/external/chromium_org/chrome/browser/extensions/api/storage/ |
H A D | settings_apitest.cc | 56 // its extension ID is well-known and the policy system can push policies for 155 void SetPolicies(const base::DictionaryValue& policies) { argument 160 &policies, policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER); 461 // Set policies for the test extension. 491 // Set policies for the test extension. 507 // Now change the policies and wait until the extension is done.
|
/external/chromium_org/chrome/browser/policy/ |
H A D | configuration_policy_provider_test.cc | 72 const base::DictionaryValue* policies) { 94 EXPECT_TRUE(provider_->policies().Equals(kEmptyBundle)); 120 EXPECT_TRUE(provider_->policies().Equals(expected_bundle)); 129 EXPECT_TRUE(provider_->policies().Equals(kEmptyBundle)); 210 EXPECT_TRUE(provider_->policies().Equals(bundle)); 220 EXPECT_TRUE(provider_->policies().Equals(bundle)); 236 EXPECT_TRUE(provider_->policies().Equals(bundle)); 248 // Both these policies should be ignored, since there's a higher priority 274 EXPECT_TRUE(provider.policies().Equals(expected_bundle)); 301 // Install these policies a 71 Install3rdPartyPolicy( const base::DictionaryValue* policies) argument [all...] |
H A D | policy_service_impl_unittest.cc | 49 // Helper that fills |bundle| with test policies. 133 // Returns true if the policies for namespace |ns| match |expected|. 380 // Starting to observe existing policies doesn't trigger a notification. 492 const PolicyMap& policies = policy_service_->GetPolicies( local 494 EXPECT_TRUE(base::Value::Equals(&kValue2, policies.GetValue("aaa"))); 495 EXPECT_TRUE(base::Value::Equals(&kValue0, policies.GetValue("bbb"))); 516 // For policies of the same level and scope, the first provider takes 520 // For policies with different levels and scopes, the highest priority
|
H A D | policy_prefs_browsertest.cc | 412 // Verifies that all known policies have a test case in the JSON file. 426 // Verifies that policies make their corresponding preferences become managed, 520 PolicyMap policies; local 521 UpdateProviderPolicy(policies); 526 policies.LoadFrom(&(*indicator_test_case)->policy(), 528 UpdateProviderPolicy(policies); 549 policies.LoadFrom(&(*indicator_test_case)->policy(), 551 UpdateProviderPolicy(policies);
|
H A D | policy_loader_win_unittest.cc | 271 const base::DictionaryValue* policies) OVERRIDE; 321 const base::DictionaryValue* policies) OVERRIDE; 489 const base::DictionaryValue* policies) { 494 for (base::DictionaryValue::Iterator domain(*policies); 590 const base::DictionaryValue* policies) { 595 for (base::DictionaryValue::Iterator domain(*policies); 488 Install3rdPartyPolicy( const base::DictionaryValue* policies) argument 589 Install3rdPartyPolicy( const base::DictionaryValue* policies) argument
|
H A D | configuration_policy_handler.cc | 48 // the ProxyBypassList and the ProxyServer policies are allowed to be specified. 50 // when the policies are not specified as allowed. Each value of ProxyMode 70 // List of policy types to preference names, for policies affecting the default 120 // List of entries determining which proxy policies can be specified, depending 179 PolicyMap* policies) const { 184 for (PolicyMap::const_iterator it = policies->begin(); 185 it != policies->end(); ++it) { 189 policies->Set(it->first, entry.level, entry.scope, 220 bool TypeCheckingPolicyHandler::CheckPolicySettings(const PolicyMap& policies, argument 223 return CheckAndGetValue(policies, error 226 CheckAndGetValue(const PolicyMap& policies, PolicyErrorMap* errors, const Value** value) argument 252 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument 304 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument 312 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument 383 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 410 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument 434 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument 440 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument 453 CheckAndGetList( const PolicyMap& policies, PolicyErrorMap* errors, scoped_ptr<base::ListValue>* extension_ids) argument 511 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument 519 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument 602 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument 642 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument 665 