/external/chromium_org/content/public/android/java/src/org/chromium/content/browser/ |
H A D | ChildProcessLauncher.java | 99 int slot = mFreeConnectionIndices.remove(0); 100 assert mChildProcessConnections[slot] == null; 101 mChildProcessConnections[slot] = new ChildProcessConnectionImpl(context, slot, 104 ", slot: " + slot); 105 return mChildProcessConnections[slot]; 111 int slot = connection.getServiceNumber(); 112 if (mChildProcessConnections[slot] != connection) { 113 int occupier = mChildProcessConnections[slot] [all...] |
/external/chromium_org/courgette/ |
H A D | adjustment_method.cc | 540 Node*& slot = node->edges_[item]; local 541 if (slot == NULL) { 542 slot = new Node(item, node); 543 all_nodes_.push_back(slot); 544 node->edges_in_frequency_order.push_back(slot); 546 slot->places_.push_back(index + 1); 547 ++slot->count_; 641 LabelInfo& slot = label_infos_[label]; local 642 if (slot.label_ == NULL) { 643 slot [all...] |
H A D | adjustment_method_2.cc | 217 LabelInfo& slot = label_infos_[label]; local 218 if (slot.label_ == NULL) { 219 slot.label_ = label; 220 slot.is_model_ = is_model; 221 slot.debug_index_ = ++debug_label_index_gen_; 223 slot.positions_.push_back(position); 224 ++slot.refs_; 225 return &slot; 1087 int* slot = &maxima[program_info][model_info]; 1088 *slot [all...] |
H A D | assembly_program.cc | 250 Label*& slot = (*labels)[rva]; local 251 if (slot == NULL) { 252 slot = new(std::nothrow) Label(rva); 254 slot->count_++; 255 return slot;
|
/external/chromium_org/crypto/ |
H A D | ec_private_key.h | 46 // Creates a new random instance in |slot|. Can return NULL if initialization 49 static ECPrivateKey* CreateSensitive(PK11SlotInfo* slot); 62 // Creates a new instance in |slot| by importing an existing key pair. 68 PK11SlotInfo* slot, 75 // Imports the key pair into |slot| and returns in |public_key| and |key|. 80 PK11SlotInfo* slot, 129 static ECPrivateKey* CreateWithParams(PK11SlotInfo* slot, 136 PK11SlotInfo* slot,
|
H A D | ec_private_key_nss.cc | 36 // slot. If we support other slots in the future, checking whether they 40 crypto::ScopedPK11Slot slot(GetTempKeySlot()); 41 supported_ = PK11_DoesMechanism(slot.get(), CKM_EC_KEY_PAIR_GEN) && 42 PK11_DoesMechanism(slot.get(), CKM_ECDSA); 93 ScopedPK11Slot slot(GetTempKeySlot()); 94 return CreateWithParams(slot.get(), 101 ECPrivateKey* ECPrivateKey::CreateSensitive(PK11SlotInfo* slot) { argument 103 slot, true /* permanent */, true /* sensitive */); 114 ScopedPK11Slot slot(GetTempKeySlot()); 116 slot 126 CreateSensitiveFromEncryptedPrivateKeyInfo( PK11SlotInfo* slot, const std::string& password, const std::vector<uint8>& encrypted_private_key_info, const std::vector<uint8>& subject_public_key_info) argument 142 ImportFromEncryptedPrivateKeyInfo( PK11SlotInfo* slot, const std::string& password, const uint8* encrypted_private_key_info, size_t encrypted_private_key_info_len, CERTSubjectPublicKeyInfo* decoded_spki, bool permanent, bool sensitive, SECKEYPrivateKey** key, SECKEYPublicKey** public_key) argument 317 CreateWithParams(PK11SlotInfo* slot, bool permanent, bool sensitive) argument 363 CreateFromEncryptedPrivateKeyInfoWithParams( PK11SlotInfo* slot, const std::string& password, const std::vector<uint8>& encrypted_private_key_info, const std::vector<uint8>& subject_public_key_info, bool permanent, bool sensitive) argument [all...] |
H A D | nss_util.cc | 120 char* PKCS11PasswordFunc(PK11SlotInfo* slot, PRBool retry, void* arg) { argument 125 std::string password = delegate->RequestPassword(PK11_GetTokenName(slot), 371 // read from this slot without requiring a call to C_Login. 386 << ", got tpm slot: " << !!tpm_args->tpm_slot; 392 // have a test DB open, pretend that it is the TPM slot. 434 // Note that CK_SLOT_ID is an unsigned long, but cryptohome gives us the slot 447 PK11SlotInfo* slot = SECMOD_LookupSlot(chaps_module->moduleID, slot_id); local 448 if (!slot) 449 LOG(ERROR) << "TPM slot " << slot_id << " not found."; 450 return crypto::ScopedPK11Slot(slot); 578 SetSystemKeySlotForTesting(ScopedPK11Slot slot) argument 731 PK11SlotInfo* slot = PK11_GetInternalKeySlot(); local 1023 SetSystemKeySlotForTesting(ScopedPK11Slot slot) argument [all...] |
