/bootable/recovery/ |
verifier.h | 24 RSAPublicKey* public_key; member in struct:Certificate
|
/external/chromium/crypto/ |
rsa_private_key_nss_unittest.cc | 35 std::vector<uint8> public_key; local 36 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); 39 crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key)); 48 std::vector<uint8> public_key; local 49 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); 61 EXPECT_EQ(NULL, crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key));
|
signature_verifier_openssl.cc | 20 ScopedOpenSSL<EVP_PKEY, EVP_PKEY_free> public_key; member in struct:crypto::SignatureVerifier::VerifyContext 59 verify_context_->public_key.reset(d2i_PUBKEY_bio(bio.get(), NULL)); 60 if (!verify_context_->public_key.get()) 82 verify_context_->public_key.get());
|
rsa_private_key_mac.cc | 34 result->public_key(), CSSM_KEYUSE_SIGN, 119 CSSM_KEY* public_key = result->public_key(); local 121 public_key->KeyData.Data = reinterpret_cast<uint8*>(CSSMMalloc(size)); 122 if (!public_key->KeyData.Data) { 126 memcpy(public_key->KeyData.Data, &public_key_data.front(), size); 127 public_key->KeyData.Length = size; 128 public_key->KeyHeader.Format = CSSM_KEYBLOB_RAW_FORMAT_PKCS1; 129 public_key->KeyHeader.HeaderVersion = CSSM_KEYHEADER_VERSION; 130 public_key->KeyHeader.BlobType = CSSM_KEYBLOB_RAW [all...] |
rsa_private_key.h | 216 SECKEYPublicKeyStr* public_key() { return public_key_; } function in class:crypto::RSAPrivateKey 222 CSSM_KEY_PTR public_key() { return &public_key_; } function in class:crypto::RSAPrivateKey
|
/external/chromium_org/net/base/ |
openssl_private_key_store_android.cc | 25 unsigned char* public_key = NULL; local 26 int public_len = i2d_PUBKEY(pkey, &public_key); 41 static_cast<const uint8*>(public_key), public_len, 46 OPENSSL_free(public_key);
|
keygen_handler_mac.cc | 107 SecKeyRef public_key = NULL; local 130 &public_key, &private_key); 136 err = SecKeychainItemExport(public_key, kSecFormatBSAFE, 0, NULL, 202 if (public_key) 203 SecKeychainItemDelete(reinterpret_cast<SecKeychainItemRef>(public_key)); 214 if (public_key) 215 CFRelease(public_key);
|
/external/chromium/chrome/common/remoting/ |
chromoting_host_info.h | 19 std::string public_key; member in struct:remoting::ChromotingHostInfo
|
/external/chromium_org/net/quic/crypto/ |
channel_id_nss.cc | 32 SECKEYPublicKey public_key; local 33 memset(&public_key, 0, sizeof(public_key)); 40 public_key.keyType = ecKey; 41 public_key.u.ec.DEREncodedParams.type = siBuffer; 42 public_key.u.ec.DEREncodedParams.data = const_cast<unsigned char*>(p256_oid); 43 public_key.u.ec.DEREncodedParams.len = sizeof(p256_oid); 48 public_key.u.ec.publicValue.type = siBuffer; 49 public_key.u.ec.publicValue.data = key_buf; 50 public_key.u.ec.publicValue.len = sizeof(key_buf) [all...] |
p256_key_exchange_openssl.cc | 18 P256KeyExchange::P256KeyExchange(EC_KEY* private_key, const uint8* public_key) 20 memcpy(public_key_, public_key, sizeof(public_key_)); 40 uint8 public_key[kUncompressedP256PointBytes]; local 43 POINT_CONVERSION_UNCOMPRESSED, public_key, 44 sizeof(public_key), NULL) != sizeof(public_key)) { 49 return new P256KeyExchange(private_key.release(), public_key);
|
p256_key_exchange_nss.cc | 32 const uint8* public_key) 34 memcpy(public_key_, public_key, sizeof(public_key_)); 78 SECKEYPublicKey* public_key = key_pair->public_key(); local 79 if (public_key->keyType != ecKey || 80 public_key->u.ec.publicValue.len != kUncompressedP256PointBytes || 81 !public_key->u.ec.publicValue.data || 82 public_key->u.ec.publicValue.data[0] != kUncompressedECPointForm) { 94 if (public_key->u.ec.DEREncodedParams.len != oid_data->oid.len + 2 || 95 !public_key->u.ec.DEREncodedParams.data | 127 vector<uint8> public_key; local [all...] |
/external/chromium_org/net/ssl/ |
openssl_client_key_store.h | 56 // Given a certificate's |public_key|, return the corresponding private 89 EVP_PKEY* public_key; member in class:net::OpenSSLClientKeyStore::KeyPair 96 // Returns the index of the keypair for |public_key|. or -1 if not found. 97 int FindKeyPairIndex(EVP_PKEY* public_key);
|
/external/chromium/chrome/browser/chromeos/login/ |
owner_key_utils_unittest.cc | 54 std::vector<uint8> public_key; local 55 ASSERT_TRUE(pair->ExportPublicKey(&public_key)); 61 for (pubkey_it = public_key.begin(), disk_it = from_disk.begin(); 62 pubkey_it < public_key.end();
|
/external/chromium_org/crypto/ |
