/external/chromium_org/third_party/webrtc/base/ |
H A D | win32regkey.cc | 38 HRESULT RegKey::Create(HKEY parent_key, const wchar_t* key_name) { argument 40 key_name, 48 HRESULT RegKey::Open(HKEY parent_key, const wchar_t* key_name) { argument 49 return Open(parent_key, key_name, KEY_ALL_ACCESS); 221 HRESULT RegKey::DeleteSubKey(const wchar_t* key_name) { argument 222 ASSERT(key_name != NULL); 225 LONG res = ::RegDeleteKey(h_key_, key_name); 257 const wchar_t* key_name, 263 ASSERT(key_name != NULL); 268 LONG res = ::RegCreateKeyEx(parent_key, key_name, 256 Create(HKEY parent_key, const wchar_t* key_name, wchar_t* lpszClass, DWORD options, REGSAM sam_desired, LPSECURITY_ATTRIBUTES lpSecAttr, LPDWORD lpdwDisposition) argument 286 Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired) argument 852 RecurseDeleteSubKey(const wchar_t* key_name) argument 926 SafeKeyNameForDeletion(const wchar_t* key_name) argument 950 GetParentKeyInfo(std::wstring* key_name) argument 1032 GetSubkeyNameAt(int index, std::wstring* key_name) argument [all...] |
H A D | win32regkey.h | 44 HRESULT Create(HKEY parent_key, const wchar_t* key_name); 47 const wchar_t* key_name, 55 HRESULT Open(HKEY parent_key, const wchar_t* key_name); 57 HRESULT Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired); 79 bool HasSubkey(const wchar_t* key_name) const; 90 HRESULT GetSubkeyNameAt(int index, std::wstring* key_name); 244 HRESULT DeleteSubKey(const wchar_t* key_name); 247 HRESULT RecurseDeleteSubKey(const wchar_t* key_name); 281 static bool SafeKeyNameForDeletion(const wchar_t* key_name); 305 static std::wstring GetParentKeyInfo(std::wstring* key_name); [all...] |
/external/chromium_org/chromeos/attestation/ |
H A D | attestation_flow.cc | 201 std::string key_name = GetKeyNameForProfile(certificate_profile, local 214 key_name, 223 key_name, 238 key_name, 249 const std::string& key_name, 267 key_name, 274 const std::string& key_name, 289 key_name, 296 const std::string& key_name, 301 key_name, 246 SendCertificateRequestToPCA( AttestationKeyType key_type, const std::string& user_id, const std::string& key_name, const CertificateCallback& callback, bool success, const std::string& data) argument 271 SendCertificateResponseToDaemon( AttestationKeyType key_type, const std::string& user_id, const std::string& key_name, const CertificateCallback& callback, bool success, const std::string& data) argument 293 GetExistingCertificate( AttestationKeyType key_type, const std::string& user_id, const std::string& key_name, const CertificateCallback& callback) argument [all...] |
H A D | attestation_flow.h | 164 // key_name - The name of the key for which a certificate is requested. 170 const std::string& key_name, 182 // key_name - The name of the key for which a certificate is requested. 188 const std::string& key_name, 198 // key_name - The name of the key for which a certificate is requested. 202 const std::string& key_name,
|
/external/chromium_org/tools/telemetry/telemetry/core/ |
H A D | discover.py | 112 key_name = camel_case.ToUnderscore(obj.__name__) 114 key_name = module.__name__.split('.')[-1] 115 classes[key_name] = obj
|
/external/chromium_org/base/test/ |
H A D | test_reg_util_win.cc | 34 base::string16 key_name = iterator_test_root_key.Name(); local 36 if (!Tokenize(key_name, base::string16(kTimestampDelimiter), &tokens)) 41 test_root_key.DeleteKey(key_name.c_str()); 49 test_root_key.DeleteKey(key_name.c_str());
|
/external/chromium_org/chromeos/cryptohome/ |
