/external/chromium_org/chrome/common/extensions/api/networking_private/ |
networking_private_crypto_unittest.cc | 89 std::string signed_data; local 90 base::Base64Decode(kSignedData, &signed_data); 94 kCertData, signed_data, unsigned_data, kHotspotBssid)); 99 kBadSubjectCertData, signed_data, unsigned_data, kHotspotBssid)); 103 kBadCertData, signed_data, unsigned_data, kHotspotBssid)); 107 kCertData, signed_data, unsigned_data, kBadHotspotBssid)); 113 kCertData, signed_data, unsigned_data, kHotspotBssid));
|
/external/chromium_org/net/quic/crypto/ |
channel_id.h | 23 // Sign signs |signed_data| using the ChannelID private key and puts the 25 virtual bool Sign(base::StringPiece signed_data, 77 // Verify returns true iff |signature| is a valid signature of |signed_data| 80 base::StringPiece signed_data, 84 // signature of |signed_data| by |key|. |is_channel_id_signature| indicates 88 base::StringPiece signed_data,
|
channel_id_test.cc | 226 const string signed_data = "signed data"; local 234 ASSERT_TRUE(channel_id_key->Sign(signed_data, &signature)); 237 EXPECT_TRUE(ChannelIDVerifier::Verify(key, signed_data, signature)); 239 EXPECT_FALSE(ChannelIDVerifier::Verify("a" + key, signed_data, signature)); 240 EXPECT_FALSE(ChannelIDVerifier::Verify(key, "a" + signed_data, signature)); 246 string(bad_key.get(), key.size()), signed_data, signature)); 252 key, signed_data, string(bad_signature.get(), signature.size())));
|
channel_id_nss.cc | 17 StringPiece signed_data, 19 return VerifyRaw(key, signed_data, signature, true); 24 StringPiece signed_data, 74 reinterpret_cast<const unsigned char*>(signed_data.data()), 75 signed_data.size());
|
channel_id_openssl.cc | 22 StringPiece signed_data, 24 return VerifyRaw(key, signed_data, signature, true); 29 StringPiece signed_data, 81 SHA256_Update(&sha256, signed_data.data(), signed_data.size());
|
channel_id_chromium.h | 26 virtual bool Sign(base::StringPiece signed_data,
|
channel_id_chromium.cc | 25 bool ChannelIDKeyChromium::Sign(base::StringPiece signed_data, 34 std::vector<uint8> data(len1 + len2 + signed_data.size()); 37 memcpy(&data[len1 + len2], signed_data.data(), signed_data.size());
|
/external/chromium_org/ppapi/c/private/ |
ppb_platform_verification_private.h | 76 * @param[out] signed_data A <code>PP_Var</code> of type 97 struct PP_Var* signed_data,
|
/external/chromium_org/ppapi/cpp/private/ |
platform_verification.h | 23 Var* signed_data,
|
platform_verification.cc | 42 Var* signed_data, 51 const_cast<PP_Var*>(&signed_data->pp_var()),
|
/external/chromium_org/ppapi/thunk/ |
ppb_platform_verification_api.h | 24 PP_Var* signed_data,
|
ppb_platform_verification_private_thunk.cc | 38 struct PP_Var* signed_data, 49 signed_data,
|
/external/chromium_org/ppapi/api/private/ |
ppb_platform_verification_private.idl | 59 * @param[out] signed_data A <code>PP_Var</code> of type 81 [out] PP_Var signed_data,
|
/external/chromium_org/ppapi/proxy/ |
platform_verification_private_resource.h | 24 PP_Var* signed_data; member in struct:ppapi::proxy::PlatformVerificationPrivateResource::ChallengePlatformParams 40 PP_Var* signed_data,
|
platform_verification_private_resource.cc | 36 PP_Var* signed_data, 42 if (!signed_data || !signed_data_signature || !platform_key_certificate || 43 VarTracker::IsVarTypeRefcounted(signed_data->type) || 68 signed_data, signed_data_signature, platform_key_certificate, callback }; 89 *(output_params.signed_data) =
|
/external/chromium_org/ppapi/tests/ |
test_platform_verification_private.cc | 35 pp::Var signed_data, signed_data_signature, platform_key_certificate; local 37 pp::Var(service_id_str), challenge_array, &signed_data,
|
/external/chromium_org/net/cert/ |
sha256_legacy_support_win.cc | 119 CERTSignedData signed_data; local 120 memset(&signed_data, 0, sizeof(signed_data)); 134 arena.get(), &signed_data, SEC_ASN1_GET(CERT_SignedDataTemplate), 138 SECOID_GetAlgorithmTag(&signed_data.signatureAlgorithm); 184 &signed_data, spki, NULL);
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
pkcs7.c | 28 CBS in, content_info, content_type, wrapped_signed_data, signed_data, local 59 !CBS_get_asn1(&wrapped_signed_data, &signed_data, CBS_ASN1_SEQUENCE) || 60 !CBS_get_asn1_uint64(&signed_data, &version) || 61 !CBS_get_asn1(&signed_data, NULL /* digests */, CBS_ASN1_SET) || 62 !CBS_get_asn1(&signed_data, NULL /* content */, CBS_ASN1_SEQUENCE)) { 72 if (!CBS_get_asn1(&signed_data, &certificates,
|
/external/chromium_org/chrome/browser/renderer_host/pepper/ |
pepper_platform_verification_message_filter.cc | 92 const std::string& signed_data, 101 DCHECK_EQ(signed_data.size(), 0u); 108 std::vector<uint8_t>(signed_data.begin(), signed_data.end()),
|
pepper_platform_verification_message_filter.h | 49 const std::string& signed_data,
|
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 172 * signed_data : signature 178 uint8_t signed_data[KM_KEY_SIZE_MAX]; member in struct:keymaster_sign_data_resp 193 * signed_data : Pointer to signed data buffer 202 uint32_t signed_data; member in struct:keymaster_verify_data_cmd
|
/external/chromium_org/net/quic/test_tools/ |
crypto_test_utils_openssl.cc | 33 virtual bool Sign(StringPiece signed_data, 46 EVP_DigestUpdate(md_ctx.get(), signed_data.data(), signed_data.size());
|
/hardware/libhardware/include/hardware/ |
keymaster.h | 261 uint8_t** signed_data, size_t* signed_data_length); 272 const uint8_t* signed_data, const size_t signed_data_length,
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
crypto_verify_impl.cc | 16 credentials.signed_data,
|
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_nss.cc | 235 ScopedNSSCMSSignedData signed_data(NSS_CMSSignedData_CreateCertsOnly( 237 if (!signed_data.get()) { 243 if (NSS_CMSSignedData_AddCertificate(signed_data.get(), cert_chain[i]) != 252 message.get(), cinfo, signed_data.get()) == SECSuccess) { 253 ignore_result(signed_data.release());
|