/external/chromium_org/chrome/installer/util/ |
create_reg_key_work_item.cc | 56 std::wstring key_path; local 61 key_path.assign(key_list_[i - 1]); 64 key_path.c_str(), 71 LOG(ERROR) << key_path << " exists, this is not expected."; 77 VLOG(1) << "created " << key_path; 84 LOG(ERROR) << "Failed to create " << key_path; 96 std::wstring key_path; 100 key_path.assign(*itr); 102 if (key.DeleteEmptyKey(key_path.c_str()) == ERROR_SUCCESS) { 103 VLOG(1) << "rollback: delete " << key_path; [all...] |
delete_reg_key_work_item_unittest.cc | 39 const std::wstring& key_path = key_paths[i]; local 41 test_data_.root_key(), key_path, WorkItem::kWow64Default)); 43 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), 47 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), 55 const std::wstring& key_path = test_data_.empty_key_path(); local 57 test_data_.root_key(), key_path, WorkItem::kWow64Default)); 59 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), 63 EXPECT_EQ(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), 71 const std::wstring& key_path = test_data_.non_empty_key_path(); local 73 test_data_.root_key(), key_path, WorkItem::kWow64Default)) [all...] |
shell_util.cc | 578 RegistryEntry(const base::string16& key_path, const base::string16& value) 579 : key_path_(key_path), name_(), 584 RegistryEntry(const base::string16& key_path, const base::string16& name, 586 : key_path_(key_path), name_(name), 591 RegistryEntry(const base::string16& key_path, const base::string16& name, 593 : key_path_(key_path), name_(name), 1122 base::string16 key_path; local [all...] |
/external/chromium_org/net/test/ |
cert_test_util_nss.cc | 23 base::FilePath key_path = dir.AppendASCII(key_filename); local 25 bool success = base::ReadFileToString(key_path, &key_pkcs8); 27 LOG(ERROR) << "Failed to read file " << key_path.value(); 40 << key_path.value();
|
/external/chromium_org/base/test/ |
test_reg_util_win.cc | 55 base::string16 key_path = test_key_root; local 56 key_path += L"\\" + base::Int64ToString16(timestamp.ToInternalValue()); 57 key_path += kTimestampDelimiter + base::ASCIIToWide(base::GenerateGUID()); 59 return key_path; 66 const base::string16& key_path) 70 temp_key_.Create(HKEY_CURRENT_USER, key_path.c_str(), KEY_ALL_ACCESS)); 96 base::string16 key_path = GenerateTempKeyPath(test_key_root_, timestamp_); local 97 overrides_.push_back(new ScopedRegistryKeyOverride(override, key_path));
|
/external/chromium_org/chrome/browser/extensions/ |
external_registry_loader_win.cc | 85 base::string16 key_path = base::ASCIIToWide(kRegistryExtensions); local 86 key_path.append(L"\\"); 87 key_path.append(*it); 89 key_path.c_str(), KEY_READ) != ERROR_SUCCESS) { 91 key_path.c_str(), KEY_READ) != ERROR_SUCCESS) { 93 << key_path << "."; 102 << " for key " << key_path << "."; local 129 << " for key " << key_path << "."; local 137 << key_path; local 143 << " for key " << key_path local 150 << " for key " << key_path << " can not be read. " local 161 << " for key " << key_path << "."; local 168 << " for key " << key_path << "."; local [all...] |
/external/chromium_org/components/policy/core/common/cloud/ |
resource_cache.cc | 112 base::FilePath key_path; local 113 if (!VerifyKeyPath(key, false, &key_path)) 116 base::FileEnumerator enumerator(key_path, false, base::FileEnumerator::FILES); 145 base::FilePath key_path; local 146 if (VerifyKeyPath(key, false, &key_path)) 147 base::DeleteFile(key_path, true); 154 base::FilePath key_path; local 155 if (!VerifyKeyPath(key, false, &key_path)) 158 base::FileEnumerator enumerator(key_path, false, base::FileEnumerator::FILES); 173 base::DeleteFile(key_path, false) 196 base::FilePath key_path; local 232 base::FilePath key_path; local [all...] |