H A D | async_method_caller.h | 137 // is to be associated with the current user. |key_name| is a name for the 145 const std::string& key_name, 149 // by |key_type| and |key_name|. If |key_type| is KEY_USER, a |user_id| must 155 const std::string& key_name, 159 // key specified by |key_type| and |key_name|. The |domain| and |device_id| 168 const std::string& key_name, 176 // specified by |key_type| and |key_name|. |challenge| can be any arbitrary 184 const std::string& key_name,
|
H A D | mock_async_method_caller.h | 69 const std::string& key_name, 74 const std::string& key_name, 80 const std::string& key_name, 89 const std::string& key_name,
|
H A D | async_method_caller.cc | 160 const std::string& key_name, 167 key_name, 178 const std::string& key_name, 184 key_name, 195 const std::string& key_name, 205 key_name, 220 const std::string& key_name, 227 key_name,
|
/external/chromium_org/chromeos/dbus/ |
H A D | mock_cryptohome_client.h | 115 const std::string& key_name, 120 const std::string& key_name, 125 const std::string& key_name, 130 const std::string& key_name, 135 const std::string& key_name, 140 const std::string& key_name, 149 const std::string& key_name, 155 const std::string& key_name, 160 const std::string& key_name,
|
H A D | cryptohome_client.h | 327 // the current user. |key_name| is a name for the key. If |key_type| is 334 const std::string& key_name, 338 // |key_type| and |key_name| exists, then the result sent to the callback will 345 const std::string& key_name, 349 // |key_name|. |callback| will be called when the operation completes. If 357 const std::string& key_name, 360 // Gets the public key for the key specified by |key_type| and |key_name|. 368 const std::string& key_name, 374 // handler is called. |key_type| and |key_name| specify the key to register. 381 const std::string& key_name, [all...] |
H A D | fake_cryptohome_client.h | 110 const std::string& key_name, 115 const std::string& key_name, 120 const std::string& key_name, 125 const std::string& key_name, 130 const std::string& key_name, 135 const std::string& key_name, 144 const std::string& key_name, 150 const std::string& key_name, 155 const std::string& key_name,
|
/external/chromium_org/chrome/browser/signin/ |
H A D | signin_header_helper.cc | 100 const std::string key_name(it->first); 101 if (key_name == kServiceTypeAttrName) { 104 } else if (key_name == kEmailAttrName) { 106 } else if (key_name == kIsSamlAttrName) { 108 } else if (key_name == kContinueUrlAttrName) { 110 } else if (key_name == kIsSameTabAttrName) { 113 DLOG(WARNING) << "Unexpected GAIA header attribute '" << key_name << "'.";
|
/external/chromium_org/chrome/installer/util/ |
H A D | delete_reg_key_work_item_unittest.cc | 88 std::wstring key_name(test_data_.base_path() + L"\\UndeletableKey"); 89 EXPECT_EQ(ERROR_SUCCESS, key.Create(test_data_.root_key(), key_name.c_str(), 91 EXPECT_EQ(ERROR_SUCCESS, key.WriteValue(NULL, key_name.c_str())); 116 test_data_.root_key(), key_name, WorkItem::kWow64Default)); 118 EXPECT_EQ(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_name.c_str(), 122 EXPECT_EQ(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_name.c_str(), 126 EXPECT_EQ(key_name, str_value);
|
H A D | auto_launch_util.cc | 69 base::string16 key_name(ProfileToKeyName(profile_directory)); 72 HKEY_CURRENT_USER, key_name, &autolaunch)) { 148 base::string16 key_name(ProfileToKeyName(profile_directory)); 204 base::win::AddCommandToAutoRun(HKEY_CURRENT_USER, key_name, cmd_line); 206 base::win::RemoveCommandFromAutoRun(HKEY_CURRENT_USER, key_name);
|
/external/chromium_org/build/android/gyp/ |
H A D | finalize_apk.py | 27 def SignApk(key_path, key_name, key_passwd, unsigned_path, signed_path): 36 key_name, 106 SignApk(options.key_path, options.key_name, options.key_passwd,
|
/external/chromium_org/ui/keyboard/webui/ |
H A D | vk_mojo_handler.h | 30 const mojo::String& key_name,
