/external/chromium_org/third_party/cld/encodings/compact_lang_det/ |
tote.cc | 17 memset(key_, 0, sizeof(key_)); 28 memset(key_, 0, sizeof(key_)); 56 if (key_[sub0] == ikey) { 61 if (key_[sub1] == ikey) { 66 if (key_[sub2] == ikey) { 73 if (key_[sub0] == 0) { 75 } else if (key_[sub1] == 0) { 77 } else if (key_[sub2] == 0) [all...] |
tote.h | 28 uint8 Key(int i) const {return key_[i];} 32 void SetKey(int i, int v) {key_[i] = v;} 41 uint8 key_[kMaxSize_]; // Lang unassigned = 0, valid = 1..255 member in class:Tote 66 uint8 Key(int i) const {return key_[i];} 70 void SetKey(int i, int v) {key_[i] = v;} 82 uint8 key_[kMaxSize_]; // Lang unassigned = 0, valid = 1..255 member in class:ToteWithReliability
|
/external/chromium/base/threading/ |
thread_local_storage_posix.cc | 13 key_(0) { 19 int error = pthread_key_create(&key_, destructor); 31 int error = pthread_key_delete(key_); 39 return pthread_getspecific(key_); 44 int error = pthread_setspecific(key_, value);
|
/external/chromium_org/base/threading/ |
thread_local_storage_posix.cc | 13 key_ = 0; 19 int error = pthread_key_create(&key_, destructor); 31 int error = pthread_key_delete(key_); 39 return pthread_getspecific(key_); 44 int error = pthread_setspecific(key_, value);
|
thread_local_storage.h | 66 pthread_key_t key_; member in struct:base::ThreadLocalStorage::StaticSlot 83 using StaticSlot::key_;
|
/external/chromium_org/ppapi/cpp/extensions/ |
dict_field.h | 23 explicit DictField(const std::string& key) : key_(key), value_() { 29 const std::string& key() const { return key_; } 41 return dict->Set(Var(key_), converter.var()); 45 Var value_var = dict.Get(Var(key_)); 55 std::string key_; member in class:pp::ext::DictField 62 explicit OptionalDictField(const std::string& key) : key_(key) { 68 const std::string& key() const { return key_; } 82 return dict->Set(Var(key_), converter.var()); 86 Var value_var = dict.Get(Var(key_)); 93 std::string key_; member in class:pp::ext::OptionalDictField [all...] |
/external/chromium/crypto/ |
hmac_mac.cc | 14 std::string key_; member in struct:crypto::HMACPlatformData 24 if (!plat_->key_.empty()) { 30 plat_->key_.assign(reinterpret_cast<const char*>(key), key_length); 37 plat_->key_.assign(plat_->key_.length(), std::string::value_type()); 38 plat_->key_.clear(); 39 plat_->key_.reserve(0); 67 plat_->key_.data(), plat_->key_.length(), data.data(), data.length(),
|
symmetric_key.h | 59 const std::string& key() { return key_; } 61 PK11SymKey* key() const { return key_.get(); } 65 HCRYPTKEY key() const { return key_.get(); } 76 std::string key_; member in class:crypto::SymmetricKey 79 ScopedPK11SymKey key_; member in class:crypto::SymmetricKey 82 std::string key_; member in class:crypto::SymmetricKey 88 ScopedHCRYPTKEY key_; member in class:crypto::SymmetricKey 92 // |key_|. This is the case of HMAC keys when the key size exceeds 16 bytes
|
rsa_private_key_openssl.cc | 63 result->key_ = EVP_PKEY_new(); 64 if (!result->key_ || !EVP_PKEY_set1_RSA(result->key_, rsa_key.get())) 97 result->key_ = EVP_PKCS82PKEY(p8inf.get()); 98 if (!result->key_) 119 : key_(NULL) { 123 if (key_) 124 EVP_PKEY_free(key_); 128 return ExportKey(key_, i2d_PKCS8PrivateKeyInfo_bio, output); 132 return ExportKey(key_, i2d_PUBKEY_bio, output) [all...] |
rsa_private_key_nss_unittest.cc | 41 EXPECT_EQ(key_pair->key_->pkcs11ID, key_pair_2->key_->pkcs11ID); 52 if (key_pair->key_) { 53 PK11_DestroyTokenObject(key_pair->key_->pkcs11Slot, 54 key_pair->key_->pkcs11ID);
|
symmetric_key_openssl.cc | 20 std::fill(key_.begin(), key_.end(), '\0'); // Zero out the confidential key. 36 reinterpret_cast<uint8*>(WriteInto(&key->key_, key_size_in_bytes + 1)); 55 reinterpret_cast<uint8*>(WriteInto(&key->key_, key_size_in_bytes + 1)); 67 key->key_ = raw_key; 72 *raw_key = key_;
|
/external/chromium_org/crypto/ |
rsa_private_key_openssl.cc | 62 result->key_ = EVP_PKEY_new(); 63 if (!result->key_ || !EVP_PKEY_set1_RSA(result->key_, rsa_key.get())) 91 result->key_ = EVP_PKCS82PKEY(p8inf.get()); 92 if (!result->key_) 99 : key_(NULL) { 103 if (key_) 104 EVP_PKEY_free(key_); 109 RSA* rsa = EVP_PKEY_get1_RSA(key_); 112 copy->key_ = EVP_PKEY_new() [all...] |
