/external/chromium_org/remoting/base/ |
rsa_key_pair.cc | 41 std::string key_str; local 42 if (!base::Base64Decode(key_base64, &key_str)) { 47 std::vector<uint8> key_buf(key_str.begin(), key_str.end()); 64 std::string key_str(key_buf.begin(), key_buf.end()); 66 if (!base::Base64Encode(key_str, &key_base64)) {
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
portallocator.cc | 70 std::string key_str = ice_ufrag + ":" + ice_pwd; local 71 PortAllocatorSessionMuxer* muxer = GetSessionMuxer(key_str); 80 muxers_[key_str] = muxer;
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
srtpfilter.cc | 232 std::string key_b64(key_params.substr(7)), key_str; local 234 &key_str, NULL) || 235 static_cast<int>(key_str.size()) != len) { 239 memcpy(key, key_str.c_str(), len);
|
/external/chromium_org/chrome/browser/search_engines/ |
template_url_parser.cc | 436 std::string key_str(url_spec, key.begin, key.len); 438 if (parameter_filter_->KeepParameter(key_str, value_str)) { 439 AppendParamToQuery(key_str, value_str, &new_query);
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
srtpfilter.cc | 425 std::string key_b64(key_params.substr(7)), key_str; local 427 &key_str, NULL) || 428 static_cast<int>(key_str.size()) != len) { 432 memcpy(key, key_str.c_str(), len);
|
/external/chromium/chrome/browser/search_engines/ |
template_url_parser.cc | 416 std::string key_str(url_spec, key.begin, key.len); 418 if (filter->KeepParameter(key_str, value_str)) { 419 AppendParamToQuery(key_str, value_str, &new_query);
|
/external/v8/src/ |
liveobjectlist.cc | 190 const char* key_str = *s; local 191 switch (key_str[0]) { 193 if (strcmp(key_str, "cell") == 0) return CELL_SPACE; 194 if (strcmp(key_str, "code") == 0) return CODE_SPACE; 197 if (strcmp(key_str, "lo") == 0) return LO_SPACE; 200 if (strcmp(key_str, "map") == 0) return MAP_SPACE; 203 if (strcmp(key_str, "new") == 0) return NEW_SPACE; 206 if (strcmp(key_str, "old-pointer") == 0) return OLD_POINTER_SPACE; 207 if (strcmp(key_str, "old-data") == 0) return OLD_DATA_SPACE; 244 const char* key_str = *s; [all...] |
/external/chromium_org/crypto/ |
encryptor_unittest.cc | 188 std::string key_str(reinterpret_cast<const char*>(key), key_size); 190 crypto::SymmetricKey::AES, key_str)); 220 std::string key_str(reinterpret_cast<const char*>(key), key_size); 222 crypto::SymmetricKey::AES, key_str));
|
/external/chromium_org/chrome/browser/policy/test/ |
policy_testserver.py | 691 key_str = open(key_path).read() 697 key = tlslite.api.parsePEMKey(key_str, private=True) 700 tlslite.utils.cryptomath.stringToBytes(key_str)) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.c | 753 char key_str[65]; local 756 key_str[0] = '\0'; 759 os_memcpy(key_str, cred->key, cred->key_len); 760 key_str[cred->key_len] = '\0'; 770 cred->auth_type, cred->encr_type, key_str); [all...] |