Searched defs:policies (Results 26 - 50 of 56) sorted by relevance

123

/external/chromium_org/chrome/browser/extensions/api/storage/
H A Dsettings_apitest.cc56 // its extension ID is well-known and the policy system can push policies for
155 void SetPolicies(const base::DictionaryValue& policies) { argument
160 &policies, policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER);
461 // Set policies for the test extension.
491 // Set policies for the test extension.
507 // Now change the policies and wait until the extension is done.
/external/chromium_org/chrome/browser/policy/
H A Dconfiguration_policy_provider_test.cc72 const base::DictionaryValue* policies) {
94 EXPECT_TRUE(provider_->policies().Equals(kEmptyBundle));
120 EXPECT_TRUE(provider_->policies().Equals(expected_bundle));
129 EXPECT_TRUE(provider_->policies().Equals(kEmptyBundle));
210 EXPECT_TRUE(provider_->policies().Equals(bundle));
220 EXPECT_TRUE(provider_->policies().Equals(bundle));
236 EXPECT_TRUE(provider_->policies().Equals(bundle));
248 // Both these policies should be ignored, since there's a higher priority
274 EXPECT_TRUE(provider.policies().Equals(expected_bundle));
301 // Install these policies a
71 Install3rdPartyPolicy( const base::DictionaryValue* policies) argument
[all...]
H A Dpolicy_service_impl_unittest.cc49 // Helper that fills |bundle| with test policies.
133 // Returns true if the policies for namespace |ns| match |expected|.
380 // Starting to observe existing policies doesn't trigger a notification.
492 const PolicyMap& policies = policy_service_->GetPolicies( local
494 EXPECT_TRUE(base::Value::Equals(&kValue2, policies.GetValue("aaa")));
495 EXPECT_TRUE(base::Value::Equals(&kValue0, policies.GetValue("bbb")));
516 // For policies of the same level and scope, the first provider takes
520 // For policies with different levels and scopes, the highest priority
H A Dpolicy_prefs_browsertest.cc412 // Verifies that all known policies have a test case in the JSON file.
426 // Verifies that policies make their corresponding preferences become managed,
520 PolicyMap policies; local
521 UpdateProviderPolicy(policies);
526 policies.LoadFrom(&(*indicator_test_case)->policy(),
528 UpdateProviderPolicy(policies);
549 policies.LoadFrom(&(*indicator_test_case)->policy(),
551 UpdateProviderPolicy(policies);
H A Dpolicy_loader_win_unittest.cc271 const base::DictionaryValue* policies) OVERRIDE;
321 const base::DictionaryValue* policies) OVERRIDE;
489 const base::DictionaryValue* policies) {
494 for (base::DictionaryValue::Iterator domain(*policies);
590 const base::DictionaryValue* policies) {
595 for (base::DictionaryValue::Iterator domain(*policies);
488 Install3rdPartyPolicy( const base::DictionaryValue* policies) argument
589 Install3rdPartyPolicy( const base::DictionaryValue* policies) argument
H A Dconfiguration_policy_handler.cc48 // the ProxyBypassList and the ProxyServer policies are allowed to be specified.
50 // when the policies are not specified as allowed. Each value of ProxyMode
70 // List of policy types to preference names, for policies affecting the default
120 // List of entries determining which proxy policies can be specified, depending
179 PolicyMap* policies) const {
184 for (PolicyMap::const_iterator it = policies->begin();
185 it != policies->end(); ++it) {
189 policies->Set(it->first, entry.level, entry.scope,
220 bool TypeCheckingPolicyHandler::CheckPolicySettings(const PolicyMap& policies, argument
223 return CheckAndGetValue(policies, error
226 CheckAndGetValue(const PolicyMap& policies, PolicyErrorMap* errors, const Value** value) argument
252 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument
304 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument
312 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument
383 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
410 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument
434 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument
440 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument
453 CheckAndGetList( const PolicyMap& policies, PolicyErrorMap* errors, scoped_ptr<base::ListValue>* extension_ids) argument
511 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument
519 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument
602 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument
642 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument
665 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
685 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
704 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
728 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
760 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
784 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
808 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument
843 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
884 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument
929 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument
957 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
1039 CheckIndividualPolicies( const PolicyMap& policies, PolicyErrorMap* errors) argument
1050 HasDefaultSearchPolicy( const PolicyMap& policies, const char* policy_name) argument
1056 AnyDefaultSearchPoliciesSpecified( const PolicyMap& policies) argument
1065 DefaultSearchProviderIsDisabled( const PolicyMap& policies) argument
1074 DefaultSearchURLIsValid( const PolicyMap& policies, const Value** url_value, std::string* url_string) argument
1120 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument
1187 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
1267 GetProxyPolicyValue( const PolicyMap& policies, const char* policy_name) argument
1287 CheckProxyModeAndServerMode(const PolicyMap& policies, PolicyErrorMap* errors, std::string* mode_value) argument
1398 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument
1425 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
1458 CheckPolicySettings(const PolicyMap& policies, PolicyErrorMap* errors) argument
1478 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument
1528 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument
1544 ApplyPolicySettingsFromHomePage( const PolicyMap& policies, PrefValueMap* prefs) argument
1578 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument
[all...]
