static byte[] encodeSigningPublicKey(PublicKey pk) { in encodeSigningPublicKey() argument
100 return encodePublicKey(pk); in encodeSigningPublicKey()
116 public static boolean isLegacyPublicKey(PublicKey pk) { in isLegacyPublicKey() argument
117 if (pk instanceof ECPublicKey) { in isLegacyPublicKey()
142 private static byte[] encodePublicKey(PublicKey pk) { in encodePublicKey() argument
143 return PublicKeyProtoUtil.encodePublicKey(pk).toByteArray(); in encodePublicKey()
/external/apache-commons-math/src/main/java/org/apache/commons/math/optimization/general/
DLevenbergMarquardtOptimizer.java289 int pk = permutation[k]; in doOptimize() local
290 wjacobian[k][pk] = diagR[pk]; in doOptimize()
516 int pk = permutation[k]; in determineLMParameter() local
517 double ypk = lmDir[pk] / diagR[pk]; in determineLMParameter()
519 lmDir[permutation[i]] -= ypk * wjacobian[i][pk]; in determineLMParameter()
521 lmDir[pk] = ypk; in determineLMParameter()
704 int pk = permutation[k]; in determineLMDirection() local
712 double rkk = wjacobian[k][pk]; in determineLMDirection()
725 wjacobian[k][pk] = cos * rkk + sin * lmDiag[k]; in determineLMDirection()
732 double rik = wjacobian[i][pk]; in determineLMDirection()
[all …]
/external/apache-commons-math/src/main/java/org/apache/commons/math/estimation/
DLevenbergMarquardtEstimator.java289 int pk = permutation[k]; in estimate() local
290 jacobian[k * cols + pk] = diagR[pk]; in estimate()
509 int pk = permutation[k]; in determineLMParameter() local
510 double ypk = lmDir[pk] / diagR[pk]; in determineLMParameter()
511 int index = pk; in determineLMParameter()
516 lmDir[pk] = ypk; in determineLMParameter()
703 int pk = permutation[k]; in determineLMDirection() local
711 double rkk = jacobian[k * cols + pk]; in determineLMDirection()
724 jacobian[k * cols + pk] = cos * rkk + sin * lmDiag[k]; in determineLMDirection()
731 double rik = jacobian[i * cols + pk]; in determineLMDirection()
[all …]
/external/openssh/
Ded25519.c14 static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigne… in get_hram() argument
19 for (i = 32;i < 64;++i) playground[i] = pk[i-32]; in get_hram()
27 unsigned char *pk, in crypto_sign_ed25519_keypair() argument
45 ge25519_pack(pk, &gepk); in crypto_sign_ed25519_keypair()
47 sk[32 + i] = pk[i]; in crypto_sign_ed25519_keypair()
106 const unsigned char *pk in crypto_sign_ed25519_open() argument
119 if (ge25519_unpackneg_vartime(&get1, pk)) return -1; in crypto_sign_ed25519_open()
121 get_hram(hram,sm,pk,m,smlen); in crypto_sign_ed25519_open()
/external/swiftshader/third_party/llvm-7.0/llvm/test/CodeGen/AMDGPU/
Dv_cvt_pk_u8_f32.ll4 declare i32 @llvm.amdgcn.cvt.pk.u8.f32(float, i32, i32) #0
9 %result = call i32 @llvm.amdgcn.cvt.pk.u8.f32(float %src, i32 0, i32 %reg) #0
17 %result = call i32 @llvm.amdgcn.cvt.pk.u8.f32(float %src, i32 1, i32 %reg) #0
25 %result = call i32 @llvm.amdgcn.cvt.pk.u8.f32(float %src, i32 2, i32 %reg) #0
