| /external/ukey2/src/main/java/com/google/security/cryptauth/lib/securegcm/ |
| D | KeyEncoding.java | 53 public static byte[] encodeUserPublicKey(PublicKey pk) { in encodeUserPublicKey() 61 public static byte[] encodeDeviceSyncGroupPublicKey(PublicKey pk) { in encodeDeviceSyncGroupPublicKey() 83 public static byte[] encodeKeyAgreementPublicKey(PublicKey pk) { in encodeKeyAgreementPublicKey() 108 public static byte[] encodeSigningPublicKey(PublicKey pk) { in encodeSigningPublicKey() 125 public static boolean isLegacyPublicKey(PublicKey pk) { in isLegacyPublicKey() 151 private static byte[] encodePublicKey(PublicKey pk) { in encodePublicKey()
|
| /external/ukey2/src/main/java/com/google/security/cryptauth/lib/securemessage/ |
| D | PublicKeyProtoUtil.java | 172 public static GenericPublicKey encodePublicKey(PublicKey pk) { in encodePublicKey() 201 public static GenericPublicKey encodePaddedEcPublicKey(PublicKey pk) { in encodePaddedEcPublicKey() 231 public static EcP256PublicKey encodeEcPublicKey(PublicKey pk) { in encodeEcPublicKey() 242 public static SimpleRsaPublicKey encodeRsa2048PublicKey(PublicKey pk) { in encodeRsa2048PublicKey() 254 public static DhPublicKey encodeDh2048PublicKey(PublicKey pk) { in encodeDh2048PublicKey() 327 public static RSAPublicKey parseRsa2048PublicKey(SimpleRsaPublicKey pk) in parseRsa2048PublicKey() 353 public static DHPublicKey parseDh2048PublicKey(DhPublicKey pk) throws InvalidKeySpecException { in parseDh2048PublicKey() 510 private static ECPublicKey pkToECPublicKey(PublicKey pk) { in pkToECPublicKey() 520 private static RSAPublicKey pkToRSAPublicKey(PublicKey pk) { in pkToRSAPublicKey() 530 private static DHPublicKey pkToDHPublicKey(PublicKey pk) { in pkToDHPublicKey()
|
| /external/ukey2/src/main/javatest/com/google/security/cryptauth/lib/securegcm/ |
| D | KeyEncodingTest.java | 84 PublicKey pk = userKeyPair.getPublic(); in testUserPublicKeyEncoding() local 99 PublicKey pk = clientKeyPair.getPublic(); in testKeyAgreementPublicKeyEncoding() local 129 PublicKey pk = keyPair.getPublic(); in testSigningPublicKeyEncoding() local 145 PublicKey pk = keyPair.getPublic(); in testDeviceSyncPublicKeyEncoding() local
|
| /external/openssh/ |
| D | ed25519.c | 14 static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigne… in get_hram() 27 unsigned char *pk, in crypto_sign_ed25519_keypair() 106 const unsigned char *pk in crypto_sign_ed25519_open()
|
| D | xmss_wots.c | 108 void wots_pkgen(unsigned char *pk, const unsigned char *sk, const wots_params *params, const unsign… in wots_pkgen() 158 int wots_pkFromSig(unsigned char *pk, const unsigned char *sig, const unsigned char *msg, const wot… in wots_pkFromSig()
|
| D | xmss_fast.c | 155 unsigned char pk[params->wots_par.keysize]; in gen_leaf_wots() local 522 int xmss_keypair(unsigned char *pk, unsigned char *sk, bds_state *state, xmss_params *params) in xmss_keypair() 663 …n, const unsigned char *sig_msg, unsigned long long sig_msg_len, const unsigned char *pk, const xm… in xmss_sign_open() 750 int xmssmt_keypair(unsigned char *pk, unsigned char *sk, bds_state *states, unsigned char *wots_sig… in xmssmt_keypair() 970 …n, const unsigned char *sig_msg, unsigned long long sig_msg_len, const unsigned char *pk, const xm… in xmssmt_sign_open()
|
| /external/libwebsockets/plugins/ssh-base/crypto/ |
| D | ed25519.c | 37 const unsigned char *pk, unsigned char *playground, in get_hram() 55 unsigned char *pk, in crypto_sign_ed25519_keypair() 175 const unsigned char *pk in crypto_sign_ed25519_open()
|
| /external/boringssl/src/crypto/x509/ |
| D | x_pubkey.c | 92 X509_PUBKEY *pk = NULL; variable 202 const unsigned char **pk, int *ppklen, in X509_PUBKEY_get0_param()
|
| D | x509_cmp.c | 402 EVP_PKEY *pk = NULL; in X509_chain_check_suiteb() local 465 int X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigned long flags) in X509_CRL_check_suiteb()
|
| /external/apache-commons-math/src/main/java/org/apache/commons/math/optimization/general/ |
