/external/chromium_org/chrome/browser/chromeos/policy/ |
device_local_account_policy_store.cc | 83 policy_map_.Set(key::kLidCloseAction, 92 policy_map_.Set(key::kShelfAutoHideBehavior, 99 policy_map_.Set(key::kShowLogoutButtonInTray, 109 policy_map_.Set(key::kExtensionAllowedTypes, 168 scoped_refptr<chromeos::OwnerKey> key = local 170 if (!key.get() || !key->public_key()) { 185 validator->ValidateSignature(*key->public_key(), false);
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
device_settings_service_unittest.cc | 260 // Check the new key has been loaded. 261 std::vector<uint8> key; local 262 ASSERT_TRUE(device_policy_.GetNewSigningKey()->ExportPublicKey(&key)); 263 EXPECT_EQ(*device_settings_service_.GetOwnerKey()->public_key(), key); 296 std::vector<uint8> key; local 297 ASSERT_TRUE(device_policy_.GetSigningKey()->ExportPublicKey(&key)); 298 EXPECT_EQ(*device_settings_service_.GetOwnerKey()->public_key(), key); 314 ASSERT_TRUE(device_policy_.GetSigningKey()->ExportPublicKey(&key)); 315 EXPECT_EQ(*device_settings_service_.GetOwnerKey()->public_key(), key);
|
/external/chromium_org/chrome/browser/chromeos/system_logs/ |
lsb_release_log_source.cc | 62 std::string key, value; local 63 TrimWhitespaceASCII(pairs[i].first, TRIM_ALL, &key); 66 if (key.empty()) 68 if (!IsStringUTF8(value) || !IsStringUTF8(key)) { 69 LOG(WARNING) << "Invalid characters in system log entry: " << key; 70 (*response)[key] = kInvalidLogEntry; 75 (*response)[key] = kEmptyLogEntry; 77 (*response)[key] = value;
|
/external/chromium_org/chrome/browser/extensions/api/storage/ |
setting_sync_data.cc | 53 specifics.key() << " had bad JSON for value: " << specifics.value(); 59 specifics.key(), 66 const std::string& key, 68 : internal_(new Internal(change_type, extension_id, key, value.Pass())) {} 80 const std::string& SettingSyncData::key() const { function in class:extensions::SettingSyncData 91 const std::string& key, 95 key_(key),
|
settings_sync_processor.cc | 40 synced_keys_.insert(i.key()); 56 const std::string& key = i->key(); local 59 if (synced_keys_.count(key)) { 60 // New value, key is synced; send ACTION_UPDATE. 62 extension_id_, key, *value, type_)); 64 // New value, key is not synced; send ACTION_ADD. 66 extension_id_, key, *value, type_)); 67 added_keys.insert(key); 70 if (synced_keys_.count(key)) { [all...] |
/external/chromium_org/chrome/browser/extensions/ |
external_registry_loader_win.cc | 29 // Registry value of of that key that defines the path to the .crx file. 32 // Registry value of that key that defines the current version of the .crx file. 68 // policy conventions. We only fall back to HKCU if the HKLM key cannot be 69 // opened, not if the data within the key is invalid, for example. 72 base::win::RegKey key; local 76 if (key.Open(HKEY_LOCAL_MACHINE, 78 if (key.Open(HKEY_CURRENT_USER, 80 LOG(ERROR) << "Unable to read registry key at path (HKLM & HKCU): " 87 if (key.ReadValue(kRegistryExtensionPath, &extension_path_str) 91 << " for key " << key_path << "." [all...] |
/external/chromium_org/chrome/browser/parsers/ |
metadata_parser_filebase_unittest.cc | 82 std::string key, value; local 85 EXPECT_TRUE(iter->GetNext(&key, &value)); 88 ASSERT_TRUE(expectations.find(key) != expectations.end()); 89 EXPECT_EQ(expectations[key], value); 91 expectations.erase(key); 95 EXPECT_FALSE(iter->GetNext(&key, &value));
|
/external/chromium_org/chrome/browser/policy/cloud/ |
component_cloud_policy_updater.cc | 78 // Encode |ns| into a string |key|. 80 const std::string key = local 86 external_policy_data_updater_.CancelExternalDataFetch(key); 94 key,
|
/external/chromium_org/chrome/browser/predictors/ |
resource_prefetcher_manager.cc | 58 std::string key = key_type == PREFETCH_KEY_TYPE_HOST ? local 60 PrefetcherMap::iterator prefetcher_it = prefetcher_map_.find(key); 66 prefetcher_map_.insert(std::make_pair(key, prefetcher)); 107 const std::string key = local 110 PrefetcherMap::iterator it = prefetcher_map_.find(key);
