/external/chromium_org/chrome/browser/ui/webui/chromeos/login/ |
H A D | enrollment_screen_handler.cc | 50 // A helper class that takes care of asynchronously revoking a given token. 60 void Start(const std::string& token) { argument 61 gaia_fetcher_.StartRevokeOAuth2Token(token); 376 const std::string& token, 384 controller_->OnOAuthTokenAvailable(token); 375 OnTokenFetched( const std::string& token, const GoogleServiceAuthError& error) argument
|
/external/chromium_org/chrome/installer/setup/ |
H A D | setup_util_unittest.cc | 55 // Returns true if the current process' token has privilege |privilege_name| 58 base::win::ScopedHandle token; local 60 token.Receive())) { 67 EXPECT_FALSE(::GetTokenInformation(token, TokenPrivileges, NULL, 0, &size)); 73 if (!::GetTokenInformation(token, TokenPrivileges, privileges, size, &size)) {
|
/external/chromium_org/chrome/tools/convert_dict/ |
H A D | aff_reader.cc | 210 std::string token; local 217 if (token[0] != 'Y' && token[0] != 'N') { 218 // This token represents a stripping prefix or suffix, which is 221 part_start = i - token.length(); 291 token.clear(); 293 token.push_back((*rule)[i]);
|
/external/chromium_org/chromeos/cryptohome/ |
H A D | cryptohome_library.cc | 125 virtual std::string EncryptWithSystemSalt(const std::string& token) OVERRIDE { 126 // Don't care about token encryption while debugging. 128 return token; 136 token); 141 // Don't care about token encryption while debugging. 179 // Encrypts (AES) the token given |key| and |salt|. 182 const std::string& token) { 191 if (!encryptor.Encrypt(token, &encoded_token)) { 192 LOG(WARNING) << "Failed to encrypt token."; 201 // Decrypts (AES) hex encoded encrypted token give 180 EncryptTokenWithKey(crypto::SymmetricKey* key, const std::string& salt, const std::string& token) argument 221 std::string token; local [all...] |
/external/chromium_org/cloud_print/gcp20/prototype/ |
H A D | privet_http_server.cc | 110 if (!CommandLine::ForCurrentProcess()->HasSwitch("disable-x-token")) { 112 info.headers.find("x-privet-token"); 223 response->SetString("x-privet-token", info.x_privet_token); 265 std::string token; local 267 status = delegate_->RegistrationGetClaimToken(user, &token, &claim_url); 268 response->SetString("token", token);
|
/external/chromium_org/google_apis/gaia/ |
H A D | gaia_auth_fetcher_unittest.cc | 122 const std::string& token) { 133 EXPECT_EQ(token, out_token); 187 const std::string& token)); 322 result.token = "auth"; 339 EXPECT_CALL(consumer, OnIssueAuthTokenSuccess(_, "token")) 345 issue_auth_token_source_, status, net::HTTP_OK, cookies_, "token", 390 std::string token = "CCTOKEN"; local 395 EXPECT_EQ(error.captcha().token, token); 532 EXPECT_CALL(consumer, OnIssueAuthTokenSuccess("service", "token")) 119 RunParsingTest(const std::string& data, const std::string& sid, const std::string& lsid, const std::string& token) argument [all...] |
H A D | google_service_auth_error.cc | 20 const std::string& token, const GURL& audio, const GURL& img, 22 : token(token), audio_url(audio), image_url(img), unlock_url(unlock), 30 return (token == b.token && 42 const std::string& token, const std::string& prompt, 44 : token(token), prompt_text(prompt), alternate_text(alternate), 53 return (token == b.token 19 Captcha( const std::string& token, const GURL& audio, const GURL& img, const GURL& unlock, int width, int height) argument 41 SecondFactor( const std::string& token, const std::string& prompt, const std::string& alternate, int length) argument 139 const std::string& GoogleServiceAuthError::token() const { function in class:GoogleServiceAuthError [all...] |
/external/chromium_org/gpu/command_buffer/client/ |
H A D | cmd_buffer_helper.h | 25 // the token mechanism: 29 // int32 token = helper.InsertToken(); 34 // helper.WaitForToken(token); // this doesn't return until the first two 78 // Inserts a new token into the command buffer. This token either has a value 83 // the value of the new token or -1 if the command buffer reader has 87 // Waits until the token of a particular value has passed through the command 88 // stream (i.e. commands inserted before that token have been executed). 91 // the value of the token to wait for. 92 void WaitForToken(int32 token); 143 SetToken(uint32 token) argument [all...] |
H A D | cmd_buffer_helper_test.cc | 271 int32 token = helper_->InsertToken(); local 278 helper_->WaitForToken(token); 298 int32 token = helper_->InsertToken(); local 303 helper_->WaitForToken(token);
|
H A D | fenced_allocator.h | 21 // class allows to free data "pending" the passage of a command buffer token, 23 // that token. 44 // token" can be re-used. 60 // Frees a block of memory, pending the passage of a token. That memory won't 61 // be re-allocated until the token has passed through the command stream. 65 // token: the token value to wait for before re-using the memory. 66 void FreePendingToken(Offset offset, int32 token); 68 // Frees any blocks pending a token for which the token ha 99 int32 token; // token to wait for in the FREE_PENDING_TOKEN case. member in struct:gpu::FencedAllocator::Block 196 FreePendingToken(void *pointer, int32 token) argument 198 allocator_.FreePendingToken(GetOffset(pointer), token); local [all...] |
