/external/chromium_org/content/child/webcrypto/nss/ |
H A D | aes_cbc_nss.cc | 26 const blink::WebCryptoKey& key, 37 PK11SymKey* sym_key = SymKeyNss::Cast(key)->key(); 106 const blink::WebCryptoKey& key, 109 return AesCbcEncryptDecrypt(ENCRYPT, algorithm, key, data, buffer); 113 const blink::WebCryptoKey& key, 116 return AesCbcEncryptDecrypt(DECRYPT, algorithm, key, data, buffer); 24 AesCbcEncryptDecrypt(EncryptOrDecrypt mode, const blink::WebCryptoAlgorithm& algorithm, const blink::WebCryptoKey& key, const CryptoData& data, std::vector<uint8_t>* buffer) argument
|
H A D | key_nss.h | 23 // Base key class for all NSS keys, used to safely cast between types. Each key 26 // target Blink thread without having to lock access to the key. 47 SymKeyNss(crypto::ScopedPK11SymKey key, const CryptoData& raw_key_data); 49 static SymKeyNss* Cast(const blink::WebCryptoKey& key); 51 PK11SymKey* key() { return key_.get(); } function in class:content::webcrypto::SymKeyNss 67 PublicKeyNss(crypto::ScopedSECKEYPublicKey key, const CryptoData& spki_data); 69 static PublicKeyNss* Cast(const blink::WebCryptoKey& key); 71 SECKEYPublicKey* key() { return key_.get(); } function in class:content::webcrypto::PublicKeyNss 87 PrivateKeyNss(crypto::ScopedSECKEYPrivateKey key, 92 SECKEYPrivateKey* key() { return key_.get(); } function in class:content::webcrypto::PrivateKeyNss [all...] |
H A D | sym_key_nss.cc | 25 blink::WebCryptoKey* key) { 48 *key = blink::WebCryptoKey::create(handle.release(), 62 blink::WebCryptoKey* key) { 81 *key = blink::WebCryptoKey::create(handle.release(), 20 GenerateSecretKeyNss(const blink::WebCryptoKeyAlgorithm& algorithm, bool extractable, blink::WebCryptoKeyUsageMask usage_mask, unsigned keylen_bytes, CK_MECHANISM_TYPE mechanism, blink::WebCryptoKey* key) argument 56 ImportKeyRawNss(const CryptoData& key_data, const blink::WebCryptoKeyAlgorithm& algorithm, bool extractable, blink::WebCryptoKeyUsageMask usage_mask, CK_MECHANISM_TYPE mechanism, CK_FLAGS flags, blink::WebCryptoKey* key) argument
|
/external/chromium_org/content/child/webcrypto/openssl/ |
H A D | aes_gcm_openssl.cc | 39 const blink::WebCryptoKey& key, 43 SymKeyOpenSsl::Cast(key)->raw_key_data(); 66 const blink::WebCryptoKey& key, 69 return AesGcmEncryptDecrypt(ENCRYPT, algorithm, key, data, buffer); 73 const blink::WebCryptoKey& key, 76 return AesGcmEncryptDecrypt(DECRYPT, algorithm, key, data, buffer); 37 AesGcmEncryptDecrypt(EncryptOrDecrypt mode, const blink::WebCryptoAlgorithm& algorithm, const blink::WebCryptoKey& key, const CryptoData& data, std::vector<uint8_t>* buffer) argument
|
H A D | aes_kw_openssl.cc | 38 const blink::WebCryptoKey& key, 52 SymKeyOpenSsl::Cast(key)->raw_key_data(); 72 const blink::WebCryptoKey& key, 75 return AesKwEncryptDecrypt(ENCRYPT, algorithm, key, data, buffer); 79 const blink::WebCryptoKey& key, 82 return AesKwEncryptDecrypt(DECRYPT, algorithm, key, data, buffer); 36 AesKwEncryptDecrypt(EncryptOrDecrypt mode, const blink::WebCryptoAlgorithm& algorithm, const blink::WebCryptoKey& key, const CryptoData& data, std::vector<uint8_t>* buffer) argument
|
