/external/chromium_org/chrome/common/mac/ |
H A D | mock_launchd.cc | 202 CFSocketSignature signature; local 203 signature.protocolFamily = PF_UNIX; 204 signature.socketType = SOCK_STREAM; 205 signature.protocol = 0; 210 signature.address = address; 213 CFSocketCreateWithSocketSignature(NULL, &signature, 0, NULL, NULL);
|
/external/chromium_org/chrome/test/chromedriver/ |
H A D | util.cc | 192 uint32 signature; local 193 if (!stream.ReadUInt32(&signature) || signature != kFileHeaderSignature) { 194 *error_msg = "invalid file header signature"; 259 if (!stream.ReadUInt32(&signature) || 260 signature != kDataDescriptorSignature) { 261 *error_msg = "invalid data descriptor signature";
|
/external/chromium_org/chromeos/login/auth/ |
H A D | extended_authenticator_impl.cc | 126 const std::string& signature, 133 signature, 252 const std::string& signature, 266 signature, 123 UpdateKeyAuthorized( const UserContext& context, const cryptohome::KeyDefinition& key, const std::string& signature, const base::Closure& success_callback) argument 250 DoUpdateKeyAuthorized( const cryptohome::KeyDefinition& key, const std::string& signature, const base::Closure& success_callback, const UserContext& user_context) argument
|
H A D | fake_extended_authenticator.cc | 82 const std::string& signature, 79 UpdateKeyAuthorized( const UserContext& context, const cryptohome::KeyDefinition& key, const std::string& signature, const base::Closure& success_callback) argument
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_mapper.cc | 20 scoped_ptr<base::Value> Mapper::MapValue(const OncValueSignature& signature, argument 28 result_value = MapObject(signature, *dict, error); 34 result_value = MapArray(signature, *list, error); 38 result_value = MapPrimitive(signature, onc_value, error); 47 const OncValueSignature& signature, 53 MapFields(signature, onc_object, &found_unknown_field, error, result.get()); 59 scoped_ptr<base::Value> Mapper::MapPrimitive(const OncValueSignature& signature, argument 99 << "Found missing value signature at field '" << field_name << "'."; 136 const OncValueSignature& signature, 139 return MapValue(signature, onc_valu 46 MapObject( const OncValueSignature& signature, const base::DictionaryValue& onc_object, bool* error) argument 135 MapEntry(int index, const OncValueSignature& signature, const base::Value& onc_value, bool* error) argument [all...] |
H A D | onc_merger.cc | 345 const OncValueSignature& signature, 351 signature_ = &signature; 485 const OncValueSignature& signature, 493 signature, user_policy, device_policy, user_settings, shared_settings, 344 MergeDictionaries( const OncValueSignature& signature, const base::DictionaryValue* user_policy, const base::DictionaryValue* device_policy, const base::DictionaryValue* user_settings, const base::DictionaryValue* shared_settings, const base::DictionaryValue* active_settings) argument 484 MergeSettingsAndPoliciesToAugmented( const OncValueSignature& signature, const base::DictionaryValue* user_policy, const base::DictionaryValue* device_policy, const base::DictionaryValue* user_settings, const base::DictionaryValue* shared_settings, const base::DictionaryValue* active_settings) argument
|
H A D | onc_normalizer.cc | 36 const OncValueSignature& signature, 40 Mapper::MapObject(signature, onc_object, error); 48 if (&signature == &kCertificateSignature) 50 else if (&signature == &kEAPSignature) 52 else if (&signature == &kEthernetSignature) 54 else if (&signature == &kIPsecSignature) 56 else if (&signature == &kNetworkConfigurationSignature) 58 else if (&signature == &kOpenVPNSignature) 60 else if (&signature == &kProxySettingsSignature) 62 else if (&signature 35 MapObject( const OncValueSignature& signature, const base::DictionaryValue& onc_object, bool* error) argument [all...] |
H A D | onc_signature.cc | 474 const OncFieldSignature* GetFieldSignature(const OncValueSignature& signature, argument 476 if (!signature.fields) 478 for (const OncFieldSignature* field_signature = signature.fields; 483 if (signature.base_signature) 484 return GetFieldSignature(*signature.base_signature, onc_field_name); 508 bool FieldIsCredential(const OncValueSignature& signature, argument 512 if (&signature == entry->value_signature &&
|
