Sign 59 base/numerics/safe_conversions_impl.h template <typename Dst, typename Src, IntegerRepresentation Sign> Sign 60 base/numerics/safe_conversions_impl.h struct StaticDstRangeRelationToSrcRange<Dst, Src, Sign, Sign> { Sign 208 base/strings/string_number_conversions.cc template<typename Sign> Sign 234 base/strings/string_number_conversions.cc if (!Sign::CheckBounds(output, new_digit)) { Sign 240 base/strings/string_number_conversions.cc Sign::Increment(new_digit, output); Sign 91 chrome/browser/chromeos/login/managed/supervised_user_authentication.cc if (!hmac.Sign(buffer, out_bytes, sizeof(out_bytes))) Sign 265 chrome/browser/devtools/adb/android_rsa.cc if (!crypto::SignatureCreator::Sign(key, vector_as_array(&digest), Sign 25 chrome/browser/extensions/api/music_manager_private/device_id.cc hmac.Sign(text, &digest[0], digest.size()); Sign 164 chrome/browser/internal_auth.cc if (!engine->Sign(blob, hmac_data, kHMACSizeInBytes)) { Sign 25 chrome/browser/prefs/pref_hash_calculator.cc if (!hmac.Init(key) || !hmac.Sign(message, &digest[0], digest.size())) { Sign 65 chrome/browser/prefs/tracked/pref_hash_calculator_helper_win_unittest.cc hmac.Sign(kFakeExtensionId, &digest[0], digest.size()); Sign 24 chrome/browser/profile_resetter/jtl_foundation.cc if (!hmac_.Sign(input, digest, arraysize(digest))) { Sign 72 components/nacl/loader/nacl_validation_query.cc CHECK(hasher_.Sign(base::StringPiece(data, length), Sign 111 components/nacl/loader/nacl_validation_query.cc CHECK(hasher_.Sign(base::StringPiece(buffer_, buffer_length_), temp, Sign 36 components/rappor/byte_vector_utils.cc if (!hmac.Sign(data, &key[0], key.size())) Sign 46 components/rappor/byte_vector_utils.cc return hmac.Sign(ByteVectorAsStringPiece(*value), Sign 151 content/browser/renderer_host/p2p/socket_host.cc if (!hmac.Sign(base::StringPiece(rtp, auth_required_length), Sign 117 content/child/webcrypto/shared_crypto.h CONTENT_EXPORT Status Sign(const blink::WebCryptoAlgorithm& algorithm, Sign 795 content/child/webcrypto/shared_crypto_unittest.cc Sign(algorithm, key, CryptoData(test_message), &output)); Sign 1660 content/child/webcrypto/shared_crypto_unittest.cc ASSERT_STATUS_SUCCESS(Sign(CreateAlgorithm(blink::WebCryptoAlgorithmIdHmac), Sign 2305 content/child/webcrypto/shared_crypto_unittest.cc Sign(algorithm, private_key, CryptoData(data), &signature)); Sign 2356 content/child/webcrypto/shared_crypto_unittest.cc Sign(algorithm, public_key, CryptoData(data), &signature)); Sign 2362 content/child/webcrypto/shared_crypto_unittest.cc Sign(algorithm, private_key, CryptoData(data), &signature)); Sign 2381 content/child/webcrypto/shared_crypto_unittest.cc Sign(CreateAlgorithm(blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5), Sign 2453 content/child/webcrypto/shared_crypto_unittest.cc Sign(algorithm, private_key, CryptoData(test_message), &signature)); Sign 170 content/child/webcrypto/webcrypto_impl.cc Status status = webcrypto::Sign( Sign 23 content/public/browser/media_device_id.cc hmac.Sign(raw_unique_id + salt, &digest[0], digest.size()); Sign 51 crypto/ec_signature_creator.h virtual bool Sign(const uint8* data, Sign 18 crypto/ec_signature_creator_impl.h virtual bool Sign(const uint8* data, Sign 42 crypto/ec_signature_creator_unittest.cc ASSERT_TRUE(signer->Sign(reinterpret_cast<const uint8*>(data.c_str()), Sign 37 crypto/hkdf.cc result = prk_hmac.Sign(secret, prk, sizeof(prk)); Sign 66 crypto/hkdf.cc result = hmac.Sign(base::StringPiece(buf.get(), j), digest, sizeof(digest)); Sign 50 crypto/hmac.cc if (!Sign(data, computed_digest.get(), digest_length)) Sign 65 crypto/hmac.h bool Sign(const base::StringPiece& data, unsigned char* digest, Sign 81 crypto/hmac_unittest.cc EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize)); Sign 151 crypto/hmac_unittest.cc EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); Sign 177 crypto/hmac_unittest.cc EXPECT_TRUE(hmac.Sign(data, calculated_hmac, kSHA256DigestSize)); Sign 218 crypto/hmac_unittest.cc EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize)); Sign 233 crypto/hmac_unittest.cc EXPECT_TRUE(hmac2.Sign(message_data, calculated_hmac2, kSHA256DigestSize)); Sign 246 crypto/hmac_unittest.cc EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); Sign 39 crypto/signature_creator.h static bool Sign(RSAPrivateKey* key, Sign 77 crypto/signature_creator_unittest.cc ASSERT_TRUE(crypto::SignatureCreator::Sign( Sign 78 google_apis/cup/client_update_protocol.cc if (!hmac.Sign(ByteVectorToSP(hashes), &result[0], result.size())) Sign 207 google_apis/gaia/oauth_request_signer.cc hmac.Sign(text, digest, kHmacDigestLength); Sign 24 net/quic/crypto/channel_id.h virtual bool Sign(const std::string& hostname, Sign 229 net/quic/crypto/channel_id_test.cc ASSERT_TRUE(signer->Sign(hostname, signed_data, &key, &signature)); Sign 464 net/quic/crypto/quic_crypto_client_config.cc if (!channel_id_signer_->Sign(server_id.host(), hkdf_input, Sign 160 net/spdy/spdy_test_util_common.h virtual bool Sign(const uint8* data, Sign 61 remoting/protocol/auth_util.cc if (!response.Sign(shared_secret, out_bytes, kAuthDigestLength)) { Sign 68 remoting/protocol/authentication_method.cc if (!response.Sign(shared_secret, out_bytes, sizeof(out_bytes))) { Sign 146 sync/util/nigori.cc if (!hmac.Sign(ciphertext, &hash[0], hash.size())) Sign 182 sync/util/nigori.cc if (!hmac.Sign(ciphertext, &hash[0], hash.size())) Sign 220 sync/util/nigori.cc if (!hmac.Sign(ciphertext, &expected[0], expected.size()))