/external/chromium_org/content/child/webcrypto/ |
H A D | structured_clone.h | 20 blink::WebVector<uint8_t>* key_data); 27 const CryptoData& key_data,
|
H A D | platform_crypto.h | 36 blink::WebVector<uint8_t>* key_data);
|
H A D | structured_clone.cc | 104 blink::WebVector<uint8_t>* key_data) { 105 return PlatformSerializeKeyForClone(key, key_data); 113 const CryptoData& key_data, 124 key_data, 103 SerializeKeyForClone(const blink::WebCryptoKey& key, blink::WebVector<uint8_t>* key_data) argument 109 DeserializeKeyForClone(const blink::WebCryptoKeyAlgorithm& algorithm, blink::WebCryptoKeyType type, bool extractable, blink::WebCryptoKeyUsageMask usage_mask, const CryptoData& key_data, blink::WebCryptoKey* key) argument
|
/external/chromium_org/content/child/webcrypto/nss/ |
H A D | sym_key_nss.cc | 41 const SECItem* key_data = PK11_GetKeyData(pk11_key.get()); local 42 if (!key_data) 46 pk11_key.Pass(), CryptoData(key_data->data, key_data->len))); 56 Status ImportKeyRawNss(const CryptoData& key_data, argument 64 SECItem key_item = MakeSECItemForBuffer(key_data); 79 scoped_ptr<SymKeyNss> handle(new SymKeyNss(pk11_sym_key.Pass(), key_data));
|
H A D | sym_key_nss.h | 26 Status ImportKeyRawNss(const CryptoData& key_data,
|
H A D | aes_key_nss.h | 51 virtual Status ImportKeyRaw(const CryptoData& key_data, 57 virtual Status ImportKeyJwk(const CryptoData& key_data,
|
H A D | aes_key_nss.cc | 77 Status AesAlgorithm::ImportKeyRaw(const CryptoData& key_data, argument 82 const unsigned int keylen_bytes = key_data.byte_length(); 91 key_data, 100 Status AesAlgorithm::ImportKeyJwk(const CryptoData& key_data, argument 107 key_data, jwk_suffix_, extractable, usage_mask, &raw_data);
|
H A D | aes_kw_nss.cc | 189 const SECItem* const key_data = PK11_GetKeyData(decrypted.get()); variable 190 if (!key_data) 192 buffer->assign(key_data->data, key_data->data + key_data->len);
|
/external/chromium_org/native_client_sdk/src/tests/nacl_io_test/fake_ppapi/ |
H A D | fake_var_dictionary_interface.cc | 31 FakeVarData* key_data = manager_->GetVarData(key); local 33 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 34 const std::string& key_string = key_data->string_value; 49 FakeVarData* key_data = manager_->GetVarData(key); local 51 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 53 const std::string& key_string = key_data->string_value; 63 FakeVarData* key_data = manager_->GetVarData(key); local 65 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 67 const std::string& key_string = key_data->string_value; 78 FakeVarData* key_data local 80 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local [all...] |
/external/chromium_org/mojo/services/public/cpp/input_events/lib/ |
H A D | input_events_type_converters.cc | 121 KeyDataPtr key_data(KeyData::New()); 122 key_data->key_code = key_event->GetConflatedWindowsKeyCode(); 123 key_data->native_key_code = key_event->platform_keycode(); 124 key_data->is_char = key_event->is_char(); 125 key_data->character = key_event->GetCharacter(); 131 key_data->windows_key_code = static_cast<mojo::KeyboardCode>( 133 key_data->text = data->text(); 134 key_data->unmodified_text = data->unmodified_text(); 136 key_data->windows_key_code = static_cast<mojo::KeyboardCode>( 138 key_data [all...] |
/external/chromium_org/chrome/browser/local_discovery/wifi/ |
H A D | credential_getter_win.cc | 57 void CredentialGetterWin::OnGotCredentials(const std::string& key_data, argument 59 PostCallback(success, key_data); 63 const std::string& key_data) { 65 base::Bind(callback_, success, key_data)); 62 PostCallback(bool success, const std::string& key_data) argument
|