H A D | key_openssl.h | 24 // Base key class for all OpenSSL keys, used to safely cast between types. Each 25 // key maintains a copy of its serialized form in either 'raw', 'pkcs8', or 27 // the target Blink thread without having to lock access to the key. 49 static SymKeyOpenSsl* Cast(const blink::WebCryptoKey& key); 64 AsymKeyOpenSsl(crypto::ScopedEVP_PKEY key, 67 static AsymKeyOpenSsl* Cast(const blink::WebCryptoKey& key); 71 EVP_PKEY* key() { return key_.get(); } function in class:content::webcrypto::AsymKeyOpenSsl
|
H A D | rsa_ssa_openssl.cc | 20 // Extracts the OpenSSL key and digest from a WebCrypto key. The returned 21 // pointers will remain valid as long as |key| is alive. 22 Status GetPKeyAndDigest(const blink::WebCryptoKey& key, argument 25 *pkey = AsymKeyOpenSsl::Cast(key)->key(); 27 *digest = GetDigest(key.algorithm().rsaHashedParams()->hash().id()); 57 const blink::WebCryptoKey& key, 60 if (key.type() != blink::WebCryptoKeyTypePrivate) 68 Status status = GetPKeyAndDigest(key, [all...] |
/external/chromium_org/content/child/webcrypto/ |
H A D | structured_clone.cc | 20 // Returns the key format to use for structured cloning. 57 // key data). Use this extra information to further validate what was 58 // deserialized from the key data. 62 bool ValidateDeserializedKey(const blink::WebCryptoKey& key, argument 65 if (algorithm.id() != key.algorithm().id()) 68 if (key.type() != type) 74 key.algorithm().aesParams()->lengthBits()) 79 key.algorithm().rsaHashedParams()->modulusLengthBits()) 82 key.algorithm().rsaHashedParams()->publicExponent().size()) 85 key 103 SerializeKeyForClone(const blink::WebCryptoKey& key, blink::WebVector<uint8_t>* key_data) argument 109 DeserializeKeyForClone(const blink::WebCryptoKeyAlgorithm& algorithm, blink::WebCryptoKeyType type, bool extractable, blink::WebCryptoKeyUsageMask usage_mask, const CryptoData& key_data, blink::WebCryptoKey* key) argument [all...] |
/external/chromium_org/content/common/indexed_db/ |
H A D | indexed_db_key_range.cc | 27 IndexedDBKeyRange::IndexedDBKeyRange(const IndexedDBKey& key) argument 28 : lower_(key), upper_(key), lower_open_(false), upper_open_(false) {}
|
/external/chromium_org/content/renderer/media/ |
H A D | mock_media_constraint_factory.cc | 34 void MockMediaConstraintFactory::AddMandatory(const std::string& key, argument 36 mandatory_.push_back(blink::WebMediaConstraint(base::UTF8ToUTF16(key), 40 void MockMediaConstraintFactory::AddMandatory(const std::string& key, argument 43 base::UTF8ToUTF16(key), 47 void MockMediaConstraintFactory::AddMandatory(const std::string& key, argument 50 base::UTF8ToUTF16(key), base::UTF8ToUTF16(value))); 53 void MockMediaConstraintFactory::AddMandatory(const std::string& key, argument 56 AddMandatory(key, string_value); 59 void MockMediaConstraintFactory::AddOptional(const std::string& key, argument 61 optional_.push_back(blink::WebMediaConstraint(base::UTF8ToUTF16(key), 65 AddOptional(const std::string& key, double value) argument 72 AddOptional(const std::string& key, const std::string& value) argument 78 AddOptional(const std::string& key, bool value) argument [all...] |
/external/chromium_org/crypto/ |
