/external/chromium_org/net/quic/crypto/ |
H A D | chacha20_poly1305_encrypter_test.cc | 16 // The strings may be empty (zero length). A test vector with a NULL |key| 19 const char* key; member in struct:__anon9427::TestVector 65 for (size_t i = 0; test_vectors[i].key != NULL; i++) { 67 string key; local 72 ASSERT_TRUE(DecodeHexString(test_vectors[i].key, &key)); 79 ASSERT_TRUE(encrypter.SetKey(key));
|
H A D | channel_id_nss.cc | 16 bool ChannelIDVerifier::Verify(StringPiece key, argument 19 return VerifyRaw(key, signed_data, signature, true); 23 bool ChannelIDVerifier::VerifyRaw(StringPiece key, argument 27 if (key.size() != 32 * 2 || 47 memcpy(&key_buf[1], key.data(), key.size());
|
H A D | channel_id_openssl.cc | 21 bool ChannelIDVerifier::Verify(StringPiece key, argument 24 return VerifyRaw(key, signed_data, signature, true); 28 bool ChannelIDVerifier::VerifyRaw(StringPiece key, argument 32 if (key.size() != 32 * 2 || 49 const uint8* key_bytes = reinterpret_cast<const uint8*>(key.data());
|
/external/chromium_org/ppapi/cpp/ |
H A D | var_dictionary.cc | 69 Var VarDictionary::Get(const Var& key) const { 75 get_interface<PPB_VarDictionary_1_0>()->Get(var_, key.pp_var())); 78 bool VarDictionary::Set(const Var& key, const Var& value) { argument 83 var_, key.pp_var(), value.pp_var())); 86 void VarDictionary::Delete(const Var& key) { argument 88 get_interface<PPB_VarDictionary_1_0>()->Delete(var_, key.pp_var()); 91 bool VarDictionary::HasKey(const Var& key) const { 96 var_, key.pp_var()));
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_var_dictionary_thunk.cc | 25 PP_Var Get(PP_Var dict, PP_Var key) { argument 31 return dict_var->Get(key); 34 PP_Bool Set(PP_Var dict, PP_Var key, PP_Var value) { argument 41 return dict_var->Set(key, value); 44 void Delete(PP_Var dict, PP_Var key) { argument 49 dict_var->Delete(key); 52 PP_Bool HasKey(PP_Var dict, PP_Var key) { argument 58 return dict_var->HasKey(key);
|
/external/chromium_org/remoting/base/ |
H A D | capabilities.cc | 15 bool HasCapability(const std::string& capabilities, const std::string& key) { argument 18 return std::find(caps.begin(), caps.end(), key) != caps.end();
|
H A D | capabilities_unittest.cc | 16 const char* key; member in struct:__anon10355::HasCapabilityTestData 36 // Expect that nothing can be found in an empty set, event when the key is 61 // Verify that HasCapability(|capabilities|, |key|) returns |result|. 69 HasCapability(JoinString(caps, " "), data[i].key));
|
/external/chromium_org/remoting/host/setup/ |
H A D | oauth_helper.cc | 70 url::Component key; local 72 while (ExtractQueryKeyValue(url.c_str(), &query, &key, &value)) { 73 if (GetComponent(url, key) == "code") {
|
/external/chromium_org/rlz/win/lib/ |
H A D | registry_util.cc | 5 // A helper library to keep track of a user's key by SID. 19 bool RegKeyReadValue(base::win::RegKey& key, const wchar_t* name, argument 24 if (key.ReadValue(name, &value_string) != ERROR_SUCCESS) { 39 bool RegKeyWriteValue(base::win::RegKey& key, const wchar_t* name, argument 42 return key.WriteValue(name, value_string.c_str()) == ERROR_SUCCESS; 51 base::win::RegKey key; local 52 if (key.Open(HKEY_CURRENT_USER, L"Software", KEY_READ) != ERROR_SUCCESS)
|
/external/chromium_org/sandbox/win/tools/finder/ |
