/external/chromium_org/net/cert/ |
jwk_serializer_unittest.cc | 64 base::StringPiece spki; local 67 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 71 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc)); 72 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 99 spki.set(reinterpret_cast<const char*>(kSpkiEcWithLeadingZero), 101 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
|
sha256_legacy_support_win.cc | 173 CERTSubjectPublicKeyInfo* spki = local 176 if (!spki) { 184 &signed_data, spki, NULL); 185 SECKEY_DestroySubjectPublicKeyInfo(spki);
|
x509_util_nss_unittest.cc | 164 std::vector<uint8> spki; local 165 ASSERT_TRUE(private_key->ExportPublicKey(&spki)); 166 VerifyCertificateSignature(der_cert, spki);
|
x509_util_openssl_unittest.cc | 135 std::vector<uint8> spki; local 136 ASSERT_TRUE(private_key->ExportPublicKey(&spki)); 137 VerifyCertificateSignature(der_cert, spki);
|
cert_verify_proc_mac.cc | 277 // the issuer's SPKI at each step. 291 base::StringPiece spki; local 292 if (!asn1::ExtractSPKIFromDERCert(der_bytes, &spki)) { 297 const std::string spki_hash = crypto::SHA256HashString(spki);
|
x509_util_nss.cc | 93 CERTSubjectPublicKeyInfo* spki = local 95 if (!spki) 102 CERT_CreateCertificateRequest(subject_name, spki, NULL); 103 SECKEY_DestroySubjectPublicKeyInfo(spki);
|
cert_verify_proc_nss.cc | 296 // the issuer's SPKI at each step. 305 base::StringPiece spki; local 306 if (!asn1::ExtractSPKIFromDERCert(der, &spki)) { 311 const std::string spki_hash = crypto::SHA256HashString(spki); [all...] |
cert_verify_proc_win.cc | 425 // the issuer's SPKI at each step. 434 base::StringPiece spki; local 435 if (!asn1::ExtractSPKIFromDERCert(der_bytes, &spki)) { 441 const std::string spki_hash = crypto::SHA256HashString(spki);
|
cert_verify_proc_unittest.cc | 536 base::StringPiece spki; local 537 ASSERT_TRUE(asn1::ExtractSPKIFromDERCert(der_bytes, &spki)); 539 std::string spki_sha1 = base::SHA1HashString(spki.as_string()); [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x509spki.c | 74 /* Load a Netscape SPKI from a base64 encoded string */ 81 NETSCAPE_SPKI *spki; local 98 spki = d2i_NETSCAPE_SPKI(NULL, &p, spki_len); 100 return spki; 103 /* Generate a base64 encoded string from an SPKI */ 105 char * NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *spki) 111 der_len = i2d_NETSCAPE_SPKI(spki, NULL); 129 i2d_NETSCAPE_SPKI(spki, &p);
|
/external/openssl/crypto/x509/ |
x509spki.c | 76 /* Load a Netscape SPKI from a base64 encoded string */ 83 NETSCAPE_SPKI *spki; local 97 spki = d2i_NETSCAPE_SPKI(NULL, &p, spki_len); 99 return spki; 102 /* Generate a base64 encoded string from an SPKI */ 104 char * NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *spki) 109 der_len = i2d_NETSCAPE_SPKI(spki, NULL); 117 i2d_NETSCAPE_SPKI(spki, &p);
|
/external/chromium_org/chrome/browser/extensions/api/messaging/ |
message_property_provider.cc | 92 base::StringPiece spki; local 93 if (!net::asn1::ExtractSPKIFromDERCert(output->domain_bound_cert, &spki)) { 98 if (!net::JwkSerializer::ConvertSpkiFromDerToJwk(spki, &jwk_value)) {
|
/external/chromium_org/crypto/ |
signature_verifier_nss.cc | 197 CERTSubjectPublicKeyInfo* spki = NULL; local 202 spki = SECKEY_DecodeDERSubjectPublicKeyInfo(&spki_der); 203 if (!spki) 205 SECKEYPublicKey* public_key = SECKEY_ExtractPublicKey(spki); 206 SECKEY_DestroySubjectPublicKeyInfo(spki); // Done with spki.
