/external/chromium_org/third_party/skia/src/gpu/ |
H A D | GrPath.cpp | 15 uint32_t* keyData = key.fData32; local 16 keyData[0] = path.getGenerationID(); 19 keyData[1] = stroke.needToApply(); 20 if (0 != keyData[1]) { 21 keyData[1] |= stroke.getJoin() << 1; 22 keyData[1] |= stroke.getCap() << 3; 23 keyData[2] = static_cast<uint32_t>(stroke.getMiter()); 24 keyData[3] = static_cast<uint32_t>(stroke.getWidth()); 26 keyData[2] = 0; 27 keyData[ [all...] |
H A D | GrStencilBuffer.cpp | 26 uint32_t* keyData = key.fData32; local 27 keyData[0] = width; 28 keyData[1] = height; 29 keyData[2] = sampleCnt; 30 memset(keyData + 3, 0, sizeof(key) - 3 * sizeof(uint32_t));
|
H A D | GrResourceCache.h | 99 } keyData; local 101 uint8_t* k = keyData.fKey8; 107 fKey.setKeyData(keyData.fKey32);
|
/external/skia/src/gpu/ |
H A D | GrPath.cpp | 15 uint32_t* keyData = key.fData32; local 16 keyData[0] = path.getGenerationID(); 19 keyData[1] = stroke.needToApply(); 20 if (0 != keyData[1]) { 21 keyData[1] |= stroke.getJoin() << 1; 22 keyData[1] |= stroke.getCap() << 3; 23 keyData[2] = static_cast<uint32_t>(stroke.getMiter()); 24 keyData[3] = static_cast<uint32_t>(stroke.getWidth()); 26 keyData[2] = 0; 27 keyData[ [all...] |
H A D | GrStencilBuffer.cpp | 26 uint32_t* keyData = key.fData32; local 27 keyData[0] = width; 28 keyData[1] = height; 29 keyData[2] = sampleCnt; 30 memset(keyData + 3, 0, sizeof(key) - 3 * sizeof(uint32_t));
|
H A D | GrResourceCache.h | 99 } keyData; local 101 uint8_t* k = keyData.fKey8; 107 fKey.setKeyData(keyData.fKey32);
|
/external/chromium_org/chrome/common/extensions/docs/examples/api/input.ime/basic/ |
H A D | main.js | 28 function(engineID, keyData) { 29 console.log('onKeyEvent:' + keyData.key + " context: " + context_id); 30 if (keyData.type == "keydown" && keyData.key.match(/^[a-z]$/)) { 32 "text": keyData.key.toUpperCase()});
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | SubjectPublicKeyInfo.java | 26 private DERBitString keyData; field in class:SubjectPublicKeyInfo 55 this.keyData = new DERBitString(publicKey); 63 this.keyData = new DERBitString(publicKey); 79 this.keyData = DERBitString.getInstance(e.nextElement()); 107 ASN1InputStream aIn = new ASN1InputStream(keyData.getBytes()); 124 ASN1InputStream aIn = new ASN1InputStream(keyData.getBytes()); 136 return keyData; 152 v.add(keyData);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
H A D | KeyUtil.java | 11 public static byte[] getEncodedSubjectPublicKeyInfo(AlgorithmIdentifier algId, ASN1Encodable keyData) argument 15 return getEncodedSubjectPublicKeyInfo(new SubjectPublicKeyInfo(algId, keyData)); 23 public static byte[] getEncodedSubjectPublicKeyInfo(AlgorithmIdentifier algId, byte[] keyData) argument 27 return getEncodedSubjectPublicKeyInfo(new SubjectPublicKeyInfo(algId, keyData));
|
/external/chromium_org/chrome/browser/resources/chromeos/ |
H A D | keyboard_overlay_accessibility_helper.js | 22 var keyData = keyboardGlyphData.keys[identifier]; 23 var keyLabel = getKeyLabel(keyData, modifiers);
|
/external/chromium_org/chrome/renderer/resources/extensions/ |
H A D | input.ime_custom_bindings.js | 17 var keyData = args[1]; 27 input_ime.keyEventHandled(keyData.requestId, result);
|
/external/chromium_org/third_party/skia/tests/ |
H A D | ResourceCacheTest.cpp | 110 GrCacheID::Key keyData; local 111 keyData.fData64[0] = 5; 112 keyData.fData64[1] = 18; 114 GrResourceKey key(GrCacheID(domain, keyData), t, 0); 145 GrCacheID::Key keyData; local 146 keyData.fData64[0] = 5; 147 keyData.fData64[1] = 0; 150 GrResourceKey key(GrCacheID(domain, keyData), t, 0);
|
/external/skia/tests/ |
H A D | ResourceCacheTest.cpp | 110 GrCacheID::Key keyData; local 111 keyData.fData64[0] = 5; 112 keyData.fData64[1] = 18; 114 GrResourceKey key(GrCacheID(domain, keyData), t, 0); 145 GrCacheID::Key keyData; local 146 keyData.fData64[0] = 5; 147 keyData.fData64[1] = 0; 150 GrResourceKey key(GrCacheID(domain, keyData), t, 0);
