/third_party/openssl/crypto/dh/ |
D | dh_kdf.c | 51 const unsigned char *ukm, size_t ukmlen) in dh_sharedinfo_encode() argument 71 if (ukm) { in dh_sharedinfo_encode() 74 ukm_oct.data = (unsigned char *)ukm; in dh_sharedinfo_encode() 101 const unsigned char *ukm, size_t ukmlen, const EVP_MD *md) in DH_KDF_X9_42() argument 115 derlen = dh_sharedinfo_encode(&der, &ctr, key_oid, outlen, ukm, ukmlen); in DH_KDF_X9_42()
|
D | dh_ameth.c | 677 ASN1_OCTET_STRING *ukm; in dh_cms_set_shared_info() local 685 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in dh_cms_set_shared_info() 731 if (ukm) { in dh_cms_set_shared_info() 732 dukmlen = ASN1_STRING_length(ukm); in dh_cms_set_shared_info() 733 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_set_shared_info() 787 ASN1_OCTET_STRING *ukm; in dh_cms_encrypt() local 846 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in dh_cms_encrypt() 875 if (ukm) { in dh_cms_encrypt() 876 dukmlen = ASN1_STRING_length(ukm); in dh_cms_encrypt() 877 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_encrypt()
|
/third_party/openssl/crypto/ec/ |
D | ec_ameth.c | 741 ASN1_OCTET_STRING *ukm; in ecdh_cms_set_shared_info() local 748 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info() 779 plen = CMS_SharedInfo_encode(&der, kekalg, ukm, keylen); in ecdh_cms_set_shared_info() 833 ASN1_OCTET_STRING *ukm; in ecdh_cms_encrypt() local 902 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in ecdh_cms_encrypt() 933 penclen = CMS_SharedInfo_encode(&penc, wrap_alg, ukm, keylen); in ecdh_cms_encrypt()
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_CTX_ctrl.pod | 119 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len); 120 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm); 134 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len); 135 int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm); 353 B<ukm> and its length to B<len> for DH key derivation. This parameter is optional 357 free the original memory pointed to by B<ukm>. 415 The EVP_PKEY_CTX_set0_ecdh_kdf_ukm() macro sets the user key material to B<ukm> 418 so the caller should not free the original memory pointed to by B<ukm>.
|
/third_party/openssl/crypto/cms/ |
D | cms_asn1.c | 167 ASN1_EXP_OPT(CMS_KeyAgreeRecipientInfo, ukm, ASN1_OCTET_STRING, 1), 376 ASN1_OCTET_STRING *ukm, int keylen) 399 ecsi.entityUInfo = ukm;
|
D | cms_local.h | 160 ASN1_OCTET_STRING *ukm; member
|
D | cms_kari.c | 34 *pukm = ri->d.kari->ukm; in CMS_RecipientInfo_kari_get0_alg()
|
/third_party/cef/libcef/browser/net_service/ |
D | url_loader_factory_getter.cc | 67 url::Origin(), absl::nullopt /* navigation_id */, ukm::SourceIdObj(), in Create()
|
/third_party/cef/libcef/browser/alloy/ |
D | alloy_content_browser_client.h | 164 ukm::SourceIdObj ukm_source_id, 178 ukm::SourceIdObj ukm_source_id,
|
D | alloy_content_browser_client.cc | 1200 ukm::SourceIdObj ukm_source_id, in RegisterNonNetworkNavigationURLLoaderFactories() 1273 ukm::SourceIdObj ukm_source_id, in WillCreateURLLoaderFactory()
|
/third_party/cef/libcef/browser/chrome/ |
D | chrome_content_browser_client_cef.h | 56 ukm::SourceIdObj ukm_source_id,
|
D | chrome_content_browser_client_cef.cc | 214 ukm::SourceIdObj ukm_source_id, in WillCreateURLLoaderFactory()
|
/third_party/openssl/include/openssl/ |
D | dh.h | 180 const unsigned char *ukm, size_t ukmlen, const EVP_MD *md);
|
D | cms.h | 328 ASN1_OCTET_STRING *ukm, int keylen);
|
/third_party/chromium/patch/ |
D | 0004-3.2-Beta5.patch | 28977 ukm::SourceId source_id_ = ukm::kInvalidSourceId; 30254 "//components/ukm:test_support", 30255 "//components/ukm/content",
|
D | 0003-3.2-Beta3-1115.patch | 40972 #include "components/ukm/content/source_url_recorder.h"
|