|
/external/chromium_org/chrome/browser/ui/autofill/ |
autofill_dialog_models.h | 39 // Adds an item and its identifying key to the model. Keys needn't be unique. 40 void AddKeyedItem(const std::string& key, const string16& display_label); 44 void AddKeyedItemWithIcon(const std::string& key, 48 // Adds a label with a sublabel and its identifying key to the model. 50 void AddKeyedItemWithSublabel(const std::string& key, 56 void AddKeyedItemWithSublabelAndIcon(const std::string& key, 64 // Returns the ID key for the item at |index|. 67 // Returns the ID key for the item at |checked_item_|, or an empty string if 75 // Sets the item to be checked to the |n|th item that has key |item_key|. 83 // Enable/disable an item by key 97 std::string key; \/\/ The key of the item. member in struct:autofill::SuggestionsMenuModel::Item [all...] |
/external/chromium_org/chrome/browser/ui/webui/translate_internals/ |
translate_internals_ui.cc | 29 // Sets the languages to |dict|. Each key is a language code and each value is 58 std::string key = "language-" + it.key(); local 61 source->AddString(key, value);
|
/external/chromium_org/chrome/browser/value_store/ |
value_store_change.cc | 23 changes_value.SetWithoutPathExpansion(it->key(), change_value); 31 const std::string& key, Value* old_value, Value* new_value) 32 : inner_(new Inner(key, old_value, new_value)) {} 36 const std::string& ValueStoreChange::key() const { function in class:ValueStoreChange 52 const std::string& key, base::Value* old_value, base::Value* new_value) 53 : key_(key), old_value_(old_value), new_value_(new_value) {}
|
/external/chromium_org/chrome/common/importer/ |
ie_importer_test_registry_overrider_win.cc | 19 // The key to which a random subkey will be appended. This key itself will never 26 // SetTestRegistryOverride() into |key| if it exists and |key| is not NULL. 28 bool GetTestKeyFromEnvironment(base::string16* key) { 33 *key = UTF8ToUTF16(value); 66 base::string16 key; local 67 if (!GetTestKeyFromEnvironment(&key)) 69 return key;
|
/external/chromium_org/chrome/installer/util/ |
create_reg_key_work_item.cc | 46 VLOG(1) << "no key to create"; 50 RegKey key; local 58 if (key.CreateWithDisposition(predefined_root_, key_path.c_str(), 62 // This should not happen. Someone created a subkey under the key 67 // Remove the key path from list if it is already present. 99 // The key might have been deleted, but we don't reliably know what
|
delete_reg_key_work_item_unittest.cc | 30 // Test that deleting a key that doesn't exist succeeds, and that rollback does 37 RegKey key; local 43 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), 47 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), 52 // Test that deleting an empty key succeeds, and that rollback brings it back. 54 RegKey key; local 59 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), 63 EXPECT_EQ(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), 67 // Test that deleting a key with subkeys and values succeeds, and that rollback 70 RegKey key; local 87 RegKey key; local [all...] |
delete_reg_value_work_item.cc | 36 RegKey key; local 39 LONG result = key.Open(predefined_root_, key_path_.c_str(), 42 result = key.ReadValue(value_name_.c_str(), NULL, &size, &type); 45 LOG(INFO) << "(delete value) Key: " << key_path_ << " or Value: " 56 result = key.ReadValue(value_name_.c_str(), &previous_value_[0], &size, 65 result = key.DeleteValue(value_name_.c_str()); 85 RegKey key; local 86 LONG result = key.Open(predefined_root_, key_path_.c_str(), 93 result = key.WriteValue(value_name_.c_str(), previous_value,
|