|
/external/chromium_org/third_party/WebKit/Source/modules/crypto/ |
H A D | SubtleCrypto.idl | 60 [CallWith=ScriptState] Promise importKey(KeyFormat format, ArrayBuffer keyData, Dictionary algorithm, boolean extractable, KeyUsage[] keyUsages); 61 [CallWith=ScriptState] Promise importKey(KeyFormat format, ArrayBufferView keyData, Dictionary algorithm, boolean extractable, KeyUsage[] keyUsages); 62 [CallWith=ScriptState] Promise importKey(KeyFormat format, Dictionary keyData, Dictionary algorithm, boolean extractable, KeyUsage[] keyUsages);
|
H A D | SubtleCrypto.cpp | 241 ScriptPromise SubtleCrypto::importKey(ScriptState* scriptState, const String& rawFormat, const ArrayPiece& keyData, const Dictionary& rawAlgorithm, bool extractable, const Vector<String>& rawKeyUsages) argument 249 if (!ensureNotNull(keyData, "keyData", result.get())) 269 blink::Platform::current()->crypto()->importKey(format, keyData.bytes(), keyData.byteLength(), algorithm, extractable, keyUsages, result->result()); 273 ScriptPromise SubtleCrypto::importKey(ScriptState* scriptState, const String& rawFormat, const Dictionary& keyData, const Dictionary& rawAlgorithm, bool extractable, const Vector<String>& rawKeyUsages) argument 299 if (!copyJwkDictionaryToJson(keyData, jsonUtf8, result.get()))
|
/external/chromium_org/third_party/WebKit/public/platform/ |
H A D | WebCrypto.h | 218 virtual void importKey(WebCryptoKeyFormat, const unsigned char* keyData, unsigned keyDataSize, const WebCryptoAlgorithm&, bool extractable, WebCryptoKeyUsageMask, WebCryptoResult result) { result.completeWithError(WebCryptoErrorTypeNotSupported, ""); } argument 274 virtual bool deserializeKeyForClone(const WebCryptoKeyAlgorithm&, WebCryptoKeyType, bool extractable, WebCryptoKeyUsageMask, const unsigned char* keyData, unsigned keyDataSize, WebCryptoKey&) { return false; } argument
|
/external/lldb/source/Core/ |
H A D | ConstString.cpp | 44 GetStringMapEntryFromKeyData (const char *keyData) argument 46 char *ptr = const_cast<char*>(keyData) - sizeof (StringPoolEntryType);
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslcon.c | 1265 PRUint8 *keyData, 1288 PORT_Memcpy(sid->u.ssl2.masterKey.data, keyData, keyLen); 2030 PRUint8 keyData[SSL_MAX_MASTER_KEY_BYTES]; local 2066 PK11_GenerateRandom(keyData, sizeof(keyData)); 2070 ** clear data is taken from the start of keyData and the encrypted 2089 rv = ssl2_FillInSID(sid, cipher, keyData, keyLen, 2112 rek.data = keyData + ckLen; 2138 keyData, ckLen, ekbuf, modulusLen); 2150 PORT_Memset(keyData, 1263 ssl2_FillInSID(sslSessionID * sid, int cipher, PRUint8 *keyData, int keyLen, PRUint8 *ca, int caLen, int keyBits, int secretKeyBits, SSLSignType authAlgorithm, PRUint32 authKeyBits, SSLKEAType keaType, PRUint32 keaKeyBits) argument [all...] |
H A D | ssl3con.c | 3743 SECItem * keyData = PK11_GetKeyData(pms); local 3744 if (keyData && keyData->data && keyData->len) { 3746 keyData->data, keyData->len); 6018 SECItem * keyData = PK11_GetKeyData(pms); local 6019 if (keyData && keyData->data && keyData 10716 SECItem *keyData; local [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/websockets/ |
H A D | WebSocketHandshake.cpp | 110 CString keyData = secWebSocketKey.ascii(); local
|
/external/chromium_org/third_party/WebKit/Source/bindings/v8/ |
H A D | SerializedScriptValue.cpp | 219 CryptoKeyTag = 'K', // subtag:byte, props, usages:uint32_t, keyDataLength:uint32_t, keyData:byte[keyDataLength] 528 blink::WebVector<uint8_t> keyData; local 529 if (!blink::Platform::current()->crypto()->serializeKeyForClone(key, keyData)) 532 doWriteUint32(keyData.size()); 533 append(keyData.data(), keyData.size()); 2272 const uint8_t* keyData = m_buffer + m_position; local 2277 algorithm, type, extractable, usages, keyData, keyDataLength, key)) {
|
/external/google-tv-pairing-protocol/java/jar/ |
H A D | bcprov-jdk15-143.jar | META-INF/MANIFEST.MF META-INF/BCKEY.SF META-INF/BCKEY.DSA META ... |