HomeSort by relevance Sort by last modified time
    Searched defs:key (Results 151 - 175 of 3317) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/chromium_org/chrome/browser/chromeos/policy/
device_local_account_policy_store.cc 83 policy_map_.Set(key::kLidCloseAction,
92 policy_map_.Set(key::kShelfAutoHideBehavior,
99 policy_map_.Set(key::kShowLogoutButtonInTray,
109 policy_map_.Set(key::kExtensionAllowedTypes,
168 scoped_refptr<chromeos::OwnerKey> key = local
170 if (!key.get() || !key->public_key()) {
185 validator->ValidateSignature(*key->public_key(), false);
  /external/chromium_org/chrome/browser/chromeos/settings/
device_settings_service_unittest.cc 260 // Check the new key has been loaded.
261 std::vector<uint8> key; local
262 ASSERT_TRUE(device_policy_.GetNewSigningKey()->ExportPublicKey(&key));
263 EXPECT_EQ(*device_settings_service_.GetOwnerKey()->public_key(), key);
296 std::vector<uint8> key; local
297 ASSERT_TRUE(device_policy_.GetSigningKey()->ExportPublicKey(&key));
298 EXPECT_EQ(*device_settings_service_.GetOwnerKey()->public_key(), key);
314 ASSERT_TRUE(device_policy_.GetSigningKey()->ExportPublicKey(&key));
315 EXPECT_EQ(*device_settings_service_.GetOwnerKey()->public_key(), key);
  /external/chromium_org/chrome/browser/chromeos/system_logs/
lsb_release_log_source.cc 62 std::string key, value; local
63 TrimWhitespaceASCII(pairs[i].first, TRIM_ALL, &key);
66 if (key.empty())
68 if (!IsStringUTF8(value) || !IsStringUTF8(key)) {
69 LOG(WARNING) << "Invalid characters in system log entry: " << key;
70 (*response)[key] = kInvalidLogEntry;
75 (*response)[key] = kEmptyLogEntry;
77 (*response)[key] = value;
  /external/chromium_org/chrome/browser/extensions/api/storage/
setting_sync_data.cc 53 specifics.key() << " had bad JSON for value: " << specifics.value();
59 specifics.key(),
66 const std::string& key,
68 : internal_(new Internal(change_type, extension_id, key, value.Pass())) {}
80 const std::string& SettingSyncData::key() const { function in class:extensions::SettingSyncData
91 const std::string& key,
95 key_(key),
settings_sync_processor.cc 40 synced_keys_.insert(i.key());
56 const std::string& key = i->key(); local
59 if (synced_keys_.count(key)) {
60 // New value, key is synced; send ACTION_UPDATE.
62 extension_id_, key, *value, type_));
64 // New value, key is not synced; send ACTION_ADD.
66 extension_id_, key, *value, type_));
67 added_keys.insert(key);
70 if (synced_keys_.count(key)) {
    [all...]
  /external/chromium_org/chrome/browser/extensions/
external_registry_loader_win.cc 29 // Registry value of of that key that defines the path to the .crx file.
32 // Registry value of that key that defines the current version of the .crx file.
68 // policy conventions. We only fall back to HKCU if the HKLM key cannot be
69 // opened, not if the data within the key is invalid, for example.
72 base::win::RegKey key; local
76 if (key.Open(HKEY_LOCAL_MACHINE,
78 if (key.Open(HKEY_CURRENT_USER,
80 LOG(ERROR) << "Unable to read registry key at path (HKLM & HKCU): "
87 if (key.ReadValue(kRegistryExtensionPath, &extension_path_str)
91 << " for key " << key_path << "."
    [all...]
  /external/chromium_org/chrome/browser/parsers/
metadata_parser_filebase_unittest.cc 82 std::string key, value; local
85 EXPECT_TRUE(iter->GetNext(&key, &value));
88 ASSERT_TRUE(expectations.find(key) != expectations.end());
89 EXPECT_EQ(expectations[key], value);
91 expectations.erase(key);
95 EXPECT_FALSE(iter->GetNext(&key, &value));
  /external/chromium_org/chrome/browser/policy/cloud/
component_cloud_policy_updater.cc 78 // Encode |ns| into a string |key|.
