summaryrefslogtreecommitdiffstats
path: root/crypto/symmetric_key_win.cc
diff options
context:
space:
mode:
authordcheng@chromium.org <dcheng@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-04-11 16:46:51 +0000
committerdcheng@chromium.org <dcheng@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-04-11 16:46:51 +0000
commitbbd87929395af478b1ed955ca479590902d5eeba (patch)
treebe52c6c0babc9bc50c1fff4860da449ff23f294a /crypto/symmetric_key_win.cc
parent681c568bdde24a8d438b6bb8b1cca07fba87ed6f (diff)
downloadchromium_src-bbd87929395af478b1ed955ca479590902d5eeba.zip
chromium_src-bbd87929395af478b1ed955ca479590902d5eeba.tar.gz
chromium_src-bbd87929395af478b1ed955ca479590902d5eeba.tar.bz2
Rewrite scoped_array<T> to scoped_ptr<T[]> in crypto.
This is a manual cleanup pass using sed for files which are not built on Linux. BUG=171111 Review URL: https://chromiumcodereview.appspot.com/13831003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@193667 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'crypto/symmetric_key_win.cc')
-rw-r--r--crypto/symmetric_key_win.cc6
1 files changed, 3 insertions, 3 deletions
diff --git a/crypto/symmetric_key_win.cc b/crypto/symmetric_key_win.cc
index f4cd751..b3d65f6 100644
--- a/crypto/symmetric_key_win.cc
+++ b/crypto/symmetric_key_win.cc
@@ -168,7 +168,7 @@ bool GenerateHMACKey(size_t key_size_in_bits,
ALG_ID alg,
ScopedHCRYPTPROV* provider,
ScopedHCRYPTKEY* key,
- scoped_array<BYTE>* raw_key) {
+ scoped_ptr<BYTE[]>* raw_key) {
DCHECK(provider);
DCHECK(key);
DCHECK(raw_key);
@@ -185,7 +185,7 @@ bool GenerateHMACKey(size_t key_size_in_bits,
return false;
DWORD key_size_in_bytes = static_cast<DWORD>(key_size_in_bits / 8);
- scoped_array<BYTE> random(new BYTE[key_size_in_bytes]);
+ scoped_ptr<BYTE[]> random(new BYTE[key_size_in_bytes]);
ok = CryptGenRandom(safe_provider, key_size_in_bytes, random.get());
if (!ok)
return false;
@@ -320,7 +320,7 @@ SymmetricKey* SymmetricKey::GenerateRandomKey(Algorithm algorithm,
ScopedHCRYPTKEY key;
bool ok = false;
- scoped_array<BYTE> raw_key;
+ scoped_ptr<BYTE[]> raw_key;
switch (algorithm) {
case AES: