/external/chromium_org/chrome/installer/util/ |
D | create_reg_key_work_item.cc | 56 std::wstring key_path; in Do() local 61 key_path.assign(key_list_[i - 1]); in Do() 64 key_path.c_str(), in Do() 71 LOG(ERROR) << key_path << " exists, this is not expected."; in Do() 77 VLOG(1) << "created " << key_path; in Do() 84 LOG(ERROR) << "Failed to create " << key_path; in Do() 96 std::wstring key_path; in Rollback() local 100 key_path.assign(*itr); in Rollback() 102 if (key.DeleteEmptyKey(key_path.c_str()) == ERROR_SUCCESS) { in Rollback() 103 VLOG(1) << "rollback: delete " << key_path; in Rollback() [all …]
|
D | delete_reg_key_work_item_unittest.cc | 39 const std::wstring& key_path = key_paths[i]; in TEST_F() local 41 test_data_.root_key(), key_path, WorkItem::kWow64Default)); in TEST_F() 43 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), in TEST_F() 47 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), in TEST_F() 55 const std::wstring& key_path = test_data_.empty_key_path(); in TEST_F() local 57 test_data_.root_key(), key_path, WorkItem::kWow64Default)); in TEST_F() 59 EXPECT_NE(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), in TEST_F() 63 EXPECT_EQ(ERROR_SUCCESS, key.Open(test_data_.root_key(), key_path.c_str(), in TEST_F() 71 const std::wstring& key_path = test_data_.non_empty_key_path(); in TEST_F() local 73 test_data_.root_key(), key_path, WorkItem::kWow64Default)); in TEST_F() [all …]
|
D | work_item.cc | 64 const std::wstring& key_path, in CreateDeleteRegValueWorkItem() argument 68 predefined_root, key_path, wow64_access, value_name); in CreateDeleteRegValueWorkItem() 91 const std::wstring& key_path, in CreateSetRegValueWorkItem() argument 97 key_path, in CreateSetRegValueWorkItem() 106 const std::wstring& key_path, in CreateSetRegValueWorkItem() argument 112 key_path, in CreateSetRegValueWorkItem() 121 const std::wstring& key_path, in CreateSetRegValueWorkItem() argument 127 key_path, in CreateSetRegValueWorkItem()
|
D | install_util_unittest.cc | 290 std::wstring key_path(L"SomeKey\\ToDelete"); in TEST_F() local 302 ASSERT_FALSE(RegKey(root, key_path.c_str(), KEY_QUERY_VALUE).Valid()); in TEST_F() 304 InstallUtil::DeleteRegistryValueIf(root, key_path.c_str(), in TEST_F() 307 EXPECT_FALSE(RegKey(root, key_path.c_str(), KEY_QUERY_VALUE).Valid()); in TEST_F() 315 ASSERT_TRUE(RegKey(root, key_path.c_str(), KEY_SET_VALUE).Valid()); in TEST_F() 317 InstallUtil::DeleteRegistryValueIf(root, key_path.c_str(), in TEST_F() 320 EXPECT_TRUE(RegKey(root, key_path.c_str(), KEY_QUERY_VALUE).Valid()); in TEST_F() 329 RegKey(root, key_path.c_str(), in TEST_F() 332 InstallUtil::DeleteRegistryValueIf(root, key_path.c_str(), in TEST_F() 335 EXPECT_TRUE(RegKey(root, key_path.c_str(), KEY_QUERY_VALUE).Valid()); in TEST_F() [all …]
|
D | delete_tree_work_item_unittest.cc | 176 base::FilePath key_path(dir_name_delete); in TEST_F() local 177 key_path = key_path.AppendASCII("key_file.exe"); in TEST_F() 183 base::CopyFile(exe_full_path, key_path); in TEST_F() 184 ASSERT_TRUE(base::PathExists(key_path)); in TEST_F() 187 << " to " << key_path.value(); in TEST_F() 193 ::CreateProcessW(NULL, const_cast<wchar_t*>(key_path.value().c_str()), in TEST_F() 202 std::vector<base::FilePath> key_paths(1, key_path); in TEST_F() 212 EXPECT_TRUE(base::PathExists(key_path)); in TEST_F()
|
D | work_item_list.cc | 125 const std::wstring& key_path, in AddDeleteRegValueWorkItem() argument 129 predefined_root, key_path, wow64_access, value_name); in AddDeleteRegValueWorkItem() 163 const std::wstring& key_path, in AddSetRegValueWorkItem() argument 169 key_path, in AddSetRegValueWorkItem() 179 const std::wstring& key_path, in AddSetRegValueWorkItem() argument 185 key_path, in AddSetRegValueWorkItem() 195 const std::wstring& key_path, in AddSetRegValueWorkItem() argument 202 key_path, in AddSetRegValueWorkItem()
