/external/chromium_org/third_party/WebKit/Source/platform/exported/ |
WebCryptoKey.cpp | 44 WebCryptoKeyPrivate(PassOwnPtr<WebCryptoKeyHandle> handle, WebCryptoKeyType type, bool extractable, const WebCryptoKeyAlgorithm& algorithm, WebCryptoKeyUsageMask usages) 47 , extractable(extractable) 56 const bool extractable; member in class:blink::WebCryptoKeyPrivate 61 WebCryptoKey WebCryptoKey::create(WebCryptoKeyHandle* handle, WebCryptoKeyType type, bool extractable, const WebCryptoKeyAlgorithm& algorithm, WebCryptoKeyUsageMask usages) 64 key.m_private = adoptRef(new WebCryptoKeyPrivate(adoptPtr(handle), type, extractable, algorithm, usages)); 85 bool WebCryptoKey::extractable() const function in class:blink::WebCryptoKey 88 return m_private->extractable;
|
/external/chromium_org/third_party/WebKit/Source/modules/crypto/ |
Key.idl | 36 readonly attribute boolean extractable;
|
SubtleCrypto.h | 60 ScriptPromise generateKey(ScriptState*, const Dictionary&, bool extractable, const Vector<String>& keyUsages); 61 ScriptPromise importKey(ScriptState*, const String&, const ArrayPiece&, const Dictionary&, bool extractable, const Vector<String>& keyUsages); 62 ScriptPromise importKey(ScriptState*, const String&, const Dictionary&, const Dictionary&, bool extractable, const Vector<String>& keyUsages);
|
SubtleCrypto.idl | 58 [CallWith=ScriptState] Promise generateKey(Dictionary algorithm, boolean extractable, DOMString[] keyUsages); 60 [CallWith=ScriptState] Promise importKey(KeyFormat format, ArrayBuffer keyData, Dictionary algorithm, boolean extractable, KeyUsage[] keyUsages); 61 [CallWith=ScriptState] Promise importKey(KeyFormat format, ArrayBufferView keyData, Dictionary algorithm, boolean extractable, KeyUsage[] keyUsages); 62 [CallWith=ScriptState] Promise importKey(KeyFormat format, Dictionary keyData, Dictionary algorithm, boolean extractable, KeyUsage[] keyUsages); 68 [CallWith=ScriptState] Promise unwrapKey(KeyFormat format, ArrayBuffer wrappedKey, Key unwrappingKey, Dictionary unwrapAlgorithm, Dictionary unwrappedKeyAlgorithm, boolean extractable, KeyUsage[] keyUsages); 69 [CallWith=ScriptState] Promise unwrapKey(KeyFormat format, ArrayBufferView wrappedKey, Key unwrappingKey, Dictionary unwrapAlgorithm, Dictionary unwrappedKeyAlgorithm, boolean extractable, KeyUsage[] keyUsages);
|
Key.h | 58 bool extractable() const;
|
SubtleCrypto.cpp | 221 ScriptPromise SubtleCrypto::generateKey(ScriptState* scriptState, const Dictionary& rawAlgorithm, bool extractable, const Vector<String>& rawKeyUsages) 237 blink::Platform::current()->crypto()->generateKey(algorithm, extractable, keyUsages, result->result()); 241 ScriptPromise SubtleCrypto::importKey(ScriptState* scriptState, const String& rawFormat, const ArrayPiece& keyData, const Dictionary& rawAlgorithm, bool extractable, const Vector<String>& rawKeyUsages) 269 blink::Platform::current()->crypto()->importKey(format, keyData.bytes(), keyData.byteLength(), algorithm, extractable, keyUsages, result->result()); 273 ScriptPromise SubtleCrypto::importKey(ScriptState* scriptState, const String& rawFormat, const Dictionary& keyData, const Dictionary& rawAlgorithm, bool extractable, const Vector<String>& rawKeyUsages) 302 blink::Platform::current()->crypto()->importKey(format, reinterpret_cast<const unsigned char*>(jsonUtf8.data()), jsonUtf8.length(), algorithm, extractable, keyUsages, result->result()); 321 if (!key->extractable()) { 322 result->completeWithError(blink::WebCryptoErrorTypeInvalidAccess, "key is not extractable"); 352 if (!key->extractable()) { 353 result->completeWithError(blink::WebCryptoErrorTypeInvalidAccess, "key is not extractable"); [all...] |
Key.cpp | 144 bool Key::extractable() const function in class:WebCore::Key 146 return m_key.extractable();
|
/external/chromium_org/content/child/webcrypto/ |
jwk.h | 24 bool extractable,
|
webcrypto_impl.h | 45 bool extractable, 52 bool extractable, 82 bool extractable, 98 bool extractable,
|
shared_crypto.h | 99 bool extractable, 105 bool extractable, 113 bool extractable, 146 bool extractable, 158 bool extractable,
|
webcrypto_impl.cc | 211 bool extractable, 216 extractable(extractable), 223 const bool extractable; member in struct:content::__anon11822::GenerateKeyState 238 bool extractable, 245 extractable(extractable), 252 const bool extractable; member in struct:content::__anon11822::ImportKeyState 322 bool extractable, 331 extractable(extractable) 340 const bool extractable; member in struct:content::__anon11822::UnwrapKeyState [all...] |
platform_crypto.h | 163 bool extractable, 176 bool extractable, 192 bool extractable, 200 bool extractable, 213 bool extractable, 230 bool extractable, 239 bool extractable,
|