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 685 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 704 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 728 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 760 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 784 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 808 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument 843 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 884 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument 929 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument 957 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 1039 CheckIndividualPolicies( const PolicyMap& policies, PolicyErrorMap* errors) argument 1050 HasDefaultSearchPolicy( const PolicyMap& policies, const char* policy_name) argument 1056 AnyDefaultSearchPoliciesSpecified( const PolicyMap& policies) argument 1065 DefaultSearchProviderIsDisabled( const PolicyMap& policies) argument 1074 DefaultSearchURLIsValid( const PolicyMap& policies, const Value** url_value, std::string* url_string) argument 1120 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument 1187 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 1267 GetProxyPolicyValue( const PolicyMap& policies, const char* policy_name) argument 1287 CheckProxyModeAndServerMode(const PolicyMap& policies, PolicyErrorMap* errors, std::string* mode_value) argument 1398 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument 1425 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 1458 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument 1478 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument 1528 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument 1544 ApplyPolicySettingsFromHomePage( const PolicyMap& policies, PrefValueMap* prefs) argument 1578 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument [all...] |
H A D | policy_browsertest.cc | 486 PolicyMap policies; local 487 policies.Set(key::kDisableScreenshots, 490 UpdateProviderPolicy(policies); 640 PolicyMap policies; variable 641 policies.Set( 644 provider_.UpdateChromePolicy(policies); 685 PolicyMap policies; local 686 policies.Set(key::kBookmarkBarEnabled, POLICY_LEVEL_MANDATORY, 688 UpdateProviderPolicy(policies); 697 policies 732 PolicyMap policies; local 775 PolicyMap policies; local 868 PolicyMap policies; local 924 PolicyMap policies; local 1022 PolicyMap policies; local 1043 PolicyMap policies; local 1079 PolicyMap policies; local 1106 PolicyMap policies; local 1147 PolicyMap policies; local 1198 PolicyMap policies; local 1219 PolicyMap policies; local 1255 PolicyMap policies; local 1289 PolicyMap policies; local 1307 PolicyMap policies; local 1332 PolicyMap policies; local 1356 PolicyMap policies; local 1391 PolicyMap policies; local 1456 PolicyMap policies; local 1502 PolicyMap policies; local 1543 PolicyMap policies; local 1571 PolicyMap policies; local 1597 PolicyMap policies; local 1624 PolicyMap policies; local 1660 PolicyMap policies; local 1741 PolicyMap policies; local 1790 PolicyMap policies; local 1883 PolicyMap policies; local 1927 PolicyMap policies; local 1959 PolicyMap policies; local 1983 PolicyMap policies; local 2007 PolicyMap policies; local 2031 PolicyMap policies; local 2052 PolicyMap policies; local 2121 PolicyMap policies; local 2141 PolicyMap policies; local 2162 PolicyMap policies; local 2175 PolicyMap policies; local 2186 PolicyMap policies; local 2248 PolicyMap policies; variable 2318 ConfigurePolicyMap(PolicyMap* policies, const char* policy_name, const char* whitelist_policy, const char* allow_rule) argument 2411 PolicyMap policies; local 2442 PolicyMap policies; local 2468 PolicyMap policies; local 2499 PolicyMap policies; local 2529 PolicyMap policies; variable [all...] |
/external/chromium_org/net/cert/ |
H A D | x509_util_mac.cc | 78 CFMutableArrayRef policies) { 96 // will set force this flag on according to system policies, so 106 CFArrayAppendValue(policies, crl_policy); 144 CFArrayAppendValue(policies, ocsp_policy); 76 CreateRevocationPolicies(bool enable_revocation_checking, bool enable_ev_checking, CFMutableArrayRef policies) argument
|
