/external/chromium/chrome/browser/policy/ |
H A D | asynchronous_policy_provider_unittest.cc | 23 DictionaryValue* policies = new DictionaryValue(); local 24 policies->SetBoolean(policy::key::kSyncDisabled, true); 25 EXPECT_CALL(*delegate_, Load()).WillOnce(Return(policies));
|
H A D | file_based_policy_provider_unittest.cc | 39 DictionaryValue* policies = new DictionaryValue(); local 40 policies->SetBoolean(policy::key::kSyncDisabled, true); 44 EXPECT_CALL(*provider_delegate, Load()).WillOnce(Return(policies)); 73 DictionaryValue* policies = new DictionaryValue(); local 74 policies->SetBoolean(policy::key::kSyncDisabled, true); 75 EXPECT_CALL(*provider_delegate, Load()).WillOnce(Return(policies));
|
H A D | configuration_policy_provider.cc | 26 const DictionaryValue* policies, 32 if (policies->Get(i->name, &value) && value->IsType(i->value_type)) 41 const PolicyMap* policies, 46 const Value* value = policies->Get(i->policy_type); 25 ApplyPolicyValueTree( const DictionaryValue* policies, ConfigurationPolicyStoreInterface* store) argument 40 ApplyPolicyMap( const PolicyMap* policies, ConfigurationPolicyStoreInterface* store) argument
|
/external/chromium_org/remoting/host/policy_hack/ |
H A D | mock_policy_callback.cc | 17 scoped_ptr<base::DictionaryValue> policies) { 18 OnPolicyUpdatePtr(policies.get()); 16 OnPolicyUpdate( scoped_ptr<base::DictionaryValue> policies) argument
|
H A D | fake_policy_watcher.cc | 20 void FakePolicyWatcher::SetPolicies(const base::DictionaryValue* policies) { argument 21 UpdatePolicies(policies);
|
/external/chromium_org/chrome/browser/policy/ |
H A D | configuration_policy_provider.h | 39 // are created early during startup to provide the initial policies; the 47 // The provider should keep providing the current policies after Shutdown() 52 const PolicyBundle& policies() const { return policy_bundle_; } function in class:policy::ConfigurationPolicyProvider 59 // Asks the provider to refresh its policies. All the updates caused by this 79 // Subclasses must invoke this to update the policies currently served by 80 // this provider. UpdatePolicy() takes ownership of |policies|. 81 // The observers are notified after the policies are updated. 85 // The policies currently configured at this provider.
|
H A D | configuration_policy_handler_android.cc | 53 const PolicyMap& policies, 56 if (!CheckAndGetValue(policies, errors, &value)) 80 const PolicyMap& policies, 82 const base::Value* value = policies.GetValue(policy_name()); 52 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument 79 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument
|
H A D | configuration_policy_handler_list.cc | 42 // List of policy types to preference names. This is used for simple policies 594 const PolicyMap& policies, 603 if ((*handler)->CheckPolicySettings(policies, errors) && prefs) 604 (*handler)->ApplyPolicySettings(policies, prefs); 607 for (PolicyMap::const_iterator it = policies.begin(); 608 it != policies.end(); 616 PolicyMap* policies) const { 619 (*handler)->PrepareForDisplaying(policies); 593 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs, PolicyErrorMap* errors) const argument
|
H A D | policy_statistics_collector.cc | 78 const PolicyMap& policies = policy_service_->GetPolicies( local 84 if (policies.Get(policy->name))
|
H A D | configuration_policy_provider.cc | 25 // Helper that converts deprecated chrome policies into their corresponding 26 // actual policies. 27 void FixDeprecatedPolicies(PolicyMap* policies) { argument 28 // Proxy settings have been configured by 5 policies that didn't mix well 29 // together, and maps of policies had to take this into account when merging 32 // now, the individual policies are mapped here to a single Dictionary policy 36 // first, and then only policies with those exact attributes are merged. 40 const PolicyMap::Entry* entry = policies->Get(kProxyPolicies[i]); 50 policies->Erase(kProxyPolicies[i]); 55 const PolicyMap::Entry* existing = policies [all...] |
