/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
D | TrustAnchorTest.java | 64 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); in testTrustAnchorStringPublicKeybyteArray01() local 67 new TrustAnchor(validCaNameRfc2253, pk, getFullEncoding()); in testTrustAnchorStringPublicKeybyteArray01() 69 new TrustAnchor(validCaNameRfc2253, pk, getEncodingPSOnly()); in testTrustAnchorStringPublicKeybyteArray01() 71 new TrustAnchor(validCaNameRfc2253, pk, getEncodingESOnly()); in testTrustAnchorStringPublicKeybyteArray01() 73 new TrustAnchor(validCaNameRfc2253, pk, getEncodingNoMinMax()); in testTrustAnchorStringPublicKeybyteArray01() 87 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); in testTrustAnchorStringPublicKeybyteArray02() local 89 new TrustAnchor(validCaNameRfc2253, pk, null); in testTrustAnchorStringPublicKeybyteArray02() 103 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); in testTrustAnchorStringPublicKeybyteArray03() local 108 TrustAnchor ta = new TrustAnchor(validCaNameRfc2253, pk, ncCopy); in testTrustAnchorStringPublicKeybyteArray03() 126 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); in testTrustAnchorStringPublicKeybyteArray04() local [all …]
|
D | PKIXCertPathValidatorResultTest.java | 185 PublicKey pk = testPublicKey; in testGetPublicKey() local 190 pk); in testGetPublicKey() 194 assertSame(pk, vr.getPublicKey()); in testGetPublicKey()
|
/external/boringssl/src/crypto/x509/ |
D | x509type.c | 64 EVP_PKEY *pk; in X509_certificate_type() local 70 pk=X509_get_pubkey(x); in X509_certificate_type() 72 pk=pkey; in X509_certificate_type() 74 if (pk == NULL) return(0); in X509_certificate_type() 76 switch (pk->type) in X509_certificate_type() 122 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look in X509_certificate_type() 125 if(pkey==NULL) EVP_PKEY_free(pk); in X509_certificate_type()
|
D | x509.c | 102 int PKCS8_pkey_get0(ASN1_OBJECT **ppkalg, const uint8_t **pk, int *ppklen, in PKCS8_pkey_get0() argument 110 if (pk) { in PKCS8_pkey_get0() 111 *pk = p8->pkey->value.octet_string->data; in PKCS8_pkey_get0() 116 if (pk) { in PKCS8_pkey_get0() 117 *pk = p8->pkey->value.sequence->data; in PKCS8_pkey_get0()
|
D | x509_cmp.c | 398 EVP_PKEY *pk = NULL; in X509_chain_check_suiteb() local 420 pk = X509_get_pubkey(x); in X509_chain_check_suiteb() 422 rv = check_suite_b(pk, -1, &tflags); in X509_chain_check_suiteb() 438 EVP_PKEY_free(pk); in X509_chain_check_suiteb() 439 pk = X509_get_pubkey(x); in X509_chain_check_suiteb() 440 rv = check_suite_b(pk, sign_nid, &tflags); in X509_chain_check_suiteb() 446 rv = check_suite_b(pk, X509_get_signature_nid(x), &tflags); in X509_chain_check_suiteb() 448 if (pk) in X509_chain_check_suiteb() 449 EVP_PKEY_free(pk); in X509_chain_check_suiteb() 467 int X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigned long flags) in X509_CRL_check_suiteb() argument [all …]
|
D | x_pubkey.c | 91 X509_PUBKEY *pk=NULL; variable 95 if ((pk=X509_PUBKEY_new()) == NULL) goto error; 101 if (!pkey->ameth->pub_encode(pk, pkey)) 122 *x=pk; 126 if (pk != NULL) X509_PUBKEY_free(pk); 370 const unsigned char **pk, int *ppklen, in X509_PUBKEY_get0_param() argument 376 if (pk) in X509_PUBKEY_get0_param() 378 *pk = pub->public_key->data; in X509_PUBKEY_get0_param()
|
/external/openssh/ |
