/external/chromium_org/third_party/cld/encodings/compact_lang_det/ |
H A D | tote.cc | 17 memset(key_, 0, sizeof(key_)); 28 memset(key_, 0, sizeof(key_)); 56 if (key_[sub0] == ikey) { 61 if (key_[sub1] == ikey) { 66 if (key_[sub2] == ikey) { 73 if (key_[sub0] == 0) { 75 } else if (key_[sub1] == 0) { 77 } else if (key_[sub [all...] |
/external/chromium_org/base/ |
H A D | supports_user_data_unittest.cc | 19 key_(key) { 23 EXPECT_EQ(NULL, supports_user_data_->GetUserData(key_)); 27 const void* key_; member in struct:base::__anon2485::UsesItself
|
/external/chromium_org/components/ownership/ |
H A D | owner_key_util.cc | 23 PrivateKey::PrivateKey(crypto::RSAPrivateKey* key) : key_(key) {
|
/external/libcxxabi/src/ |
H A D | cxa_exception_storage.cpp | 57 pthread_key_t key_; member in namespace:__cxxabiv1::__anon23626 62 if ( 0 != ::pthread_setspecific ( key_, NULL ) ) 67 if ( 0 != pthread_key_create ( &key_, destruct_ ) ) 83 if ( 0 != pthread_setspecific ( key_, retVal ) ) 98 return static_cast<__cxa_eh_globals*>(::pthread_getspecific(key_));
|
/external/chromium_org/base/test/ |
H A D | scoped_path_override.cc | 12 ScopedPathOverride::ScopedPathOverride(int key) : key_(key) { 20 : key_(key) { 26 bool result = PathService::RemoveOverride(key_);
|
H A D | scoped_path_override.h | 28 int key_; member in class:base::ScopedPathOverride
|
/external/chromium_org/crypto/ |
H A D | symmetric_key.h | 61 const std::string& key() { return key_; } 63 HCRYPTKEY key() const { return key_.get(); } 65 PK11SymKey* key() const { return key_.get(); } 76 std::string key_; member in class:crypto::SymmetricKey 82 ScopedHCRYPTKEY key_; member in class:crypto::SymmetricKey 86 // |key_|. This is the case of HMAC keys when the key size exceeds 16 bytes 93 ScopedPK11SymKey key_; member in class:crypto::SymmetricKey
|
H A D | rsa_private_key_nss.cc | 77 if (key_) 78 SECKEY_DestroyPrivateKey(key_); 133 copy->key_ = SECKEY_CopyPrivateKey(key); 135 if (!copy->key_ || !copy->public_key_) { 164 result->key_ = PK11_FindKeyByKeyID(item->module->slots[i], 166 if (result->key_) 193 result->key_ = PK11_FindKeyByKeyID(slot, ck_id.get(), NULL); 194 if (!result->key_) 202 copy->key_ = SECKEY_CopyPrivateKey(key_); [all...] |
H A D | rsa_private_key_openssl.cc | 65 result->key_ = EVP_PKEY_new(); 66 if (!result->key_ || !EVP_PKEY_set1_RSA(result->key_, rsa_key.get())) 94 result->key_ = EVP_PKCS82PKEY(p8inf.get()); 95 if (!result->key_) 107 copy->key_ = EVP_PKEY_dup(key); 112 : key_(NULL) { 116 if (key_) 117 EVP_PKEY_free(key_); 122 ScopedRSA rsa(EVP_PKEY_get1_RSA(key_)); [all...] |
H A D | rsa_private_key_nss_unittest.cc | 37 EXPECT_EQ(key_pair->key_->pkcs11ID, key_pair_2->key_->pkcs11ID); 48 if (key_pair->key_) { 49 PK11_DestroyTokenObject(key_pair->key_->pkcs11Slot, 50 key_pair->key_->pkcs11ID);
|
H A D | symmetric_key_openssl.cc | 20 std::fill(key_.begin(), key_.end(), '\0'); // Zero out the confidential key. 43 reinterpret_cast<uint8*>(WriteInto(&key->key_, key_size_in_bytes + 1)); 74 reinterpret_cast<uint8*>(WriteInto(&key->key_, key_size_in_bytes + 1)); 95 key->key_ = raw_key; 100 *raw_key = key_;
|
H A D | ec_private_key_openssl.cc | 84 if (key_) 85 EVP_PKEY_free(key_); 100 result->key_ = EVP_PKEY_new(); 101 if (!result->key_ || !EVP_PKEY_set1_EC_KEY(result->key_, ec_key.get())) 104 CHECK_EQ(EVP_PKEY_EC, EVP_PKEY_type(result->key_->type)); 149 result->key_ = EVP_PKCS82PKEY(p8_decrypted.get()); 150 if (!result->key_ || EVP_PKEY_type(result->key_->type) != EVP_PKEY_EC) 162 ScopedPKCS8_PRIV_KEY_INFO pkcs8(EVP_PKEY2PKCS8(key_)); [all...] |
/external/chromium_org/third_party/libaddressinput/src/cpp/test/ |
H A D | fake_storage_test.cc | 40 key_(), 46 std::string key_; member in class:__anon12583::FakeStorageTest 54 key_ = key; 68 EXPECT_EQ("key", key_); 77 EXPECT_EQ("key", key_); 87 EXPECT_EQ("key", key_);