ec_private_key.h | 30 // (The difference in types of key() and public_key() make this a little 72 // Imports the key pair and returns in |public_key| and |key|. 84 SECKEYPublicKey** public_key); 91 SECKEYPublicKey* public_key() { return public_key_; } function in class:crypto::ECPrivateKey
|
rsa_private_key_nss_unittest.cc | 58 std::vector<uint8> public_key; local 59 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); 62 crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key)); 71 std::vector<uint8> public_key; local 72 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); 84 EXPECT_EQ(NULL, crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key));
|
signature_verifier_nss.cc | 32 SECStatus VerifyRSAPSS_End(SECKEYPublicKey* public_key, 42 unsigned int modulus_len = SECKEY_PublicKeyStrength(public_key); 48 SECStatus rv = PK11_PubEncryptRaw(public_key, &enc[0], 87 SECKEYPublicKey* public_key = DecodePublicKeyInfo(public_key_info, local 89 if (!public_key) 94 SECKEY_DestroyPublicKey(public_key); 108 SECKEY_DestroyPublicKey(public_key); 118 vfy_context_ = VFY_CreateContextWithAlgorithmID(public_key, &sig, 121 SECKEY_DestroyPublicKey(public_key); // Done with public_key 150 SECKEYPublicKey* public_key = DecodePublicKeyInfo(public_key_info, local [all...] |
/external/chromium_org/chrome/browser/chromeos/settings/ |
session_manager_operation_unittest.cc | 59 ASSERT_TRUE(op->owner_key()->public_key()); 60 std::vector<uint8> public_key; local 61 ASSERT_TRUE(policy_.GetSigningKey()->ExportPublicKey(&public_key)); 62 EXPECT_EQ(public_key, *op->owner_key()->public_key()); 105 EXPECT_FALSE(op.owner_key()->public_key()); 176 EXPECT_TRUE(op.owner_key()->public_key()); 263 std::vector<uint8> public_key; local 264 policy_.GetSigningKey()->ExportPublicKey(&public_key); 265 validator->ValidateSignature(public_key, false) [all...] |
session_manager_operation.cc | 70 if (force_key_load_ || !owner_key_.get() || !owner_key_->public_key()) { 87 scoped_ptr<std::vector<uint8> > public_key; local 92 if (current_key->public_key()) 93 public_key.reset(new std::vector<uint8>(*current_key->public_key())); 98 if (!public_key.get() && util->IsPublicKeyPresent()) { 99 public_key.reset(new std::vector<uint8>()); 100 if (!util->ImportPublicKey(public_key.get())) 104 if (public_key.get() && !private_key.get()) { 105 private_key.reset(util->FindPrivateKey(*public_key)); [all...] |
/external/chromium_org/chrome/browser/component_updater/ |
component_unpacker.cc | 80 const std::vector<uint8>& public_key() const { return public_key_; } function in class:__anon7067::CRXValidator 139 sha256->Update(&(validator.public_key()[0]), validator.public_key().size());
|
/external/chromium_org/chrome/browser/policy/cloud/ |
cloud_policy_validator_unittest.cc | 62 std::vector<uint8> public_key; local 64 PolicyBuilder::CreateTestSigningKey()->ExportPublicKey(&public_key)); 76 validator->ValidateSignature(public_key, allow_key_rotation_);
|
/external/chromium_org/chromeos/dbus/ |
shill_manager_client.h | 87 std::string public_key; member in struct:chromeos::ShillManagerClient::VerificationProperties 185 // by the given |service_path|, encrypted using the |public_key| for the 194 // |data| encrypted using the |public_key| for the trusted device. If the
|
/external/chromium_org/remoting/base/ |
rsa_key_pair.cc | 73 std::vector<uint8> public_key; local 74 CHECK(key_->ExportPublicKey(&public_key)); 75 std::string public_key_str(public_key.begin(), public_key.end());
|
/external/chromium/chrome/browser/extensions/ |
extension_creator.cc | 196 std::vector<uint8> public_key; local 197 if (!private_key->ExportPublicKey(&public_key)) { 207 header.key_size = public_key.size(); 214 if (fwrite(&public_key.front(), sizeof(uint8), public_key.size(), 215 crx_handle.get()) != public_key.size()) { 216 PLOG(ERROR) << "fwrite failed to write public_key.front";
|
/external/chromium/net/base/ |
keygen_handler_mac.cc | 106 SecKeyRef public_key = NULL; local 129 &public_key, &private_key); 135 err = SecKeychainItemExport(public_key, kSecFormatBSAFE, 0, NULL, 201 if (public_key) 202 SecKeychainItemDelete(reinterpret_cast<SecKeychainItemRef>(public_key)); 213 if (public_key) 214 CFRelease(public_key);
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
user_cloud_policy_store_chromeos_unittest.cc | 79 std::vector<uint8> public_key; variable 80 ASSERT_TRUE(policy_.GetSigningKey()->ExportPublicKey(&public_key)); 81 StoreUserPolicyKey(public_key); variable 129 void StoreUserPolicyKey(const std::vector<uint8>& public_key) { 133 reinterpret_cast<const char*>(public_key.data()), 134 public_key.size()));
|