/external/chromium_org/content/child/webcrypto/nss/ |
sym_key_nss.cc | 41 const SECItem* key_data = PK11_GetKeyData(pk11_key.get()); local 42 if (!key_data) 46 pk11_key.Pass(), CryptoData(key_data->data, key_data->len))); 56 Status ImportKeyRawNss(const CryptoData& key_data, 64 SECItem key_item = MakeSECItemForBuffer(key_data); 79 scoped_ptr<SymKeyNss> handle(new SymKeyNss(pk11_sym_key.Pass(), key_data));
|
aes_kw_nss.cc | 189 const SECItem* const key_data = PK11_GetKeyData(decrypted.get()); variable 190 if (!key_data) 192 buffer->assign(key_data->data, key_data->data + key_data->len);
|
/external/chromium_org/crypto/ |
symmetric_key_openssl.cc | 42 uint8* key_data = local 45 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); 73 uint8* key_data = local 79 key_data);
|
hmac_win.cc | 140 BYTE key_data[1]; member in struct:crypto::KeyBlob 142 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, 151 memcpy(key_blob->key_data, key, key_length); 161 SecureZeroMemory(key_blob->key_data, key_length);
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
networking_private_credentials_getter_mac.cc | 50 std::string key_data; local 52 wifi_service->GetKeyFromSystem(network_guid, &key_data, &error); 62 public_key_data, key_data, &ciphertext)) {
|
/external/chromium_org/native_client_sdk/src/tests/nacl_io_test/fake_ppapi/ |
fake_var_dictionary_interface.cc | 31 FakeVarData* key_data = manager_->GetVarData(key); local 33 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 34 const std::string& key_string = key_data->string_value; 49 FakeVarData* key_data = manager_->GetVarData(key); local 51 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 53 const std::string& key_string = key_data->string_value; 63 FakeVarData* key_data = manager_->GetVarData(key); local 65 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 67 const std::string& key_string = key_data->string_value; 78 FakeVarData* key_data = manager_->GetVarData(key) local 80 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local [all...] |
/external/chromium_org/net/cert/ |
ct_log_verifier_nss.cc | 73 SECItem key_data; local 77 key_data.data = reinterpret_cast<unsigned char*>( 79 key_data.len = public_key.size(); 82 SECKEY_DecodeDERSubjectPublicKeyInfo(&key_data);
|
/external/chromium_org/net/extras/sqlite/ |
sqlite_channel_id_store_unittest.cc | 215 std::string key_data; local 217 ReadTestKeyAndCert(&key_data, &cert_data); 236 add_smt.BindBlob(1, key_data.data(), key_data.size()); 282 std::string key_data; local 284 ReadTestKeyAndCert(&key_data, &cert_data); 305 add_smt.BindBlob(1, key_data.data(), key_data.size()); 331 ASSERT_EQ(key_data, channel_ids[0]->private_key()); 363 std::string key_data; local 448 std::string key_data; local [all...] |
/external/chromium_org/net/http/ |
des.cc | 184 BYTE key_data[8]; member in struct:net::KeyBlob 192 memcpy(key_blob.key_data, key, 8); 199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data);
|
/external/chromium_org/net/quic/crypto/ |
p256_key_exchange_nss.cc | 215 SECItem* key_data = PK11_GetKeyData(premaster_secret.get()); local 216 if (!key_data || !key_data->data || key_data->len != kP256FieldBytes) { 221 out_result->assign(reinterpret_cast<char*>(key_data->data), key_data->len);
|
/external/chromium_org/chrome/installer/util/ |
registry_key_backup.cc | 283 scoped_ptr<KeyData> key_data; local 288 key_data.reset(new KeyData()); 289 if (!key_data->Initialize(key)) { 299 key_data_.swap(key_data);
|
/external/chromium_org/chrome/utility/extensions/ |
extensions_handler.cc | 291 std::string key_data; local 293 wifi_service->GetKeyFromSystem(network_guid, &key_data, &error); 295 Send(new ChromeUtilityHostMsg_GotWiFiCredentials(key_data, error.empty()));
|
/external/chromium_org/chromeos/cryptohome/ |
homedir_methods.cc | 337 const RepeatedPtrField<KeyData>& key_data = local 338 reply.GetExtension(GetKeyDataReply::reply).key_data(); 340 for (RepeatedPtrField<KeyData>::const_iterator it = key_data.begin(); 341 it != key_data.end(); ++it) {
|
