Searched defs:signature (Results 51 - 75 of 314) sorted by path

1234567891011>>

/external/chromium_org/chrome/common/mac/
H A Dmock_launchd.cc202 CFSocketSignature signature; local
203 signature.protocolFamily = PF_UNIX;
204 signature.socketType = SOCK_STREAM;
205 signature.protocol = 0;
210 signature.address = address;
213 CFSocketCreateWithSocketSignature(NULL, &signature, 0, NULL, NULL);
/external/chromium_org/chrome/test/chromedriver/
H A Dutil.cc192 uint32 signature; local
193 if (!stream.ReadUInt32(&signature) || signature != kFileHeaderSignature) {
194 *error_msg = "invalid file header signature";
259 if (!stream.ReadUInt32(&signature) ||
260 signature != kDataDescriptorSignature) {
261 *error_msg = "invalid data descriptor signature";
/external/chromium_org/chromeos/login/auth/
H A Dextended_authenticator_impl.cc126 const std::string& signature,
133 signature,
252 const std::string& signature,
266 signature,
123 UpdateKeyAuthorized( const UserContext& context, const cryptohome::KeyDefinition& key, const std::string& signature, const base::Closure& success_callback) argument
250 DoUpdateKeyAuthorized( const cryptohome::KeyDefinition& key, const std::string& signature, const base::Closure& success_callback, const UserContext& user_context) argument
H A Dfake_extended_authenticator.cc82 const std::string& signature,
79 UpdateKeyAuthorized( const UserContext& context, const cryptohome::KeyDefinition& key, const std::string& signature, const base::Closure& success_callback) argument
/external/chromium_org/chromeos/network/onc/
H A Donc_mapper.cc20 scoped_ptr<base::Value> Mapper::MapValue(const OncValueSignature& signature, argument
28 result_value = MapObject(signature, *dict, error);
34 result_value = MapArray(signature, *list, error);
38 result_value = MapPrimitive(signature, onc_value, error);
47 const OncValueSignature& signature,
53 MapFields(signature, onc_object, &found_unknown_field, error, result.get());
59 scoped_ptr<base::Value> Mapper::MapPrimitive(const OncValueSignature& signature, argument
99 << "Found missing value signature at field '" << field_name << "'.";
136 const OncValueSignature& signature,
139 return MapValue(signature, onc_valu
46 MapObject( const OncValueSignature& signature, const base::DictionaryValue& onc_object, bool* error) argument
135 MapEntry(int index, const OncValueSignature& signature, const base::Value& onc_value, bool* error) argument
[all...]
H A Donc_merger.cc345 const OncValueSignature& signature,
351 signature_ = &signature;
485 const OncValueSignature& signature,
493 signature, user_policy, device_policy, user_settings, shared_settings,
344 MergeDictionaries( const OncValueSignature& signature, const base::DictionaryValue* user_policy, const base::DictionaryValue* device_policy, const base::DictionaryValue* user_settings, const base::DictionaryValue* shared_settings, const base::DictionaryValue* active_settings) argument
484 MergeSettingsAndPoliciesToAugmented( const OncValueSignature& signature, const base::DictionaryValue* user_policy, const base::DictionaryValue* device_policy, const base::DictionaryValue* user_settings, const base::DictionaryValue* shared_settings, const base::DictionaryValue* active_settings) argument
H A Donc_normalizer.cc36 const OncValueSignature& signature,
40 Mapper::MapObject(signature, onc_object, error);
48 if (&signature == &kCertificateSignature)
50 else if (&signature == &kEAPSignature)
52 else if (&signature == &kEthernetSignature)
54 else if (&signature == &kIPsecSignature)
56 else if (&signature == &kNetworkConfigurationSignature)
58 else if (&signature == &kOpenVPNSignature)
60 else if (&signature == &kProxySettingsSignature)
62 else if (&signature
35 MapObject( const OncValueSignature& signature, const base::DictionaryValue& onc_object, bool* error) argument
[all...]
H A Donc_signature.cc474 const OncFieldSignature* GetFieldSignature(const OncValueSignature& signature, argument
476 if (!signature.fields)
478 for (const OncFieldSignature* field_signature = signature.fields;
483 if (signature.base_signature)
484 return GetFieldSignature(*signature.base_signature, onc_field_name);
508 bool FieldIsCredential(const OncValueSignature& signature, argument
512 if (&signature == entry->value_signature &&
H A Donc_translator_onc_to_shill.cc8 // - The local translation of an object depending on the associated signature
82 // by the associated signature. Takes ownership of |value|. Does nothing if
83 // |value| is NULL or the property name cannot be read from the signature.
