/external/chromium_org/third_party/cld/encodings/compact_lang_det/ |
tote.cc | 17 memset(key_, 0, sizeof(key_)); 28 memset(key_, 0, sizeof(key_)); 56 if (key_[sub0] == ikey) { 61 if (key_[sub1] == ikey) { 66 if (key_[sub2] == ikey) { 73 if (key_[sub0] == 0) { 75 } else if (key_[sub1] == 0) { 77 } else if (key_[sub2] == 0) [all...] |
tote.h | 28 uint8 Key(int i) const {return key_[i];} 32 void SetKey(int i, int v) {key_[i] = v;} 41 uint8 key_[kMaxSize_]; // Lang unassigned = 0, valid = 1..255 member in class:Tote 66 uint8 Key(int i) const {return key_[i];} 70 void SetKey(int i, int v) {key_[i] = v;} 82 uint8 key_[kMaxSize_]; // Lang unassigned = 0, valid = 1..255 member in class:ToteWithReliability
|
/external/chromium_org/base/ |
supports_user_data_unittest.cc | 19 key_(key) { 23 EXPECT_EQ(NULL, supports_user_data_->GetUserData(key_)); 27 const void* key_; member in struct:base::__anon7076::UsesItself
|
/external/libcxxabi/src/ |
cxa_exception_storage.cpp | 57 pthread_key_t key_; member in namespace:__cxxabiv1::__anon27435 62 if ( 0 != ::pthread_setspecific ( key_, NULL ) ) 67 if ( 0 != pthread_key_create ( &key_, destruct_ ) ) 83 if ( 0 != pthread_setspecific ( key_, retVal ) ) 98 return static_cast<__cxa_eh_globals*>(::pthread_getspecific(key_));
|
/ndk/sources/cxx-stl/llvm-libc++abi/libcxxabi/src/ |
cxa_exception_storage.cpp | 57 pthread_key_t key_; member in namespace:__cxxabiv1::__anon42910 62 if ( 0 != ::pthread_setspecific ( key_, NULL ) ) 67 if ( 0 != pthread_key_create ( &key_, destruct_ ) ) 83 if ( 0 != pthread_setspecific ( key_, retVal ) ) 98 return static_cast<__cxa_eh_globals*>(::pthread_getspecific(key_));
|
/external/chromium_org/crypto/ |
rsa_private_key_openssl.cc | 62 result->key_ = EVP_PKEY_new(); 63 if (!result->key_ || !EVP_PKEY_set1_RSA(result->key_, rsa_key.get())) 91 result->key_ = EVP_PKCS82PKEY(p8inf.get()); 92 if (!result->key_) 99 : key_(NULL) { 103 if (key_) 104 EVP_PKEY_free(key_); 109 RSA* rsa = EVP_PKEY_get1_RSA(key_); 112 copy->key_ = EVP_PKEY_new() [all...] |
symmetric_key.h | 61 const std::string& key() { return key_; } 63 HCRYPTKEY key() const { return key_.get(); } 65 PK11SymKey* key() const { return key_.get(); } 76 std::string key_; member in class:crypto::SymmetricKey 82 ScopedHCRYPTKEY key_; member in class:crypto::SymmetricKey 86 // |key_|. This is the case of HMAC keys when the key size exceeds 16 bytes 93 ScopedPK11SymKey key_; member in class:crypto::SymmetricKey
|
rsa_private_key_nss.cc | 77 if (key_) 78 SECKEY_DestroyPrivateKey(key_); 133 copy->key_ = SECKEY_CopyPrivateKey(key); 135 if (!copy->key_ || !copy->public_key_) { 164 result->key_ = PK11_FindKeyByKeyID(item->module->slots[i], 166 if (result->key_) 193 result->key_ = PK11_FindKeyByKeyID(slot, ck_id.get(), NULL); 194 if (!result->key_) 202 copy->key_ = SECKEY_CopyPrivateKey(key_); [all...] |
ec_private_key_openssl.cc | 79 if (key_) 80 EVP_PKEY_free(key_); 96 result->key_ = EVP_PKEY_new(); 97 if (!result->key_ || !EVP_PKEY_set1_EC_KEY(result->key_, ec_key.get())) 145 result->key_ = EVP_PKCS82PKEY(p8_decrypted.get()); 146 if (!result->key_) 159 EVP_PKEY2PKCS8(key_)); 188 key_, reinterpret_cast<ExportBioFunction>(i2d_PUBKEY_bio), output); 193 ScopedOpenSSL<EC_KEY, EC_KEY_free> ec_key(EVP_PKEY_get1_EC_KEY(key_)); [all...] |
symmetric_key_openssl.cc | 20 std::fill(key_.begin(), key_.end(), '\0'); // Zero out the confidential key. 36 reinterpret_cast<uint8*>(WriteInto(&key->key_, key_size_in_bytes + 1)); 58 reinterpret_cast<uint8*>(WriteInto(&key->key_, key_size_in_bytes + 1)); 71 key->key_ = raw_key; 76 *raw_key = key_;
|
rsa_private_key_nss_unittest.cc | 64 EXPECT_EQ(key_pair->key_->pkcs11ID, key_pair_2->key_->pkcs11ID); 75 if (key_pair->key_) { 76 PK11_DestroyTokenObject(key_pair->key_->pkcs11Slot, 77 key_pair->key_->pkcs11ID);