H A D | finder_registry.cc | 9 DWORD Finder::ParseRegistry(HKEY key, ATL::CString print_name) { argument 13 // TODO(nsylvain): Don't hardcode 2048. Get the key len by calling the 15 LONG err_code = ::RegEnumKey(key, index, buffer, name_size); 18 TestRegAccess(key, buffer, name_complete); 22 err_code = ::RegOpenKeyEx(key, buffer, 0, KEY_ENUMERATE_SUB_KEYS, 33 err_code = ::RegEnumKey(key, index, buffer, name_size); 44 DWORD Finder::TestRegAccess(HKEY key, ATL::CString name, argument 54 err_code = ::RegOpenKeyEx(key, name, 0, GENERIC_ALL, &key_res); 67 err_code = ::RegOpenKeyEx(key, name, 0, GENERIC_WRITE, &key_res); 80 err_code = ::RegOpenKeyEx(key, nam [all...] |
/external/chromium_org/sync/internal_api/public/ |
H A D | change_record_unittest.cc | 29 const std::string& key) { 31 EXPECT_TRUE(value.GetString(key, &str_value)); 27 ExpectChangeRecordActionValue(ChangeRecord::Action expected_value, const base::DictionaryValue& value, const std::string& key) argument
|
/external/chromium_org/third_party/WebKit/Source/bindings/core/v8/ |
H A D | V8HiddenValue.cpp | 25 v8::Local<v8::Value> V8HiddenValue::getHiddenValue(v8::Isolate* isolate, v8::Handle<v8::Object> object, v8::Handle<v8::String> key) argument 27 return object->GetHiddenValue(key); 30 bool V8HiddenValue::setHiddenValue(v8::Isolate* isolate, v8::Handle<v8::Object> object, v8::Handle<v8::String> key, v8::Handle<v8::Value> value) argument 32 return object->SetHiddenValue(key, value); 35 bool V8HiddenValue::deleteHiddenValue(v8::Isolate* isolate, v8::Handle<v8::Object> object, v8::Handle<v8::String> key) argument 37 return object->DeleteHiddenValue(key); 40 v8::Local<v8::Value> V8HiddenValue::getHiddenValueFromMainWorldWrapper(v8::Isolate* isolate, ScriptWrappable* wrappable, v8::Handle<v8::String> key) argument 43 return wrapper.IsEmpty() ? v8::Local<v8::Value>() : getHiddenValue(isolate, wrapper, key);
|
/external/chromium_org/third_party/WebKit/Source/bindings/templates/ |
H A D | interface.cpp | 57 bool namedSecurityCheck(v8::Local<v8::Object> host, v8::Local<v8::Value> key, v8::AccessType type, v8::Local<v8::Value>) argument 505 static int domTemplateKey; // This address is used for a key to look up the dom template.
|
/external/chromium_org/third_party/WebKit/Source/core/html/forms/ |
H A D | BaseClickableWithKeyInputType.cpp | 44 const String& key = event->keyIdentifier(); local 45 if (key == "U+0020") { 68 const String& key = event->keyIdentifier(); local 69 if (key != "U+0020")
|
H A D | CheckboxInputType.cpp | 65 const String& key = event->keyIdentifier(); local 66 if (key != "U+0020")
|
/external/chromium_org/third_party/WebKit/Source/core/storage/ |
H A D | StorageEvent.h | 40 String key; member in struct:blink::StorageEventInit 51 static PassRefPtrWillBeRawPtr<StorageEvent> create(const AtomicString& type, const String& key, const String& oldValue, const String& newValue, const String& url, Storage* storageArea); 55 const String& key() const { return m_key; } function in class:blink::FINAL 61 void initStorageEvent(const AtomicString& type, bool canBubble, bool cancelable, const String& key, const String& oldValue, const String& newValue, const String& url, Storage* storageArea); 72 StorageEvent(const AtomicString& type, const String& key, const String& oldValue, const String& newValue, const String& url, Storage* storageArea);
|
/external/chromium_org/third_party/WebKit/Source/platform/ |
H A D | LinkHash.h | 39 // Use the low 32-bits of the 64-bit LinkHash as the key for HashSets. 41 static unsigned hash(LinkHash key) { return static_cast<unsigned>(key); } argument
|
/external/chromium_org/third_party/WebKit/Source/platform/exported/ |
H A D | WebCryptoKey.cpp | 63 WebCryptoKey key; local 64 key.m_private = adoptRef(new WebCryptoKeyPrivate(adoptPtr(handle), type, extractable, algorithm, usages)); 65 return key;
|
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