|
/external/chromium_org/net/base/ |
keygen_handler_mac.cc | 30 CSSM_X509_SUBJECT_PUBLIC_KEY_INFO spki; member in struct:net::PublicKeyAndChallenge 49 offsetof(PublicKeyAndChallenge, spki), 154 spkac.pkac.spki.algorithm.algorithm = CSSMOID_RSA; 155 spkac.pkac.spki.subjectPublicKey.Length = 157 spkac.pkac.spki.subjectPublicKey.Data =
|
keygen_handler_win.cc | 69 std::vector<BYTE> spki; local 71 if (!GetSubjectPublicKeyInfo(prov, &spki)) 75 // spki SubjectPublicKeyInfo, 81 *reinterpret_cast<PCERT_PUBLIC_KEY_INFO>(&spki[0]);
|
/external/openssl/apps/ |
spkac.c | 94 NETSCAPE_SPKI *spki = NULL; local 202 spki = NETSCAPE_SPKI_new(); 203 if(challenge) ASN1_STRING_set(spki->spkac->challenge, 205 NETSCAPE_SPKI_set_pubkey(spki, pkey); 206 NETSCAPE_SPKI_sign(spki, pkey, EVP_md5()); 207 spkstr = NETSCAPE_SPKI_b64_encode(spki); 259 spki = NETSCAPE_SPKI_b64_decode(spkstr, -1); 261 if(!spki) { 284 if(!noout) NETSCAPE_SPKI_print(out, spki); 285 pkey = NETSCAPE_SPKI_get_pubkey(spki); [all...] |
ca.c | 2279 NETSCAPE_SPKI *spki = NULL; local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/pkcs10/ |
CertificationRequestInfoTest.java | 47 SubjectPublicKeyInfo spki = new SubjectPublicKeyInfo( local 55 version, subject, spki, attributes); 61 assertTrue(Arrays.equals(spki.getEncoded(), certReqInfo
|
CertificationRequestTest.java | 46 SubjectPublicKeyInfo spki = new SubjectPublicKeyInfo( local 53 version, subject, spki, attributes);
|
/external/chromium_org/net/quic/crypto/ |
proof_verifier_chromium.cc | 268 StringPiece spki; local 269 if (!asn1::ExtractSPKIFromDERCert(cert, &spki)) { 289 reinterpret_cast<const uint8*>(spki.data()), spki.size()); 317 reinterpret_cast<const uint8*>(spki.data()), 318 spki.size())) {
|
/external/chromium_org/third_party/webrtc/base/ |
nssidentity.cc | 338 CERTSubjectPublicKeyInfo *spki = NULL; local 366 spki = SECKEY_CreateSubjectPublicKeyInfo(keypair->pubkey()); 367 if (!spki) { 368 LOG(LS_ERROR) << "Couldn't create SPKI"; 372 certreq = CERT_CreateCertificateRequest(subject_name, spki, NULL); 433 if (spki) SECKEY_DestroySubjectPublicKeyInfo(spki);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/x509/ |
SubjectPublicKeyInfoTest.java | 67 SubjectPublicKeyInfo spki = new SubjectPublicKeyInfo(algid, rsaPubKeyInfo.encode(null)); local 69 PublicKey pubKey = spki.getPublicKey(); 76 SubjectPublicKeyInfo spki = new SubjectPublicKeyInfo(algid, ENCODED_BROKEN); local 77 PublicKey pubKey = spki.getPublicKey(); 88 SubjectPublicKeyInfo spki = new SubjectPublicKeyInfo(algid, ENCODED_BROKEN); local 89 PublicKey pubKey = spki.getPublicKey();
|
/external/chromium_org/content/child/webcrypto/test/ |
rsa_ssa_unittest.cc | 40 // Passing case: Import a valid RSA key in SPKI format. 61 // Failing case: Empty SPKI data 90 // Passing case: Export a previously imported RSA public key in SPKI format 117 // TODO(eroman): Failing test: Import a SPKI with an unrecognized hash OID 118 // TODO(eroman): Failing test: Import a SPKI with invalid algorithm params 119 // TODO(eroman): Failing test: Import a SPKI with inconsistent parameters 121 // TODO(eroman): Failing test: Import a SPKI for RSA-SSA, but with params 699 // Exporting a private key as SPKI format doesn't make sense. However this 705 // Re-generate an extractable private_key and try to export it as SPKI format. 706 // This should fail since spki is for public keys 1150 std::vector<uint8_t> spki; local [all...] |
/external/chromium_org/chrome/browser/extensions/ |
extension_messages_apitest.cc | 873 base::StringPiece spki; local [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3con.c | 10797 SECItem *spki = NULL; local [all...] |