/external/chromium_org/net/cert/ |
H A D | jwk_serializer_unittest.cc | 64 base::StringPiece spki; local 67 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 71 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc)); 72 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 99 spki.set(reinterpret_cast<const char*>(kSpkiEcWithLeadingZero), 101 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
|
H A D | jwk_serializer_nss.cc | 23 CERTSubjectPublicKeyInfo* spki, 29 if (spki->subjectPublicKey.len != (kPrime256v1PublicKeyLength + 1) * 8 || 30 spki->subjectPublicKey.data[0] != kUncompressedEncodingType) 37 reinterpret_cast<char*>(spki->subjectPublicKey.data + 1), 44 reinterpret_cast<char*>(spki->subjectPublicKey.data + 1 + 54 CERTSubjectPublicKeyInfo* spki, 63 if (spki->algorithm.parameters.len == sizeof(kPrime256v1) && 64 !memcmp(spki->algorithm.parameters.data, kPrime256v1, 66 return ConvertEcPrime256v1PublicKeyInfoToJwk(spki, public_key_jwk); 94 ScopedCERTSubjectPublicKeyInfo spki( 22 ConvertEcPrime256v1PublicKeyInfoToJwk( CERTSubjectPublicKeyInfo* spki, base::DictionaryValue* public_key_jwk) argument 53 ConvertEcPublicKeyInfoToJwk( CERTSubjectPublicKeyInfo* spki, base::DictionaryValue* public_key_jwk) argument [all...] |
H A D | x509_util_openssl_unittest.cc | 135 std::vector<uint8> spki; local 136 ASSERT_TRUE(private_key->ExportPublicKey(&spki)); 137 VerifyCertificateSignature(der_cert, spki);
|
H A D | asn1_util.cc | 160 bool ExtractSubjectPublicKeyFromSPKI(base::StringPiece spki, argument 173 if (!asn1::GetElement(&spki, asn1::kSEQUENCE, &spki_contents))
|
H A D | sha256_legacy_support_win.cc | 173 CERTSubjectPublicKeyInfo* spki = local 176 if (!spki) { 184 &signed_data, spki, NULL); 185 SECKEY_DestroySubjectPublicKeyInfo(spki);
|
H A D | x509_util_nss_unittest.cc | 164 std::vector<uint8> spki; local 165 ASSERT_TRUE(private_key->ExportPublicKey(&spki)); 166 VerifyCertificateSignature(der_cert, spki);
|
H A D | cert_verify_proc_mac.cc | 291 base::StringPiece spki; local 292 if (!asn1::ExtractSPKIFromDERCert(der_bytes, &spki)) { 297 const std::string spki_hash = crypto::SHA256HashString(spki);
|
H A D | cert_verify_proc_nss.cc | 305 base::StringPiece spki; local 306 if (!asn1::ExtractSPKIFromDERCert(der, &spki)) { 311 const std::string spki_hash = crypto::SHA256HashString(spki);
|
H A D | cert_verify_proc_win.cc | 434 base::StringPiece spki; local 435 if (!asn1::ExtractSPKIFromDERCert(der_bytes, &spki)) { 441 const std::string spki_hash = crypto::SHA256HashString(spki);
|
H A D | x509_util_nss.cc | 93 CERTSubjectPublicKeyInfo* spki = local 95 if (!spki) 102 CERT_CreateCertificateRequest(subject_name, spki, NULL); 103 SECKEY_DestroySubjectPublicKeyInfo(spki);
|
/external/openssl/crypto/asn1/ |
H A D | t_spki.c | 73 int NETSCAPE_SPKI_print(BIO *out, NETSCAPE_SPKI *spki) argument 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); 83 pkey = X509_PUBKEY_get(spki->spkac->pubkey); 90 chal = spki->spkac->challenge; 93 i=OBJ_obj2nid(spki->sig_algor->algorithm); 97 n=spki->signature->length; 98 s=(char *)spki->signature->data;
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | x509spki.c | 81 NETSCAPE_SPKI *spki; local 98 spki = d2i_NETSCAPE_SPKI(NULL, &p, spki_len); 100 return spki; 105 char * NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *spki) argument 111 der_len = i2d_NETSCAPE_SPKI(spki, NULL); 129 i2d_NETSCAPE_SPKI(spki, &p);
|
/external/openssl/crypto/x509/ |
H A D | x509spki.c | 83 NETSCAPE_SPKI *spki; local 97 spki = d2i_NETSCAPE_SPKI(NULL, &p, spki_len); 99 return spki; 104 char * NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *spki) argument 109 der_len = i2d_NETSCAPE_SPKI(spki, NULL); 117 i2d_NETSCAPE_SPKI(spki, &p);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | SubjectKeyIdentifier.java | 78 * @param spki the subject public key info. 82 SubjectPublicKeyInfo spki) 84 this.keyidentifier = getDigest(spki); 127 private static byte[] getDigest(SubjectPublicKeyInfo spki) argument 134 byte[] bytes = spki.getPublicKeyData().getBytes(); 81 SubjectKeyIdentifier( SubjectPublicKeyInfo spki) argument