symmetric_key.h | 60 const std::string& key() { return key_; } 62 HCRYPTKEY key() const { return key_.get(); } 64 PK11SymKey* key() const { return key_.get(); } 80 std::string key_; member in class:crypto::SymmetricKey 86 ScopedHCRYPTKEY key_; member in class:crypto::SymmetricKey 90 // |key_|. This is the case of HMAC keys when the key size exceeds 16 bytes 97 ScopedPK11SymKey key_; member in class:crypto::SymmetricKey
|
rsa_private_key_nss.cc | 46 if (key_) 47 SECKEY_DestroyPrivateKey(key_); 89 copy->key_ = SECKEY_CopyPrivateKey(key); 91 if (!copy->key_ || !copy->public_key_) { 146 result->key_ = PK11_FindKeyByKeyID(item->module->slots[i], 148 if (result->key_) 160 copy->key_ = SECKEY_CopyPrivateKey(key_); 170 if (!ReadAttribute(key_, CKA_MODULUS, private_key_info.modulus()) || 171 !ReadAttribute(key_, CKA_PUBLIC_EXPONENT [all...] |
symmetric_key_openssl.cc | 20 std::fill(key_.begin(), key_.end(), '\0'); // Zero out the confidential key. 36 reinterpret_cast<uint8*>(WriteInto(&key->key_, key_size_in_bytes + 1)); 58 reinterpret_cast<uint8*>(WriteInto(&key->key_, key_size_in_bytes + 1)); 71 key->key_ = raw_key; 76 *raw_key = key_;
|
/external/chromium_org/base/test/ |
scoped_path_override.cc | 12 ScopedPathOverride::ScopedPathOverride(int key) : key_(key) { 20 : key_(key) { 26 bool result = PathService::RemoveOverride(key_);
|
scoped_path_override.h | 28 int key_; member in class:base::ScopedPathOverride
|
/external/chromium_org/base/win/ |
registry.cc | 38 : key_(NULL), 43 : key_(key), 48 : key_(NULL), 75 REG_OPTION_NON_VOLATILE, access, NULL, &key_, 83 LONG result = RegCreateKeyEx(key_, name, 0, NULL, REG_OPTION_NON_VOLATILE, 87 key_ = subkey; 95 LONG result = RegOpenKeyEx(rootkey, subkey, 0, access, &key_); 102 LONG result = RegOpenKeyEx(key_, relative_key_name, 0, access, &subkey); 108 key_ = subkey; 114 if (key_) { [all...] |
/external/chromium/base/win/ |
registry.cc | 20 : key_(NULL), 25 : key_(NULL), 54 REG_OPTION_NON_VOLATILE, access, NULL, &key_, 64 LONG result = RegOpenKeyEx(rootkey, subkey, 0, access, &key_); 73 LONG result = RegCreateKeyEx(key_, name, 0, NULL, REG_OPTION_NON_VOLATILE, 77 key_ = subkey; 86 LONG result = RegOpenKeyEx(key_, name, 0, access, &subkey); 90 key_ = subkey; 97 if (key_) { 98 ::RegCloseKey(key_); [all...] |
/external/chromium_org/net/http/ |
http_pipelined_host_pool_unittest.cc | 50 : key_(key) { 64 virtual const Key& GetKey() const OVERRIDE { return key_; } 67 Key key_; member in class:net::__anon11183::MockHost 73 : key_(HostPortPair("host", 123)), 75 host_(new MockHost(key_)), // Owned by pool_. 117 HttpPipelinedHost::Key key_; member in class:net::__anon11183::HttpPipelinedHostPoolTest 132 EXPECT_TRUE(pool_->IsKeyEligibleForPipelining(key_)); 133 EXPECT_CALL(*factory_, CreateNewHost(pool_.get(), Ref(key_), _, 138 CreateDummyStream(key_, kDummyConnection, kDummyStream, host_); 143 EXPECT_CALL(*factory_, CreateNewHost(pool_.get(), Ref(key_), _ [all...] |
/external/chromium/chrome/browser/autofill/crypto/ |
rc4_decryptor.h | 67 state = &key_.state[0]; 71 key_.x = key_.y = 0; 86 x = key_.x; 87 y = key_.y; 88 state = &key_.state[0]; 96 key_.x = x; 97 key_.y = y; 100 Rc4Key key_; member in class:RC4Decryptor
|
/external/chromium_org/components/autofill/core/browser/crypto/ |
rc4_decryptor.h | 72 state = &key_.state[0]; 76 key_.x = key_.y = 0; 91 x = key_.x; 92 y = key_.y; 93 state = &key_.state[0]; 101 key_.x = x; 102 key_.y = y; 105 Rc4Key key_; member in class:autofill::RC4Decryptor
|
/external/chromium_org/components/autofill/core/browser/webdata/ |
autofill_change.h | 31 const KeyType& key() const { return key_; } 36 key_(key) {} 39 KeyType key_; member in class:autofill::GenericAutofillChange
|
/external/chromium_org/remoting/base/ |
rsa_key_pair.h | 41 crypto::RSAPrivateKey* private_key() { return key_.get(); } 48 scoped_ptr<crypto::RSAPrivateKey> key_; member in class:remoting::RsaKeyPair
|
/external/chromium_org/ui/surface/ |
transport_dib_gtk.cc | 65 dib->key_.shmkey = shmkey; 82 dib->key_.shmkey = shmkey; 105 if (!is_valid_id(key_)) 111 if (shmctl(key_.shmkey, IPC_STAT, &shmst) == -1) 114 void* address = shmat(key_.shmkey, NULL /* desired address */, 0 /* flags */); 129 return key_; 133 return key_.shmkey; 138 x_shm_ = ui::AttachSharedMemory(display, key_.shmkey);
|