H A D | ec_private_key.h | 28 // Encapsulates an elliptic curve (EC) private key. Can be used to generate new 29 // keys, export keys to other formats, or to extract a public key. 31 // (The difference in types of key() and public_key() make this a little 41 // The created key will use the NIST P-256 curve. 47 // fails. The created key is permanent and is not exportable in plaintext 52 // Creates a new instance by importing an existing key pair. 53 // The key pair is given as an ASN.1-encoded PKCS #8 EncryptedPrivateKeyInfo 62 // Creates a new instance in |slot| by importing an existing key pair. 63 // The key pair is given as an ASN.1-encoded PKCS #8 EncryptedPrivateKeyInfo 65 // This can return NULL if initialization fails. The created key i 95 EVP_PKEY* key() { return key_; } function in class:crypto::ECPrivateKey 97 SECKEYPrivateKey* key() { return key_; } function in class:crypto::ECPrivateKey [all...] |
H A D | hmac_openssl.cc | 20 std::vector<unsigned char> key; member in struct:crypto::HMACPlatformData 29 bool HMAC::Init(const unsigned char* key, size_t key_length) { argument 31 DCHECK(plat_->key.empty()); 33 plat_->key.assign(key, key + key_length); 35 // Special-case: if the key is empty, use a key with one zero 36 // byte. OpenSSL's HMAC function breaks when passed a NULL key. (It calls 37 // HMAC_Init_ex which treats a NULL key a [all...] |
H A D | symmetric_key.h | 24 // Wraps a platform-specific symmetric key and allows it to be held in a 28 // Defines the algorithm that a key will be used with. See also 37 // Generates a random key suitable to be used with |algorithm| and of 43 // Derives a key from the supplied password and salt using PBKDF2, suitable 45 // used to derive the key from the password. |key_size_in_bits| must be a 54 // Imports an array of key bytes in |raw_key|. This key may have been 56 // GetRawKey, or via another compatible method. The key must be of suitable 61 const std::string& key() { return key_; } function in class:crypto::SymmetricKey 63 HCRYPTKEY key() cons function in class:crypto::SymmetricKey 65 PK11SymKey* key() const { return key_.get(); } function in class:crypto::SymmetricKey [all...] |
/external/chromium_org/crypto/third_party/nss/ |
H A D | pk11akey.cc | 62 PK11SymKey* key = PK11_PBEKeyGen(slot, local 67 if (key == NULL) { 76 PK11_FreeSymKey(key); 82 *private_key = PK11_UnwrapPrivKey(slot, key, crypto_mech_type, crypto_param, 90 PK11_FreeSymKey(key);
|
H A D | secsign.cc | 57 SECKEYPrivateKey *key, 59 if (key->keyType != ecKey) { 60 return SEC_DerSignData(arena, result, input->data, input->len, key, 100 int signature_len = PK11_SignatureLen(key); 104 rv = PK11_Sign(key, &sig, &hash); 54 DerSignData(PLArenaPool *arena, SECItem *result, SECItem *input, SECKEYPrivateKey *key, SECOidTag algo_id) argument
|
/external/chromium_org/extensions/browser/value_store/ |
H A D | value_store.cc | 13 scoped_ptr<std::string> key) 14 : code(code), message(message), key(key.Pass()) {} 11 Error(ErrorCode code, const std::string& message, scoped_ptr<std::string> key) argument
|
H A D | value_store_change.cc | 23 changes_value.SetWithoutPathExpansion(it->key(), change_value); 31 const std::string& key, base::Value* old_value, base::Value* new_value) 32 : inner_(new Inner(key, old_value, new_value)) {} 36 const std::string& ValueStoreChange::key() const { function in class:ValueStoreChange 52 const std::string& key, base::Value* old_value, base::Value* new_value) 53 : key_(key), old_value_(old_value), new_value_(new_value) {} 30 ValueStoreChange( const std::string& key, base::Value* old_value, base::Value* new_value) argument 51 Inner( const std::string& key, base::Value* old_value, base::Value* new_value) argument