| D | LevenbergMarquardtOptimizer.java | 289 int pk = permutation[k]; in doOptimize() local 516 int pk = permutation[k]; in determineLMParameter() local 704 int pk = permutation[k]; in determineLMDirection() local 837 int pk = permutation[nextColumn]; in qrDecomposition() local 876 int pk = permutation[k]; in qTy() local
|
| /external/apache-commons-math/src/main/java/org/apache/commons/math/estimation/ |
| D | LevenbergMarquardtEstimator.java | 289 int pk = permutation[k]; in estimate() local 509 int pk = permutation[k]; in determineLMParameter() local 703 int pk = permutation[k]; in determineLMDirection() local 839 int pk = permutation[nextColumn]; in qrDecomposition() local 880 int pk = permutation[k]; in qTy() local
|
| /external/boringssl/src/third_party/wycheproof_testvectors/ |
| D | eddsa_test.json | 25 "pk" : "7d4d0e7f6153a69b6242b522abbee685fda4420f8834b108c3bdae369ef549fa", string 622 "pk" : "a12c2beb77265f2aac953b5009349d94155a03ada416aad451319480e983ca4c", string 715 "pk" : "d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a", string 744 "pk" : "3d4017c3e843895a92b70aa74d1b7ebc9c982ccf2ec4968cc0cd55f12af4660c", string 773 "pk" : "fc51cd8e6218a1a38da47ed00230f0580816ed13ba3303ac5deb911548908025", string 802 "pk" : "278117fc144c72340f67d0f2316e8386ceffbf2b2428c9c51fef7c597f1d426e", string 831 "pk" : "8fd659b77b558ed93882c1157438450ac86ec62d421d568e98ee236f3810295a", string 860 "pk" : "2a606bf67ac770c607038b004101b325edb569efd3413d2d1f2c3e6b4e6e3082", string 897 "pk" : "c9c946cbc5544ac74eef491f07c5881c16faf7ec31ce4aa91bb60ae7b4539051", string 934 "pk" : "32ad026f693d0d2afe7f4388d91c4c964426fcb9e3665c3ebd8650009b815c8e", string [all …]
|
| /external/autotest/frontend/afe/fixtures/ |
| D | initial_data.json | 1 [{"pk": "1", "model": "afe.aclgroup", "fields": {"name": "Everyone", "description": ""}}] string
|
| /external/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
| D | ssl_pkey.c | 166 EVP_PKEY *pk; in SSL_CTX_use_PrivateKey_ASN1() local 195 EVP_PKEY *pk; in SSL_use_PrivateKey_ASN1() local
|
| /external/rust/crates/quiche/deps/boringssl/src/crypto/x509v3/ |
| D | v3_skey.c | 111 ASN1_BIT_STRING *pk; in s2i_skey_id() local
|
| /external/boringssl/src/crypto/x509v3/ |
| D | v3_skey.c | 111 ASN1_BIT_STRING *pk; in s2i_skey_id() local
|
| /external/rust/crates/quiche/deps/boringssl/src/crypto/x509/ |
| D | x509.c | 107 int PKCS8_pkey_get0(ASN1_OBJECT **ppkalg, const uint8_t **pk, int *ppklen, in PKCS8_pkey_get0()
|
| D | x_pubkey.c | 92 X509_PUBKEY *pk = NULL; variable 356 const unsigned char **pk, int *ppklen, in X509_PUBKEY_get0_param()
|
| D | x509_cmp.c | 397 EVP_PKEY *pk = NULL; in X509_chain_check_suiteb() local 460 int X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigned long flags) in X509_CRL_check_suiteb()
|
| /external/wpa_supplicant_8/src/tls/ |
| D | tlsv1_common.c | 163 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) in tls_parse_cert() 414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, in tls_verify_signature()
|
| /external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ |
| D | CryptDes.c | 138 BYTE *pk = desKey->t.buffer; in CryptDesValidateKey() local
|
| /external/wpa_supplicant_8/src/eap_common/ |
| D | eap_gpsk_common.c | 114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() 192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() 285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys()
|
| /external/wpa_supplicant_8/src/common/ |
| D | sae_pk.c | 436 void sae_deinit_pk(struct sae_pk *pk) in sae_deinit_pk() 452 struct sae_pk *pk; in sae_parse_pk() local 607 const struct sae_pk *pk; in sae_write_confirm_pk() local
|
| /external/openssh/regress/misc/sk-dummy/ |
| D | sk-dummy.c | 172 u_char pk[crypto_sign_ed25519_PUBLICKEYBYTES]; in pack_key_ed25519() local 307 EVP_PKEY *pk = NULL; in sig_ecdsa() local
|
| /external/libwebsockets/lib/tls/mbedtls/wrapper/platform/ |
| D | ssl_pm.c | 682 int pkey_pm_new(EVP_PKEY *pk, EVP_PKEY *m_pkey) in pkey_pm_new() 701 void pkey_pm_free(EVP_PKEY *pk) in pkey_pm_free() 716 int pkey_pm_load(EVP_PKEY *pk, const unsigned char *buffer, int len) in pkey_pm_load()
|