/external/chromium_org/crypto/ |
H A D | rsa_private_key_nss_unittest.cc | 31 std::vector<uint8> public_key; local 32 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); 35 crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key)); 44 std::vector<uint8> public_key; local 45 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); 57 EXPECT_EQ(NULL, crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key));
|
H A D | curve25519.cc | 30 void ScalarBaseMult(const uint8* private_key, uint8* public_key) { argument 31 curve25519_donna(public_key, private_key, kBasePoint);
|
H A D | ec_private_key.h | 31 // (The difference in types of key() and public_key() make this a little 75 // Imports the key pair into |slot| and returns in |public_key| and |key|. 88 SECKEYPublicKey** public_key); 98 SECKEYPublicKey* public_key() { return public_key_; } function in class:crypto::ECPrivateKey
|
/external/chromium_org/net/ssl/ |
H A D | openssl_client_key_store.h | 49 // Given a certificate's |public_key|, return the corresponding private 79 crypto::ScopedEVP_PKEY public_key; member in class:net::OpenSSLClientKeyStore::KeyPair 86 // Returns the index of the keypair for |public_key|. or -1 if not found. 87 int FindKeyPairIndex(EVP_PKEY* public_key);
|
H A D | openssl_client_key_store.cc | 41 : public_key(EVP_PKEY_dup(pub_key)), 49 : public_key(EVP_PKEY_dup(other.public_key.get())), 56 crypto::ScopedEVP_PKEY public_key_tmp(EVP_PKEY_dup(other.public_key.get())); 58 public_key.reset(); 59 public_key = public_key_tmp.Pass(); 64 int OpenSSLClientKeyStore::FindKeyPairIndex(EVP_PKEY* public_key) { argument 65 if (!public_key) 68 if (EVP_PKEY_cmp(pairs_[n].public_key.get(), public_key) [all...] |
/external/chromium_org/chrome/browser/chromeos/login/easy_unlock/ |
H A D | easy_unlock_types.h | 27 std::string public_key; member in struct:chromeos::EasyUnlockDeviceKeyData
|
/external/chromium_org/net/base/ |
H A D | openssl_private_key_store_android.cc | 26 unsigned char* public_key = NULL; local 27 int public_len = i2d_PUBKEY(pkey, &public_key); 41 static_cast<const uint8*>(public_key), public_len, 46 OPENSSL_free(public_key);
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
H A D | networking_private_credentials_getter_mac.cc | 27 const std::string& public_key, 45 const std::string& public_key, 59 std::vector<uint8> public_key_data(public_key.begin(), public_key.end()); 43 Start( const std::string& network_guid, const std::string& public_key, const extensions::NetworkingPrivateServiceClient::CryptoVerify:: VerifyAndEncryptCredentialsCallback& callback) argument
|
H A D | networking_private_credentials_getter_win.cc | 24 explicit CredentialsGetterHostClient(const std::string& public_key); 54 const std::string& public_key) 55 : public_key_(public_key.begin(), public_key.end()) { 120 const std::string& public_key, 135 const std::string& public_key, 142 new CredentialsGetterHostClient(public_key), 53 CredentialsGetterHostClient( const std::string& public_key) argument 133 Start( const std::string& network_guid, const std::string& public_key, const extensions::NetworkingPrivateServiceClient::CryptoVerify:: VerifyAndEncryptCredentialsCallback& callback) argument
|
/external/chromium_org/content/child/webcrypto/openssl/ |
H A D | rsa_ssa_openssl.cc | 102 EVP_PKEY* public_key = NULL; variable 104 Status status = GetPKeyAndDigest(key, &public_key, &digest); 108 if (!EVP_DigestVerifyInit(ctx.get(), NULL, digest, NULL, public_key))
|
/external/chromium_org/extensions/browser/ |
H A D | verified_contents_unittest.cc | 32 bool GetPublicKey(const base::FilePath& path, std::string* public_key) { argument 36 if (!Extension::ParsePEMKeyBytes(public_key_pem, public_key)) 50 std::string public_key; local 51 ASSERT_TRUE(GetPublicKey(path.AppendASCII("public_key.pem"), &public_key)); 52 VerifiedContents contents(reinterpret_cast<const uint8*>(public_key.data()), 53 public_key.size());
|
/external/chromium_org/net/cert/ |
H A D | ct_log_verifier.cc | 15 const base::StringPiece& public_key, 18 if (!result->Init(public_key, description)) 14 Create( const base::StringPiece& public_key, const base::StringPiece& description) argument
|
H A D | ct_log_verifier_openssl.cc | 55 bool CTLogVerifier::Init(const base::StringPiece& public_key, argument 60 BIO_new_mem_buf(const_cast<char*>(public_key.data()), public_key.size())); 68 key_id_ = crypto::SHA256HashString(public_key);
|
H A D | ct_log_verifier_nss.cc | 71 bool CTLogVerifier::Init(const base::StringPiece& public_key, argument 78 const_cast<char*>(public_key.data())); 79 key_data.len = public_key.size(); 96 key_id_ = crypto::SHA256HashString(public_key);
|
/external/chromium_org/net/quic/crypto/ |
H A D | channel_id_nss.cc | 32 SECKEYPublicKey public_key; local 33 memset(&public_key, 0, sizeof(public_key)); 40 public_key.keyType = ecKey; 41 public_key.u.ec.DEREncodedParams.type = siBuffer; 42 public_key.u.ec.DEREncodedParams.data = const_cast<unsigned char*>(p256_oid); 43 public_key.u.ec.DEREncodedParams.len = sizeof(p256_oid); 48 public_key.u.ec.publicValue.type = siBuffer; 49 public_key.u.ec.publicValue.data = key_buf; 50 public_key [all...] |
H A D | p256_key_exchange_openssl.cc | 18 P256KeyExchange::P256KeyExchange(EC_KEY* private_key, const uint8* public_key) argument 20 memcpy(public_key_, public_key, sizeof(public_key_)); 39 uint8 public_key[kUncompressedP256PointBytes]; local 42 POINT_CONVERSION_UNCOMPRESSED, public_key, 43 sizeof(public_key), NULL) != sizeof(public_key)) { 48 return new P256KeyExchange(private_key.release(), public_key);
|
H A D | p256_key_exchange_nss.cc | 32 const uint8* public_key) 34 memcpy(public_key_, public_key, sizeof(public_key_)); 78 SECKEYPublicKey* public_key = key_pair->public_key(); local 79 if (public_key->keyType != ecKey || 80 public_key->u.ec.publicValue.len != kUncompressedP256PointBytes || 81 !public_key->u.ec.publicValue.data || 82 public_key->u.ec.publicValue.data[0] != kUncompressedECPointForm) { 94 if (public_key->u.ec.DEREncodedParams.len != oid_data->oid.len + 2 || 95 !public_key 31 P256KeyExchange(crypto::ECPrivateKey* key_pair, const uint8* public_key) argument 127 vector<uint8> public_key; local [all...] |
/external/chromium_org/chrome/browser/chromeos/settings/ |
H A D | session_manager_operation_unittest.cc | 73 ASSERT_TRUE(op->public_key().get()); 74 ASSERT_TRUE(op->public_key()->is_loaded()); 75 std::vector<uint8> public_key; local 76 ASSERT_TRUE(policy_.GetSigningKey()->ExportPublicKey(&public_key)); 77 EXPECT_EQ(public_key, op->public_key()->data()); 112 ASSERT_TRUE(op.public_key().get()); 113 EXPECT_FALSE(op.public_key()->is_loaded()); 165 EXPECT_TRUE(op.public_key().get()); 166 EXPECT_TRUE(op.public_key() 255 std::vector<uint8> public_key; local [all...] |
/external/chromium_org/remoting/base/ |
H A D | rsa_key_pair.cc | 71 std::vector<uint8> public_key; local 72 CHECK(key_->ExportPublicKey(&public_key)); 73 std::string public_key_str(public_key.begin(), public_key.end());
|
/external/chromium_org/chrome/app/ |
H A D | signature_validator_win_unittest.cc | 79 uint8* public_key = blob.pbData; local 83 base::StringPiece key_bytes(reinterpret_cast<char*>(public_key),
|
/external/chromium_org/chromeos/dbus/ |
H A D | fake_easy_unlock_client.cc | 44 const std::string& public_key) { 48 ExtractKeyPairIndexFromKey(public_key, kEc256PublicKeyKey); 74 const std::string& public_key, 79 ExtractKeyPairIndexFromKey(public_key, kEc256PublicKeyKey); 86 // used keys belong, i.e. (key_pair[1].private_key, key_pair[2].public_key) 87 // and (key_pair[2].private_key, key_pair[1].public_key) should produce the 43 IsEcP256KeyPair(const std::string& private_key, const std::string& public_key) argument 72 PerformECDHKeyAgreement( const std::string& private_key, const std::string& public_key, const DataCallback& callback) argument
|
H A D | fake_easy_unlock_client_unittest.cc | 154 const std::string public_key = "{\"ec_p256_public_key\": 345}"; local 157 client.PerformECDHKeyAgreement(public_key, 167 const std::string public_key = "{\"ec_p256_public_key_invalid\": 345}"; local 171 public_key, 180 const std::string public_key = "{\"ec_p256_public_key\": \"345__\"}"; local 184 public_key, 193 const std::string public_key = "{\"ec_p256_public_key\": 345}"; local 197 public_key,
|
H A D | shill_manager_client.h | 109 std::string public_key; member in struct:chromeos::ShillManagerClient::VerificationProperties 206 // by the given |service_path|, encrypted using the |public_key| for the 215 // the |data| encrypted using the |public_key| for the trusted device. If the
|
/external/chromium_org/components/ownership/ |
H A D | owner_settings_service.cc | 100 const scoped_refptr<PublicKey>& public_key, 104 public_key_ = public_key; 99 OnKeypairLoaded( const scoped_refptr<PublicKey>& public_key, const scoped_refptr<PrivateKey>& private_key) argument
|
/external/chromium_org/components/policy/core/common/cloud/ |
H A D | cloud_policy_validator_unittest.cc | 81 std::string public_key = std::string( local 95 validator->ValidateCachedKey(public_key, 99 validator->ValidateSignature(public_key,
|