D | ed25519.c | 14 static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigne… in get_hram() argument 19 for (i = 32;i < 64;++i) playground[i] = pk[i-32]; in get_hram() 27 unsigned char *pk, in crypto_sign_ed25519_keypair() argument 45 ge25519_pack(pk, &gepk); in crypto_sign_ed25519_keypair() 47 sk[32 + i] = pk[i]; in crypto_sign_ed25519_keypair() 106 const unsigned char *pk in crypto_sign_ed25519_open() argument 119 if (ge25519_unpackneg_vartime(&get1, pk)) return -1; in crypto_sign_ed25519_open() 121 get_hram(hram,sm,pk,m,smlen); in crypto_sign_ed25519_open()
|
D | sshkey.c | 1977 u_char *pk = NULL; in sshkey_from_blob_internal() local 2110 if ((ret = sshbuf_get_string(b, &pk, &len)) != 0) in sshkey_from_blob_internal() 2120 key->ed25519_pk = pk; in sshkey_from_blob_internal() 2121 pk = NULL; in sshkey_from_blob_internal() 2150 free(pk); in sshkey_from_blob_internal() 2263 struct sshkey *pk; in sshkey_demote() local 2269 if ((pk = calloc(1, sizeof(*pk))) == NULL) in sshkey_demote() 2271 pk->type = k->type; in sshkey_demote() 2272 pk->flags = k->flags; in sshkey_demote() 2273 pk->ecdsa_nid = k->ecdsa_nid; in sshkey_demote() [all …]
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
D | KeyPairTest.java | 116 PrivateKey pk = TestKeyPair.getPrivate(); 117 KeyPair kp = new KeyPair(null, pk); 118 assertSame(pk, kp.getPrivate()); 137 PublicKey pk = TestKeyPair.getPublic(); 138 KeyPair kp = new KeyPair(pk, null); 139 assertSame(pk, kp.getPublic());
|
D | KSPrivateKeyEntryTest.java | 71 PrivateKey pk = null; in testPrivateKeyEntry01() local 73 new KeyStore.PrivateKeyEntry(pk, certs); in testPrivateKeyEntry01() 87 PrivateKey pk = new tmpPrivateKey(); in testPrivateKeyEntry02() local 89 new KeyStore.PrivateKeyEntry(pk, chain); in testPrivateKeyEntry02() 95 new KeyStore.PrivateKeyEntry(pk, chain); in testPrivateKeyEntry02()
|
D | IdentityScope2Test.java | 45 public IdentityScopeSubclass(String name, PublicKey pk) { in IdentityScopeSubclass() argument 48 setPublicKey(pk); in IdentityScopeSubclass() 84 public Identity getIdentity(PublicKey pk) { in getIdentity() argument 88 if (current.getPublicKey() == pk) in getIdentity()
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/optimization/general/ |
D | LevenbergMarquardtOptimizer.java | 289 int pk = permutation[k]; in doOptimize() local 290 wjacobian[k][pk] = diagR[pk]; in doOptimize() 516 int pk = permutation[k]; in determineLMParameter() local 517 double ypk = lmDir[pk] / diagR[pk]; in determineLMParameter() 519 lmDir[permutation[i]] -= ypk * wjacobian[i][pk]; in determineLMParameter() 521 lmDir[pk] = ypk; in determineLMParameter() 704 int pk = permutation[k]; in determineLMDirection() local 712 double rkk = wjacobian[k][pk]; in determineLMDirection() 725 wjacobian[k][pk] = cos * rkk + sin * lmDiag[k]; in determineLMDirection() 732 double rik = wjacobian[i][pk]; in determineLMDirection() [all …]
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/estimation/ |
D | LevenbergMarquardtEstimator.java | 289 int pk = permutation[k]; in estimate() local 290 jacobian[k * cols + pk] = diagR[pk]; in estimate() 509 int pk = permutation[k]; in determineLMParameter() local 510 double ypk = lmDir[pk] / diagR[pk]; in determineLMParameter() 511 int index = pk; in determineLMParameter() 516 lmDir[pk] = ypk; in determineLMParameter() 703 int pk = permutation[k]; in determineLMDirection() local 711 double rkk = jacobian[k * cols + pk]; in determineLMDirection() 724 jacobian[k * cols + pk] = cos * rkk + sin * lmDiag[k]; in determineLMDirection() 731 double rik = jacobian[i * cols + pk]; in determineLMDirection() [all …]
