/external/chromium_org/components/policy/core/common/ |
H A D | mock_configuration_policy_provider.cc | 5 #include "components/policy/core/common/mock_configuration_policy_provider.h" 12 #include "components/policy/core/common/policy_bundle.h" 16 namespace policy { namespace 23 const PolicyMap& policy) { 26 .CopyFrom(policy); 47 } // namespace policy 22 UpdateChromePolicy( const PolicyMap& policy) argument
|
H A D | policy_provider_android.cc | 5 #include "components/policy/core/common/policy_provider_android.h" 6 #include "components/policy/core/common/policy_provider_android_delegate.h" 8 namespace policy { namespace 38 void PolicyProviderAndroid::SetPolicies(scoped_ptr<PolicyBundle> policy) { argument 40 UpdatePolicy(policy.Pass()); 66 } // namespace policy
|
H A D | external_data_fetcher.h | 13 #include "components/policy/policy_export.h" 15 namespace policy { namespace 20 // data for a policy. 26 // external data referenced by the given |policy|. 28 const std::string& policy); 51 } // namespace policy
|
H A D | mock_configuration_policy_provider.h | 9 #include "components/policy/core/common/configuration_policy_provider.h" 10 #include "components/policy/core/common/policy_map.h" 11 #include "components/policy/core/common/schema_registry.h" 14 namespace policy { namespace 18 // TODO(joaodasilva, mnissler): introduce an implementation that non-policy 33 // the Chrome namespace to a copy of |policy|. 34 void UpdateChromePolicy(const PolicyMap& policy); 64 } // namespace policy
|
H A D | policy_provider_android.h | 10 #include "components/policy/core/common/configuration_policy_provider.h" 12 namespace policy { namespace 23 // Call this method to tell the policy system whether it should wait for 33 void SetPolicies(scoped_ptr<PolicyBundle> policy); 47 } // namespace policy
|
/external/chromium_org/sandbox/mac/ |
H A D | policy.cc | 5 #include "sandbox/mac/policy.h" 45 bool IsPolicyValid(const BootstrapSandboxPolicy& policy) { argument 46 if (!IsRuleValid(policy.default_rule)) 49 for (const auto& pair : policy.rules) {
|
/external/chromium_org/components/search_engines/ |
H A D | default_search_policy_handler_unittest.cc | 6 #include "components/policy/core/browser/configuration_policy_pref_store.h" 7 #include "components/policy/core/browser/configuration_policy_pref_store_test.h" 11 #include "policy/policy_constants.h" 20 namespace policy { namespace 50 // Build a default search policy by setting search-related keys in |policy| to 53 void BuildDefaultSearchPolicy(PolicyMap* policy); 81 BuildDefaultSearchPolicy(PolicyMap* policy) { argument 85 policy->Set(key::kDefaultSearchProviderEnabled, 90 policy 144 PolicyMap policy; local 217 PolicyMap policy; local 273 PolicyMap policy; local 298 PolicyMap policy; local 328 PolicyMap policy; local 348 PolicyMap policy; local 411 PolicyMap policy; local 431 PolicyMap policy; local 493 PolicyMap policy; local [all...] |
/external/chromium_org/content/common/ |
H A D | sandbox_win.cc | 113 // Adds the policy rules for the path and path\ with the semantic |access|. 118 sandbox::TargetPolicy* policy) { 127 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 145 // Adds the policy rules for the path and path\* with the semantic |access|. 149 sandbox::TargetPolicy* policy) { 151 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, 157 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, 179 // Adds a single dll by |module_name| into the |policy| blacklist. 180 // If |check_in_browser| is true we only add an unload policy onl 116 AddDirectory(int path, const wchar_t* sub_dir, bool children, sandbox::TargetPolicy::Semantics access, sandbox::TargetPolicy* policy) argument 147 AddKeyAndSubkeys(std::wstring key, sandbox::TargetPolicy::Semantics access, sandbox::TargetPolicy* policy) argument 182 BlacklistAddOneDll(const wchar_t* module_name, bool check_in_browser, sandbox::TargetPolicy* policy) argument 221 AddGenericDllEvictionPolicy(sandbox::TargetPolicy* policy) argument 278 AddGenericPolicy(sandbox::TargetPolicy* policy) argument 342 AddPolicyForSandboxedProcess(sandbox::TargetPolicy* policy) argument 510 SetJobLevel(const base::CommandLine& cmd_line, sandbox::JobLevel job_level, uint32 ui_exceptions, sandbox::TargetPolicy* policy) argument 526 AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy) argument 658 sandbox::TargetPolicy* policy = g_broker_services->CreatePolicy(); local [all...] |
H A D | sandbox_win.h | 28 sandbox::TargetPolicy* policy); 31 void AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy);