H A D | KURLHash.h | 36 static unsigned hash(const KURL& key) argument 38 return key.string().impl()->hash();
|
/external/chromium_org/third_party/WebKit/Source/web/ |
H A D | WebStorageEventDispatcherImpl.cpp | 44 const WebString& key, const WebString& oldValue, 51 key, oldValue, newValue, securityOrigin.get(), pageURL, 56 const WebString& key, const WebString& oldValue, 63 key, oldValue, newValue, securityOrigin.get(), pageURL, 43 dispatchLocalStorageEvent( const WebString& key, const WebString& oldValue, const WebString& newValue, const WebURL& origin, const WebURL& pageURL, WebStorageArea* sourceAreaInstance, bool originatedInProcess) argument 55 dispatchSessionStorageEvent( const WebString& key, const WebString& oldValue, const WebString& newValue, const WebURL& origin, const WebURL& pageURL, const WebStorageNamespace& sessionNamespace, WebStorageArea* sourceAreaInstance, bool originatedInProcess) argument
|
/external/chromium_org/third_party/boringssl/src/crypto/aes/ |
H A D | mode_wrappers.c | 57 const AES_KEY *key, uint8_t ivec[AES_BLOCK_SIZE], 59 CRYPTO_ctr128_encrypt(in, out, len, key, ivec, ecount_buf, num, 63 void AES_ecb_encrypt(const uint8_t *in, uint8_t *out, const AES_KEY *key, argument 65 assert(in && out && key); 69 AES_encrypt(in, out, key); 71 AES_decrypt(in, out, key); 78 const AES_KEY *key, uint8_t *ivec, const int enc) { 81 CRYPTO_cbc128_encrypt(in, out, len, key, ivec, (block128_f)AES_encrypt); 83 CRYPTO_cbc128_decrypt(in, out, len, key, ivec, (block128_f)AES_decrypt); 89 const AES_KEY *key, uint8_ 56 AES_ctr128_encrypt(const uint8_t *in, uint8_t *out, size_t len, const AES_KEY *key, uint8_t ivec[AES_BLOCK_SIZE], uint8_t ecount_buf[AES_BLOCK_SIZE], unsigned int *num) argument 77 AES_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t len, const AES_KEY *key, uint8_t *ivec, const int enc) argument 90 AES_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t len, const AES_KEY *key, uint8_t *ivec, const int enc) argument 97 AES_ofb128_encrypt(const uint8_t *in, uint8_t *out, size_t length, const AES_KEY *key, uint8_t *ivec, int *num) argument 103 AES_cfb128_encrypt(const uint8_t *in, uint8_t *out, size_t length, const AES_KEY *key, uint8_t *ivec, int *num, int enc) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
H A D | e_null.c | 64 static int null_init_key(EVP_CIPHER_CTX *ctx, const uint8_t *key, argument
|
/external/chromium_org/third_party/boringssl/src/crypto/ecdsa/ |
H A D | ecdsa_asn1.c | 71 size_t ECDSA_size(const EC_KEY *key) { argument 78 if (key->ecdsa_meth && key->ecdsa_meth->group_order_size) { 79 group_order_size = key->ecdsa_meth->group_order_size(key); 83 if (key == NULL) { 86 group = EC_KEY_get0_group(key);
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
H A D | asn1.c | 158 int i2d_PublicKey(EVP_PKEY *key, uint8_t **outp) { argument 159 switch (key->type) { 161 return i2d_RSAPublicKey(key->pkey.rsa, outp); 163 return i2d_DSAPublicKey(key->pkey.dsa, outp); 165 return i2o_ECPublicKey(key->pkey.ec, outp);
|
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
H A D | pkcs12_test.c | 29 * openssl pkcs12 -export -inkey key.pem -in cacert.pem */ 464 /* kWindows is a dummy key and certificate exported from the certificate 685 EVP_PKEY *key; local 691 if (!PKCS12_get_key_and_certs(&key, certs, &pkcs12, "foo")) { 697 if (sk_X509_num(certs) != 1 || key == NULL) { 703 EVP_PKEY_free(key); 712 EVP_PKEY *key; local 725 if (!PKCS12_parse(p12, "foo", &key, &cert, &ca_certs)) { 731 if (key == NULL || cert == NULL) { 736 EVP_PKEY_free(key); [all...] |