|
H A D | vk_mojo_handler.cc | 36 const mojo::String& key_name, 41 std::string name = key_name.To<std::string>(); 33 SendKeyEvent(const mojo::String& event_type, int32_t char_value, int32_t key_code, const mojo::String& key_name, int32_t modifiers) argument
|
/external/chromium_org/components/autofill/core/browser/ |
H A D | autofill_ie_toolbar_import_win.cc | 262 std::wstring key_name(kProfileKey); 263 key_name.append(L"\\"); 264 key_name.append(iterator_profiles.Name()); 265 RegKey key(HKEY_CURRENT_USER, key_name.c_str(), KEY_READ); 286 std::wstring key_name(kCreditCardKey); 287 key_name.append(L"\\"); 288 key_name.append(iterator_cc.Name()); 289 RegKey key(HKEY_CURRENT_USER, key_name.c_str(), KEY_READ);
|
/external/chromium_org/sync/util/ |
H A D | cryptographer.cc | 65 return nigoris_.end() != nigoris_.find(data.key_name()); 71 data.key_name() == default_nigori_name_; 128 NigoriMap::const_iterator it = nigoris_.find(encrypted.key_name()); 211 SetDefaultKey(pending_keys_->key_name()); 229 void Cryptographer::SetDefaultKey(const std::string& key_name) { argument 230 DCHECK(nigoris_.end() != nigoris_.find(key_name)); 231 default_nigori_name_ = key_name; 264 const std::string& new_default_key_name = pending_keys_->key_name();
|
H A D | cryptographer_unittest.cc | 136 EXPECT_EQ(encrypted1.key_name(), encrypted2.key_name()); 137 EXPECT_NE(encrypted1.key_name(), encrypted3.key_name()); 138 EXPECT_EQ(encrypted3.key_name(), encrypted4.key_name()); 264 EXPECT_EQ(encrypted_c.key_name(), encrypted_k2.key_name());
|
/external/chromium_org/tools/grit/grit/format/policy_templates/writers/ |
H A D | adm_writer.py | 95 def _WritePart(self, policy, key_name, builder): 100 key_name: The registry key backing the policy. 113 builder.AddLine('KEYNAME "%s\\%s"' % (key_name, policy['name'])) 133 def _WritePolicy(self, policy, key_name, builder): 150 self._WritePart(policy, key_name, builder) 184 def _CreateTemplate(self, category_path, key_name, policies): 190 key_name: Main registry key backing the policies. 196 lines.AddLine('KEYNAME "%s"' % key_name)
|
/external/chromium_org/sync/engine/ |
H A D | model_type_sync_proxy_impl_unittest.cc | 85 const std::string& key_name); 109 void UpdateDesiredEncryptionKey(const std::string& key_name); 111 // Sets the key_name that the mock ModelTypeSyncWorker will claim is in use 113 void SetServerEncryptionKey(const std::string& key_name); 122 const std::string& key_name); 217 const std::string& key_name) { 222 GenerateEncryptedSpecifics(tag, value, key_name)); 284 const std::string& key_name) { 285 data_type_state_.encryption_key_name = key_name; 291 const std::string& key_name) { 213 PendingUpdateFromServer( int64 version_offset, const std::string& tag, const std::string& value, const std::string& key_name) argument 283 UpdateDesiredEncryptionKey( const std::string& key_name) argument 290 SetServerEncryptionKey( const std::string& key_name) argument 311 GenerateEncryptedSpecifics( const std::string& tag, const std::string& value, const std::string& key_name) argument [all...] |
/external/lldb/source/Plugins/SymbolVendor/MacOSX/ |
H A D | SymbolVendorMacOSX.cpp | 221 const char *key_name = (const char *)::xmlNodeGetContent(key_node); local 222 if (strcmp(key_name, "DBGBuildSourcePath") == 0) 241 else if (strcmp(key_name, "DBGSourcePath") == 0) 261 if (key_name != NULL) 262 xmlFree((void *) key_name);
|
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/ |
H A D | enterprise_platform_keys_private_api.h | 97 const std::string& key_name, 113 const std::string& key_name, 122 const std::string key_name; member in struct:extensions::EPKPChallengeKeyBase::PrepareKeyContext
|