|
D | registry_key_backup.cc | 275 const wchar_t* key_path, in Initialize() argument 277 DCHECK(key_path); in Initialize() 286 LONG result = key.Open(root, key_path, kKeyReadNoNotify | wow64_access); in Initialize() 290 LOG(ERROR) << "Failed to backup key at " << key_path; in Initialize() 294 LOG(ERROR) << "Failed to open key at " << key_path in Initialize() 304 const wchar_t* key_path, in WriteTo() argument 306 DCHECK(key_path); in WriteTo() 315 LONG result = dest_key.Create(root, key_path, KEY_WRITE | wow64_access); in WriteTo() 317 LOG(ERROR) << "Failed to create destination key at " << key_path in WriteTo()
|
D | set_reg_value_work_item.cc | 16 const std::wstring& key_path, in SetRegValueWorkItem() argument 22 key_path_(key_path), in SetRegValueWorkItem() 37 const std::wstring& key_path, in SetRegValueWorkItem() argument 43 key_path_(key_path), in SetRegValueWorkItem() 58 const std::wstring& key_path, in SetRegValueWorkItem() argument 64 key_path_(key_path), in SetRegValueWorkItem()
|
D | set_reg_value_work_item.h | 46 const std::wstring& key_path, 53 const std::wstring& key_path, 60 const std::wstring& key_path,
|
D | work_item_list.h | 74 const std::wstring& key_path, 99 const std::wstring& key_path, 108 const std::wstring& key_path, 117 const std::wstring& key_path,
|
D | work_item.h | 111 const std::wstring& key_path, 135 const std::wstring& key_path, 145 const std::wstring& key_path, 155 const std::wstring& key_path,
|
D | non_updating_app_registration_data.cc | 8 const base::string16& key_path) : key_path_(key_path) {} in NonUpdatingAppRegistrationData() argument
|
D | registry_key_backup.h | 29 bool Initialize(HKEY root, const wchar_t* key_path, REGSAM wow64_acccess); 34 bool WriteTo(HKEY root, const wchar_t* key_path, REGSAM wow64_acccess) const;
|
D | conditional_work_item_list.h | 39 explicit ConditionRunIfFileExists(const base::FilePath& key_path) in ConditionRunIfFileExists() argument 40 : key_path_(key_path) {} in ConditionRunIfFileExists()
|
/external/chromium_org/chrome/browser/extensions/ |
D | external_registry_loader_win.cc | 79 base::string16 key_path = base::ASCIIToWide(kRegistryExtensions); in LoadOnFileThread() local 80 key_path.append(L"\\"); in LoadOnFileThread() 81 key_path.append(*it); in LoadOnFileThread() 83 key_path.c_str(), KEY_READ) != ERROR_SUCCESS) { in LoadOnFileThread() 85 key_path.c_str(), KEY_READ) != ERROR_SUCCESS) { in LoadOnFileThread() 87 << key_path << "."; in LoadOnFileThread() 96 << " for key " << key_path << "."; in LoadOnFileThread() 123 << " for key " << key_path << "."; in LoadOnFileThread() 131 << key_path; in LoadOnFileThread() 137 << " for key " << key_path in LoadOnFileThread() [all …]
|
/external/chromium_org/components/policy/core/common/cloud/ |
D | resource_cache.cc | 112 base::FilePath key_path; in LoadAllSubkeys() local 113 if (!VerifyKeyPath(key, false, &key_path)) in LoadAllSubkeys() 116 base::FileEnumerator enumerator(key_path, false, base::FileEnumerator::FILES); in LoadAllSubkeys() 145 base::FilePath key_path; in Clear() local 146 if (VerifyKeyPath(key, false, &key_path)) in Clear() 147 base::DeleteFile(key_path, true); in Clear() 154 base::FilePath key_path; in FilterSubkeys() local 155 if (!VerifyKeyPath(key, false, &key_path)) in FilterSubkeys() 158 base::FileEnumerator enumerator(key_path, false, base::FileEnumerator::FILES); in FilterSubkeys() 173 base::DeleteFile(key_path, false); in FilterSubkeys() [all …]
|
D | user_cloud_policy_store.cc | 64 const base::FilePath& key_path) { in LoadPolicyFromDisk() argument 83 if (!base::ReadFileToString(key_path, &data, kKeySizeLimit) || in LoadPolicyFromDisk() 89 LOG(ERROR) << "Failed to read or parse key data from " << key_path.value(); in LoadPolicyFromDisk() 122 const base::FilePath& key_path, in StorePolicyToDiskOnBackgroundThread() argument 148 WriteStringToFile(key_path, key_data); in StorePolicyToDiskOnBackgroundThread() 156 const base::FilePath& key_path, in UserCloudPolicyStore() argument 162 key_path_(key_path), in UserCloudPolicyStore() 174 base::FilePath key_path = in Create() local 177 policy_path, key_path, verification_key, background_task_runner)); in Create()