H A D | nss_util_internal.h | 25 // user-visible description |description|. Returns the slot for the opened 32 // Returns a reference to the default NSS key slot for storing persistent data. 50 // Returns a reference to the system-wide TPM slot if it is loaded. If it is not 51 // loaded and |callback| is non-null, the |callback| will be run once the slot 56 // Sets the test system slot to |slot|, which means that |slot| will be exposed 59 // does not have to be called if the test system slot is set. 60 // This must must not be called consecutively with a |slot| != NULL. If |slot| [all...] |
H A D | rsa_private_key.h | 184 // Create a new random instance in |slot|. Can return NULL if initialization 187 static RSAPrivateKey* CreateSensitive(PK11SlotInfo* slot, uint16 num_bits); 189 // Create a new instance in |slot| by importing an existing private key. The 194 PK11SlotInfo* slot, 211 // half in the slot specified by |slot|. The format of the public 215 // is created in the slot. 218 PK11SlotInfo* slot); 258 static RSAPrivateKey* CreateWithParams(PK11SlotInfo* slot, 267 PK11SlotInfo* slot, [all...] |
H A D | rsa_private_key_nss.cc | 87 ScopedPK11Slot slot(PK11_GetInternalSlot()); 88 return CreateWithParams(slot.get(), 99 ScopedPK11Slot slot(PK11_GetInternalSlot()); 101 slot.get(), 109 RSAPrivateKey* RSAPrivateKey::CreateSensitive(PK11SlotInfo* slot, argument 111 return CreateWithParams(slot, 119 PK11SlotInfo* slot, 121 return CreateFromPrivateKeyInfoWithParams(slot, 178 PK11SlotInfo* slot) { 179 if (!slot) 118 CreateSensitiveFromPrivateKeyInfo( PK11SlotInfo* slot, const std::vector<uint8>& input) argument 176 FindFromPublicKeyInfoInSlot( const std::vector<uint8>& input, PK11SlotInfo* slot) argument 245 CreateWithParams(PK11SlotInfo* slot, uint16 num_bits, bool permanent, bool sensitive) argument 271 CreateFromPrivateKeyInfoWithParams( PK11SlotInfo* slot, const std::vector<uint8>& input, bool permanent, bool sensitive) argument [all...] |
H A D | scoped_test_nss_db.h | 24 PK11SlotInfo* slot() const { return slot_.get(); } function in class:crypto::ScopedTestNSSDB
|
H A D | scoped_test_system_nss_key_slot.cc | 17 ScopedPK11Slot(PK11_ReferenceSlot(test_db_->slot()))); 28 PK11SlotInfo* ScopedTestSystemNSSKeySlot::slot() const { function in class:crypto::ScopedTestSystemNSSKeySlot 29 return test_db_->slot();
|
H A D | scoped_test_system_nss_key_slot.h | 20 // the test system slot to the opened database. This helper should be created in 22 // |slot| is exposed through |GetSystemNSSKeySlot| and |IsTPMTokenReady| will 33 PK11SlotInfo* slot() const;
|
H A D | symmetric_key_nss.cc | 30 ScopedPK11Slot slot(PK11_GetInternalSlot()); 31 if (!slot.get()) 34 PK11SymKey* sym_key = PK11_KeyGen(slot.get(), CKM_AES_KEY_GEN, NULL, 83 ScopedPK11Slot slot(PK11_GetInternalSlot()); 84 if (!slot.get()) 87 PK11SymKey* sym_key = PK11_PBEKeyGen(slot.get(), alg_id.get(), &password_item, 117 ScopedPK11Slot slot(PK11_GetInternalSlot()); 118 if (!slot.get()) 124 PK11SymKey* sym_key = PK11_ImportSymKey(slot.get(), cipher, PK11_OriginUnwrap,
|
/external/chromium_org/crypto/third_party/nss/ |
H A D | chromium-nss.h | 62 PK11SlotInfo* slot,
|
H A D | pk11akey.cc | 49 PK11SlotInfo* slot, 62 PK11SymKey* key = PK11_PBEKeyGen(slot, 82 *private_key = PK11_UnwrapPrivKey(slot, key, crypto_mech_type, crypto_param, 48 ImportEncryptedECPrivateKeyInfoAndReturnKey( PK11SlotInfo* slot, SECKEYEncryptedPrivateKeyInfo* epki, SECItem* password, SECItem* nickname, SECItem* public_value, PRBool permanent, PRBool sensitive, SECKEYPrivateKey** private_key, void* wincx) argument