|
/external/chromium_org/extensions/common/ |
H A D | manifest_handler_helpers.cc | 41 std::string key = base::IntToString(icon_sizes[i]); local 42 if (icons_value->HasKey(key)) { 44 if (!icons_value->GetString(key, &icon_path)) { 46 errors::kInvalidIconPath, key); 52 errors::kInvalidIconPath, key);
|
/external/chromium_org/gin/ |
H A D | dictionary.h | 34 bool Get(const std::string& key, T* out) { argument 35 v8::Handle<v8::Value> val = object_->Get(StringToV8(isolate_, key)); 40 bool Set(const std::string& key, T val) { argument 41 return object_->Set(StringToV8(isolate_, key), ConvertToV8(isolate_, val));
|
/external/chromium_org/gpu/command_buffer/service/ |
H A D | gles2_cmd_decoder_unittest_1.cc | 32 void ShaderCacheCb(const std::string& key, const std::string& shader) { argument
|
/external/chromium_org/mojo/services/html_viewer/ |
H A D | webstoragenamespace_impl.cc | 19 virtual blink::WebString key(unsigned index) { function in class:mojo::__anon8812::DummyWebStorageAreaImpl 22 virtual blink::WebString getItem(const blink::WebString& key) { argument
|
/external/chromium_org/net/android/java/src/org/chromium/net/ |
H A D | AndroidKeyStore.java | 17 * Returns the public modulus of a given RSA private key as a byte 23 * @param key A PrivateKey instance, must implement RSAKey. 28 byte[] getRSAKeyModulus(AndroidPrivateKey key); argument 31 * Returns the 'Q' parameter of a given DSA private key as a byte 36 * @param key A PrivateKey instance. Must implement DSAKey. 41 byte[] getDSAKeyParamQ(AndroidPrivateKey key); argument 44 * Returns the 'order' parameter of a given ECDSA private key as a 46 * @param key A PrivateKey instance. Must implement ECKey. 51 byte[] getECKeyOrder(AndroidPrivateKey key); argument 58 * @param key 62 getPrivateKeyEncodedBytes(AndroidPrivateKey key) argument 94 rawSignDigestWithPrivateKey(AndroidPrivateKey key, byte[] message) argument 104 getPrivateKeyType(AndroidPrivateKey key) argument 138 getOpenSSLHandleForPrivateKey(AndroidPrivateKey key) argument 151 getOpenSSLEngineForPrivateKey(AndroidPrivateKey key) argument 157 releaseKey(AndroidPrivateKey key) argument [all...] |
/external/chromium_org/net/cert/ |
H A D | cert_database_nss.cc | 34 // Check if the private key corresponding to the certificate exist 38 // also imports the certificate if the private key exists. This 53 CK_OBJECT_HANDLE key; local 54 crypto::ScopedPK11Slot slot(PK11_KeyForCertExists(cert, &key, NULL)); 66 rv = PK11_ImportCert(slot.get(), cert, key, nickname.c_str(), PR_FALSE);
|
/external/chromium_org/net/dns/ |
H A D | notify_watcher_mac.cc | 20 bool NotifyWatcherMac::Watch(const char* key, const CallbackType& callback) { argument 21 DCHECK(key); 25 key, ¬ify_fd_, 0, ¬ify_token_);
|
/external/chromium_org/net/proxy/ |
H A D | proxy_config_service_ios.cc | 23 // returning a default value if the key is not present. 25 CFStringRef key, 28 base::mac::GetValueFromDictionary<CFNumberRef>(dict, key); 45 // The kCFNetworkProxiesProxyAutoDiscoveryEnable key is not available on iOS. 90 // The kCFNetworkProxiesExceptionsList key is not available on iOS. 93 // The kCFNetworkProxiesExcludeSimpleHostnames key is not available on iOS. 24 GetBoolFromDictionary(CFDictionaryRef dict, CFStringRef key, bool default_value) argument
|