H A D | config_dir_policy_loader.cc | 27 // Subdirectories that contain the mandatory and recommended policies. 175 const base::Value* policies, 178 // The first-level entries in |policies| are PolicyDomains. The second-level 179 // entries are component IDs, and the third-level entries are the policies 183 if (!policies->GetAsDictionary(&domains_dictionary)) { 174 Merge3rdPartyPolicy( const base::Value* policies, PolicyLevel level, PolicyBundle* bundle) argument
|
H A D | config_dir_policy_loader_unittest.cc | 22 // Subdirectory of the config dir that contains mandatory policies. 49 const base::DictionaryValue* policies) OVERRIDE; 128 void TestHarness::Install3rdPartyPolicy(const base::DictionaryValue* policies) { argument 130 dict.Set("3rdparty", policies->DeepCopy());
|
H A D | policy_map.cc | 103 const DictionaryValue* policies, 106 for (DictionaryValue::Iterator it(*policies); !it.IsAtEnd(); it.Advance()) 102 LoadFrom( const DictionaryValue* policies, PolicyLevel level, PolicyScope scope) argument
|
/external/libsepol/tests/ |
H A D | Makefile | 11 # In order to load source policies we need to link in the checkpolicy/checkmodule parser and util code. 12 # This is less than ideal, but it makes the tests easier to maintain by allowing source policies 24 m4support := $(wildcard policies/support/*.spt) 25 testsuites := $(wildcard policies/test-*) 29 policies := $(stdpol) $(mlspol) macro 31 all: $(EXE) $(policies) 32 policies: $(policies) 45 rm -f $(policies) 46 rm -f policies/tes [all...] |
H A D | test-linker.c | 48 const char *policies[NUM_POLICIES] = { variable 63 if (test_load_policy(&linkedbase, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) 66 if (test_load_policy(&basenomods, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) 77 if (test_load_policy(modules[i], POLICY_MOD, mls, "test-linker", policies[i]))
|
/external/chromium/chrome/browser/chromeos/ |
H A D | plugin_selection_policy.cc | 68 map<string, Policy> policies; local 107 policies.insert(make_pair(last_plugin, policy)); 114 policies.insert(make_pair(last_plugin, policy)); 116 policies_.swap(policies);
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | device_policy_decoder_chromeos.cc | 61 PolicyMap* policies) { 65 policies->Set(key::kDeviceGuestModeEnabled, 76 policies->Set(key::kDeviceShowUserNamesOnSignin, 87 policies->Set(key::kDeviceAllowNewUsers, 104 policies->Set(key::kDeviceUserWhitelist, 115 policies->Set(key::kDeviceEphemeralUsersEnabled, 163 policies->Set(key::kDeviceLocalAccounts, 169 policies->Set(key::kDeviceLocalAccountAutoLoginId, 176 policies->Set(key::kDeviceLocalAccountAutoLoginDelay, 183 policies 60 DecodeLoginPolicies(const em::ChromeDeviceSettingsProto& policy, PolicyMap* policies) argument 207 DecodeKioskPolicies(const em::ChromeDeviceSettingsProto& policy, PolicyMap* policies, EnterpriseInstallAttributes* install_attributes) argument 287 DecodeNetworkPolicies(const em::ChromeDeviceSettingsProto& policy, PolicyMap* policies, EnterpriseInstallAttributes* install_attributes) argument 343 DecodeReportingPolicies(const em::ChromeDeviceSettingsProto& policy, PolicyMap* policies) argument 387 DecodeAutoUpdatePolicies(const em::ChromeDeviceSettingsProto& policy, PolicyMap* policies) argument 472 DecodeAccessibilityPolicies(const em::ChromeDeviceSettingsProto& policy, PolicyMap* policies) argument 520 DecodeGenericPolicies(const em::ChromeDeviceSettingsProto& policy, PolicyMap* policies) argument 661 DecodeDevicePolicy(const em::ChromeDeviceSettingsProto& policy, PolicyMap* policies, EnterpriseInstallAttributes* install_attributes) argument [all...] |
H A D | network_configuration_updater_impl.cc | 39 // Apply the current device policies immediately. 140 const PolicyMap& policies = policy_service->GetPolicies( local 142 const base::Value* policy_value = policies.GetValue(policy_key);
|
H A D | network_configuration_updater_impl_cros.cc | 47 // Apply the current policies immediately. 62 VLOG(1) << "Network profile list changed, applying policies."; 148 const PolicyMap& policies = policy_service->GetPolicies( local 150 const base::Value* policy_value = policies.GetValue(policy_key);