33 %result = call i32 @llvm.amdgcn.cvt.pk.u8.f32(float %src, i32 3, i32 %reg) #0
44 %result0 = call i32 @llvm.amdgcn.cvt.pk.u8.f32(float %src, i32 0, i32 %reg) #0
45 %result1 = call i32 @llvm.amdgcn.cvt.pk.u8.f32(float %src, i32 1, i32 %result0) #0
46 %result2 = call i32 @llvm.amdgcn.cvt.pk.u8.f32(float %src, i32 2, i32 %result1) #0
47 %result3 = call i32 @llvm.amdgcn.cvt.pk.u8.f32(float %src, i32 3, i32 %result2) #0
55 %result = call i32 @llvm.amdgcn.cvt.pk.u8.f32(float %src, i32 %idx, i32 %reg) #0
Dllvm.amdgcn.cvt.pk.u16.ll12 %result = call <2 x i16> @llvm.amdgcn.cvt.pk.u16(i32 %x, i32 %y)
22 %result = call <2 x i16> @llvm.amdgcn.cvt.pk.u16(i32 %x, i32 %x)
41 %cvt = call <2 x i16> @llvm.amdgcn.cvt.pk.u16(i32 %a, i32 %b)
56 %cvt = call <2 x i16> @llvm.amdgcn.cvt.pk.u16(i32 %a, i32 1)
72 %cvt = call <2 x i16> @llvm.amdgcn.cvt.pk.u16(i32 1, i32 %a)
78 declare <2 x i16> @llvm.amdgcn.cvt.pk.u16(i32, i32) #1
Dllvm.amdgcn.cvt.pk.i16.ll12 %result = call <2 x i16> @llvm.amdgcn.cvt.pk.i16(i32 %x, i32 %y)
22 %result = call <2 x i16> @llvm.amdgcn.cvt.pk.i16(i32 %x, i32 %x)
41 %cvt = call <2 x i16> @llvm.amdgcn.cvt.pk.i16(i32 %a, i32 %b)
56 %cvt = call <2 x i16> @llvm.amdgcn.cvt.pk.i16(i32 %a, i32 1)
72 %cvt = call <2 x i16> @llvm.amdgcn.cvt.pk.i16(i32 1, i32 %a)
78 declare <2 x i16> @llvm.amdgcn.cvt.pk.i16(i32, i32) #1
/external/wpa_supplicant_8/src/crypto/
Dcrypto_libtomcrypt.c423 struct crypto_public_key *pk; in crypto_public_key_import() local
425 pk = os_zalloc(sizeof(*pk)); in crypto_public_key_import()
426 if (pk == NULL) in crypto_public_key_import()
429 res = rsa_import(key, len, &pk->rsa); in crypto_public_key_import()
434 os_free(pk); in crypto_public_key_import()
438 if (pk->rsa.type != PK_PUBLIC) { in crypto_public_key_import()
441 rsa_free(&pk->rsa); in crypto_public_key_import()
442 os_free(pk); in crypto_public_key_import()
446 return pk; in crypto_public_key_import()
455 struct crypto_private_key *pk; in crypto_private_key_import() local
[all …]
/external/boringssl/src/crypto/x509v3/
Dv3_skey.c111 ASN1_BIT_STRING *pk; in s2i_skey_id() local
132 pk = ctx->subject_req->req_info->pubkey->public_key; in s2i_skey_id()
134 pk = ctx->subject_cert->cert_info->key->public_key; in s2i_skey_id()
136 if (!pk) { in s2i_skey_id()
142 (pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL)) in s2i_skey_id()
/external/eigen/Eigen/src/OrderingMethods/
DAmd.h100 ok, nel = 0, p, p1, p2, p3, p4, pj, pk, pk1, pk2, pn, q, t, h; in minimum_degree_ordering() local
267 for(pk = pk1; pk < pk2; pk++) /* scan 1: find |Le\Lk| */ in minimum_degree_ordering()
269 i = Ci[pk]; in minimum_degree_ordering()
288 for(pk = pk1; pk < pk2; pk++) /* scan2: degree update */ in minimum_degree_ordering()
290 i = Ci[pk]; /* consider node i in Lk */ in minimum_degree_ordering()
352 for(pk = pk1; pk < pk2; pk++) in minimum_degree_ordering()
354 i = Ci[pk]; in minimum_degree_ordering()