H A D | cert_verify_proc_mac.cc | 149 // stores the resultant array of SecPolicyRefs in |policies|. 152 ScopedCFTypeRef<CFArrayRef>* policies) { 165 // Explicitly add revocation policies, in order to override system 166 // revocation checking policies and instead respect the application-level 175 policies->reset(local_policies.release()); 345 // in |cert_array|, using the verification policies in |trust_policies|. On 150 CreateTrustPolicies(const std::string& hostname, int flags, ScopedCFTypeRef<CFArrayRef>* policies) argument
|
/external/chromium_org/third_party/WebKit/Source/bindings/v8/ |
H A D | DOMWrapperWorld.cpp | 206 IsolatedWorldContentSecurityPolicyMap& policies = isolatedWorldContentSecurityPolicies(); local 207 IsolatedWorldContentSecurityPolicyMap::iterator it = policies.find(worldId()); 208 return it == policies.end() ? false : it->value;
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
H A D | x509_vpm.c | 81 if (param->policies) 83 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 84 param->policies = NULL; 190 if (test_x509_verify_param_copy(policies, NULL)) 192 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) 262 if (!param->policies) 264 param->policies = sk_ASN1_OBJECT_new_null(); 265 if (!param->policies) 268 if (!sk_ASN1_OBJECT_push(param->policies, policy)) 274 STACK_OF(ASN1_OBJECT) *policies) 273 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument [all...] |
H A D | x509_vfy.h | 175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st 528 STACK_OF(ASN1_OBJECT) *policies);
|
/external/openssl/crypto/x509/ |
H A D | x509_vpm.c | 81 if (param->policies) 83 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 84 param->policies = NULL; 190 if (test_x509_verify_param_copy(policies, NULL)) 192 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) 262 if (!param->policies) 264 param->policies = sk_ASN1_OBJECT_new_null(); 265 if (!param->policies) 268 if (!sk_ASN1_OBJECT_push(param->policies, policy)) 274 STACK_OF(ASN1_OBJECT) *policies) 273 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument [all...] |
/external/chromium_org/chrome/browser/policy/cloud/ |
H A D | cloud_policy_invalidator_unittest.cc | 236 base::DictionaryValue policies; local 237 policies.SetInteger( 241 &policies,
|
/external/strace/ |
H A D | mem.c | 763 static const struct xlat policies[] = { variable in typeref:struct:xlat 844 printxval(policies, tcp->u_arg[2], "MPOL_???"); 857 printxval(policies, tcp->u_arg[0], "MPOL_???"); 874 printxval(policies, pol, "MPOL_???");
|
/external/chromium_org/chrome/browser/ui/webui/ |
H A D | policy_ui.cc | 297 // Send a dictionary containing the names of all known policies to the UI. 581 const policy::PolicySchemaMap* policies = schema->second->GetProperties(); local 583 for (it_policies = policies->begin(); it_policies != policies->end();
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
H A D | X509CertSelectorTest.java | 106 protected String[] policies = null; field in class:X509CertSelectorTest.TestCert 124 public TestCert(String[] policies) { argument 125 setPolicies(policies); 165 public void setPolicies(String[] policies) { argument 166 this.policies = policies; 418 if ("2.5.29.32".equals(oid) && (policies != null) 419 && (policies.length > 0)) { 423 for (int i=0; i<policies.length; i++) { 425 new PolicyInformation(policies[ [all...] |
/external/chromium/net/base/ |
H A D | x509_certificate_nss.cc | 36 explicit ScopedCERTCertificatePolicies(CERTCertificatePolicies* policies) argument 37 : policies_(policies) {} 332 // If policy_oids is not NULL and num_policy_oids is positive, policies 541 CERTCertificatePolicies* policies = 544 return policies; 551 CERTCertificatePolicies* policies = DecodeCertPolicies(cert_handle); local 552 if (!policies) 554 ScopedCERTCertificatePolicies scoped_policies(policies); 555 CERTPolicyInfo* policy_info = policies->policyInfos[0]; 578 CERTCertificatePolicies* policies local [all...] |
H A D | x509_certificate_mac.cc | 296 // noErr, and stores the resultant array of SecPolicyRefs in |policies|. 298 ScopedCFTypeRef<CFArrayRef>* policies) { 315 // Manually add OCSP and CRL policies. If neither an OCSP or CRL policy is 365 policies->reset(policy_array); 297 CreateTrustPolicies(const std::string& hostname, int flags, ScopedCFTypeRef<CFArrayRef>* policies) argument
|
/external/chromium_org/chrome/third_party/mozilla_security_manager/ |
H A D | nsNSSCertHelper.cpp | 698 CERTCertificatePolicies* policies = CERT_DecodeCertificatePoliciesExtension( local 700 if (!policies) 703 CERTPolicyInfo** policyInfos = policies->policyInfos; 749 CERT_DestroyCertificatePoliciesExtension(policies);
|
/external/chromium_org/chromeos/network/ |
