/external/chromium/crypto/ |
rsa_private_key_nss_unittest.cc | 35 std::vector<uint8> public_key; local 36 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); 39 crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key)); 48 std::vector<uint8> public_key; local 49 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); 61 EXPECT_EQ(NULL, crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key));
|
rsa_private_key_mac.cc | 34 result->public_key(), CSSM_KEYUSE_SIGN, 119 CSSM_KEY* public_key = result->public_key(); local 121 public_key->KeyData.Data = reinterpret_cast<uint8*>(CSSMMalloc(size)); 122 if (!public_key->KeyData.Data) { 126 memcpy(public_key->KeyData.Data, &public_key_data.front(), size); 127 public_key->KeyData.Length = size; 128 public_key->KeyHeader.Format = CSSM_KEYBLOB_RAW_FORMAT_PKCS1; 129 public_key->KeyHeader.HeaderVersion = CSSM_KEYHEADER_VERSION; 130 public_key->KeyHeader.BlobType = CSSM_KEYBLOB_RAW [all...] |
signature_verifier_nss.cc | 40 SECKEYPublicKey* public_key = SECKEY_ExtractPublicKey(spki); 42 if (!public_key) 47 SECKEY_DestroyPublicKey(public_key); 60 SECKEY_DestroyPublicKey(public_key); 70 vfy_context_ = VFY_CreateContextWithAlgorithmID(public_key, &sig, 73 SECKEY_DestroyPublicKey(public_key); // Done with public_key.
|
signature_verifier_openssl.cc | 20 ScopedOpenSSL<EVP_PKEY, EVP_PKEY_free> public_key; member in struct:crypto::SignatureVerifier::VerifyContext 59 verify_context_->public_key.reset(d2i_PUBKEY_bio(bio.get(), NULL)); 60 if (!verify_context_->public_key.get()) 82 verify_context_->public_key.get());
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_shared_secret.c | 29 @param public_key The public key 34 int ecc_shared_secret(ecc_key *private_key, ecc_key *public_key, 43 LTC_ARGCHK(public_key != NULL); 52 if (ltc_ecc_is_valid_idx(private_key->idx) == 0 || ltc_ecc_is_valid_idx(public_key->idx) == 0) { 56 if (XSTRCMP(private_key->dp->name, public_key->dp->name) != 0) { 72 if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, prime, 1)) != CRYPT_OK) { goto done; }
|
/external/chromium/chrome/browser/chromeos/login/ |
owner_key_utils_unittest.cc | 54 std::vector<uint8> public_key; local 55 ASSERT_TRUE(pair->ExportPublicKey(&public_key)); 61 for (pubkey_it = public_key.begin(), disk_it = from_disk.begin(); 62 pubkey_it < public_key.end();
|
owner_key_utils.h | 53 // |public_key| 57 const std::vector<uint8> public_key) = 0;
|
owner_key_utils.cc | 47 const std::vector<uint8> public_key); 136 const std::vector<uint8> public_key) { 140 &public_key[0], public_key.size())) {
|
mock_owner_key_utils.h | 29 const std::vector<uint8> public_key));
|
/external/chromium/chrome/common/remoting/ |
chromoting_host_info.h | 19 std::string public_key; member in struct:remoting::ChromotingHostInfo
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_shared_secret.c | 24 @param public_key The public key 30 dsa_key *public_key, 38 LTC_ARGCHK(public_key != NULL); 47 if ((err = mp_exptmod(base, private_key, public_key->p, res)) != CRYPT_OK) {
|
/external/chromium/net/base/ |
openssl_private_key_store.h | 38 // Given a |public_key| part returns the corresponding private key, or NULL 40 virtual EVP_PKEY* FetchPrivateKey(EVP_PKEY* public_key) = 0;
|
keygen_handler_mac.cc | 106 SecKeyRef public_key = NULL; local 129 &public_key, &private_key); 135 err = SecKeychainItemExport(public_key, kSecFormatBSAFE, 0, NULL, 201 if (public_key) 202 SecKeychainItemDelete(reinterpret_cast<SecKeychainItemRef>(public_key)); 213 if (public_key) 214 CFRelease(public_key);
|
dnssec_keyset.h | 50 base::StringPiece public_key,
|
/external/openssl/crypto/asn1/ |
x_pubkey.c | 85 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING) 145 if (key->public_key == NULL) goto error; 347 if (pub->public_key->data) 348 OPENSSL_free(pub->public_key->data); 349 pub->public_key->data = penc; 350 pub->public_key->length = penclen; 352 pub->public_key->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07); 353 pub->public_key->flags|=ASN1_STRING_FLAG_BITS_LEFT; 367 *pk = pub->public_key->data; 368 *ppklen = pub->public_key->length [all...] |
/external/chromium/chrome/browser/extensions/ |
extension_creator.cc | 196 std::vector<uint8> public_key; local 197 if (!private_key->ExportPublicKey(&public_key)) { 207 header.key_size = public_key.size(); 214 if (fwrite(&public_key.front(), sizeof(uint8), public_key.size(), 215 crx_handle.get()) != public_key.size()) { 216 PLOG(ERROR) << "fwrite failed to write public_key.front";
|
convert_user_script_unittest.cc | 35 extension->public_key()); 75 extension->public_key());
|
convert_web_app_unittest.cc | 120 extension->public_key()); 163 extension->public_key());
|
/external/openssl/crypto/dh/ |
dh_ameth.c | 79 ASN1_INTEGER *public_key = NULL; local 103 if (!(public_key=d2i_ASN1_INTEGER(NULL, &p, pklen))) 110 if (!(dh->pub_key = ASN1_INTEGER_to_BN(public_key, NULL))) 116 ASN1_INTEGER_free(public_key); 121 if (public_key) 122 ASN1_INTEGER_free(public_key);
|
/external/openssl/crypto/dsa/ |
dsa_ameth.c | 77 ASN1_INTEGER *public_key = NULL; local 113 if (!(public_key=d2i_ASN1_INTEGER(NULL, &p, pklen))) 119 if (!(dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL))) 125 ASN1_INTEGER_free(public_key); 130 if (public_key) 131 ASN1_INTEGER_free(public_key);
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
RSA_SHA1.java | 58 * c.setProperty(RSA_SHA1.PUBLIC_KEY, consumer_publicRSAKey); 86 final static public String PUBLIC_KEY = "RSA-SHA1.PublicKey"; 114 Object publicKeyObject = accessor.consumer.getProperty(PUBLIC_KEY);
|
/external/wpa_supplicant/ |
x509v3.h | 44 u8 *public_key; member in struct:x509_certificate
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
x509v3.h | 44 u8 *public_key; member in struct:x509_certificate
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.h | 64 u8 *public_key; member in struct:x509_certificate
|
/external/openssl/crypto/x509v3/ |
v3_skey.c | 124 pk = ctx->subject_req->req_info->pubkey->public_key; 125 else pk = ctx->subject_cert->cert_info->key->public_key;
|