|
H A D | configuration_policy_handler_chromeos.cc | 56 const PolicyMap& policies, 59 if (!CheckAndGetValue(policies, errors, &value)) 80 // ONC policies are always unencrypted. 97 const PolicyMap& policies, 99 const base::Value* value = policies.GetValue(policy_name()); 115 PolicyMap* policies) const { 116 const PolicyMap::Entry* entry = policies->Get(policy_name()); 123 policies->Set(policy_name(), entry->level, entry->scope, 171 const PolicyMap& policies, 174 const base::Value* policy_value = policies 55 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument 96 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument 170 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument 199 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument 222 CheckPolicySettings( const PolicyMap& policies, PolicyErrorMap* errors) argument 237 ApplyPolicySettings( const PolicyMap& policies, PrefValueMap* prefs) argument 251 ApplyPolicySettings(const PolicyMap& policies, PrefValueMap* prefs) argument [all...] |
/external/chromium_org/chrome/browser/extensions/api/storage/ |
H A D | policy_value_store_unittest.cc | 121 policy::PolicyMap policies; local 123 policies.Set("must", policy::POLICY_LEVEL_MANDATORY, 125 policies.Set("may", policy::POLICY_LEVEL_RECOMMENDED, 128 store_->SetCurrentPolicy(policies, false); 156 policy::PolicyMap policies; local 157 policies.Set("aaa", policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 161 store_->SetCurrentPolicy(policies, false); 166 policies.Set("aaa", policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 168 policies.Set("bbb", policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 171 store_->SetCurrentPolicy(policies, fals [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/x509v3/ |
H A D | pcy_cache.c | 74 CERTIFICATEPOLICIES *policies, int crit) 81 if (sk_POLICYINFO_num(policies) == 0) 86 for (i = 0; i < sk_POLICYINFO_num(policies); i++) 88 policy = sk_POLICYINFO_value(policies, i); 119 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); 149 * even if we don't have any policies. 175 * there is no point continuing because the valid policies will be 73 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) argument
|
/external/openssl/crypto/x509v3/ |
H A D | pcy_cache.c | 74 CERTIFICATEPOLICIES *policies, int crit) 81 if (sk_POLICYINFO_num(policies) == 0) 86 for (i = 0; i < sk_POLICYINFO_num(policies); i++) 88 policy = sk_POLICYINFO_value(policies, i); 119 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); 149 * even if we don't have any policies. 175 * there is no point continuing because the valid policies will be 73 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) argument
|
/external/chromium_org/chrome/browser/prefs/ |
H A D | synced_pref_change_registrar_browsertest.cc | 47 void UpdateChromePolicy(const policy::PolicyMap& policies) { argument 48 policy_provider_.UpdateChromePolicy(policies); 183 policy::PolicyMap policies; local 184 policies.Set(policy::key::kShowHomeButton, 189 UpdateChromePolicy(policies); 204 policy::PolicyMap policies; local 205 policies.Set(policy::key::kShowHomeButton, 210 UpdateChromePolicy(policies);
|
/external/chromium_org/chrome/browser/ui/webui/ |
H A D | policy_ui_browsertest.cc | 124 // Retrieve the text contents of the policy table cells for all policies. 128 "var policies = [];" 142 " policies.push(values);" 144 "domAutomationController.send(JSON.stringify(policies));"; 155 // Verify that the cells contain the expected strings for all policies. 171 // Verifies that the names of known policies are sent to the UI and processed 172 // there correctly by checking that the policy table contains all policies in 175 // Expect that the policy table contains all known policies in alphabetical 176 // order and none of the policies have a set value. 178 const policy::PolicyDefinitionList* policies local 244 const policy::PolicyDefinitionList* policies = local [all...] |