H A D | mapped_memory_unittest.cc | 70 return command_buffer_->GetState().token; 226 int32 token = helper_.get()->InsertToken(); local 227 manager_->FreePendingToken(pointers[0], token); 230 // until it has to wait for something. Which means the token shouldn't have 232 EXPECT_GT(token, GetToken()); 233 // Force it to read up to the token 235 // Check that the token has indeed passed. 236 EXPECT_LE(token, GetToken());
|
H A D | query_tracker.h | 110 void MarkAsPending(int32 token) { argument 111 token_ = token; 120 int32 token() const { function in class:gpu::gles2::QueryTracker::Query
|
H A D | transfer_buffer.cc | 74 void TransferBuffer::FreePendingToken(void* p, unsigned int token) { argument 75 ring_buffer_->FreePendingToken(p, token); 221 // will be valid. That has the side effect that we'll insert a token on free. 222 // We could add code skip the token for a zero size buffer but it doesn't seem
|
/external/chromium_org/gpu/command_buffer/service/ |
H A D | command_buffer_service.cc | 45 state.token = token_; 58 return GetState().token; 172 void CommandBufferService::SetToken(int32 token) { argument 173 token_ = token;
|
H A D | common_decoder_unittest.cc | 110 virtual void set_token(int32 token) OVERRIDE { 111 token_ = token; 114 int32 token() const { function in class:gpu::MockCommandBufferEngine 209 EXPECT_EQ(0, engine_.token()); 212 EXPECT_EQ(kTokenId, engine_.token());
|
H A D | gpu_scheduler.cc | 184 void GpuScheduler::set_token(int32 token) { argument 185 command_buffer_->SetToken(token);
|
/external/chromium_org/net/proxy/ |
H A D | proxy_config_service_android.cc | 106 std::string token = tokenizer.token(); local 108 TrimWhitespaceASCII(token, TRIM_ALL, &pattern);
|
/external/chromium_org/ppapi/proxy/ |
H A D | ppapi_command_buffer_proxy.cc | 85 return last_state_.token; 211 void PpapiCommandBufferProxy::SetToken(int32 token) { argument
|
/external/chromium_org/remoting/host/win/ |
H A D | launch_process_with_token.cc | 122 // Copies the process token making it a primary impersonation token. 129 LOG_GETLASTERROR(ERROR) << "Failed to open process token"; 140 LOG_GETLASTERROR(ERROR) << "Failed to duplicate the process token"; 170 "Failed to enable SE_TCB_NAME privilege in a token"; 303 HANDLE token; member in struct:__anon9801::CreateProcessRequest 369 // using the default (i.e. Winlogon) token. This routine relies on undocumented 410 // Creates a copy of the current process token for the given |session_id| so 428 "Failed to impersonate the privileged token"; 432 // Change the session ID of the token [all...] |
H A D | unprivileged_process_delegate.cc | 73 // Creates a token with limited access that will be used to run the worker 76 // Create a token representing LocalService account. 77 ScopedHandle token; local 79 LOGON32_PROVIDER_DEFAULT, token.Receive())) { 84 if (restricted_token.Init(token) != ERROR_SUCCESS) 87 // Remove all privileges in the token. 99 // Return the resulting token. 232 // Create a restricted token that will be used to run the worker process. 233 ScopedHandle token; local 234 if (!CreateRestrictedToken(&token)) { [all...] |
/external/chromium_org/remoting/webapp/ |
H A D | wcs_sandbox_container.js | 73 * @param {string} token The access token. 76 remoting.WcsSandboxContainer.prototype.setAccessToken = function(token) { 79 'token': token
|
/external/chromium_org/sandbox/win/src/ |
H A D | process_thread_interception.cc | 175 ACCESS_MASK desired_access, PHANDLE token) { 176 NTSTATUS status = orig_OpenProcessToken(process, desired_access, token); 187 if (!ValidParameter(token, sizeof(HANDLE), WRITE)) 206 *token = answer.handle; 219 ACCESS_MASK desired_access, ULONG handle_attributes, PHANDLE token) { 221 handle_attributes, token); 232 if (!ValidParameter(token, sizeof(HANDLE), WRITE)) 251 *token = answer.handle; 173 TargetNtOpenProcessToken( NtOpenProcessTokenFunction orig_OpenProcessToken, HANDLE process, ACCESS_MASK desired_access, PHANDLE token) argument 217 TargetNtOpenProcessTokenEx( NtOpenProcessTokenExFunction orig_OpenProcessTokenEx, HANDLE process, ACCESS_MASK desired_access, ULONG handle_attributes, PHANDLE token) argument
|
H A D | restricted_token_utils.cc | 30 restricted_token.Init(NULL); // Initialized with the current process token 84 // This token has to be able to create objects in BNO. 86 // in the token to achieve this. You should also set the process to be 161 // Create the primary (restricted) token for the process 172 // Create the impersonation token (restricted) to be able to start the 209 // Change the token of the main thread of the new process for the 210 // impersonation token with more rights. 297 DWORD SetTokenIntegrityLevel(HANDLE token, IntegrityLevel integrity_level) { argument 316 BOOL result = ::SetTokenInformation(token, TokenIntegrityLevel, &label, 339 base::win::ScopedHandle token(token_handl [all...] |
/external/chromium_org/sync/android/java/src/org/chromium/sync/signin/ |
H A D | AccountManagerHelper.java | 56 * Invoked on the UI thread once a token has been provided by the AccountManager. 57 * @param token Auth token, or null if no token is available (bad credentials, 60 void tokenAvailable(String token); argument 150 * Gets the auth token synchronously. 164 * Gets the auth token and returns the response asynchronously. 165 * This should be called when we have a foreground activity that needs an auth token. 209 // Gets the auth token synchronously 227 Log.w(TAG, "Auth token [all...] |
/external/chromium_org/sync/internal_api/ |
H A D | debug_info_event_listener.cc | 91 void DebugInfoEventListener::OnUpdatedToken(const std::string& token) { argument
|