|
/external/chromium_org/mojo/public/cpp/utility/lib/ |
H A D | thread_local.h | 25 static void AllocateSlot(SlotType* slot); 26 static void FreeSlot(SlotType slot); 27 static void* GetValueFromSlot(SlotType slot); 28 static void SetValueInSlot(SlotType slot, void* value);
|
H A D | thread_local_posix.cc | 13 void ThreadLocalPlatform::AllocateSlot(SlotType* slot) { argument 14 if (pthread_key_create(slot, NULL) != 0) { 20 void ThreadLocalPlatform::FreeSlot(SlotType slot) { argument 21 if (pthread_key_delete(slot) != 0) { 27 void* ThreadLocalPlatform::GetValueFromSlot(SlotType slot) { argument 28 return pthread_getspecific(slot); 32 void ThreadLocalPlatform::SetValueInSlot(SlotType slot, void* value) { argument 33 if (pthread_setspecific(slot, value) != 0) {
|
H A D | thread_local_win.cc | 14 void ThreadLocalPlatform::AllocateSlot(SlotType* slot) { argument 15 *slot = TlsAlloc(); 16 assert(*slot != TLS_OUT_OF_INDEXES); 20 void ThreadLocalPlatform::FreeSlot(SlotType slot) { argument 21 if (!TlsFree(slot)) { 27 void* ThreadLocalPlatform::GetValueFromSlot(SlotType slot) { argument 28 return TlsGetValue(slot); 32 void ThreadLocalPlatform::SetValueInSlot(SlotType slot, void* value) { argument 33 if (!TlsSetValue(slot, value)) {
|
/external/chromium_org/net/base/ |
H A D | keygen_handler_nss.cc | 21 crypto::ScopedPK11Slot slot; local 23 slot = crypto_module_delegate_->RequestSlot().Pass(); 25 LOG(ERROR) << "Could not get an NSS key slot."; 30 if (SECSuccess != PK11_Authenticate(slot.get(), 33 LOG(ERROR) << "Could not authenticate to the key slot."; 38 slot.get(), stores_key_);
|
H A D | keygen_handler_unittest.cc | 32 explicit StubCryptoModuleDelegate(crypto::ScopedPK11Slot slot) argument 33 : slot_(slot.Pass()) {} 62 PK11_ReferenceSlot(test_nss_db_.slot())))));
|
/external/chromium_org/net/cert/ |
H A D | cert_database_nss.cc | 42 PK11SlotInfo* slot = PK11_KeyForCertExists(cert, NULL, NULL); local 43 if (!slot) 46 PK11_FreeSlot(slot); 54 crypto::ScopedPK11Slot slot(PK11_KeyForCertExists(cert, &key, NULL)); 55 if (!slot.get()) 61 slot.get()); 66 rv = PK11_ImportCert(slot.get(), cert, key, nickname.c_str(), PR_FALSE);
|
H A D | cert_verify_proc_nss.cc | 231 if (!root || !root->slot) 236 return 0 == strcmp(PK11_GetSlotName(root->slot),
|
H A D | nss_cert_database.cc | 118 PK11SlotInfo* slot) { 119 DCHECK(slot); 127 base::Passed(crypto::ScopedPK11Slot(PK11_ReferenceSlot(slot))), 149 crypto::ScopedPK11Slot slot(GetPublicSlot()); 150 return CryptoModule::CreateFromHandle(slot.get()); 154 crypto::ScopedPK11Slot slot(GetPrivateSlot()); 155 return CryptoModule::CreateFromHandle(slot.get()); 175 modules->push_back(CryptoModule::CreateFromHandle(slot_element->slot)); 234 crypto::ScopedPK11Slot slot(GetPublicSlot()); 237 slot 117 ListCertsInSlot(const ListCertsCallback& callback, PK11SlotInfo* slot) argument 383 PK11SlotInfo* slot = cert->os_cert_handle()->slot; local 388 PK11SlotInfo* slot = cert->os_cert_handle()->slot; local 406 ListCertsImpl(crypto::ScopedPK11Slot slot, CertificateList* certs) argument [all...] |
H A D | nss_cert_database.h | 126 // Get a list of certificates in the certificate database of the given slot. 132 PK11SlotInfo* slot); 135 // Get the slot for system-wide key data. May be NULL if the system token was 137 // Note: The System slot is set after the NSSCertDatabase is constructed and 144 // Get the default slot for public key data. 147 // Get the default slot for private key or mixed private/public key data. 243 // Check whether cert is stored in a readonly slot. 246 // Check whether cert is stored in a hardware slot. 256 // If |slot| is NULL, obtains the certs of all slots, otherwise only of 257 // |slot| [all...] |