homedir_methods_unittest.cc | 137 KeyData* key_data = reply->add_key_data(); local 138 key_data->set_type(KeyData::KEY_TYPE_PASSWORD); 139 key_data->set_label(kKeyLabel); 140 key_data->mutable_privileges()->set_update(false); 141 key_data->set_revision(kKeyRevision); 142 key_data->add_authorization_data()->set_type( 144 KeyProviderData* data = key_data->mutable_provider_data();
|
/external/chromium_org/components/policy/core/common/cloud/ |
user_cloud_policy_store_unittest.cc | 481 std::string key_data; local 483 ASSERT_TRUE(base::ReadFileToString(key_file(), &key_data)); 484 ASSERT_TRUE(key.ParseFromString(key_data)); 486 key.SerializeToString(&key_data); 487 WriteStringToFile(key_file(), key_data); local 510 std::string key_data; local 512 ASSERT_TRUE(base::ReadFileToString(key_file(), &key_data)); 513 ASSERT_TRUE(key.ParseFromString(key_data)); 515 key.SerializeToString(&key_data); 516 WriteStringToFile(key_file(), key_data); local [all...] |
user_cloud_policy_store.cc | 153 std::string key_data; local 154 if (!key_info.SerializeToString(&key_data)) { 159 WriteStringToFile(key_path, key_data);
|
/external/chromium_org/components/wifi/ |
wifi_test.cc | 217 std::string key_data; local 218 wifi_service_->GetKeyFromSystem(network_guid, &key_data, &error); 219 VLOG(0) << key_data << error;
|
/external/chromium_org/content/child/webcrypto/test/ |
aes_kw_unittest.cc | 418 const std::vector<uint8_t> key_data = HexStringToBytes( local 462 EXPECT_BYTES_EQ(key_data, raw_key);
|
/external/chromium_org/third_party/leveldatabase/src/util/ |
cache.cc | 35 char key_data[1]; // Beginning of key member in struct:leveldb::__anon17091::LRUHandle 43 return Slice(key_data, key_length); 238 memcpy(e->key_data, key.data(), key.size());
|
/external/chromium_org/chrome/browser/extensions/api/input_ime/ |
input_ime_api.cc | 89 void CallbackKeyEventHandle(chromeos::input_method::KeyEventHandle* key_data, 92 reinterpret_cast<base::Callback<void(bool consumed)>*>(key_data); 175 chromeos::input_method::KeyEventHandle* key_data) OVERRIDE { 184 CallbackKeyEventHandle(key_data, false); 192 ime_event_router->AddRequest(component_id, key_data); 442 chromeos::input_method::KeyEventHandle* key_data = request->second.second; local 445 CallbackKeyEventHandle(key_data, handled); 450 chromeos::input_method::KeyEventHandle* key_data) { 454 request_map_[request_id] = std::make_pair(component_id, key_data); 570 const std::vector<linked_ptr<input_ime::KeyboardEvent> >& key_data local [all...] |
/external/openssl/crypto/des/ |
destest.c | 92 static unsigned char key_data[NUM_TESTS][8]={ variable 411 DES_set_key_unchecked(&key_data[i],&ks); 421 i+1,pt(key_data[i]),pt(in),pt(cipher_data[i]), 428 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin)); 437 DES_set_key_unchecked(&key_data[i],&ks); 438 DES_set_key_unchecked(&key_data[i+1],&ks2); 439 DES_set_key_unchecked(&key_data[i+2],&ks3); 449 i+1,pt(key_data[i]),pt(in),pt(cipher_ecb2[i]), 456 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
|
/external/chromium_org/content/child/webcrypto/ |
webcrypto_impl.cc | 236 const unsigned char* key_data, 244 key_data(key_data, key_data + key_data_size), 251 const std::vector<uint8_t> key_data; member in struct:content::__anon12180::ImportKeyState 459 webcrypto::CryptoData(state->key_data), 645 const unsigned char* key_data, 652 key_data, 750 const unsigned char* key_data, 760 webcrypto::CryptoData(key_data, key_data_size) [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
t1_enc.c | 496 const unsigned char *key_data; local 527 key_data = s->s3->tmp.key_block; 528 client_write_mac_secret = key_data; key_data += mac_secret_len; 529 server_write_mac_secret = key_data; key_data += mac_secret_len; 530 client_write_key = key_data; key_data += key_len; 531 server_write_key = key_data; key_data += key_len [all...] |
/external/openssl/crypto/x509/ |
x509.h | 501 char *key_data; member in struct:private_key_st 502 int key_free; /* true if we should auto free key_data */ [all...] |
/external/openssl/include/openssl/ |
x509.h | 501 char *key_data; member in struct:private_key_st 502 int key_free; /* true if we should auto free key_data */ [all...] |