|
/external/boringssl/src/crypto/x509v3/ |
D | v3_skey.c | 108 ASN1_BIT_STRING *pk; in s2i_skey_id() local 127 pk = ctx->subject_req->req_info->pubkey->public_key; in s2i_skey_id() 128 else pk = ctx->subject_cert->cert_info->key->public_key; in s2i_skey_id() 130 if(!pk) { in s2i_skey_id() 135 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL)) in s2i_skey_id()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_libtomcrypt.c | 419 struct crypto_public_key *pk; in crypto_public_key_import() local 421 pk = os_zalloc(sizeof(*pk)); in crypto_public_key_import() 422 if (pk == NULL) in crypto_public_key_import() 425 res = rsa_import(key, len, &pk->rsa); in crypto_public_key_import() 430 os_free(pk); in crypto_public_key_import() 434 if (pk->rsa.type != PK_PUBLIC) { in crypto_public_key_import() 437 rsa_free(&pk->rsa); in crypto_public_key_import() 438 os_free(pk); in crypto_public_key_import() 442 return pk; in crypto_public_key_import() 451 struct crypto_private_key *pk; in crypto_private_key_import() local [all …]
|
/external/eigen/Eigen/src/OrderingMethods/ |
D | Amd.h | 97 ok, nel = 0, p, p1, p2, p3, p4, pj, pk, pk1, pk2, pn, q, t; in minimum_degree_ordering() local 255 for(pk = pk1; pk < pk2; pk++) /* scan 1: find |Le\Lk| */ in minimum_degree_ordering() 257 i = Ci[pk]; in minimum_degree_ordering() 276 for(pk = pk1; pk < pk2; pk++) /* scan2: degree update */ in minimum_degree_ordering() 278 i = Ci[pk]; /* consider node i in Lk */ in minimum_degree_ordering() 340 for(pk = pk1; pk < pk2; pk++) in minimum_degree_ordering() 342 i = Ci[pk]; in minimum_degree_ordering() 379 for(p = pk1, pk = pk1; pk < pk2; pk++) /* finalize Lk */ in minimum_degree_ordering() 381 i = Ci[pk]; in minimum_degree_ordering()
|
/external/boringssl/src/crypto/evp/ |
D | internal.h | 95 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub); 96 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk); 100 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf); 101 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); 107 int (*pkey_opaque)(const EVP_PKEY *pk); 115 int (*pkey_size)(const EVP_PKEY *pk); 116 int (*pkey_bits)(const EVP_PKEY *pk); 120 int (*param_missing)(const EVP_PKEY *pk);
|
/external/apache-harmony/security/src/test/api/java.injected/java/security/ |
D | IdentityTest.java | 212 PublicKey pk = new PublicKeyStub("aaa", "fff", new byte[] { 1, 2, 3, 4, 5 }); in testIdentityEquals() local 214 i.setPublicKey(pk); in testIdentityEquals() 222 new IdentityStub(name, pk), Boolean.TRUE in testIdentityEquals() 230 i2.setPublicKey(pk); in testIdentityEquals() 314 PublicKey pk = new PublicKeyStub("kkk", "Identity.testGetPublicKey", null); in testGetPublicKey() local 315 i.setPublicKey(pk); in testGetPublicKey() 316 assertSame(pk, i.getPublicKey()); in testGetPublicKey()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_common.c | 163 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) in tls_parse_cert() argument 170 *pk = crypto_public_key_from_cert(buf, len); in tls_parse_cert() 171 if (*pk) in tls_parse_cert() 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); in tls_parse_cert() 196 if (*pk == NULL) { in tls_parse_cert() 398 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, in tls_verify_signature() argument 425 if (pk == NULL) { in tls_verify_signature() 437 if (crypto_public_key_decrypt_pkcs1(pk, pos, end - pos, buf, &buflen) < in tls_verify_signature()