|
H A D | rule_retriever_test.cc | 47 key_(), 53 std::string key_; member in class:__anon12596::RuleRetrieverTest 62 key_ = key; 75 EXPECT_EQ(kExistingKey, key_); 85 EXPECT_EQ(kMissingKey, key_);
|
H A D | validating_storage_test.cc | 55 key_(), 62 std::string key_; member in class:__anon12607::ValidatingStorageTest 70 key_ = key; 85 EXPECT_EQ(kKey, key_); 94 EXPECT_EQ(kKey, key_); 102 EXPECT_EQ(kKey, key_); 112 EXPECT_EQ(kKey, key_); 122 EXPECT_EQ(kKey, key_);
|
/external/chromium_org/content/browser/indexed_db/ |
H A D | indexed_db_blob_info.cc | 14 : is_file_(false), size_(-1), key_(DatabaseMetaDataKey::kInvalidBlobKey) { 24 key_(DatabaseMetaDataKey::kInvalidBlobKey) { 30 : is_file_(false), type_(type), size_(size), key_(key) { 43 key_(DatabaseMetaDataKey::kInvalidBlobKey) { 49 : is_file_(true), type_(type), size_(-1), file_name_(file_name), key_(key) { 77 DCHECK_EQ(DatabaseMetaDataKey::kInvalidBlobKey, key_); 78 key_ = key;
|
/external/chromium_org/base/win/ |
H A D | registry.cc | 40 : key_(NULL), 46 : key_(key), 52 : key_(NULL), 84 key_ = subhkey; 103 LONG result = RegCreateKeyEx(key_, name, 0, NULL, REG_OPTION_NON_VOLATILE, 107 key_ = subkey; 121 key_ = subhkey; 140 LONG result = RegOpenKeyEx(key_, relative_key_name, 0, access, &subkey); 146 key_ = subkey; 154 if (key_) { [all...] |
/external/chromium_org/components/autofill/core/browser/crypto/ |
H A D | rc4_decryptor.h | 72 state = &key_.state[0]; 76 key_.x = key_.y = 0; 91 x = key_.x; 92 y = key_.y; 93 state = &key_.state[0]; 101 key_.x = x; 102 key_.y = y; 105 Rc4Key key_; member in class:autofill::RC4Decryptor
|
/external/chromium_org/content/child/webcrypto/nss/ |
H A D | key_nss.h | 51 PK11SymKey* key() { return key_.get(); } 59 crypto::ScopedPK11SymKey key_; member in class:content::webcrypto::SymKeyNss 71 SECKEYPublicKey* key() { return key_.get(); } 79 crypto::ScopedSECKEYPublicKey key_; member in class:content::webcrypto::PublicKeyNss 92 SECKEYPrivateKey* key() { return key_.get(); } 100 crypto::ScopedSECKEYPrivateKey key_; member in class:content::webcrypto::PrivateKeyNss
|
/external/chromium_org/third_party/libaddressinput/chromium/ |
H A D | storage_test_runner.cc | 21 key_(), 34 key_.clear(); 48 key_ = key; 61 EXPECT_EQ("key", key_); 72 EXPECT_EQ("key", key_); 84 EXPECT_EQ("key", key_);
|
/external/openfst/src/include/fst/ |
H A D | heap.h | 68 pos_[key_[size_]] = size_; 72 key_.push_back(size_); 146 int tkey = key_[j]; 147 pos_[key_[j] = key_[k]] = j; 148 pos_[key_[k] = tkey] = k; 190 return key_[i]; 197 vector<int> key_; member in class:fst::Heap
|
/external/srec/tools/thirdparty/OpenFst/fst/lib/ |
H A D | heap.h | 62 pos_[key_[size_]] = size_; 66 key_.push_back(size_); 138 int tkey = key_[j]; 139 pos_[key_[j] = key_[k]] = j; 140 pos_[key_[k] = tkey] = k; 177 return key_[i]; 185 vector<int> key_; member in class:fst::Heap
|
/external/chromium_org/remoting/base/ |
H A D | rsa_key_pair.cc | 22 : key_(key.Pass()){ 23 DCHECK(key_); 60 DCHECK(key_.get() != NULL); 63 CHECK(key_->ExportPrivateKey(&key_buf)); 72 CHECK(key_->ExportPublicKey(&public_key)); 81 crypto::SignatureCreator::Create(key_.get(), 95 // Certificates are SHA1-signed because |key_| has likely been used to sign 99 key_.get(),
|
/external/chromium_org/v8/src/compiler/ |
H A D | node-cache.cc | 60 int hash = NodeCacheHash(old->key_); 66 entry->key_ = old->key_; 87 entry->key_ = key; 97 if (entry->key_ == key) return &entry->value_; 99 entry->key_ = key; 109 entry->key_ = key;
|
/external/chromium_org/ui/base/ |
H A D | view_prop.cc | 38 const char* key() const { return key_; } 47 return (d1->view_ == d2->view_) ? (d1->key_ < d2->key_) : 56 key_(key), 71 const char* key_; member in class:ui::ViewProp::Data
|