H A D | onc_translator_onc_to_shill.cc | 8 // - The local translation of an object depending on the associated signature 82 // by the associated signature. Takes ownership of |value|. Does nothing if 83 // |value| is NULL or the property name cannot be read from the signature. 313 // Iterates recursively over |onc_object| and its |signature|. At each object 316 void TranslateONCHierarchy(const OncValueSignature& signature, argument 321 GetPathToNestedShillDictionary(signature); 336 LocalTranslator translator(signature, onc_object, target_shill_dictionary); 347 GetFieldSignature(signature, it.key());
|
H A D | onc_utils.cc | 203 const OncValueSignature& signature, 206 if (&signature == &kEAPSignature) { 209 } else if (&signature == &kL2TPSignature || 210 &signature == &kOpenVPNSignature) { 222 GetFieldSignature(signature, it.key()); 248 const OncValueSignature& signature, 253 return masker.MapObject(signature, onc_object, &unused_error); 282 const OncValueSignature& signature, 285 return OncMaskValues::Mask(signature, onc_object, mask); 565 const OncValueSignature& signature, 202 ExpandStringsInOncObject( const OncValueSignature& signature, const StringSubstitution& substitution, base::DictionaryValue* onc_object) argument 247 Mask( const OncValueSignature& signature, const base::DictionaryValue& onc_object, const std::string& mask) argument 281 MaskCredentialsInOncObject( const OncValueSignature& signature, const base::DictionaryValue& onc_object, const std::string& mask) argument 564 ResolveServerCertRefsInObject(const CertPEMsByGUIDMap& certs_by_guid, const OncValueSignature& signature, base::DictionaryValue* onc_object) argument [all...] |
H A D | onc_validator.cc | 79 scoped_ptr<base::Value> Validator::MapValue(const OncValueSignature& signature, argument 82 if (onc_value.GetType() != signature.onc_type) { 85 << "', but type '" << ValueTypeToString(signature.onc_type) 92 Mapper::MapValue(signature, onc_value, error); 94 CHECK_EQ(repaired->GetType(), signature.onc_type); 99 const OncValueSignature& signature, 104 bool valid = ValidateObjectDefault(signature, onc_object, repaired.get()); 106 if (&signature == &kToplevelConfigurationSignature) { 108 } else if (&signature == &kNetworkConfigurationSignature) { 110 } else if (&signature 98 MapObject( const OncValueSignature& signature, const base::DictionaryValue& onc_object, bool* error) argument 193 MapEntry(int index, const OncValueSignature& signature, const base::Value& onc_value, bool* error) argument 206 ValidateObjectDefault(const OncValueSignature& signature, const base::DictionaryValue& onc_object, base::DictionaryValue* result) argument [all...] |
H A D | onc_validator_unittest.cc | 24 // Validate |onc_object| with the given |signature|. The object is considered 31 const OncValueSignature* signature, 44 repaired_object_ = validator->ValidateAndRepairObject(signature, 82 signature(onc_signature), 88 const OncValueSignature* signature; member in struct:chromeos::onc::__anon6220::OncParams 94 return os << "(" << onc.location << ", " << onc.signature << ", " 117 Validate(true, test_utils::ReadTestDictionary(onc.location), onc.signature, 124 Validate(false, test_utils::ReadTestDictionary(onc.location), onc.signature, 131 // OncValueSignature: signature of that ONC, 246 Validate(true, GetDictionaryFromTestFile(onc.location), onc.signature, 29 Validate(bool strict, scoped_ptr<base::DictionaryValue> onc_object, const OncValueSignature* signature, bool managed_onc, ::onc::ONCSource onc_source) argument [all...] |
/external/chromium_org/chromeos/network/ |
H A D | policy_util.cc | 34 const onc::OncValueSignature& signature, 50 onc::GetFieldSignature(signature, field_name); 61 onc::FieldIsCredential(signature, field_name)) { 33 RemoveFakeCredentials( const onc::OncValueSignature& signature, base::DictionaryValue* onc_object) argument
|
/external/chromium_org/chromeos/tools/onc_validator/ |
H A D | onc_validator.cc | 138 const chromeos::onc::OncValueSignature* signature = NULL; local 140 signature = &chromeos::onc::kToplevelConfigurationSignature; 142 signature = &chromeos::onc::kNetworkConfigurationSignature; 144 signature = &chromeos::onc::kCertificateSignature; 151 validator.ValidateAndRepairObject(signature, *onc_object, &result);
|
/external/chromium_org/components/autofill/core/browser/ |
H A D | autofill_download_manager.cc | 202 std::string signature = GetCombinedSignature(forms_in_query); local 205 if (it->first == signature) { 214 data.first = signature; 224 std::string signature = GetCombinedSignature(forms_in_query); local 227 if (it->first == signature) { 241 std::string signature; local 243 signature.reserve(total_size); 247 signature.append(","); 248 signature.append(forms_in_query[i]); 250 return signature; [all...] |