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | cloud_external_data_manager_base_test_util.h | 17 namespace policy { namespace 29 // Constructs a value that points a policy referencing external data at |url| 35 // TODO(bartfab): Makes an arbitrary |policy| in |core| reference external data 37 // that reference external data yet. Once the first such policy is added, it 41 const std::string& policy, 45 } // namespace policy
|
H A D | device_local_account_policy_store.cc | 5 #include "chrome/browser/chromeos/policy/device_local_account_policy_store.h" 10 #include "chrome/browser/chromeos/policy/browser_policy_connector_chromeos.h" 13 #include "components/policy/core/common/cloud/device_management_service.h" 14 #include "components/policy/core/common/external_data_fetcher.h" 15 #include "components/policy/core/common/policy_map.h" 16 #include "components/policy/core/common/policy_types.h" 17 #include "policy/proto/cloud_policy.pb.h" 18 #include "policy/proto/device_management_backend.pb.h" 22 namespace policy { namespace 46 const em::PolicyFetchResponse& policy) { 45 Store( const em::PolicyFetchResponse& policy) argument 121 CheckKeyAndValidate( bool valid_timestamp_required, scoped_ptr<em::PolicyFetchResponse> policy, const UserCloudPolicyValidator::CompletionCallback& callback) argument [all...] |
/external/chromium_org/chrome/browser/net/ |
H A D | disk_cache_dir_policy_handler.cc | 10 #include "chrome/browser/policy/policy_path_parser.h" 12 #include "components/policy/core/common/policy_map.h" 13 #include "policy/policy_constants.h" 15 namespace policy { namespace 28 policy::path_parser::ExpandPathVariables(string_value); 34 } // namespace policy
|
/external/chromium_org/chrome/common/extensions/api/storage/ |
H A D | storage_schema_manifest_handler.h | 11 namespace policy { namespace 28 static policy::Schema GetSchema(const Extension* extension,
|
/external/chromium_org/components/policy/core/browser/ |
H A D | configuration_policy_pref_store_test.h | 12 #include "components/policy/core/browser/configuration_policy_handler_list.h" 13 #include "components/policy/core/common/mock_configuration_policy_provider.h" 14 #include "components/policy/core/common/policy_service_impl.h" 17 namespace policy { namespace 29 void UpdateProviderPolicy(const PolicyMap& policy); 31 // A unit test can override this method to populate the policy handler 47 } // namespace policy
|
H A D | policy_error_map.cc | 5 #include "components/policy/core/browser/policy_error_map.h" 16 namespace policy { namespace 140 void PolicyErrorMap::AddError(const std::string& policy, int message_id) { argument 141 AddError(new SimplePendingError(policy, message_id, std::string())); 144 void PolicyErrorMap::AddError(const std::string& policy, argument 148 new DictSubkeyPendingError(policy, subkey, message_id, std::string())); 151 void PolicyErrorMap::AddError(const std::string& policy, argument 154 AddError(new ListItemPendingError(policy, index, message_id, std::string())); 157 void PolicyErrorMap::AddError(const std::string& policy, argument 160 AddError(new SimplePendingError(policy, message_i 163 AddError(const std::string& policy, const std::string& subkey, int message_id, const std::string& replacement) argument 170 AddError(const std::string& policy, int index, int message_id, const std::string& replacement) argument 177 AddError(const std::string& policy, const std::string& error_path, const std::string& message) argument 183 GetErrors(const std::string& policy) argument [all...] |
/external/chromium_org/components/policy/core/common/cloud/ |
H A D | cloud_policy_service_unittest.cc | 5 #include "components/policy/core/common/cloud/cloud_policy_service.h" 9 #include "components/policy/core/common/cloud/cloud_policy_constants.h" 10 #include "components/policy/core/common/cloud/mock_cloud_policy_client.h" 11 #include "components/policy/core/common/cloud/mock_cloud_policy_store.h" 12 #include "policy/proto/device_management_backend.pb.h" 20 namespace policy { namespace 62 em::PolicyFetchResponse policy; local 63 policy.set_policy_data("fake policy"); 64 client_.SetPolicy(policy_ns_key_, policy); 105 em::PolicyFetchResponse policy; local 161 em::PolicyFetchResponse policy; local 189 em::PolicyFetchResponse policy; local [all...] |
H A D | mock_cloud_external_data_manager.h | 13 #include "components/policy/core/common/cloud/cloud_external_data_manager.h" 14 #include "components/policy/core/common/external_data_fetcher.h" 21 namespace policy { namespace 37 const std::string& policy); 43 } // namespace policy
|