platform_crypto_openssl.cc | 274 bool extractable, 294 extractable, 302 bool extractable, 316 bool extractable, 327 extractable, 374 bool extractable, 385 bool extractable, 449 bool extractable, 458 bool extractable, 508 bool extractable, [all...] |
shared_crypto.cc | 214 bool extractable, 230 algorithm, key_data, extractable, usage_mask, key); 384 bool extractable, 398 format, CryptoData(buffer), algorithm, extractable, usage_mask, key); 620 bool extractable, 670 algorithm, extractable, usage_mask, keylen_bytes, key); 674 bool extractable, 706 extractable, 723 bool extractable, 736 return ImportKeyRaw(key_data, algorithm, extractable, usage_mask, key) [all...] |
jwk.cc | 45 // Web Crypto Key extractable <-- JWK ext + input extractable 184 // The 'algorithm', 'extractable', and 'usage_mask' input parameters 194 // extractable 196 // Web Crypto Key non-extractable. Conversely, if the JWK ext field is 589 // Writes a Web Crypto extractable value to a JWK dictionary. 590 void WriteExt(bool extractable, base::DictionaryValue* jwk_dict) { 591 jwk_dict->SetBoolean("ext", extractable); 716 bool extractable, [all...] |
shared_crypto_unittest.cc | 458 bool extractable = true; local 463 extractable, 471 EXPECT_EQ(extractable, key.extractable()); 479 bool extractable, 495 EXPECT_TRUE(public_key->extractable()); 502 extractable, 509 EXPECT_EQ(extractable, private_key->extractable()); 575 bool extractable, 1677 bool extractable = false; local 1688 CryptoData(json_vec), algorithm, extractable, usage_mask, &key)); local 1712 CryptoData(json_vec), algorithm, extractable, usage_mask, &key)); local 1740 extractable, local 1750 extractable, local 1771 extractable, local 1782 CryptoData(json_vec), algorithm, extractable, usage_mask, &key)); local 1797 bool extractable = false; local 2433 bool extractable = true; local 2624 bool extractable = true; local [all...] |
platform_crypto_nss.cc | [all...] |
/external/chromium_org/third_party/WebKit/public/platform/ |
WebCryptoKey.h | 105 BLINK_PLATFORM_EXPORT static WebCryptoKey create(WebCryptoKeyHandle*, WebCryptoKeyType, bool extractable, const WebCryptoKeyAlgorithm&, WebCryptoKeyUsageMask); 115 BLINK_PLATFORM_EXPORT bool extractable() const;
|
WebCrypto.h | 208 // * The key is extractable when calling into exportKey/wrapKey. 217 virtual void generateKey(const WebCryptoAlgorithm&, bool extractable, WebCryptoKeyUsageMask, WebCryptoResult result) { result.completeWithError(WebCryptoErrorTypeNotSupported, ""); } 218 virtual void importKey(WebCryptoKeyFormat, const unsigned char* keyData, unsigned keyDataSize, const WebCryptoAlgorithm&, bool extractable, WebCryptoKeyUsageMask, WebCryptoResult result) { result.completeWithError(WebCryptoErrorTypeNotSupported, ""); } 221 virtual void unwrapKey(WebCryptoKeyFormat, const unsigned char* wrappedKey, unsigned wrappedKeySize, const WebCryptoKey&, const WebCryptoAlgorithm& unwrapAlgorithm, const WebCryptoAlgorithm& unwrappedKeyAlgorithm, bool extractable, WebCryptoKeyUsageMask, WebCryptoResult result) { result.completeWithError(WebCryptoErrorTypeNotSupported, ""); } 274 virtual bool deserializeKeyForClone(const WebCryptoKeyAlgorithm&, WebCryptoKeyType, bool extractable, WebCryptoKeyUsageMask, const unsigned char* keyData, unsigned keyDataSize, WebCryptoKey&) { return false; }
|
/external/chromium_org/chrome/renderer/resources/extensions/enterprise_platform_keys/ |
key.js | 32 * @param {boolean} extractable Whether the key is extractable. 35 var KeyImpl = function(type, publicKeySpki, algorithm, usages, extractable) { 40 this.extractable = extractable; 55 {superclass: KeyBase, readonly: ['extractable', 'type', 'usages']});
|
key_pair.js | 25 true /* extractable */); 30 false /* not extractable */);
|
subtle_crypto.js | 83 function(algorithm, extractable, keyUsages) { 89 if (extractable) { 168 // Either key.type is not 'private' or the key is not extractable. In both
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsPKCS12Blob.cpp | 210 // non-extractable if needed. 234 // non-extractable. 241 // private keys as non-extractable. 246 // Mark the private key as non-extractable. 302 // a token. On success, store the attribute in |extractable| and return 305 isExtractable(SECKEYPrivateKey *privKey, PRBool *extractable) 315 *extractable = !!(*(CK_BBOOL*)value.data); 443 LOG(ERROR) << "Private key is not extractable";
|
/external/chromium_org/chrome/browser/ui/webui/options/ |
certificate_manager_browsertest.js | 167 'extractable': true }], 177 'extractable': true, 183 'extractable': true,
|
/external/chromium_org/third_party/WebKit/Source/bindings/v8/ |
SerializedScriptValue.cpp | 526 doWriteKeyUsages(key.usages(), key.extractable()); 784 void doWriteKeyUsages(const blink::WebCryptoKeyUsageMask usages, bool extractable) 791 if (extractable) 2261 bool extractable; local [all...] |