/external/chromium_org/mojo/services/public/cpp/input_events/lib/ |
input_events_type_converters.cc | 36 KeyDataPtr key_data(KeyData::New()); 37 key_data->key_code = key_event->key_code(); 38 key_data->is_char = key_event->is_char(); 39 event->key_data = key_data.Pass(); 55 input->key_data->key_code), 57 input->key_data->is_char));
|
/external/chromium_org/native_client_sdk/src/tests/nacl_io_test/fake_ppapi/ |
fake_var_dictionary_interface.cc | 31 FakeVarData* key_data = manager_->GetVarData(key); local 33 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 34 const std::string& key_string = key_data->string_value; 49 FakeVarData* key_data = manager_->GetVarData(key); local 51 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 53 const std::string& key_string = key_data->string_value; 63 FakeVarData* key_data = manager_->GetVarData(key); local 65 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 67 const std::string& key_string = key_data->string_value; 78 FakeVarData* key_data = manager_->GetVarData(key) local 80 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local [all...] |
/external/chromium_org/content/child/webcrypto/ |
jwk.h | 22 Status ImportKeyJwk(const CryptoData& key_data,
|
platform_crypto_openssl.cc | 32 explicit SymKey(const CryptoData& key_data) 33 : key_(key_data.bytes(), key_data.bytes() + key_data.byte_length()) {} 39 blink::WebVector<uint8>* key_data) OVERRIDE { 40 key_data->assign(Uint8VectorStart(key_), key_.size()); 315 const CryptoData& key_data, 322 algorithm, key_data.byte_length(), &key_algorithm)) 325 *key = blink::WebCryptoKey::create(new SymKey(key_data), 448 const CryptoData& key_data, [all...] |
webcrypto_impl.h | 49 const unsigned char* key_data, 100 const unsigned char* key_data, 105 blink::WebVector<unsigned char>& key_data);
|
shared_crypto.h | 111 const CryptoData& key_data, 152 blink::WebVector<uint8>* key_data); 160 const CryptoData& key_data,
|
/external/chromium_org/crypto/ |
symmetric_key_openssl.cc | 35 uint8* key_data = local 38 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); 57 uint8* key_data = local 63 key_data);
|
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_fkp.h | 48 uint8_t key_data[KEYBOX_KEYDATA_SIZE]; // 72 bytes member in struct:wv_keybox
|
wv_mod_oem_crypto.h | 40 const uint8_t *key_data; member in struct:drm_wv_mod_key_object
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
networking_private_credentials_getter_mac.cc | 50 std::string key_data; local 52 wifi_service->GetKeyFromSystem(network_guid, &key_data, &error); 62 if (!crypto.EncryptByteString(public_key_data, key_data, &ciphertext)) {
|
networking_private_credentials_getter_win.cc | 33 void OnGotEncryptedCredentials(const std::vector<uint8>& key_data, 75 const std::vector<uint8>& key_data, 79 base::Base64Encode(std::string(key_data.begin(), key_data.end()),
|
/external/chromium_org/chrome/browser/net/ |
sqlite_server_bound_cert_store_unittest.cc | 167 std::string key_data; local 169 ReadTestKeyAndCert(&key_data, &cert_data); 188 add_smt.BindBlob(1, key_data.data(), key_data.size()); 235 std::string key_data; local 237 ReadTestKeyAndCert(&key_data, &cert_data); 259 add_smt.BindBlob(1, key_data.data(), key_data.size()); 287 ASSERT_EQ(key_data, certs[0]->private_key()); 319 std::string key_data; local 407 std::string key_data; local [all...] |
/external/chromium_org/net/cert/ |
ct_log_verifier_nss.cc | 73 SECItem key_data; local 77 key_data.data = reinterpret_cast<unsigned char*>( 79 key_data.len = public_key.size(); 82 SECKEY_DecodeDERSubjectPublicKeyInfo(&key_data);
|
/system/keymaster/ |