80 const std::string key = local
86 external_policy_data_updater_.CancelExternalDataFetch(key);
94 key,
  /external/chromium_org/chrome/browser/predictors/
resource_prefetcher_manager.cc 58 std::string key = key_type == PREFETCH_KEY_TYPE_HOST ? local
60 PrefetcherMap::iterator prefetcher_it = prefetcher_map_.find(key);
66 prefetcher_map_.insert(std::make_pair(key, prefetcher));
107 const std::string key = local
110 PrefetcherMap::iterator it = prefetcher_map_.find(key);
  /external/chromium_org/chrome/browser/ui/autofill/
autofill_dialog_models.h 39 // Adds an item and its identifying key to the model. Keys needn't be unique.
40 void AddKeyedItem(const std::string& key, const string16& display_label);
44 void AddKeyedItemWithIcon(const std::string& key,
48 // Adds a label with a sublabel and its identifying key to the model.
50 void AddKeyedItemWithSublabel(const std::string& key,
56 void AddKeyedItemWithSublabelAndIcon(const std::string& key,
64 // Returns the ID key for the item at |index|.
67 // Returns the ID key for the item at |checked_item_|, or an empty string if
75 // Sets the item to be checked to the |n|th item that has key |item_key|.
83 // Enable/disable an item by key
97 std::string key; \/\/ The key of the item. member in struct:autofill::SuggestionsMenuModel::Item
    [all...]
  /external/chromium_org/chrome/browser/ui/webui/translate_internals/
translate_internals_ui.cc 29 // Sets the languages to |dict|. Each key is a language code and each value is
58 std::string key = "language-" + it.key(); local
61 source->AddString(key, value);
  /external/chromium_org/chrome/browser/value_store/
value_store_change.cc 23 changes_value.SetWithoutPathExpansion(it->key(), change_value);
31 const std::string& key, Value* old_value, Value* new_value)
32 : inner_(new Inner(key, old_value, new_value)) {}
36 const std::string& ValueStoreChange::key() const { function in class:ValueStoreChange
52 const std::string& key, base::Value* old_value, base::Value* new_value)
53 : key_(key), old_value_(old_value), new_value_(new_value) {}
  /external/chromium_org/chrome/common/importer/
ie_importer_test_registry_overrider_win.cc 19 // The key to which a random subkey will be appended. This key itself will never
26 // SetTestRegistryOverride() into |key| if it exists and |key| is not NULL.
28 bool GetTestKeyFromEnvironment(base::string16* key) {
33 *key = UTF8ToUTF16(value);
66 base::string16 key; local
67 if (!GetTestKeyFromEnvironment(&key))
69 return key;
  /external/chromium_org/chrome/installer/util/
create_reg_key_work_item.cc 46 VLOG(1) << "no key to create";
50 RegKey key; local
58 if (key.CreateWithDisposition(predefined_root_, key_path.c_str(),
62 // This should not happen. Someone created a subkey under the key
67 // Remove the key path from list if it is already present.
99 // The key might have been deleted, but we don't reliably know what
delete_reg_key_work_item_unittest.cc 30 // Test that deleting a key that doesn't exist succeeds, and that rollback does
37 RegKey key; local
43 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(),
47 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(),
52 // Test that deleting an empty key succeeds, and that rollback brings it back.
54 RegKey key; local
59 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(),
63 EXPECT_EQ(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(),
67 // Test that deleting a key with subkeys and values succeeds, and that rollback
70 RegKey key; local
87 RegKey key; local
    [all...]
delete_reg_value_work_item.cc 36 RegKey key; local
39 LONG result = key.Open(predefined_root_, key_path_.c_str(),
42 result = key.ReadValue(value_name_.c_str(), NULL, &size, &type);
45 LOG(INFO) << "(delete value) Key: " << key_path_ << " or Value: "
56 result = key.ReadValue(value_name_.c_str(), &previous_value_[0], &size,
65 result = key.DeleteValue(value_name_.c_str());
85 RegKey key; local
86 LONG result = key.Open(predefined_root_, key_path_.c_str(),
93 result = key.WriteValue(value_name_.c_str(), previous_value,
delete_reg_value_work_item_unittest.cc 27 // Create a temporary key for testing
28 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS);
29 key.DeleteKey(kTestRoot);
30 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kTestRoot, KEY_READ));
32 key.Create(HKEY_CURRENT_USER, kTestRoot, KEY_READ));
36 // Clean up the temporary key
37 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS);
38 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kTestRoot));
47 RegKey key; local
52 key.Create(HKEY_CURRENT_USER, parent_key.c_str(), KEY_READ | KEY_WRITE))
104 RegKey key; local
    [all...]