|
H A D | AuthorityKeyIdentifier.java | 109 SubjectPublicKeyInfo spki) 116 byte[] bytes = spki.getPublicKeyData().getBytes(); 127 SubjectPublicKeyInfo spki, 136 byte[] bytes = spki.getPublicKeyData().getBytes(); 108 AuthorityKeyIdentifier( SubjectPublicKeyInfo spki) argument 126 AuthorityKeyIdentifier( SubjectPublicKeyInfo spki, GeneralNames name, BigInteger serialNumber) argument
|
/external/chromium_org/chrome/browser/extensions/api/messaging/ |
H A D | message_property_provider.cc | 92 base::StringPiece spki; local 93 if (!net::asn1::ExtractSPKIFromDERCert(output->domain_bound_cert, &spki)) { 98 if (!net::JwkSerializer::ConvertSpkiFromDerToJwk(spki, &jwk_value)) {
|
/external/openssl/apps/ |
H A D | spkac.c | 94 NETSCAPE_SPKI *spki = NULL; local 202 spki = NETSCAPE_SPKI_new(); 203 if(challenge) ASN1_STRING_set(spki->spkac->challenge, 205 NETSCAPE_SPKI_set_pubkey(spki, pkey); 206 NETSCAPE_SPKI_sign(spki, pkey, EVP_md5()); 207 spkstr = NETSCAPE_SPKI_b64_encode(spki); 259 spki = NETSCAPE_SPKI_b64_decode(spkstr, -1); 261 if(!spki) { 284 if(!noout) NETSCAPE_SPKI_print(out, spki); 285 pkey = NETSCAPE_SPKI_get_pubkey(spki); [all...] |
/external/chromium_org/crypto/ |
H A D | signature_verifier_nss.cc | 197 CERTSubjectPublicKeyInfo* spki = NULL; local 202 spki = SECKEY_DecodeDERSubjectPublicKeyInfo(&spki_der); 203 if (!spki) 205 SECKEYPublicKey* public_key = SECKEY_ExtractPublicKey(spki); 206 SECKEY_DestroySubjectPublicKeyInfo(spki); // Done with spki.
|
H A D | rsa_private_key_nss.cc | 43 inline void operator()(CERTSubjectPublicKeyInfo* spki) { argument 44 SECKEY_DestroySubjectPublicKeyInfo(spki); 59 ScopedPublicKeyInfo spki(SECKEY_DecodeDERSubjectPublicKeyInfo(&key_der)); 60 if (!spki) 63 crypto::ScopedSECKEYPublicKey result(SECKEY_ExtractPublicKey(spki.get()));
|
/external/chromium_org/net/base/ |
H A D | keygen_handler_mac.cc | 30 CSSM_X509_SUBJECT_PUBLIC_KEY_INFO spki; member in struct:net::PublicKeyAndChallenge 49 offsetof(PublicKeyAndChallenge, spki), 154 spkac.pkac.spki.algorithm.algorithm = CSSMOID_RSA; 155 spkac.pkac.spki.subjectPublicKey.Length = 157 spkac.pkac.spki.subjectPublicKey.Data =
|
H A D | keygen_handler_win.cc | 69 std::vector<BYTE> spki; local 71 if (!GetSubjectPublicKeyInfo(prov, &spki)) 75 // spki SubjectPublicKeyInfo, 81 *reinterpret_cast<PCERT_PUBLIC_KEY_INFO>(&spki[0]);
|
/external/chromium_org/net/quic/crypto/ |
H A D | proof_verifier_chromium.cc | 268 StringPiece spki; local 269 if (!asn1::ExtractSPKIFromDERCert(cert, &spki)) { 289 reinterpret_cast<const uint8*>(spki.data()), spki.size()); 317 reinterpret_cast<const uint8*>(spki.data()), 318 spki.size())) {
|
/external/chromium_org/content/child/webcrypto/test/ |
H A D | rsa_ssa_unittest.cc | 706 // This should fail since spki is for public keys. 1115 // Import the spki to create a public key 1149 // Export the new key as spki and compare to the original. 1150 std::vector<uint8_t> spki; local 1152 ExportKey(blink::WebCryptoKeyFormatSpki, public_key2, &spki)); 1153 EXPECT_BYTES_EQ_HEX(kPublicKeySpkiDerHex, CryptoData(spki));
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | nssidentity.cc | 338 CERTSubjectPublicKeyInfo *spki = NULL; local 366 spki = SECKEY_CreateSubjectPublicKeyInfo(keypair->pubkey()); 367 if (!spki) { 372 certreq = CERT_CreateCertificateRequest(subject_name, spki, NULL); 433 if (spki) SECKEY_DestroySubjectPublicKeyInfo(spki);
|
/external/chromium_org/chrome/browser/extensions/ |
H A D | extension_messages_apitest.cc | 873 base::StringPiece spki; local 874 net::asn1::ExtractSPKIFromDERCert(channel_id_cert, &spki); 876 net::JwkSerializer::ConvertSpkiFromDerToJwk(spki, &jwk_value);
|