Searched defs:new_key (Results 1 - 21 of 21) sorted by relevance

/external/chromium_org/third_party/libsrtp/srtp/crypto/kernel/
H A Dkey.c64 key_limit_clone(key_limit_t original, key_limit_t *new_key) { argument
67 *new_key = original;
/external/srtp/crypto/kernel/
H A Dkey.c64 key_limit_clone(key_limit_t original, key_limit_t *new_key) { argument
67 *new_key = original;
/external/chromium_org/chrome/browser/supervised_user/chromeos/
H A Dmanager_password_service.cc145 std::string new_key; local
149 kEncryptedPassword, &new_key);
163 new_key,
/external/chromium_org/v8/src/
H A Dsplay-tree-inl.h161 const Key& new_key) {
166 Splay(new_key);
167 int cmp = Config::Compare(new_key, root_->key_);
173 node_to_move->key_ = new_key;
160 Move(const Key& old_key, const Key& new_key) argument
H A Dhydrogen.cc8438 HValue* new_key = loop.BeginBody( local
8440 HValue* key = AddUncasted<HAdd>(new_key, graph()->GetConstant1());
8445 elements, new_key, element, kind);
/external/chromium_org/chrome/browser/chromeos/attestation/
H A Dattestation_policy_observer_unittest.cc134 bool new_key = (mock_options & MOCK_NEW_KEY); local
135 if (new_key || !key_uploaded) {
137 UploadCertificate(new_key ? "fake_cert" : certificate, _))
147 if (new_key) {
/external/chromium_org/chrome/browser/chromeos/settings/
H A Dsession_manager_operation.cc115 scoped_refptr<PublicKey> new_key) {
117 public_key_ = new_key;
114 StorePublicKey(const base::Closure& callback, scoped_refptr<PublicKey> new_key) argument
/external/qemu/qobject/
H A Dqdict.c484 char *new_key; local
493 new_key = NULL;
497 new_key = g_strdup_printf("%s.%s", prefix, entry->key);
504 new_key ? new_key : entry->key);
509 qdict_put_obj(target, new_key, value);
513 g_free(new_key);
/external/chromium_org/chromeos/login/auth/
H A Dcryptohome_authenticator.cc321 scoped_ptr<Key> new_key = local
326 new_key->GetSecret(),
333 new_key->GetSecret(),
/external/chromium_org/sync/internal_api/
H A Dsync_encryption_handler_impl_unittest.cc1546 const char kNewKey[] = "new_key";
1581 KeyParams new_key = {"localhost", "dummy", kNewKey}; local
1583 new_cryptographer.AddKey(new_key);
1653 const char kNewKey[] = "new_key";
1688 KeyParams new_key = {"localhost", "dummy", kNewKey}; local
1690 new_cryptographer.AddKey(new_key);
1761 const char kNewKey[] = "new_key";
1783 KeyParams new_key = {"localhost", "dummy", kNewKey}; local
1785 new_cryptographer.AddKey(new_key);
/external/chromium_org/chromeos/dbus/
H A Dfake_cryptohome_client.cc127 const std::string& new_key,
124 AsyncAddKey( const std::string& username, const std::string& key, const std::string& new_key, const AsyncMethodCallback& callback) argument
/external/qemu/distrib/mini-glib/src/
H A Dglib-mini.c622 gpointer new_key,
627 entry->key = new_key;
619 _g_hash_table_insert_index(GHashTable* hash_table, guint key_index, guint new_key_hash, gpointer new_key, gpointer new_value) argument
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_kay_i.h236 struct data_key *new_key; member in struct:ieee802_1x_mka_participant
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_kay_i.h236 struct data_key *new_key; member in struct:ieee802_1x_mka_participant
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_kay_i.h236 struct data_key *new_key; member in struct:ieee802_1x_mka_participant
/external/chromium_org/third_party/libpng/
H A Dpngwutil.c1224 * The new_key is allocated to hold the corrected keyword and must be freed
1229 png_check_keyword(png_structp png_ptr, png_charp key, png_charpp new_key) argument
1238 *new_key = NULL;
1248 *new_key = (png_charp)png_malloc_warn(png_ptr, (png_uint_32)(key_len + 2));
1249 if (*new_key == NULL)
1256 for (kp = key, dp = *new_key; *kp != '\0'; kp++, dp++)
1280 kp = *new_key + key_len - 1;
1293 kp = *new_key;
1308 for (kflag = 0, dp = *new_key; *kp != '\0'; kp++)
1332 png_free(png_ptr, *new_key);
1358 png_charp new_key; local
1400 png_charp new_key; local
1460 png_charp new_key = NULL; local
[all...]
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
H A Dsctp_auth.c249 sctp_key_t *new_key; local
251 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen,
253 if (new_key == NULL) {
257 new_key->keylen = keylen;
258 return (new_key);
321 sctp_key_t *new_key; local
323 new_key = sctp_alloc_key(keylen);
324 if (new_key == NULL) {
328 SCTP_READ_RANDOM(new_key
336 sctp_key_t *new_key; local
408 sctp_key_t *new_key; local
463 sctp_sharedkey_t *new_key; local
1441 sctp_key_t *new_key; local
1981 sctp_key_t *new_key; local
[all...]
H A Dsctp_pcb.c7103 sctp_key_t *new_key; local
7688 new_key = sctp_alloc_key(keylen);
7689 if (new_key != NULL) {
7693 bcopy(p_random, new_key->key, keylen);
7697 bcopy(chunks, new_key->key + keylen,
7703 bcopy(hmacs, new_key->key + keylen,
7712 stcb->asoc.authinfo.peer_random = new_key;
/external/libpng/
H A Dpngwutil.c675 * The 'new_key' buffer must be 80 characters in size (for the keyword plus a
680 png_check_keyword(png_structrp png_ptr, png_const_charp key, png_bytep new_key) argument
691 *new_key = 0;
700 *new_key++ = ch, ++key_len, space = 0;
707 *new_key++ = 32, ++key_len, space = 1;
720 --key_len, --new_key;
726 *new_key = 0;
1582 png_byte new_key[80]; local
1586 key_len = png_check_keyword(png_ptr, key, new_key);
1609 png_write_chunk_data(png_ptr, new_key, key_le
1625 png_byte new_key[81]; local
1678 png_byte new_key[82]; local
[all...]
/external/qemu/distrib/libpng-1.2.46/
H A Dpngwutil.c1224 * The new_key is allocated to hold the corrected keyword and must be freed
1229 png_check_keyword(png_structp png_ptr, png_charp key, png_charpp new_key) argument
1238 *new_key = NULL;
1248 *new_key = (png_charp)png_malloc_warn(png_ptr, (png_uint_32)(key_len + 2));
1249 if (*new_key == NULL)
1256 for (kp = key, dp = *new_key; *kp != '\0'; kp++, dp++)
1280 kp = *new_key + key_len - 1;
1293 kp = *new_key;
1308 for (kflag = 0, dp = *new_key; *kp != '\0'; kp++)
1332 png_free(png_ptr, *new_key);
1358 png_charp new_key; local
1400 png_charp new_key; local
1460 png_charp new_key = NULL; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dctrl_iface.c1232 char *new_key; local
1261 new_key = os_strchr(new_encr, ' ');
1262 if (new_key == NULL)
1264 *new_key++ = '\0';
1270 ap.key_hex = new_key;
1385 char *new_key; local
1408 new_key = os_strchr(new_encr, ' ');
1409 if (new_key == NULL)
1411 *new_key++ = '\0';
1417 ap.key_hex = new_key;
[all...]

Completed in 659 milliseconds