H A Dpolicy_browsertest.cc486 PolicyMap policies; local
487 policies.Set(key::kDisableScreenshots,
490 UpdateProviderPolicy(policies);
640 PolicyMap policies; variable
641 policies.Set(
644 provider_.UpdateChromePolicy(policies);
685 PolicyMap policies; local
686 policies.Set(key::kBookmarkBarEnabled, POLICY_LEVEL_MANDATORY,
688 UpdateProviderPolicy(policies);
697 policies
732 PolicyMap policies; local
775 PolicyMap policies; local
868 PolicyMap policies; local
924 PolicyMap policies; local
1022 PolicyMap policies; local
1043 PolicyMap policies; local
1079 PolicyMap policies; local
1106 PolicyMap policies; local
1147 PolicyMap policies; local
1198 PolicyMap policies; local
1219 PolicyMap policies; local
1255 PolicyMap policies; local
1289 PolicyMap policies; local
1307 PolicyMap policies; local
1332 PolicyMap policies; local
1356 PolicyMap policies; local
1391 PolicyMap policies; local
1456 PolicyMap policies; local
1502 PolicyMap policies; local
1543 PolicyMap policies; local
1571 PolicyMap policies; local
1597 PolicyMap policies; local
1624 PolicyMap policies; local
1660 PolicyMap policies; local
1741 PolicyMap policies; local
1790 PolicyMap policies; local
1883 PolicyMap policies; local
1927 PolicyMap policies; local
1959 PolicyMap policies; local
1983 PolicyMap policies; local
2007 PolicyMap policies; local
2031 PolicyMap policies; local
2052 PolicyMap policies; local
2121 PolicyMap policies; local
2141 PolicyMap policies; local
2162 PolicyMap policies; local
2175 PolicyMap policies; local
2186 PolicyMap policies; local
2248 PolicyMap policies; variable
2318 ConfigurePolicyMap(PolicyMap* policies, const char* policy_name, const char* whitelist_policy, const char* allow_rule) argument
2411 PolicyMap policies; local
2442 PolicyMap policies; local
2468 PolicyMap policies; local
2499 PolicyMap policies; local
2529 PolicyMap policies; variable
[all...]
/external/chromium_org/net/cert/
H A Dx509_util_mac.cc78 CFMutableArrayRef policies) {
96 // will set force this flag on according to system policies, so
106 CFArrayAppendValue(policies, crl_policy);
144 CFArrayAppendValue(policies, ocsp_policy);
76 CreateRevocationPolicies(bool enable_revocation_checking, bool enable_ev_checking, CFMutableArrayRef policies) argument
H A Dcert_verify_proc_mac.cc149 // stores the resultant array of SecPolicyRefs in |policies|.
152 ScopedCFTypeRef<CFArrayRef>* policies) {
165 // Explicitly add revocation policies, in order to override system
166 // revocation checking policies and instead respect the application-level
175 policies->reset(local_policies.release());
345 // in |cert_array|, using the verification policies in |trust_policies|. On
150 CreateTrustPolicies(const std::string& hostname, int flags, ScopedCFTypeRef<CFArrayRef>* policies) argument
/external/chromium_org/third_party/WebKit/Source/bindings/v8/
H A DDOMWrapperWorld.cpp206 IsolatedWorldContentSecurityPolicyMap& policies = isolatedWorldContentSecurityPolicies(); local
207 IsolatedWorldContentSecurityPolicyMap::iterator it = policies.find(worldId());
208 return it == policies.end() ? false : it->value;
/external/chromium_org/third_party/openssl/openssl/crypto/x509/
H A Dx509_vpm.c81 if (param->policies)
83 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
84 param->policies = NULL;
190 if (test_x509_verify_param_copy(policies, NULL))
192 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies))
262 if (!param->policies)
264 param->policies = sk_ASN1_OBJECT_new_null();
265 if (!param->policies)
268 if (!sk_ASN1_OBJECT_push(param->policies, policy))
274 STACK_OF(ASN1_OBJECT) *policies)
273 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument
[all...]