H A D | user_cloud_policy_store_base.h | 14 #include "components/policy/core/common/cloud/cloud_policy_store.h" 15 #include "components/policy/core/common/cloud/cloud_policy_validator.h" 16 #include "components/policy/policy_export.h" 22 namespace policy { namespace 33 // Creates a validator configured to validate a user policy. The caller owns 36 scoped_ptr<enterprise_management::PolicyFetchResponse> policy, 39 // Sets |policy_data| and |payload| as the active policy. 55 } // namespace policy
|
/external/chromium_org/sandbox/win/src/ |
H A D | policy_engine_processor.h | 14 // This header contains the core policy evaluator. In its simplest form 39 // matching group. The action opcode from this group is the resulting policy 45 // from this group is the resulting policy action. 47 // As explained above, the policy evaluation of a group is a logical AND of 58 // Possible outcomes of policy evaluation. 75 // Discussed briefly at the policy design meeting. It will evaluate 79 // This class evaluates a policy-opcode stream given the memory where the 101 // // apply policy here... 105 // arguments, and represent all the 'interesting' policy inputs, and 107 // relevant policy fo 114 PolicyProcessor(PolicyBuffer* policy) argument [all...] |
H A D | process_mitigations.cc | 117 PROCESS_MITIGATION_ASLR_POLICY policy = { 0 }; local 118 policy.EnableForceRelocateImages = true; 119 policy.DisallowStrippedImages = (flags & 123 if (!set_process_mitigation_policy(ProcessASLRPolicy, &policy, 124 sizeof(policy)) && 132 PROCESS_MITIGATION_STRICT_HANDLE_CHECK_POLICY policy = { 0 }; local 133 policy.HandleExceptionsPermanentlyEnabled = 134 policy.RaiseExceptionOnInvalidHandleReference = true; 136 if (!set_process_mitigation_policy(ProcessStrictHandleCheckPolicy, &policy, 137 sizeof(policy)) 145 PROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY policy = { 0 }; local 157 PROCESS_MITIGATION_EXTENSION_POINT_DISABLE_POLICY policy = { 0 }; local [all...] |
/external/chromium_org/tools/grit/grit/format/policy_templates/writers/ |
H A D | plist_writer.py | 25 '''Class for generating policy templates in Mac plist format. 70 def _AddTargets(self, parent, policy): 81 if self.CanBeRecommended(policy): 83 if self.CanBeMandatory(policy): 89 def WritePolicy(self, policy): 90 policy_name = policy['name'] 91 policy_type = policy['type'] 93 # This type can only be set through cloud policy. 103 self._AddTargets(dict, policy) 108 for item in policy['item [all...] |
/external/chromium_org/ui/shell_dialogs/ |
H A D | select_file_dialog.cc | 71 ui::SelectFilePolicy* policy) { 73 SelectFileDialog* dialog = dialog_factory_->Create(listener, policy); 81 return shell_dialogs->CreateSelectFileDialog(listener, policy); 87 return CreateDefaultWinSelectFileDialog(listener, policy); 89 return CreateMacSelectFileDialog(listener, policy); 91 return CreateAndroidSelectFileDialog(listener, policy); 137 ui::SelectFilePolicy* policy) 139 select_file_policy_(policy) { 69 Create( Listener* listener, ui::SelectFilePolicy* policy) argument 136 SelectFileDialog(Listener* listener, ui::SelectFilePolicy* policy) argument
|
H A D | select_file_dialog_win.h | 27 SelectFilePolicy* policy, 33 SelectFilePolicy* policy);
|
/external/chromium_org/chrome/browser/profiles/ |
H A D | chrome_browser_main_extra_parts_profiles.cc | 27 #include "chrome/browser/policy/profile_policy_connector_factory.h" 70 #include "chrome/browser/policy/cloud/policy_header_service_factory.h" 71 #include "chrome/browser/policy/cloud/user_cloud_policy_invalidator_factory.h" 72 #include "chrome/browser/policy/schema_registry_service_factory.h" 75 #include "chrome/browser/chromeos/policy/policy_cert_service_factory.h" 76 #include "chrome/browser/chromeos/policy/recommendation_restorer_factory.h" 77 #include "chrome/browser/chromeos/policy/user_cloud_policy_manager_factory_chromeos.h" 78 #include "chrome/browser/chromeos/policy/user_cloud_policy_token_forwarder_factory.h" 79 #include "chrome/browser/chromeos/policy/user_network_configuration_updater_factory.h" 81 #include "chrome/browser/policy/clou [all...] |
/external/chromium_org/chrome/browser/extensions/ |
H A D | policy_handlers.cc | 12 #include "components/policy/core/browser/policy_error_map.h" 13 #include "components/policy/core/common/policy_map.h" 17 #include "policy/policy_constants.h" 26 : policy::TypeCheckingPolicyHandler(policy_name, base::Value::TYPE_LIST), 33 const policy::PolicyMap& policies, 34 policy::PolicyErrorMap* errors) { 39 const policy::PolicyMap& policies, 42 policy::PolicyErrorMap errors; 52 const policy::PolicyMap& policies, 53 policy [all...] |