Lines Matching +refs:format +refs:decode
439 * Encode/decode the two FEE signature types. We malloc returned data via
532 PRErrorCode perr = coder.decode(encodedSig, encodedSigLen,
567 PRErrorCode perr = coder.decode(encodedSig, encodedSigLen,
593 * Encode/decode the FEE private and public keys. We malloc returned data via
687 PRErrorCode perr = coder.decode(keyBlob, keyBlobLen,
728 PRErrorCode perr = coder.decode(keyBlob, keyBlobLen,
845 #pragma mark --- ECDSA public key, X.509 format ---
848 * Encode/decode public key in X.509 format.
905 perr = coder.decode(x509Blob, x509BlobLen, kSecAsn1SubjectPublicKeyInfoTemplate,
908 dbgLog(("decode(SubjectPublicKeyInfo) error"));
930 #pragma mark --- ECDSA keys, OpenSSL format ---
933 * Encode private, and decode private or public key, in unencrypted OpenSSL format.
1008 if(coder.decode(osBlob, osBlobLen,
1027 /* quickie decode */
1048 #pragma mark --- ECDSA public key, PKCS8 format ---
1051 * Encode/decode private key in unencrypted PKCS8 format.
1126 perr = coder.decode(pkcs8Blob, pkcs8BlobLen, kSecAsn1PrivateKeyInfoTemplate, &nssPrivKeyInfo);