|
/external/eigen/unsupported/Eigen/src/Splines/ |
D | Spline.h | 412 DenseIndex rk,pk,j1,j2; in basisFunctionDerivativesImpl() local 413 rk = r-k; pk = p-k; in basisFunctionDerivativesImpl() 417 a(s2,0) = a(s1,0)/ndu(pk+1,rk); in basisFunctionDerivativesImpl() 418 d = a(s2,0)*ndu(rk,pk); in basisFunctionDerivativesImpl() 424 if (r-1 <= pk) j2 = k-1; in basisFunctionDerivativesImpl() 429 a(s2,j) = (a(s1,j)-a(s1,j-1))/ndu(pk+1,rk+j); in basisFunctionDerivativesImpl() 430 d += a(s2,j)*ndu(rk+j,pk); in basisFunctionDerivativesImpl() 433 if (r<=pk) in basisFunctionDerivativesImpl() 435 a(s2,k) = -a(s1,k-1)/ndu(pk+1,r); in basisFunctionDerivativesImpl() 436 d += a(s2,k)*ndu(r,pk); in basisFunctionDerivativesImpl()
|
/external/libpcap/ |
D | dlpisubs.c | 130 u_char *ep, *pk; in pcap_process_pkts() local 172 pk = bufp + sizeof(*sbp); in pcap_process_pkts() 179 pk = bufp; in pcap_process_pkts() 183 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) { in pcap_process_pkts() 195 (*callback)(user, &pkthdr, pk); in pcap_process_pkts()
|
/external/v8/test/mjsunit/harmony/ |
D | proxies.js | 85 get: function(pr, pk) { argument 119 get: function(pr, pk) { argument 194 get: function(pr, pk) { argument 291 get: function(pr, pk) { argument 347 get: function(pr, pk) { throw "myexn" } argument 351 get: function(pr, pk) { argument 451 get: function(pr, pk) { argument 569 get: function(pr, pk) { throw "myexn" } argument 573 get: function(pr, pk) { argument 816 get: function(pr, pk) { argument [all …]
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_gpsk_common.c | 113 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument 179 if (pk) { in eap_gpsk_derive_keys_helper() 181 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper() 191 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument 219 pk, *pk_len); in eap_gpsk_derive_keys_aes() 284 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument 320 pk, pk_len); in eap_gpsk_derive_keys()
|
/external/pdfium/core/src/fxcodec/lcms2/lcms2-2.6/src/ |
D | cmsintrp.c | 1019 cmsFloat32Number pk; in Eval4InputsFloat() local 1026 pk = fclamp(Input[0]) * p->Domain[0]; in Eval4InputsFloat() 1027 k0 = _cmsQuickFloor(pk); in Eval4InputsFloat() 1028 rest = pk - (cmsFloat32Number) k0; in Eval4InputsFloat() 1106 cmsFloat32Number pk; in Eval5InputsFloat() local 1113 pk = fclamp(Input[0]) * p->Domain[0]; in Eval5InputsFloat() 1114 k0 = _cmsQuickFloor(pk); in Eval5InputsFloat() 1115 rest = pk - (cmsFloat32Number) k0; in Eval5InputsFloat() 1193 cmsFloat32Number pk; in Eval6InputsFloat() local 1200 pk = fclamp(Input[0]) * p->Domain[0]; in Eval6InputsFloat() [all …]
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
D | TrustAnchor_ImplTest.java | 540 PublicKey pk = new TestKeyPair(keyAlg).getPublic(); in testToString() local 544 ta = new TrustAnchor(validCaNameRfc2253, pk, getEncodingESOnly()); in testToString() 550 ta = new TrustAnchor(x500p, pk, getEncodingNoMinMax()); in testToString() 555 ta = new TrustAnchor(x500p, pk, null); in testToString()
|