391 for(p = pk1, pk = pk1; pk < pk2; pk++) /* finalize Lk */ in minimum_degree_ordering()
393 i = Ci[pk]; in minimum_degree_ordering()
/external/python/pyasn1/docs/source/
Dexample-use-case.rst132 >>> pk = private_key
134 >>> pk['prime1'] * pk['prime2'] == pk['modulus']
136 >>> pk['prime1'] == pk['modulus'] // pk['prime2']
138 >>> pk['exponent1'] == pk['privateExponent'] % (pk['prime1'] - 1)
140 >>> pk['exponent2'] == pk['privateExponent'] % (pk['prime2'] - 1)
/external/skqp/src/compute/skc/platforms/cl_12/kernels/
Dplace.cl176 skc_ttpk_lo_t pk[SKC_PLACE_SMEM_COUNT_TTPK];
181 skc_ttpk_hi_t pk[SKC_PLACE_SMEM_COUNT_TTPK];
239 // clip the sk and pk keys
245 // alternatively -- keep sk and pk keys segregated because sk
285 skc_uint const lo = smem->lo.pk[pk_idx] & SKC_TTXK_LO_MASK_ID_PREFIX; // assumes prefix bit is 1
286 skc_uint const hi = smem->hi.pk[pk_idx];
342 skc_uint const lo = smem->lo.pk[idx];
343 skc_uint const hi = smem->hi.pk[idx];
361 skc_uint const pk)
363 // bail out if pk queue is empty
[all …]
/external/skia/src/compute/skc/platforms/cl_12/kernels/
Dplace.cl176 skc_ttpk_lo_t pk[SKC_PLACE_SMEM_COUNT_TTPK];
181 skc_ttpk_hi_t pk[SKC_PLACE_SMEM_COUNT_TTPK];
239 // clip the sk and pk keys
245 // alternatively -- keep sk and pk keys segregated because sk
285 skc_uint const lo = smem->lo.pk[pk_idx] & SKC_TTXK_LO_MASK_ID_PREFIX; // assumes prefix bit is 1
286 skc_uint const hi = smem->hi.pk[pk_idx];
342 skc_uint const lo = smem->lo.pk[idx];
343 skc_uint const hi = smem->hi.pk[idx];
361 skc_uint const pk)
363 // bail out if pk queue is empty
[all …]
/external/syzkaller/vendor/golang.org/x/oauth2/google/
Djwt.go31 pk, err := internal.ParseKey(cfg.PrivateKey)
38 pk: pk,
50 pk *rsa.PrivateKey member
69 msg, err := jws.Encode(hdr, cs, ts.pk)
/external/boringssl/src/crypto/x509/
Dx509_cmp.c391 EVP_PKEY *pk = NULL; in X509_chain_check_suiteb() local
410 pk = X509_get_pubkey(x); in X509_chain_check_suiteb()
412 rv = check_suite_b(pk, -1, &tflags); in X509_chain_check_suiteb()
425 EVP_PKEY_free(pk); in X509_chain_check_suiteb()
426 pk = X509_get_pubkey(x); in X509_chain_check_suiteb()
427 rv = check_suite_b(pk, sign_nid, &tflags); in X509_chain_check_suiteb()
433 rv = check_suite_b(pk, X509_get_signature_nid(x), &tflags); in X509_chain_check_suiteb()
435 if (pk) in X509_chain_check_suiteb()
436 EVP_PKEY_free(pk); in X509_chain_check_suiteb()
454 int X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigned long flags) in X509_CRL_check_suiteb() argument
[all …]
Dx509.c107 int PKCS8_pkey_get0(ASN1_OBJECT **ppkalg, const uint8_t **pk, int *ppklen, in PKCS8_pkey_get0() argument
115 if (pk) { in PKCS8_pkey_get0()
116 *pk = p8->pkey->value.octet_string->data; in PKCS8_pkey_get0()
121 if (pk) { in PKCS8_pkey_get0()
122 *pk = p8->pkey->value.sequence->data; in PKCS8_pkey_get0()
Dx_pubkey.c92 X509_PUBKEY *pk = NULL; variable
110 pk = d2i_X509_PUBKEY(NULL, &p, (long)spki_len);
111 if (pk == NULL || p != spki + spki_len) {