H A Dx509_vfy.h175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
528 STACK_OF(ASN1_OBJECT) *policies);
/external/openssl/crypto/x509/
H A Dx509_vpm.c81 if (param->policies)
83 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
84 param->policies = NULL;
190 if (test_x509_verify_param_copy(policies, NULL))
192 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies))
262 if (!param->policies)
264 param->policies = sk_ASN1_OBJECT_new_null();
265 if (!param->policies)
268 if (!sk_ASN1_OBJECT_push(param->policies, policy))
274 STACK_OF(ASN1_OBJECT) *policies)
273 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument
[all...]
/external/chromium_org/chrome/browser/policy/cloud/
H A Dcloud_policy_invalidator_unittest.cc236 base::DictionaryValue policies; local
237 policies.SetInteger(
241 &policies,
/external/strace/
H A Dmem.c763 static const struct xlat policies[] = { variable in typeref:struct:xlat
844 printxval(policies, tcp->u_arg[2], "MPOL_???");
857 printxval(policies, tcp->u_arg[0], "MPOL_???");
874 printxval(policies, pol, "MPOL_???");
/external/chromium_org/chrome/browser/ui/webui/
H A Dpolicy_ui.cc297 // Send a dictionary containing the names of all known policies to the UI.
581 const policy::PolicySchemaMap* policies = schema->second->GetProperties(); local
583 for (it_policies = policies->begin(); it_policies != policies->end();
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/
H A DX509CertSelectorTest.java106 protected String[] policies = null; field in class:X509CertSelectorTest.TestCert
124 public TestCert(String[] policies) { argument
125 setPolicies(policies);
165 public void setPolicies(String[] policies) { argument
166 this.policies = policies;
418 if ("2.5.29.32".equals(oid) && (policies != null)
419 && (policies.length > 0)) {
423 for (int i=0; i<policies.length; i++) {
425 new PolicyInformation(policies[
[all...]
/external/chromium/net/base/
H A Dx509_certificate_nss.cc36 explicit ScopedCERTCertificatePolicies(CERTCertificatePolicies* policies) argument
37 : policies_(policies) {}
332 // If policy_oids is not NULL and num_policy_oids is positive, policies
541 CERTCertificatePolicies* policies =
544 return policies;
551 CERTCertificatePolicies* policies = DecodeCertPolicies(cert_handle); local
552 if (!policies)
554 ScopedCERTCertificatePolicies scoped_policies(policies);
555 CERTPolicyInfo* policy_info = policies->policyInfos[0];
578 CERTCertificatePolicies* policies local
[all...]
H A Dx509_certificate_mac.cc296 // noErr, and stores the resultant array of SecPolicyRefs in |policies|.
298 ScopedCFTypeRef<CFArrayRef>* policies) {
315 // Manually add OCSP and CRL policies. If neither an OCSP or CRL policy is
365 policies->reset(policy_array);
297 CreateTrustPolicies(const std::string& hostname, int flags, ScopedCFTypeRef<CFArrayRef>* policies) argument
/external/chromium_org/chrome/third_party/mozilla_security_manager/
H A DnsNSSCertHelper.cpp698 CERTCertificatePolicies* policies = CERT_DecodeCertificatePoliciesExtension( local
700 if (!policies)
703 CERTPolicyInfo** policyInfos = policies->policyInfos;
749 CERT_DestroyCertificatePoliciesExtension(policies);
/external/chromium_org/chromeos/network/
H A Dmanaged_network_configuration_handler.cc276 // Returns the policy from |policies| matching |actual_network|, if any exists.