313 // Iterates recursively over |onc_object| and its |signature|. At each object
316 void TranslateONCHierarchy(const OncValueSignature& signature, argument
321 GetPathToNestedShillDictionary(signature);
336 LocalTranslator translator(signature, onc_object, target_shill_dictionary);
347 GetFieldSignature(signature, it.key());
H A Donc_utils.cc203 const OncValueSignature& signature,
206 if (&signature == &kEAPSignature) {
209 } else if (&signature == &kL2TPSignature ||
210 &signature == &kOpenVPNSignature) {
222 GetFieldSignature(signature, it.key());
248 const OncValueSignature& signature,
253 return masker.MapObject(signature, onc_object, &unused_error);
282 const OncValueSignature& signature,
285 return OncMaskValues::Mask(signature, onc_object, mask);
565 const OncValueSignature& signature,
202 ExpandStringsInOncObject( const OncValueSignature& signature, const StringSubstitution& substitution, base::DictionaryValue* onc_object) argument
247 Mask( const OncValueSignature& signature, const base::DictionaryValue& onc_object, const std::string& mask) argument
281 MaskCredentialsInOncObject( const OncValueSignature& signature, const base::DictionaryValue& onc_object, const std::string& mask) argument
564 ResolveServerCertRefsInObject(const CertPEMsByGUIDMap& certs_by_guid, const OncValueSignature& signature, base::DictionaryValue* onc_object) argument
[all...]
H A Donc_validator.cc79 scoped_ptr<base::Value> Validator::MapValue(const OncValueSignature& signature, argument
82 if (onc_value.GetType() != signature.onc_type) {
85 << "', but type '" << ValueTypeToString(signature.onc_type)
92 Mapper::MapValue(signature, onc_value, error);
94 CHECK_EQ(repaired->GetType(), signature.onc_type);
99 const OncValueSignature& signature,
104 bool valid = ValidateObjectDefault(signature, onc_object, repaired.get());
106 if (&signature == &kToplevelConfigurationSignature) {
108 } else if (&signature == &kNetworkConfigurationSignature) {
110 } else if (&signature
98 MapObject( const OncValueSignature& signature, const base::DictionaryValue& onc_object, bool* error) argument
193 MapEntry(int index, const OncValueSignature& signature, const base::Value& onc_value, bool* error) argument
206 ValidateObjectDefault(const OncValueSignature& signature, const base::DictionaryValue& onc_object, base::DictionaryValue* result) argument
[all...]
H A Donc_validator_unittest.cc24 // Validate |onc_object| with the given |signature|. The object is considered
31 const OncValueSignature* signature,
44 repaired_object_ = validator->ValidateAndRepairObject(signature,
82 signature(onc_signature),
88 const OncValueSignature* signature; member in struct:chromeos::onc::__anon6220::OncParams
94 return os << "(" << onc.location << ", " << onc.signature << ", "
117 Validate(true, test_utils::ReadTestDictionary(onc.location), onc.signature,
124 Validate(false, test_utils::ReadTestDictionary(onc.location), onc.signature,
131 // OncValueSignature: signature of that ONC,
246 Validate(true, GetDictionaryFromTestFile(onc.location), onc.signature,
29 Validate(bool strict, scoped_ptr<base::DictionaryValue> onc_object, const OncValueSignature* signature, bool managed_onc, ::onc::ONCSource onc_source) argument
[all...]
/external/chromium_org/chromeos/network/
H A Dpolicy_util.cc34 const onc::OncValueSignature& signature,
50 onc::GetFieldSignature(signature, field_name);
61 onc::FieldIsCredential(signature, field_name)) {
33 RemoveFakeCredentials( const onc::OncValueSignature& signature, base::DictionaryValue* onc_object) argument
/external/chromium_org/chromeos/tools/onc_validator/
H A Donc_validator.cc138 const chromeos::onc::OncValueSignature* signature = NULL; local
140 signature = &chromeos::onc::kToplevelConfigurationSignature;
142 signature = &chromeos::onc::kNetworkConfigurationSignature;
144 signature = &chromeos::onc::kCertificateSignature;
151 validator.ValidateAndRepairObject(signature, *onc_object, &result);
/external/chromium_org/components/autofill/core/browser/
H A Dautofill_download_manager.cc202 std::string signature = GetCombinedSignature(forms_in_query); local
205 if (it->first == signature) {
214 data.first = signature;
224 std::string signature = GetCombinedSignature(forms_in_query); local
227 if (it->first == signature) {
241 std::string signature; local
243 signature.reserve(total_size);
247 signature.append(",");
248 signature.append(forms_in_query[i]);
250 return signature;
[all...]
