/external/chromium_org/chrome/browser/supervised_user/chromeos/ |
manager_password_service.cc | 145 std::string new_key; local 149 kEncryptedPassword, &new_key); 163 new_key,
|
/system/keymaster/ |
asymmetric_key.cpp | 154 RsaKey* new_key = new RsaKey(rsa_key.release(), authorizations, logger); local 155 *error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED; 156 return new_key; 331 DsaKey* new_key = new DsaKey(dsa_key.release(), authorizations, logger); local 332 *error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED; 333 return new_key; 493 EcdsaKey* new_key = new EcdsaKey(ecdsa_key.release(), authorizations, logger); local 494 *error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED; 495 return new_key;
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
attestation_policy_observer_unittest.cc | 134 bool new_key = (mock_options & MOCK_NEW_KEY); local 135 if (new_key || !key_uploaded) { 137 UploadCertificate(new_key ? "fake_cert" : certificate, _)) 147 if (new_key) {
|
/external/chromium_org/chromeos/login/auth/ |
cryptohome_authenticator.cc | 321 scoped_ptr<Key> new_key = local 326 new_key->GetSecret(), 333 new_key->GetSecret(), [all...] |
/external/qemu/qobject/ |
qdict.c | 484 char *new_key; local 493 new_key = NULL; 497 new_key = g_strdup_printf("%s.%s", prefix, entry->key); 504 new_key ? new_key : entry->key); 509 qdict_put_obj(target, new_key, value); 513 g_free(new_key);
|
/external/chromium_org/sync/internal_api/ |
sync_encryption_handler_impl_unittest.cc | 1581 KeyParams new_key = {"localhost", "dummy", kNewKey}; local 1688 KeyParams new_key = {"localhost", "dummy", kNewKey}; local 1783 KeyParams new_key = {"localhost", "dummy", kNewKey}; local [all...] |
/external/chromium_org/third_party/libpng/ |
pngwutil.c | 1358 png_charp new_key; local 1400 png_charp new_key; local 1460 png_charp new_key = NULL; local [all...] |
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
sctp_auth.c | 249 sctp_key_t *new_key; local 251 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen, 253 if (new_key == NULL) { 257 new_key->keylen = keylen; 258 return (new_key); 321 sctp_key_t *new_key; local 323 new_key = sctp_alloc_key(keylen); 324 if (new_key == NULL) { 328 SCTP_READ_RANDOM(new_key->key, keylen) 336 sctp_key_t *new_key; local 408 sctp_key_t *new_key; local 463 sctp_sharedkey_t *new_key; local 1441 sctp_key_t *new_key; local 1981 sctp_key_t *new_key; local [all...] |
sctp_pcb.c | 7103 sctp_key_t *new_key; local [all...] |
/external/libpng/ |
pngwutil.c | 675 * The 'new_key' buffer must be 80 characters in size (for the keyword plus a 680 png_check_keyword(png_structrp png_ptr, png_const_charp key, png_bytep new_key) 691 *new_key = 0; 700 *new_key++ = ch, ++key_len, space = 0; 707 *new_key++ = 32, ++key_len, space = 1; 720 --key_len, --new_key; 726 *new_key = 0; 1582 png_byte new_key[80]; local 1625 png_byte new_key[81]; local 1678 png_byte new_key[82]; local [all...] |
/external/qemu/distrib/libpng-1.2.46/ |
pngwutil.c | 1358 png_charp new_key; local 1400 png_charp new_key; local 1460 png_charp new_key = NULL; local [all...] |
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay_i.h | 236 struct data_key *new_key; member in struct:ieee802_1x_mka_participant
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface.c | 1232 char *new_key; local 1261 new_key = os_strchr(new_encr, ' '); 1262 if (new_key == NULL) 1264 *new_key++ = '\0'; 1270 ap.key_hex = new_key; 1385 char *new_key; local 1408 new_key = os_strchr(new_encr, ' '); 1409 if (new_key == NULL) 1411 *new_key++ = '\0'; [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/X11/extensions/ |
XKBstr.h | 208 unsigned char new_key; member in struct:_XkbRedirectKeyAction
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/X11/extensions/ |
XKBstr.h | 208 unsigned char new_key; member in struct:_XkbRedirectKeyAction
|
/external/chromium_org/v8/src/ |
hydrogen.cc | 8438 HValue* new_key = loop.BeginBody( local [all...] |