delete_reg_value_work_item_unittest.cc | 27 // Create a temporary key for testing 28 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); 29 key.DeleteKey(kTestRoot); 30 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kTestRoot, KEY_READ)); 32 key.Create(HKEY_CURRENT_USER, kTestRoot, KEY_READ)); 36 // Clean up the temporary key 37 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); 38 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kTestRoot)); 47 RegKey key; local 52 key.Create(HKEY_CURRENT_USER, parent_key.c_str(), KEY_READ | KEY_WRITE)) 104 RegKey key; local [all...] |
registry_test_data.cc | 30 << "Failed to delete registry key " << path << ", result: " << result; 62 RegKey key; local 64 result = key.Create(root_key_, empty_key_path_.c_str(), KEY_QUERY_VALUE); 66 result = key.Create(root_key_, non_empty_key_path_.c_str(), KEY_WRITE); 68 result = key.WriteValue(NULL, non_empty_key_path_.c_str()); 70 result = key.CreateKey(L"SubKey", KEY_WRITE); 72 result = key.WriteValue(L"SomeValue", 1UL); 85 RegKey key; local 87 EXPECT_EQ(ERROR_SUCCESS, key.Open(root_key, path, KEY_READ)); 89 EXPECT_EQ(ERROR_SUCCESS, key.ReadValue(NULL, &str_value)) 101 RegKey key; local [all...] |
set_reg_value_work_item.cc | 65 base::win::RegKey key; local 74 result = key.Open(predefined_root_, key_path_.c_str(), 83 result = key.ReadValue(value_name_.c_str(), NULL, &size, &type); 96 result = key.ReadValue(value_name_.c_str(), &previous_value_[0], &size, 105 result = key.WriteValue(value_name_.c_str(), &value_[0], 129 base::win::RegKey key; local 130 LONG result = key.Open(predefined_root_, key_path_.c_str(), KEY_SET_VALUE); 137 result = key.DeleteValue(value_name_.c_str()); 142 result = key.WriteValue(value_name_.c_str(), previous_value,
|
set_reg_value_work_item_unittest.cc | 31 // Create a temporary key for testing 32 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); 33 key.DeleteKey(kTestRoot); 34 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kTestRoot, KEY_READ)); 36 key.Create(HKEY_CURRENT_USER, kTestRoot, KEY_READ)); 40 // Clean up the temporary key 41 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); 42 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kTestRoot)); 50 RegKey key; local 56 key.Create(HKEY_CURRENT_USER, parent_key.c_str(), KEY_READ)) 89 RegKey key; local 129 RegKey key; local 179 RegKey key; local 250 RegKey key; local [all...] |
work_item_list_unittest.cc | 30 // Create a temporary key for testing 31 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); 32 key.DeleteKey(kTestRoot); 33 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kTestRoot, KEY_READ)); 35 key.Create(HKEY_CURRENT_USER, kTestRoot, KEY_READ)); 43 // Clean up the temporary key 44 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); 45 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kTestRoot)); 86 RegKey key; local 88 key.Open(HKEY_CURRENT_USER, key_to_create.c_str(), KEY_READ)) 147 RegKey key; local 201 RegKey key; local 258 RegKey key; local [all...] |
/external/chromium_org/cloud_print/common/win/ |
cloud_print_utils.cc | 51 // Set appropriate key to 1 to let Omaha record usage. 52 base::win::RegKey key; local 53 if (key.Create(HKEY_CURRENT_USER, 56 key.WriteValue(kUsageKey, L"1") != ERROR_SUCCESS) { 57 LOG(ERROR) << "Unable to set usage key";
|
/external/chromium_org/components/autofill/core/browser/webdata/ |
autofill_entry.h | 22 AutofillKey(const AutofillKey& key); 28 bool operator==(const AutofillKey& key) const; 29 bool operator<(const AutofillKey& key) const; 38 AutofillEntry(const AutofillKey& key, 42 const AutofillKey& key() const { return key_; } function in class:autofill::AutofillEntry
|
/external/chromium_org/components/autofill/core/common/ |
password_form_fill_data.cc | 74 UsernamesCollectionKey key; local 75 key.username = iter->first; 76 key.password = iter->second->password_value; 77 key.realm = iter->second->original_signon_realm; 78 result->other_possible_usernames[key] =
|
/external/chromium_org/content/browser/indexed_db/ |
indexed_db_cursor.h | 30 void Continue(scoped_ptr<IndexedDBKey> key, 36 const IndexedDBKey& key() const { return cursor_->key(); } function in class:content::IndexedDBCursor
|