118 *x = pk;
122 X509_PUBKEY_free(pk);
356 const unsigned char **pk, int *ppklen, in X509_PUBKEY_get0_param() argument
361 if (pk) { in X509_PUBKEY_get0_param()
362 *pk = pub->public_key->data; in X509_PUBKEY_get0_param()
/external/boringssl/src/third_party/wycheproof_testvectors/
Deddsa_test.txt9 [key.pk = 7d4d0e7f6153a69b6242b522abbee685fda4420f8834b108c3bdae369ef549fa]
204 # include pk in signature
451 [key.pk = a12c2beb77265f2aac953b5009349d94155a03ada416aad451319480e983ca4c]
503 [key.pk = d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a]
516 [key.pk = 3d4017c3e843895a92b70aa74d1b7ebc9c982ccf2ec4968cc0cd55f12af4660c]
529 [key.pk = fc51cd8e6218a1a38da47ed00230f0580816ed13ba3303ac5deb911548908025]
542 [key.pk = 278117fc144c72340f67d0f2316e8386ceffbf2b2428c9c51fef7c597f1d426e]
555 [key.pk = 8fd659b77b558ed93882c1157438450ac86ec62d421d568e98ee236f3810295a]
568 [key.pk = 2a606bf67ac770c607038b004101b325edb569efd3413d2d1f2c3e6b4e6e3082]
587 [key.pk = c9c946cbc5544ac74eef491f07c5881c16faf7ec31ce4aa91bb60ae7b4539051]
[all …]
/external/wpa_supplicant_8/src/tls/
Dtlsv1_common.c163 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) in tls_parse_cert() argument
170 *pk = crypto_public_key_from_cert(buf, len); in tls_parse_cert()
171 if (*pk) in tls_parse_cert()
193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); in tls_parse_cert()
196 if (*pk == NULL) { in tls_parse_cert()
414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, in tls_verify_signature() argument
441 if (pk == NULL) { in tls_verify_signature()
453 if (crypto_public_key_decrypt_pkcs1(pk, pos, end - pos, buf, &buflen) < in tls_verify_signature()
/external/libpcap/
Ddlpisubs.c126 u_char *ep, *pk; in pcap_process_pkts() local
168 pk = bufp + sizeof(*sbp); in pcap_process_pkts()
175 pk = bufp; in pcap_process_pkts()
179 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) { in pcap_process_pkts()
191 (*callback)(user, &pkthdr, pk); in pcap_process_pkts()
/external/eigen/unsupported/Eigen/src/Splines/
DSpline.h437 DenseIndex rk,pk,j1,j2; in BasisFunctionDerivativesImpl() local
438 rk = r-k; pk = p-k; in BasisFunctionDerivativesImpl()
442 a(s2,0) = a(s1,0)/ndu(pk+1,rk); in BasisFunctionDerivativesImpl()
443 d = a(s2,0)*ndu(rk,pk); in BasisFunctionDerivativesImpl()
449 if (r-1 <= pk) j2 = k-1; in BasisFunctionDerivativesImpl()
454 a(s2,j) = (a(s1,j)-a(s1,j-1))/ndu(pk+1,rk+j); in BasisFunctionDerivativesImpl()
455 d += a(s2,j)*ndu(rk+j,pk); in BasisFunctionDerivativesImpl()
458 if (r<=pk) in BasisFunctionDerivativesImpl()
460 a(s2,k) = -a(s1,k-1)/ndu(pk+1,r); in BasisFunctionDerivativesImpl()
461 d += a(s2,k)*ndu(r,pk); in BasisFunctionDerivativesImpl()
/external/boringssl/src/crypto/evp/
Dinternal.h101 int (*pkey_opaque)(const EVP_PKEY *pk);
103 int (*pkey_size)(const EVP_PKEY *pk);
104 int (*pkey_bits)(const EVP_PKEY *pk);
106 int (*param_missing)(const EVP_PKEY *pk);

12345678910>>...13