Searched refs:tmp_key (Results 1 – 3 of 3) sorted by relevance
216 void *tmp_key = NULL; in str_parms_add_str() local225 tmp_key = strdup(key); in str_parms_add_str()226 if (tmp_key == NULL) { in str_parms_add_str()235 old_val = hashmapPut(str_parms->map, tmp_key, tmp_val); in str_parms_add_str()242 RELEASE_OWNERSHIP(tmp_key); in str_parms_add_str()244 tmp_key = tmp_val = NULL; in str_parms_add_str()253 free(tmp_key); in str_parms_add_str()
1362 base::FilePath tmp_key; in ValidateMetadataSignature() local1363 if (GetPublicKeyFromResponse(&tmp_key)) in ValidateMetadataSignature()1364 path_to_public_key = tmp_key; in ValidateMetadataSignature()1365 ScopedPathUnlinker tmp_key_remover(tmp_key.value()); in ValidateMetadataSignature()1366 if (tmp_key.empty()) in ValidateMetadataSignature()1568 base::FilePath tmp_key; in VerifyPayload() local1569 if (GetPublicKeyFromResponse(&tmp_key)) in VerifyPayload()1570 path_to_public_key = tmp_key; in VerifyPayload()1571 ScopedPathUnlinker tmp_key_remover(tmp_key.value()); in VerifyPayload()1572 if (tmp_key.empty()) in VerifyPayload()
898 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> tmp_key(km0_engine_->GetKeymaster0PublicKey(blob)); in ParseKeymaster0HwBlob() local900 if (!tmp_key) in ParseKeymaster0HwBlob()904 keymaster_error_t error = FakeKeyAuthorizations(tmp_key.get(), hw_enforced, sw_enforced); in ParseKeymaster0HwBlob()