HomeSort by relevance Sort by last modified time
    Searched refs:new_key (Results 1 - 25 of 49) sorted by null

1 2

  /external/chromium_org/net/cert/
x509_util.cc 64 scoped_ptr<crypto::ECPrivateKey> new_key(crypto::ECPrivateKey::Create());
65 if (!new_key.get())
68 bool success = CreateChannelIDEC(new_key.get(),
76 key->reset(new_key.release());
87 scoped_ptr<crypto::RSAPrivateKey> new_key(
89 if (!new_key.get())
92 bool success = CreateSelfSignedCert(new_key.get(),
100 key->reset(new_key.release());
  /external/chromium_org/third_party/libsrtp/srtp/crypto/include/
key.h 63 key_limit_clone(key_limit_t original, key_limit_t *new_key);
  /external/srtp/crypto/include/
key.h 63 key_limit_clone(key_limit_t original, key_limit_t *new_key);
  /external/chromium_org/chrome/browser/prefs/
browser_ui_prefs_migrator.cc 63 std::string new_key(full_key.substr(search_for.length()));
66 app_window_placement->Set(new_key, single_app_placement_dict.release());
  /external/chromium_org/third_party/cython/src/Cython/Compiler/
Interpreter.py 59 new_key, dummy = interpret(item.key, None)
60 new_optdict[new_key] = interpret(item.value, item.key.value)
  /external/chromium_org/third_party/libsrtp/srtp/crypto/kernel/
key.c 64 key_limit_clone(key_limit_t original, key_limit_t *new_key) {
67 *new_key = original;
  /external/srtp/crypto/kernel/
key.c 64 key_limit_clone(key_limit_t original, key_limit_t *new_key) {
67 *new_key = original;
  /external/chromium_org/third_party/webrtc/base/
messagedigest.cc 119 scoped_ptr<uint8[]> new_key(new uint8[block_len]);
121 ComputeDigest(digest, key, key_len, new_key.get(), block_len);
122 memset(new_key.get() + digest->Size(), 0, block_len - digest->Size());
124 memcpy(new_key.get(), key, key_len);
125 memset(new_key.get() + key_len, 0, block_len - key_len);
130 o_pad[i] = 0x5c ^ new_key[i];
131 i_pad[i] = 0x36 ^ new_key[i];
  /external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
sctp_auth.c 249 sctp_key_t *new_key; local
251 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen,
253 if (new_key == NULL) {
257 new_key->keylen = keylen;
258 return (new_key);
321 sctp_key_t *new_key; local
323 new_key = sctp_alloc_key(keylen);
324 if (new_key == NULL) {
328 SCTP_READ_RANDOM(new_key->key, keylen)
336 sctp_key_t *new_key; local
408 sctp_key_t *new_key; local
463 sctp_sharedkey_t *new_key; local
1441 sctp_key_t *new_key; local
1981 sctp_key_t *new_key; local
    [all...]
  /external/chromium_org/sync/test/
fake_sync_encryption_handler.cc 73 std::string new_key = keys.Get(keys.size()-1);
74 if (new_key.empty())
76 keystore_key_ = new_key;
  /external/qemu/qobject/
qdict.c 484 char *new_key; local
493 new_key = NULL;
497 new_key = g_strdup_printf("%s.%s", prefix, entry->key);
504 new_key ? new_key : entry->key);
509 qdict_put_obj(target, new_key, value);
513 g_free(new_key);
  /external/chromium_org/content/child/webcrypto/nss/
aes_kw_nss.cc 58 crypto::ScopedPK11SymKey new_key(
71 if (!new_key)
86 *unwrapped_key = new_key.Pass();
  /external/chromium_org/build/
gypi_to_gn.py 123 new_key = ReplaceSubstrings(key, search_for, replace_with)
125 result[new_key] = new_value
  /external/chromium_org/chrome/browser/chromeos/attestation/
attestation_policy_observer_unittest.cc 134 bool new_key = (mock_options & MOCK_NEW_KEY); local
135 if (new_key || !key_uploaded) {
137 UploadCertificate(new_key ? "fake_cert" : certificate, _))
147 if (new_key) {
  /external/chromium_org/chrome/browser/chromeos/settings/
device_settings_service.cc 352 scoped_refptr<PublicKey> new_key(operation->public_key());
353 if (new_key.get()) {
354 ownership_status = new_key->is_loaded() ? OWNERSHIP_TAKEN : OWNERSHIP_NONE;
360 if (public_key_.get() != new_key.get()) {
361 public_key_ = new_key;
session_manager_operation.h 106 scoped_refptr<ownership::PublicKey> new_key);
session_manager_operation.cc 115 scoped_refptr<PublicKey> new_key) {
117 public_key_ = new_key;
  /system/keymaster/
asymmetric_key.cpp 154 RsaKey* new_key = new RsaKey(rsa_key.release(), authorizations, logger); local
155 *error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED;
156 return new_key;
331 DsaKey* new_key = new DsaKey(dsa_key.release(), authorizations, logger); local
332 *error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED;
333 return new_key;
493 EcdsaKey* new_key = new EcdsaKey(ecdsa_key.release(), authorizations, logger); local
494 *error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED;
495 return new_key;
  /external/chromium_org/v8/src/
splay-tree-inl.h 161 const Key& new_key) {
166 Splay(new_key);
167 int cmp = Config::Compare(new_key, root_->key_);
173 node_to_move->key_ = new_key;
  /external/chromium_org/chrome/browser/supervised_user/chromeos/
manager_password_service.cc 145 std::string new_key; local
149 kEncryptedPassword, &new_key);
163 new_key,
  /external/chromium_org/third_party/libpng/
pngwutil.c 1358 png_charp new_key; local
1400 png_charp new_key; local
1460 png_charp new_key = NULL; local
    [all...]
  /external/qemu/distrib/libpng-1.2.46/
pngwutil.c 1358 png_charp new_key; local
1400 png_charp new_key; local
1460 png_charp new_key = NULL; local
    [all...]
  /external/llvm/include/llvm/IR/
ValueMap.h 226 void allUsesReplacedWith(Value *new_key) override {
227 assert(isa<KeySansPointerT>(new_key) &&
235 KeyT typed_new_key = cast<KeySansPointerT>(new_key);
  /external/chromium_org/chromeos/cryptohome/
homedir_methods.cc 248 const KeyDefinition& new_key,
257 FillKeyProtobuf(new_key, request.mutable_key());
292 const KeyDefinition& new_key,
301 FillKeyProtobuf(new_key, pb_update_key.mutable_changes());
mock_async_method_caller.h 43 const std::string& new_key,

Completed in 546 milliseconds

1 2