H A D | credential_getter_win.h | 35 void OnGotCredentials(const std::string& key_data, bool success); 39 void PostCallback(bool success, const std::string& key_data);
|
/external/chromium_org/content/child/webcrypto/openssl/ |
H A D | sym_key_openssl.cc | 43 Status ImportKeyRawOpenSsl(const CryptoData& key_data, argument 48 *key = blink::WebCryptoKey::create(new SymKeyOpenSsl(key_data),
|
H A D | sym_key_openssl.h | 23 Status ImportKeyRawOpenSsl(const CryptoData& key_data,
|
H A D | aes_key_openssl.cc | 69 Status AesAlgorithm::ImportKeyRaw(const CryptoData& key_data, argument 74 const unsigned int keylen_bytes = key_data.byte_length(); 83 key_data, 90 Status AesAlgorithm::ImportKeyJwk(const CryptoData& key_data, argument 97 key_data, jwk_suffix_, extractable, usage_mask, &raw_data);
|
H A D | rsa_key_openssl.h | 58 virtual Status ImportKeyPkcs8(const CryptoData& key_data, 64 virtual Status ImportKeySpki(const CryptoData& key_data, 70 virtual Status ImportKeyJwk(const CryptoData& key_data,
|
H A D | aes_key_openssl.h | 43 virtual Status ImportKeyRaw(const CryptoData& key_data, 49 virtual Status ImportKeyJwk(const CryptoData& key_data,
|
H A D | key_openssl.cc | 65 blink::WebVector<uint8_t>* key_data) { 67 *key_data = openssl_key->serialized_key_data(); 64 PlatformSerializeKeyForClone(const blink::WebCryptoKey& key, blink::WebVector<uint8_t>* key_data) argument
|
/external/chromium_org/crypto/ |
H A D | symmetric_key_openssl.cc | 42 uint8* key_data = local 45 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); 73 uint8* key_data = local 79 key_data);
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
H A D | networking_private_credentials_getter_mac.cc | 50 std::string key_data; local 52 wifi_service->GetKeyFromSystem(network_guid, &key_data, &error); 62 public_key_data, key_data, &ciphertext)) {
|
/external/chromium_org/net/extras/sqlite/ |
H A D | sqlite_channel_id_store_unittest.cc | 215 std::string key_data; local 217 ReadTestKeyAndCert(&key_data, &cert_data); 236 add_smt.BindBlob(1, key_data.data(), key_data.size()); 282 std::string key_data; local 284 ReadTestKeyAndCert(&key_data, &cert_data); 305 add_smt.BindBlob(1, key_data.data(), key_data.size()); 331 ASSERT_EQ(key_data, channel_ids[0]->private_key()); 363 std::string key_data; local 448 std::string key_data; local [all...] |
/external/chromium_org/chromeos/cryptohome/ |
H A D | homedir_methods_unittest.cc | 137 KeyData* key_data = reply->add_key_data(); local 138 key_data->set_type(KeyData::KEY_TYPE_PASSWORD); 139 key_data->set_label(kKeyLabel); 140 key_data->mutable_privileges()->set_update(false); 141 key_data->set_revision(kKeyRevision); 142 key_data->add_authorization_data()->set_type( 144 KeyProviderData* data = key_data->mutable_provider_data();
|
/external/chromium_org/net/cert/ |
H A D | ct_log_verifier_nss.cc | 73 SECItem key_data; local 77 key_data.data = reinterpret_cast<unsigned char*>( 79 key_data.len = public_key.size(); 82 SECKEY_DecodeDERSubjectPublicKeyInfo(&key_data);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 130 if (data->key_data) { 131 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 132 data->key_data = NULL; 194 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 198 if (data->key_data) { 200 data->key_data, EAP_TLS_KEY_LEN); 202 data->key_data + EAP_TLS_KEY_LEN, 301 return data->key_data != NULL; 310 if (data->key_data [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 130 if (data->key_data) { 131 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 132 data->key_data = NULL; 194 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 198 if (data->key_data) { 200 data->key_data, EAP_TLS_KEY_LEN); 202 data->key_data + EAP_TLS_KEY_LEN, 301 return data->key_data != NULL; 310 if (data->key_data [all...] |