|
/external/chromium_org/chrome/browser/chromeos/login/auth/ |
user_context.cc | 18 key_(other.key_), 36 context.key_ == key_ && 52 return &key_; 56 return &key_; 76 return (!user_id_.empty() && !key_.GetSecret().empty()) || 85 key_ = key; 105 key_.ClearSecret();
|
/external/chromium_org/base/test/ |
scoped_path_override.cc | 12 ScopedPathOverride::ScopedPathOverride(int key) : key_(key) { 20 : key_(key) { 26 bool result = PathService::RemoveOverride(key_);
|
scoped_path_override.h | 28 int key_; member in class:base::ScopedPathOverride
|
/external/chromium_org/third_party/libaddressinput/chromium/cpp/test/ |
storage_test_runner.cc | 27 key_(), 38 key_.clear(); 51 key_ = key; 60 EXPECT_EQ("key", key_); 70 EXPECT_EQ("key", key_); 81 EXPECT_EQ("key", key_);
|
/external/chromium_org/content/browser/indexed_db/ |
indexed_db_blob_info.cc | 14 : is_file_(false), size_(-1), key_(DatabaseMetaDataKey::kInvalidBlobKey) { 26 key_(DatabaseMetaDataKey::kInvalidBlobKey) { 32 : is_file_(false), type_(type), size_(size), key_(key) { 45 key_(DatabaseMetaDataKey::kInvalidBlobKey) { 51 : is_file_(true), type_(type), size_(-1), file_name_(file_name), key_(key) { 77 DCHECK_EQ(DatabaseMetaDataKey::kInvalidBlobKey, key_); 78 key_ = key;
|
/external/chromium_org/base/win/ |
registry.cc | 40 : key_(NULL), 46 : key_(key), 52 : key_(NULL), 84 key_ = subhkey; 103 LONG result = RegCreateKeyEx(key_, name, 0, NULL, REG_OPTION_NON_VOLATILE, 107 key_ = subkey; 121 key_ = subhkey; 140 LONG result = RegOpenKeyEx(key_, relative_key_name, 0, access, &subkey); 146 key_ = subkey; 154 if (key_) { [all...] |
/external/chromium_org/components/autofill/core/browser/crypto/ |
rc4_decryptor.h | 72 state = &key_.state[0]; 76 key_.x = key_.y = 0; 91 x = key_.x; 92 y = key_.y; 93 state = &key_.state[0]; 101 key_.x = x; 102 key_.y = y; 105 Rc4Key key_; member in class:autofill::RC4Decryptor
|
/external/chromium_org/third_party/libaddressinput/src/cpp/test/ |
rule_retriever_test.cc | 47 key_(), 58 std::string key_; member in class:__anon16277::RuleRetrieverTest 66 key_ = key; 78 EXPECT_EQ(kExistingKey, key_); 89 EXPECT_EQ(kMissingKey, key_);
|
fake_storage_test.cc | 36 FakeStorageTest() : storage_(), success_(false), key_(), data_() {} 45 std::string key_; member in class:__anon16262::FakeStorageTest 54 key_ = key; 67 EXPECT_EQ("key", key_); 78 EXPECT_EQ("key", key_); 90 EXPECT_EQ("key", key_);
|
validating_storage_test.cc | 54 key_(), 66 std::string key_; member in class:__anon16286::ValidatingStorageTest 73 key_ = key; 88 EXPECT_EQ(kKey, key_); 99 EXPECT_EQ(kKey, key_); 108 EXPECT_EQ(kKey, key_); 120 EXPECT_EQ(kKey, key_); 132 EXPECT_EQ(kKey, key_);
|
/external/chromium_org/components/autofill/core/browser/webdata/ |
autofill_change.h | 31 const KeyType& key() const { return key_; } 36 key_(key) {} 39 KeyType key_; member in class:autofill::GenericAutofillChange
|
/external/chromium_org/remoting/base/ |
rsa_key_pair.h | 41 crypto::RSAPrivateKey* private_key() { return key_.get(); } 48 scoped_ptr<crypto::RSAPrivateKey> key_; member in class:remoting::RsaKeyPair
|
rsa_key_pair.cc | 22 : key_(key.Pass()){ 23 DCHECK(key_); 60 DCHECK(key_.get() != NULL); 63 CHECK(key_->ExportPrivateKey(&key_buf)); 72 CHECK(key_->ExportPublicKey(&public_key)); 81 crypto::SignatureCreator::Create(key_.get())); 94 // Certificates are SHA1-signed because |key_| has likely been used to sign 98 key_.get(),
|
/external/srec/tools/thirdparty/OpenFst/fst/lib/ |
heap.h | 62 pos_[key_[size_]] = size_; 66 key_.push_back(size_); 138 int tkey = key_[j]; 139 pos_[key_[j] = key_[k]] = j; 140 pos_[key_[k] = tkey] = k; 177 return key_[i]; 185 vector<int> key_; member in class:fst::Heap
|