/external/chromium_org/chrome/browser/chromeos/policy/ |
network_configuration_updater.cc | 46 policy_key_(policy_key), 55 policy_key_, 77 const base::Value* policy_value = policies.GetValue(policy_key_);
|
network_configuration_updater.h | 79 std::string policy_key_; member in class:policy::NetworkConfigurationUpdater
|
user_cloud_policy_store_chromeos.cc | 256 LoadPolicyKey(policy_key_path_, &policy_key_); 272 if (policy_key_.empty()) { 277 validator->ValidateSignature(policy_key_, 360 // Load |policy_key_| to verify the loaded policy. 521 policy_key_ = *key; 568 policy_key_, empty_key, ExtractDomain(username_), allow_rotation);
|
user_cloud_policy_store_chromeos.h | 103 // Invokes |callback| after reloading |policy_key_|. 114 // Invokes |callback| after creating |policy_key_|, if it hasn't been created 139 std::string policy_key_; member in class:policy::UserCloudPolicyStoreChromeOS
|
/external/chromium_org/components/policy/core/common/cloud/ |
user_cloud_policy_store.h | 62 const std::string& policy_key() { return policy_key_; } 95 std::string policy_key_; member in class:policy::UserCloudPolicyStore
|
user_cloud_policy_store.cc | 214 policy_key_.clear(); 312 policy_key_.clear(); 315 policy_key_ = signing_key; 387 DCHECK(policy_key_.empty() || policy_key_ == cached_key->signing_key()); 404 if (policy_key_.empty()) { 412 // injected. |policy_key_| is already known to be valid, so no need to 416 policy_key_, verification_key, owning_domain, allow_rotation); 456 policy_key_ = validator->policy()->new_public_key();
|
/external/chromium_org/chrome/browser/policy/test/ |
local_policy_test_server.cc | 98 policy_key_ = server_data_dir_.path().Append(kSigningKeyFileName); 100 policy_key_, 242 if (!policy_key_.empty()) 243 arguments->SetString("policy-key", policy_key_.AsUTF8Unsafe());
|
local_policy_test_server.h | 94 base::FilePath policy_key_; member in class:policy::LocalPolicyTestServer
|