|
/external/chromium_org/base/test/ |
D | test_reg_util_win.cc | 54 base::string16 key_path = test_key_root; in GenerateTempKeyPath() local 55 key_path += L"\\" + base::Int64ToString16(timestamp.ToInternalValue()); in GenerateTempKeyPath() 56 key_path += kTimestampDelimiter + base::ASCIIToWide(base::GenerateGUID()); in GenerateTempKeyPath() 58 return key_path; in GenerateTempKeyPath() 65 const base::string16& key_path) in ScopedRegistryKeyOverride() argument 69 temp_key_.Create(HKEY_CURRENT_USER, key_path.c_str(), KEY_ALL_ACCESS)); in ScopedRegistryKeyOverride() 97 base::string16 key_path = GenerateTempKeyPath(test_key_root_, timestamp_); in OverrideRegistry() local 98 overrides_.push_back(new ScopedRegistryKeyOverride(override, key_path)); in OverrideRegistry()
|
D | test_reg_util_win_unittest.cc | 40 void AssertKeyExists(const base::string16& key_path) { in AssertKeyExists() argument 43 key.Open(HKEY_CURRENT_USER, key_path.c_str(), KEY_READ)) in AssertKeyExists() 44 << key_path << " does not exist."; in AssertKeyExists() 47 void AssertKeyAbsent(const base::string16& key_path) { in AssertKeyAbsent() argument 50 key.Open(HKEY_CURRENT_USER, key_path.c_str(), KEY_READ)) in AssertKeyAbsent() 51 << key_path << " exists but it should not."; in AssertKeyAbsent() 54 void CreateKey(const base::string16& key_path) { in CreateKey() argument 57 key.Create(HKEY_CURRENT_USER, key_path.c_str(), KEY_ALL_ACCESS)); in CreateKey()
|
/external/chromium_org/content/browser/indexed_db/ |
D | indexed_db_metadata.h | 20 const IndexedDBKeyPath& key_path, in IndexedDBIndexMetadata() 25 key_path(key_path), in IndexedDBIndexMetadata() 30 IndexedDBKeyPath key_path; member 41 const IndexedDBKeyPath& key_path, 47 IndexedDBKeyPath key_path; member
|
D | indexed_db_metadata.cc | 12 const IndexedDBKeyPath& key_path, in IndexedDBObjectStoreMetadata() argument 17 key_path(key_path), in IndexedDBObjectStoreMetadata()
|
/external/chromium_org/content/child/indexed_db/ |
D | indexed_db_key_builders.cc | 110 const blink::WebIDBKeyPath& key_path) { in Build() argument 111 switch (key_path.keyPathType()) { in Build() 113 return IndexedDBKeyPath(key_path.string()); in Build() 115 return IndexedDBKeyPath(CopyArray(key_path.array())); in Build() 125 const IndexedDBKeyPath& key_path) { in Build() argument 126 switch (key_path.type()) { in Build() 128 return blink::WebIDBKeyPath::create(WebString(key_path.string())); in Build() 130 return blink::WebIDBKeyPath::create(CopyArray(key_path.array())); in Build()
|
D | webidbdatabase_impl.cc | 57 const WebIDBKeyPath& key_path, in createObjectStore() argument 64 params.key_path = IndexedDBKeyPathBuilder::Build(key_path); in createObjectStore() 236 const WebIDBKeyPath& key_path, in createIndex() argument 245 params.key_path = IndexedDBKeyPathBuilder::Build(key_path); in createIndex()
|
/external/chromium_org/build/android/gyp/ |
D | finalize_apk.py | 17 def SignApk(key_path, key_name, key_passwd, unsigned_path, signed_path): argument 23 '-keystore', key_path, 57 SignApk(options.key_path, options.key_name, options.key_passwd,
|
/external/chromium_org/chrome_elf/ |
D | chrome_elf_util.cc | 34 bool ReadKeyValueString(bool system_install, const wchar_t* key_path, in ReadKeyValueString() argument 40 base::string16 full_key_path(key_path); in ReadKeyValueString() 79 bool ReadKeyValueDW(bool system_install, const wchar_t* key_path, in ReadKeyValueDW() argument 85 base::string16 full_key_path(key_path); in ReadKeyValueDW()
|