user_cloud_policy_store.cc | 75 const base::FilePath& key_path) { 94 if (!base::ReadFileToString(key_path, &data, kKeySizeLimit) || 100 LOG(ERROR) << "Failed to read or parse key data from " << key_path.value(); 133 const base::FilePath& key_path, 159 WriteStringToFile(key_path, key_data); 167 const base::FilePath& key_path, 172 key_path_(key_path), 185 base::FilePath key_path = local 188 policy_path, key_path, verification_key, background_task_runner));
|
/external/chromium_org/content/browser/indexed_db/ |
indexed_db_metadata.h | 22 const IndexedDBKeyPath& key_path, 27 key_path(key_path), 32 IndexedDBKeyPath key_path; member in struct:content::IndexedDBIndexMetadata 45 const IndexedDBKeyPath& key_path, 51 IndexedDBKeyPath key_path; member in struct:content::IndexedDBObjectStoreMetadata
|
indexed_db_leveldb_coding_unittest.cc | 680 IndexedDBKeyPath key_path = key_paths[i]; local 683 std::string v = WrappedEncodeIDBKeyPath(key_path); 689 EXPECT_EQ(key_path, decoded); 786 IndexedDBKeyPath key_path = key_paths[i]; local 792 EXPECT_EQ(key_path, decoded); 899 ObjectStoreMetaDataKey::Encode(1, 1, ObjectStoreMetaDataKey::KEY_PATH)); 918 IndexMetaDataKey::Encode(1, 1, 30, IndexMetaDataKey::KEY_PATH)); [all...] |
indexed_db_backing_store.cc | 1553 IndexedDBKeyPath key_path; local 2580 IndexedDBKeyPath key_path; local [all...] |
/external/chromium_org/net/extras/sqlite/ |
sqlite_channel_id_store_unittest.cc | 46 base::FilePath key_path = local 50 ASSERT_TRUE(base::ReadFileToString(key_path, key));
|
/external/chromium_org/remoting/protocol/ |
authenticator_test_base.cc | 53 base::FilePath key_path = certs_dir.AppendASCII("unittest.key.bin"); local 55 ASSERT_TRUE(base::ReadFileToString(key_path, &key_string));
|
ssl_hmac_channel_authenticator_unittest.cc | 63 base::FilePath key_path = certs_dir.AppendASCII("unittest.key.bin"); variable 65 ASSERT_TRUE(base::ReadFileToString(key_path, &key_string));
|
/hardware/invensense/60xx/libsensors_iio/software/core/mllite/linux/ |
ml_sysfs_helper.c | 233 char key_path[100]; local 246 memset(key_path, 0, 100); 270 memset(key_path, 0, 100); 272 sprintf(key_path, "/sys/bus/iio/devices/iio:device%d/key", iio_dev_num); 274 sprintf(key_path, "%s%s", sysfs_path, "/device/invensense/mpu/key"); 276 if((fp = fopen(key_path, "rt")) == NULL)
|
/hardware/invensense/6515/libsensors_iio/software/core/mllite/linux/ |
ml_sysfs_helper.c | 251 char key_path[100]; local 264 memset(key_path, 0, 100); 288 memset(key_path, 0, 100); 290 sprintf(key_path, "/sys/bus/iio/devices/iio:device%d/key", iio_dev_num); 292 sprintf(key_path, "%s%s", sysfs_path, "/device/invensense/mpu/key"); 294 if((fp = fopen(key_path, "rt")) == NULL)
|
/hardware/invensense/65xx/libsensors_iio/software/core/mllite/linux/ |
ml_sysfs_helper.c | 244 char key_path[100]; local 257 memset(key_path, 0, 100); 281 memset(key_path, 0, 100); 283 sprintf(key_path, "/sys/bus/iio/devices/iio:device%d/key", iio_dev_num); 285 sprintf(key_path, "%s%s", sysfs_path, "/device/invensense/mpu/key"); 287 if((fp = fopen(key_path, "rt")) == NULL)
|
/external/chromium_org/chromeos/dbus/ |
session_manager_client.cc | 688 base::FilePath key_path = GetUserFilePath(username, "policy.pub"); variable 691 base::Bind(&StoreFile, key_path, response.new_public_key()),
|
/external/chromium_org/net/socket/ |
ssl_server_socket_unittest.cc | 328 base::FilePath key_path = certs_dir.AppendASCII("unittest.key.bin"); local 330 ASSERT_TRUE(base::ReadFileToString(key_path, &key_string));
|
/external/chromium_org/remoting/test/ |
protocol_perftest.cc | 264 base::FilePath key_path = certs_dir.AppendASCII("unittest.key.bin"); local 266 ASSERT_TRUE(base::ReadFileToString(key_path, &key_string));
|
/external/chromium_org/chrome/installer/setup/ |
install_worker.cc | 79 void GetOldIELowRightsElevationPolicyKeyPath(base::string16* key_path) { 80 key_path->assign(kElevationPolicyKeyPath, 82 key_path->append(kIELowRightsPolicyOldGuid, 1541 base::string16 key_path; local [all...] |