H A D | autofill_download_manager_unittest.cc | 100 response.signature = form_signature; 118 std::string signature; member in struct:autofill::AutofillDownloadTest::ResponseData 256 EXPECT_EQ(std::string(), responses_.front().signature); 265 responses_.front().signature); 273 EXPECT_EQ(std::string(), responses_.front().signature);
|
H A D | autofill_manager_unittest.cc | 2433 // Test that the form signature for an uploaded form always matches the form 2434 // signature from the query. 2442 // Cache the expected form signature. 2443 std::string signature = FormStructure(form).FormSignature(); local 2455 EXPECT_EQ(signature, autofill_manager_->GetSubmittedFormSignature());
|
H A D | form_structure.cc | 45 const char kAttributeSignature[] = "signature"; 363 // signature. This is a requirement for Autofill servers. 511 std::string signature((*it)->FormSignature()); 512 if (processed_forms.find(signature) != processed_forms.end()) 514 processed_forms.insert(signature); 518 signature); local 525 encoded_signatures->push_back(signature); 629 form.signature = form_structure->FormSignature(); 637 annotated_field.signature = (*field)->FieldSignature(); 741 // The form signature shoul [all...] |
/external/chromium_org/components/autofill/core/common/ |
H A D | form_data_predictions.h | 20 // The form signature for communication with the crowdsourcing server. 21 std::string signature; member in struct:autofill::FormDataPredictions
|
H A D | form_field_data_predictions.h | 22 std::string signature; member in struct:autofill::FormFieldDataPredictions
|
/external/chromium_org/components/nacl/browser/ |
H A D | nacl_browser.cc | 437 bool NaClBrowser::QueryKnownToValidate(const std::string& signature, argument 442 return validation_cache_.QueryKnownToValidate(signature, false) || 443 off_the_record_validation_cache_.QueryKnownToValidate(signature, true); 445 bool result = validation_cache_.QueryKnownToValidate(signature, true); 453 void NaClBrowser::SetKnownToValidate(const std::string& signature, argument 457 off_the_record_validation_cache_.SetKnownToValidate(signature); 459 validation_cache_.SetKnownToValidate(signature);
|
H A D | nacl_process_host.cc | 988 void NaClProcessHost::OnQueryKnownToValidate(const std::string& signature, argument 992 *result = nacl_browser->QueryKnownToValidate(signature, off_the_record_); 995 void NaClProcessHost::OnSetKnownToValidate(const std::string& signature) { argument 998 signature, off_the_record_);
|
H A D | nacl_validation_cache.cc | 33 bool NaClValidationCache::QueryKnownToValidate(const std::string& signature, argument 35 if (signature.length() == kValidationCacheEntrySize) { 38 iter = validation_cache_.Get(signature); 40 iter = validation_cache_.Peek(signature); 49 void NaClValidationCache::SetKnownToValidate(const std::string& signature) { argument 50 if (signature.length() == kValidationCacheEntrySize) { 51 validation_cache_.Put(signature, true);
|
/external/chromium_org/components/policy/core/common/cloud/ |
H A D | cloud_policy_validator.cc | 26 // DER-encoded ASN.1 object identifier for the SHA1-RSA signature algorithm. 32 // DER-encoded ASN.1 object identifier for the SHA256-RSA signature algorithm 49 // Recorded when the policy being verified has no key signature (e.g. policy 52 // Recorded when the key signature did not match the expected value (in 278 // Policy does not contain a verification signature, so log an error. 307 const std::string& signature) { 327 return VerifySignature(signed_data_as_string, verification_key, signature, 357 LOG(ERROR) << "New public key rotation signature verification failed"; 370 LOG(ERROR) << "Policy signature validation failed"; 382 LOG(ERROR) << "Initial policy signature validatio 304 CheckVerificationKeySignature( const std::string& key, const std::string& verification_key, const std::string& signature) argument 519 VerifySignature(const std::string& data, const std::string& key, const std::string& signature, SignatureType signature_type) argument [all...] |
H A D | policy_builder.cc | 52 // SHA256 signature of kSigningKey for "example.com" domain. 111 // SHA256 signature of kNewSigningKey for "example.com" domain. 249 // PolicyData signature. 296 std::string* signature) { 304 signature->assign( 294 SignData(const std::string& data, crypto::RSAPrivateKey* key, std::string* signature) argument
|