/external/chromium/crypto/ |
signature_verifier_mac.cc | 34 memset(&public_key_, 0, sizeof(public_key_)); 35 public_key_.KeyData.Data = const_cast<uint8*>(&public_key_info_[0]); 36 public_key_.KeyData.Length = public_key_info_.size(); 37 public_key_.KeyHeader.HeaderVersion = CSSM_KEYHEADER_VERSION; 38 public_key_.KeyHeader.BlobType = CSSM_KEYBLOB_RAW; 39 public_key_.KeyHeader.Format = CSSM_KEYBLOB_RAW_FORMAT_X509; 40 public_key_.KeyHeader.AlgorithmId = key_alg; 41 public_key_.KeyHeader.KeyClass = CSSM_KEYCLASS_PUBLIC_KEY; 42 public_key_.KeyHeader.KeyAttr = CSSM_KEYATTR_EXTRACTABLE [all...] |
signature_verifier.h | 96 CSSM_KEY public_key_; member in class:crypto::SignatureVerifier 102 ScopedHCRYPTKEY public_key_; member in class:crypto::SignatureVerifier
|
rsa_private_key_nss_unittest.cc | 56 if (key_pair->public_key_) { 57 PK11_DestroyTokenObject(key_pair->public_key_->pkcs11Slot, 58 key_pair->public_key_->pkcs11ID);
|
rsa_private_key_nss.cc | 47 if (public_key_) 48 SECKEY_DestroyPublicKey(public_key_); 101 result->public_key_ = SECKEY_ExtractPublicKey(spki); 103 if (!result->public_key_) { 118 if (result->public_key_->keyType != rsaKey) { 124 SECItem *ck_id = PK11_MakeIDFromPubKey(&(result->public_key_->u.rsa.modulus)); 169 SECItem* der_pubkey = SECKEY_EncodeDERSubjectPublicKeyInfo(public_key_); 182 RSAPrivateKey::RSAPrivateKey() : key_(NULL), public_key_(NULL) { 202 &result->public_key_, permanent, sensitive, NULL); 240 result->public_key_ = SECKEY_ConvertToPublicKey(result->key_) [all...] |
signature_verifier_win.cc | 27 SignatureVerifier::SignatureVerifier() : hash_object_(0), public_key_(0) { 68 cert_public_key_info, public_key_.receive()); 120 signature_.size(), public_key_, NULL, 0); 129 public_key_.reset();
|
rsa_private_key.h | 216 SECKEYPublicKeyStr* public_key() { return public_key_; } 222 CSSM_KEY_PTR public_key() { return &public_key_; } 257 SECKEYPublicKeyStr* public_key_; member in class:crypto::RSAPrivateKey 265 CSSM_KEY public_key_; member in class:crypto::RSAPrivateKey
|
rsa_private_key_mac.cc | 163 memset(&public_key_, 0, sizeof(public_key_)); 172 if (public_key_.KeyData.Data) { 173 CSSM_FreeKey(GetSharedCSPHandle(), NULL, &public_key_, CSSM_FALSE); local
|
/external/chromium/chrome/browser/chromeos/login/ |
owner_manager.cc | 23 public_key_(0), 34 public_key_ = key; 47 // If |public_key_| isn't empty, we already have the key, so don't 49 if (public_key_.empty() && 50 !utils_->ImportPublicKey(utils_->GetOwnerKeyFilePath(), &public_key_)) { 65 if (public_key_.empty()) 68 return !public_key_.empty(); 76 private_key_.reset(utils_->FindPrivateKey(public_key_)); 132 if (!utils_->Verify(data, signature, public_key_)) {
|
owner_manager.h | 79 // |data| with |public_key_|. First, ensures we have the key we 109 std::vector<uint8> public_key_; member in class:chromeos::OwnerManager
|
owner_manager_unittest.cc | 64 manager->public_key_ = fake_public_key_;
|
/external/chromium/chrome/browser/extensions/ |
sandboxed_extension_unpacker.h | 173 // |public_key_|. Returns true if the signature validates, false otherwise. 228 std::string public_key_; member in class:SandboxedExtensionUnpacker
|
sandboxed_extension_unpacker_unittest.cc | 110 sandboxed_unpacker_->public_key_ =
|
sandboxed_extension_unpacker.cc | 402 key.size()), &public_key_); 429 final_manifest->SetString(extension_manifest_keys::kPublicKey, public_key_);
|
/external/chromium/chrome/common/extensions/ |
extension.h | 578 const std::string& public_key() const { return public_key_; } 851 std::string public_key_; member in class:Extension [all...] |
extension.cc | [all...] |