H A D | managed_network_configuration_handler.cc | 276 // Returns the policy from |policies| matching |actual_network|, if any exists. 280 const ManagedNetworkConfigurationHandler::GuidToPolicyMap &policies, 283 policies.begin(); it != policies.end(); ++it) { 291 const ManagedNetworkConfigurationHandler::GuidToPolicyMap &policies, 294 policies.find(guid); 295 if (it == policies.end()) 316 // the current policies (GetEntryCallback) and adds all missing policies 347 // Creates new entries for all remaining policies, 279 FindMatchingPolicy( const ManagedNetworkConfigurationHandler::GuidToPolicyMap &policies, const base::DictionaryValue& actual_network) argument 290 GetByGUID( const ManagedNetworkConfigurationHandler::GuidToPolicyMap &policies, const std::string& guid) argument 447 const GuidToPolicyMap* policies = GetPoliciesForProfile(*profile); local 528 const GuidToPolicyMap* policies = GetPoliciesForProfile(*profile); local 576 const GuidToPolicyMap* policies = GetPoliciesForUser(userhash); local 634 GuidToPolicyMap& policies = policies_by_user_[userhash]; local 687 const GuidToPolicyMap* policies = GetPoliciesForProfile(profile); local 874 const GuidToPolicyMap& policies = *handler_->GetPoliciesForProfile(profile_); local 973 const GuidToPolicyMap& policies = *handler_->GetPoliciesForProfile(profile_); local [all...] |
/external/chromium_org/remoting/host/ |
H A D | remoting_me2me_host.cc | 152 // Host process has just been started. Waiting for config and policies to be 211 void OnPolicyUpdate(scoped_ptr<base::DictionaryValue> policies); 535 // should keep running, but not connected, until the policies are fixed. 538 << "Host will reject all clients until policies are corrected. " 733 void HostProcess::OnPolicyUpdate(scoped_ptr<base::DictionaryValue> policies) { argument 737 // check policies again later, e.g. when host config changes. 741 &HostProcess::OnPolicyUpdate, this, base::Passed(&policies))); 748 if (policies->GetString(policy_hack::PolicyWatcher::kHostDomainPolicyName, 753 if (policies->GetBoolean( 758 if (policies [all...] |
/external/chromium_org/remoting/host/plugin/ |
H A D | host_script_object.cc | 137 // Called by Connect() to check for policies and start connection process. 142 // Called by ReadPolicyAndConnect once policies have been read. 160 // Called when initial policies are read, and when they change. 161 void OnPolicyUpdate(scoped_ptr<base::DictionaryValue> policies); 163 // Handlers for NAT traversal and host domain policies. 243 // Start monitoring configured policies. 502 scoped_ptr<base::DictionaryValue> policies) { 506 if (policies->GetBoolean(policy_hack::PolicyWatcher::kNatPolicyName, 511 if (policies->GetString(policy_hack::PolicyWatcher::kHostDomainPolicyName, 501 OnPolicyUpdate( scoped_ptr<base::DictionaryValue> policies) argument
|
/external/chromium_org/third_party/WebKit/Source/core/page/ |
H A D | ContentSecurityPolicy.cpp | 1468 // We disable 'eval()' even in the case of report-only policies, and rely on the check in the V8Initializer::codeGenerationCheckCallbackInMainThread callback to determine whether the call should execute or not. 1497 bool isAllowedByAll(const CSPDirectiveListVector& policies, ContentSecurityPolicy::ReportingStatus reportingStatus) argument 1499 for (size_t i = 0; i < policies.size(); ++i) { 1500 if (!(policies[i].get()->*allowed)(reportingStatus)) 1507 bool isAllowedByAllWithState(const CSPDirectiveListVector& policies, ScriptState* state, ContentSecurityPolicy::ReportingStatus reportingStatus) argument 1509 for (size_t i = 0; i < policies.size(); ++i) { 1510 if (!(policies[i].get()->*allowed)(state, reportingStatus)) 1517 bool isAllowedByAllWithContext(const CSPDirectiveListVector& policies, const String& contextURL, const WTF::OrdinalNumber& contextLine, ContentSecurityPolicy::ReportingStatus reportingStatus) argument 1519 for (size_t i = 0; i < policies.size(); ++i) { 1520 if (!(policies[ 1527 isAllowedByAllWithNonce(const CSPDirectiveListVector& policies, const String& nonce) argument 1536 isAllowedByAllWithURL(const CSPDirectiveListVector& policies, const KURL& url, ContentSecurityPolicy::ReportingStatus reportingStatus) argument [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
H A D | ts.h | 273 policies SEQUENCE OF PolicyInformation OPTIONAL 505 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx 506 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
|