registry_test_data.cc 30 << "Failed to delete registry key " << path << ", result: " << result;
62 RegKey key; local
64 result = key.Create(root_key_, empty_key_path_.c_str(), KEY_QUERY_VALUE);
66 result = key.Create(root_key_, non_empty_key_path_.c_str(), KEY_WRITE);
68 result = key.WriteValue(NULL, non_empty_key_path_.c_str());
70 result = key.CreateKey(L"SubKey", KEY_WRITE);
72 result = key.WriteValue(L"SomeValue", 1UL);
85 RegKey key; local
87 EXPECT_EQ(ERROR_SUCCESS, key.Open(root_key, path, KEY_READ));
89 EXPECT_EQ(ERROR_SUCCESS, key.ReadValue(NULL, &str_value))
101 RegKey key; local
    [all...]
set_reg_value_work_item.cc 65 base::win::RegKey key; local
74 result = key.Open(predefined_root_, key_path_.c_str(),
83 result = key.ReadValue(value_name_.c_str(), NULL, &size, &type);
96 result = key.ReadValue(value_name_.c_str(), &previous_value_[0], &size,
105 result = key.WriteValue(value_name_.c_str(), &value_[0],
129 base::win::RegKey key; local
130 LONG result = key.Open(predefined_root_, key_path_.c_str(), KEY_SET_VALUE);
137 result = key.DeleteValue(value_name_.c_str());
142 result = key.WriteValue(value_name_.c_str(), previous_value,
set_reg_value_work_item_unittest.cc 31 // Create a temporary key for testing
32 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS);
33 key.DeleteKey(kTestRoot);
34 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kTestRoot, KEY_READ));
36 key.Create(HKEY_CURRENT_USER, kTestRoot, KEY_READ));
40 // Clean up the temporary key
41 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS);
42 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kTestRoot));
50 RegKey key; local
56 key.Create(HKEY_CURRENT_USER, parent_key.c_str(), KEY_READ))
89 RegKey key; local
129 RegKey key; local
179 RegKey key; local
250 RegKey key; local
    [all...]
work_item_list_unittest.cc 30 // Create a temporary key for testing
31 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS);
32 key.DeleteKey(kTestRoot);
33 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kTestRoot, KEY_READ));
35 key.Create(HKEY_CURRENT_USER, kTestRoot, KEY_READ));
43 // Clean up the temporary key
44 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS);
45 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kTestRoot));
86 RegKey key; local
88 key.Open(HKEY_CURRENT_USER, key_to_create.c_str(), KEY_READ))
147 RegKey key; local
201 RegKey key; local
258 RegKey key; local
    [all...]
  /external/chromium_org/cloud_print/common/win/
cloud_print_utils.cc 51 // Set appropriate key to 1 to let Omaha record usage.
52 base::win::RegKey key; local
53 if (key.Create(HKEY_CURRENT_USER,
56 key.WriteValue(kUsageKey, L"1") != ERROR_SUCCESS) {
57 LOG(ERROR) << "Unable to set usage key";
  /external/chromium_org/components/autofill/core/browser/webdata/
autofill_entry.h 22 AutofillKey(const AutofillKey& key);
28 bool operator==(const AutofillKey& key) const;
29 bool operator<(const AutofillKey& key) const;
38 AutofillEntry(const AutofillKey& key,
42 const AutofillKey& key() const { return key_; } function in class:autofill::AutofillEntry
  /external/chromium_org/components/autofill/core/common/
password_form_fill_data.cc 74 UsernamesCollectionKey key; local
75 key.username = iter->first;
76 key.password = iter->second->password_value;
77 key.realm = iter->second->original_signon_realm;
78 result->other_possible_usernames[key] =
  /external/chromium_org/content/browser/indexed_db/
indexed_db_cursor.h 30 void Continue(scoped_ptr<IndexedDBKey> key,
36 const IndexedDBKey& key() const { return cursor_->key(); } function in class:content::IndexedDBCursor

Completed in 473 milliseconds

1 2 3 4 5 67 8 91011>>