/external/chromium_org/net/cert/ |
x509_util.cc | 64 scoped_ptr<crypto::ECPrivateKey> new_key(crypto::ECPrivateKey::Create()); 65 if (!new_key.get()) 68 bool success = CreateChannelIDEC(new_key.get(), 76 key->reset(new_key.release()); 87 scoped_ptr<crypto::RSAPrivateKey> new_key( 89 if (!new_key.get()) 92 bool success = CreateSelfSignedCert(new_key.get(), 100 key->reset(new_key.release());
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/include/ |
key.h | 63 key_limit_clone(key_limit_t original, key_limit_t *new_key);
|
/external/srtp/crypto/include/ |
key.h | 63 key_limit_clone(key_limit_t original, key_limit_t *new_key);
|
/external/chromium_org/chrome/browser/prefs/ |
browser_ui_prefs_migrator.cc | 63 std::string new_key(full_key.substr(search_for.length())); 66 app_window_placement->Set(new_key, single_app_placement_dict.release());
|
/external/chromium_org/third_party/cython/src/Cython/Compiler/ |
Interpreter.py | 59 new_key, dummy = interpret(item.key, None) 60 new_optdict[new_key] = interpret(item.value, item.key.value)
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/kernel/ |
key.c | 64 key_limit_clone(key_limit_t original, key_limit_t *new_key) { 67 *new_key = original;
|
/external/srtp/crypto/kernel/ |
key.c | 64 key_limit_clone(key_limit_t original, key_limit_t *new_key) { 67 *new_key = original;
|
/external/chromium_org/third_party/webrtc/base/ |
messagedigest.cc | 119 scoped_ptr<uint8[]> new_key(new uint8[block_len]); 121 ComputeDigest(digest, key, key_len, new_key.get(), block_len); 122 memset(new_key.get() + digest->Size(), 0, block_len - digest->Size()); 124 memcpy(new_key.get(), key, key_len); 125 memset(new_key.get() + key_len, 0, block_len - key_len); 130 o_pad[i] = 0x5c ^ new_key[i]; 131 i_pad[i] = 0x36 ^ new_key[i];
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
sctp_auth.c | 249 sctp_key_t *new_key; local 251 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen, 253 if (new_key == NULL) { 257 new_key->keylen = keylen; 258 return (new_key); 321 sctp_key_t *new_key; local 323 new_key = sctp_alloc_key(keylen); 324 if (new_key == NULL) { 328 SCTP_READ_RANDOM(new_key->key, keylen) 336 sctp_key_t *new_key; local 408 sctp_key_t *new_key; local 463 sctp_sharedkey_t *new_key; local 1441 sctp_key_t *new_key; local 1981 sctp_key_t *new_key; local [all...] |
/external/chromium_org/sync/test/ |
fake_sync_encryption_handler.cc | 73 std::string new_key = keys.Get(keys.size()-1); 74 if (new_key.empty()) 76 keystore_key_ = new_key;
|
/external/qemu/qobject/ |
qdict.c | 484 char *new_key; local 493 new_key = NULL; 497 new_key = g_strdup_printf("%s.%s", prefix, entry->key); 504 new_key ? new_key : entry->key); 509 qdict_put_obj(target, new_key, value); 513 g_free(new_key);
|
/external/chromium_org/content/child/webcrypto/nss/ |
aes_kw_nss.cc | 58 crypto::ScopedPK11SymKey new_key( 71 if (!new_key) 86 *unwrapped_key = new_key.Pass();
|
/external/chromium_org/build/ |
gypi_to_gn.py | 123 new_key = ReplaceSubstrings(key, search_for, replace_with) 125 result[new_key] = new_value
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
attestation_policy_observer_unittest.cc | 134 bool new_key = (mock_options & MOCK_NEW_KEY); local 135 if (new_key || !key_uploaded) { 137 UploadCertificate(new_key ? "fake_cert" : certificate, _)) 147 if (new_key) {
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
device_settings_service.cc | 352 scoped_refptr<PublicKey> new_key(operation->public_key()); 353 if (new_key.get()) { 354 ownership_status = new_key->is_loaded() ? OWNERSHIP_TAKEN : OWNERSHIP_NONE; 360 if (public_key_.get() != new_key.get()) { 361 public_key_ = new_key;
|
session_manager_operation.h | 106 scoped_refptr<ownership::PublicKey> new_key);
|
session_manager_operation.cc | 115 scoped_refptr<PublicKey> new_key) { 117 public_key_ = new_key;
|
/system/keymaster/ |
asymmetric_key.cpp | 154 RsaKey* new_key = new RsaKey(rsa_key.release(), authorizations, logger); local 155 *error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED; 156 return new_key; 331 DsaKey* new_key = new DsaKey(dsa_key.release(), authorizations, logger); local 332 *error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED; 333 return new_key; 493 EcdsaKey* new_key = new EcdsaKey(ecdsa_key.release(), authorizations, logger); local 494 *error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED; 495 return new_key;
|
/external/chromium_org/v8/src/ |
splay-tree-inl.h | 161 const Key& new_key) { 166 Splay(new_key); 167 int cmp = Config::Compare(new_key, root_->key_); 173 node_to_move->key_ = new_key;
|
/external/chromium_org/chrome/browser/supervised_user/chromeos/ |
manager_password_service.cc | 145 std::string new_key; local 149 kEncryptedPassword, &new_key); 163 new_key,
|
/external/chromium_org/third_party/libpng/ |
pngwutil.c | 1358 png_charp new_key; local 1400 png_charp new_key; local 1460 png_charp new_key = NULL; local [all...] |
/external/qemu/distrib/libpng-1.2.46/ |
pngwutil.c | 1358 png_charp new_key; local 1400 png_charp new_key; local 1460 png_charp new_key = NULL; local [all...] |
/external/llvm/include/llvm/IR/ |
ValueMap.h | 226 void allUsesReplacedWith(Value *new_key) override { 227 assert(isa<KeySansPointerT>(new_key) && 235 KeyT typed_new_key = cast<KeySansPointerT>(new_key);
|
/external/chromium_org/chromeos/cryptohome/ |
homedir_methods.cc | 248 const KeyDefinition& new_key, 257 FillKeyProtobuf(new_key, request.mutable_key()); 292 const KeyDefinition& new_key, 301 FillKeyProtobuf(new_key, pb_update_key.mutable_changes());
|
mock_async_method_caller.h | 43 const std::string& new_key,
|