280 const ManagedNetworkConfigurationHandler::GuidToPolicyMap &policies,
283 policies.begin(); it != policies.end(); ++it) {
291 const ManagedNetworkConfigurationHandler::GuidToPolicyMap &policies,
294 policies.find(guid);
295 if (it == policies.end())
316 // the current policies (GetEntryCallback) and adds all missing policies
347 // Creates new entries for all remaining policies,
279 FindMatchingPolicy( const ManagedNetworkConfigurationHandler::GuidToPolicyMap &policies, const base::DictionaryValue& actual_network) argument
290 GetByGUID( const ManagedNetworkConfigurationHandler::GuidToPolicyMap &policies, const std::string& guid) argument
447 const GuidToPolicyMap* policies = GetPoliciesForProfile(*profile); local
528 const GuidToPolicyMap* policies = GetPoliciesForProfile(*profile); local
576 const GuidToPolicyMap* policies = GetPoliciesForUser(userhash); local
634 GuidToPolicyMap& policies = policies_by_user_[userhash]; local
687 const GuidToPolicyMap* policies = GetPoliciesForProfile(profile); local
874 const GuidToPolicyMap& policies = *handler_->GetPoliciesForProfile(profile_); local
973 const GuidToPolicyMap& policies = *handler_->GetPoliciesForProfile(profile_); local
[all...]
/external/chromium_org/remoting/host/
H A Dremoting_me2me_host.cc152 // Host process has just been started. Waiting for config and policies to be
211 void OnPolicyUpdate(scoped_ptr<base::DictionaryValue> policies);
535 // should keep running, but not connected, until the policies are fixed.
538 << "Host will reject all clients until policies are corrected. "
733 void HostProcess::OnPolicyUpdate(scoped_ptr<base::DictionaryValue> policies) { argument
737 // check policies again later, e.g. when host config changes.
741 &HostProcess::OnPolicyUpdate, this, base::Passed(&policies)));
748 if (policies->GetString(policy_hack::PolicyWatcher::kHostDomainPolicyName,
753 if (policies->GetBoolean(
758 if (policies
[all...]
/external/chromium_org/remoting/host/plugin/
H A Dhost_script_object.cc137 // Called by Connect() to check for policies and start connection process.
142 // Called by ReadPolicyAndConnect once policies have been read.
160 // Called when initial policies are read, and when they change.
161 void OnPolicyUpdate(scoped_ptr<base::DictionaryValue> policies);
163 // Handlers for NAT traversal and host domain policies.
243 // Start monitoring configured policies.
502 scoped_ptr<base::DictionaryValue> policies) {
506 if (policies->GetBoolean(policy_hack::PolicyWatcher::kNatPolicyName,
511 if (policies->GetString(policy_hack::PolicyWatcher::kHostDomainPolicyName,
501 OnPolicyUpdate( scoped_ptr<base::DictionaryValue> policies) argument
/external/chromium_org/third_party/WebKit/Source/core/page/
H A DContentSecurityPolicy.cpp1468 // We disable 'eval()' even in the case of report-only policies, and rely on the check in the V8Initializer::codeGenerationCheckCallbackInMainThread callback to determine whether the call should execute or not.
1497 bool isAllowedByAll(const CSPDirectiveListVector& policies, ContentSecurityPolicy::ReportingStatus reportingStatus) argument
1499 for (size_t i = 0; i < policies.size(); ++i) {
1500 if (!(policies[i].get()->*allowed)(reportingStatus))
1507 bool isAllowedByAllWithState(const CSPDirectiveListVector& policies, ScriptState* state, ContentSecurityPolicy::ReportingStatus reportingStatus) argument
1509 for (size_t i = 0; i < policies.size(); ++i) {
1510 if (!(policies[i].get()->*allowed)(state, reportingStatus))
1517 bool isAllowedByAllWithContext(const CSPDirectiveListVector& policies, const String& contextURL, const WTF::OrdinalNumber& contextLine, ContentSecurityPolicy::ReportingStatus reportingStatus) argument
1519 for (size_t i = 0; i < policies.size(); ++i) {
1520 if (!(policies[
1527 isAllowedByAllWithNonce(const CSPDirectiveListVector& policies, const String& nonce) argument
1536 isAllowedByAllWithURL(const CSPDirectiveListVector& policies, const KURL& url, ContentSecurityPolicy::ReportingStatus reportingStatus) argument
[all...]
/external/chromium_org/third_party/openssl/openssl/include/openssl/
H A Dts.h273 policies SEQUENCE OF PolicyInformation OPTIONAL
505 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx
506 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */

Completed in 957 milliseconds

123