H A Dautofill_download_manager_unittest.cc100 response.signature = form_signature;
118 std::string signature; member in struct:autofill::AutofillDownloadTest::ResponseData
256 EXPECT_EQ(std::string(), responses_.front().signature);
265 responses_.front().signature);
273 EXPECT_EQ(std::string(), responses_.front().signature);
H A Dautofill_manager_unittest.cc2433 // Test that the form signature for an uploaded form always matches the form
2434 // signature from the query.
2442 // Cache the expected form signature.
2443 std::string signature = FormStructure(form).FormSignature(); local
2455 EXPECT_EQ(signature, autofill_manager_->GetSubmittedFormSignature());
H A Dform_structure.cc45 const char kAttributeSignature[] = "signature";
363 // signature. This is a requirement for Autofill servers.
511 std::string signature((*it)->FormSignature());
512 if (processed_forms.find(signature) != processed_forms.end())
514 processed_forms.insert(signature);
518 signature); local
525 encoded_signatures->push_back(signature);
629 form.signature = form_structure->FormSignature();
637 annotated_field.signature = (*field)->FieldSignature();
741 // The form signature shoul
[all...]
/external/chromium_org/components/autofill/core/common/
H A Dform_data_predictions.h20 // The form signature for communication with the crowdsourcing server.
21 std::string signature; member in struct:autofill::FormDataPredictions
H A Dform_field_data_predictions.h22 std::string signature; member in struct:autofill::FormFieldDataPredictions
/external/chromium_org/components/nacl/browser/
H A Dnacl_browser.cc437 bool NaClBrowser::QueryKnownToValidate(const std::string& signature, argument
442 return validation_cache_.QueryKnownToValidate(signature, false) ||
443 off_the_record_validation_cache_.QueryKnownToValidate(signature, true);
445 bool result = validation_cache_.QueryKnownToValidate(signature, true);
453 void NaClBrowser::SetKnownToValidate(const std::string& signature, argument
457 off_the_record_validation_cache_.SetKnownToValidate(signature);
459 validation_cache_.SetKnownToValidate(signature);
H A Dnacl_process_host.cc988 void NaClProcessHost::OnQueryKnownToValidate(const std::string& signature, argument
992 *result = nacl_browser->QueryKnownToValidate(signature, off_the_record_);
995 void NaClProcessHost::OnSetKnownToValidate(const std::string& signature) { argument
998 signature, off_the_record_);
H A Dnacl_validation_cache.cc33 bool NaClValidationCache::QueryKnownToValidate(const std::string& signature, argument
35 if (signature.length() == kValidationCacheEntrySize) {
38 iter = validation_cache_.Get(signature);
40 iter = validation_cache_.Peek(signature);
49 void NaClValidationCache::SetKnownToValidate(const std::string& signature) { argument
50 if (signature.length() == kValidationCacheEntrySize) {
51 validation_cache_.Put(signature, true);
/external/chromium_org/components/policy/core/common/cloud/
H A Dcloud_policy_validator.cc26 // DER-encoded ASN.1 object identifier for the SHA1-RSA signature algorithm.
32 // DER-encoded ASN.1 object identifier for the SHA256-RSA signature algorithm
49 // Recorded when the policy being verified has no key signature (e.g. policy
52 // Recorded when the key signature did not match the expected value (in
278 // Policy does not contain a verification signature, so log an error.
307 const std::string& signature) {
327 return VerifySignature(signed_data_as_string, verification_key, signature,
357 LOG(ERROR) << "New public key rotation signature verification failed";
370 LOG(ERROR) << "Policy signature validation failed";
382 LOG(ERROR) << "Initial policy signature validatio
304 CheckVerificationKeySignature( const std::string& key, const std::string& verification_key, const std::string& signature) argument
519 VerifySignature(const std::string& data, const std::string& key, const std::string& signature, SignatureType signature_type) argument
[all...]
H A Dpolicy_builder.cc52 // SHA256 signature of kSigningKey for "example.com" domain.
111 // SHA256 signature of kNewSigningKey for "example.com" domain.
249 // PolicyData signature.
296 std::string* signature) {
304 signature->assign(
294 SignData(const std::string& data, crypto::RSAPrivateKey* key, std::string* signature) argument

Completed in 449 milliseconds

1234567891011>>