key_blob_test.cpp | 43 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; member in namespace:keymaster::test 49 key_.key_material = const_cast<uint8_t*>(key_data); 50 key_.key_material_size = array_size(key_data); 88 // key_data shouldn't be anywhere in the blob. 91 EXPECT_EQ(end, std::search(begin, end, key_data, key_data + array_size(key_data))); 97 EXPECT_EQ(0, memcmp(deserialized.key_material(), key_data, array_size(key_data))); 131 EXPECT_NE(0, memcmp(deserialized.key_material(), key_data, array_size(key_data))) [all...] |
google_keymaster_messages.cpp | 228 delete[] key_data; 229 key_data = dup_buffer(key_material, length); 241 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); 245 delete[] key_data; 246 key_data = NULL; 252 key_data = deserialized_key_material.release(); 316 delete[] key_data; 317 key_data = dup_buffer(key_material, length); 326 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); 330 delete[] key_data; [all...] |
key.cpp | 76 const uint8_t* key_data, size_t key_data_length, const Logger& logger, 80 if (key_data == NULL || key_data_length <= 0) { 91 d2i_PKCS8_PRIV_KEY_INFO(NULL, &key_data, key_data_length));
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 130 if (data->key_data) { 131 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 132 data->key_data = NULL; 194 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 198 if (data->key_data) { 200 data->key_data, EAP_TLS_KEY_LEN); 202 data->key_data + EAP_TLS_KEY_LEN, 301 return data->key_data != NULL; 310 if (data->key_data == NULL [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
x_pkey.c | 118 ret->key_data=NULL; 149 if ((x->key_data != NULL) && (x->key_free)) OPENSSL_free(x->key_data);
|
/external/openssl/crypto/asn1/ |
x_pkey.c | 118 ret->key_data=NULL; 149 if ((x->key_data != NULL) && (x->key_free)) OPENSSL_free(x->key_data);
|
/external/chromium_org/chrome/browser/extensions/api/input_ime/ |
input_ime_api.cc | 86 void CallbackKeyEventHandle(chromeos::input_method::KeyEventHandle* key_data, 89 reinterpret_cast<base::Callback<void(bool consumed)>*>(key_data); 182 chromeos::input_method::KeyEventHandle* key_data) OVERRIDE { 191 CallbackKeyEventHandle(key_data, false); 199 ime_event_router->AddRequest(engine_id, key_data); 438 chromeos::input_method::KeyEventHandle* key_data = request->second.second; local 441 CallbackKeyEventHandle(key_data, handled); 446 chromeos::input_method::KeyEventHandle* key_data) { 450 request_map_[request_id] = std::make_pair(engine_id, key_data); 566 const std::vector<linked_ptr<input_ime::KeyboardEvent> >& key_data local [all...] |
/external/chromium_org/net/http/ |
des.cc | 184 BYTE key_data[8]; member in struct:net::KeyBlob 192 memcpy(key_blob.key_data, key, 8); 199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len)
|
/external/chromium_org/net/quic/crypto/ |
p256_key_exchange_nss.cc | 215 SECItem* key_data = PK11_GetKeyData(premaster_secret.get()); local 216 if (!key_data || !key_data->data || key_data->len != kP256FieldBytes) { 221 out_result->assign(reinterpret_cast<char*>(key_data->data), key_data->len);
|
/external/chromium_org/net/base/ |
keygen_handler_mac.cc | 135 CFDataRef key_data = NULL; 137 &key_data); 142 base::ScopedCFTypeRef<CFDataRef> scoped_key_data(key_data); 156 CFDataGetLength(key_data) * 8; // interpreted as a _bit_ count 158 const_cast<uint8_t*>(CFDataGetBytePtr(key_data));
|
/system/keymaster/include/keymaster/ |
google_keymaster_messages.h | 230 ImportKeyRequest() : key_data(NULL) {} 231 ~ImportKeyRequest() { delete[] key_data; } 241 uint8_t* key_data; member in struct:keymaster::ImportKeyRequest 282 ExportKeyResponse() : key_data(NULL) {} 283 ~ExportKeyResponse() { delete[] key_data; } 291 uint8_t* key_data; member in struct:keymaster::ExportKeyResponse
|