Searched defs:policy (Results 251 - 275 of 820) sorted by relevance

<<11121314151617181920>>

/external/chromium_org/components/policy/core/common/
H A Dpreg_parser_win_unittest.cc5 #include "components/policy/core/common/preg_parser_win.h"
13 #include "components/policy/core/common/policy_load_status.h"
14 #include "components/policy/core/common/registry_dict_win.h"
17 namespace policy { namespace
93 test_data_dir.AppendASCII("chrome/test/data/policy/registry.pol"));
119 } // namespace policy
H A Dproxy_policy_provider_unittest.cc7 #include "components/policy/core/common/external_data_fetcher.h"
8 #include "components/policy/core/common/mock_configuration_policy_provider.h"
9 #include "components/policy/core/common/proxy_policy_provider.h"
10 #include "components/policy/core/common/schema_registry.h"
16 namespace policy { namespace
54 .Set("policy",
68 .Set("policy",
102 } // namespace policy
H A Dregistry_dict_win.h16 #include "components/policy/policy_export.h"
22 namespace policy { namespace
75 // for each policy.
89 } // namespace policy
/external/chromium_org/content/public/android/java/src/org/chromium/content_public/common/
H A DReferrer.java8 * Container that holds together a referrer URL along with the referrer policy set on the
15 public Referrer(String url, int policy) { argument
17 mPolicy = policy;
/external/chromium_org/content/public/common/
H A Dsandboxed_process_launcher_delegate.h28 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy,
45 // Called before the default sandbox is applied. If the default policy is too
47 // apply their policy in PreSpawnTarget. |exposed_dir| is used to allow a
53 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, argument
71 // SANDBOX_TYPE_INVALID for no sandbox policy.
/external/chromium_org/net/http/
H A Durl_security_manager_win.cc21 // On Windows, we honor the WinINet/IE settings and group policy related to
57 DWORD policy = 0; local
61 reinterpret_cast<BYTE*>(&policy),
62 sizeof(policy), NULL, 0,
72 switch (policy) {
76 // This policy means "prompt the user for permission if the resource is
/external/chromium_org/net/test/
H A Dcert_test_util.cc65 const char* policy)
68 EXPECT_TRUE(ev_root_ca_metadata->AddEVCA(fingerprint, policy));
63 ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata, const SHA1HashValue& fingerprint, const char* policy) argument
/external/chromium_org/sandbox/linux/seccomp-bpf/
H A Dsandbox_bpf_test_runner.cc30 scoped_ptr<SandboxBPFPolicy> policy = local
41 // Initialize and then start the sandbox with our custom policy
44 sandbox.SetSandboxPolicy(policy.release());
58 // Call the compiler and verify the policy. That's the least we can do,
61 sandbox.SetSandboxPolicy(policy.release());
/external/chromium_org/sandbox/mac/
H A Dpolicy.cc5 #include "sandbox/mac/policy.h"
45 bool IsPolicyValid(const BootstrapSandboxPolicy& policy) { argument
46 if (!IsRuleValid(policy.default_rule))
49 for (const auto& pair : policy.rules) {
/external/chromium_org/sandbox/win/src/
H A Dhandle_policy.cc21 LowLevelPolicy* policy) {
48 if (!policy->AddRule(IPC_DUPLICATEHANDLEPROXY_TAG, &duplicate_rule)) {
78 // If the policy didn't block us and we have no valid target, then the broker
19 GenerateRules(const wchar_t* type_name, TargetPolicy::Semantics semantics, LowLevelPolicy* policy) argument
H A Dpolicy_engine_processor.h14 // This header contains the core policy evaluator. In its simplest form
39 // matching group. The action opcode from this group is the resulting policy
45 // from this group is the resulting policy action.
47 // As explained above, the policy evaluation of a group is a logical AND of
58 // Possible outcomes of policy evaluation.
75 // Discussed briefly at the policy design meeting. It will evaluate
79 // This class evaluates a policy-opcode stream given the memory where the
101 // // apply policy here...
105 // arguments, and represent all the 'interesting' policy inputs, and
107 // relevant policy fo
114 PolicyProcessor(PolicyBuffer* policy) argument
[all...]
H A Dunload_dll_test.cc64 sandbox::TargetPolicy* policy = runner.GetPolicy(); local
65 policy->AddDllToUnload(L"avicap32.dll");
75 sandbox::TargetPolicy* policy = runner.GetPolicy(); local
76 policy->AddDllToUnload(L"avicap32.dll");
/external/chromium_org/storage/common/blob/
H A Dscoped_file.cc21 ScopeOutPolicy policy,
24 scope_out_policy_(policy),
26 DCHECK(path.empty() || policy != DELETE_ON_SCOPE_OUT ||
28 << "path:" << path.value() << " policy:" << policy
20 ScopedFile(const base::FilePath& path, ScopeOutPolicy policy, const scoped_refptr<base::TaskRunner>& file_task_runner) argument
/external/chromium_org/third_party/WebKit/Source/core/dom/
H A DChildFrameDisconnector.cpp19 void ChildFrameDisconnector::disconnect(DisconnectPolicy policy) argument
28 if (policy == RootAndDescendants) {
H A DSandboxFlags.cpp35 SandboxFlags parseSandboxPolicy(const String& policy, String& invalidTokensErrorMessage) argument
40 unsigned length = policy.length();
45 while (start < length && isHTMLSpace<UChar>(policy[start]))
50 while (end < length && !isHTMLSpace<UChar>(policy[end]))
54 String sandboxToken = policy.substring(start, end - start);
/external/chromium_org/third_party/WebKit/Source/core/frame/csp/
H A DCSPDirective.h17 CSPDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument
20 , m_policy(policy)
27 ContentSecurityPolicy* policy() const { return m_policy; } function in class:blink::CSPDirective
H A DCSPSource.cpp16 CSPSource::CSPSource(ContentSecurityPolicy* policy, const String& scheme, const String& host, int port, const String& path, WildcardDisposition hostWildcard, WildcardDisposition portWildcard) argument
17 : m_policy(policy)
H A DMediaListDirective.cpp16 MediaListDirective::MediaListDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument
17 : CSPDirective(name, value, policy)
35 policy()->reportInvalidPluginTypes(String());
51 policy()->reportInvalidPluginTypes(String(begin, position - begin));
60 policy()->reportInvalidPluginTypes(String(begin, position - begin));
68 policy()->reportInvalidPluginTypes(String(begin, position - begin));
77 policy()->reportInvalidPluginTypes(String(begin, position - begin));
H A DSourceListDirective.cpp16 SourceListDirective::SourceListDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument
17 : CSPDirective(name, value, policy)
18 , m_sourceList(policy, name)
28 return m_sourceList.matches(url.isEmpty() ? policy()->url() : url);
/external/chromium_org/third_party/WebKit/Source/core/loader/
H A DNavigationAction.h51 NavigationPolicy policy() const { return m_policy; } function in class:blink::NavigationAction
/external/chromium_org/third_party/WebKit/Source/wtf/text/
H A DBase64.h59 inline void base64Encode(const Vector<char>& in, Vector<char>& out, Base64EncodePolicy policy) argument
61 base64Encode(in.data(), in.size(), out, policy);
64 inline void base64Encode(const CString& in, Vector<char>& out, Base64EncodePolicy policy) argument
66 base64Encode(in.data(), in.length(), out, policy);
69 inline String base64Encode(const Vector<char>& in, Base64EncodePolicy policy) argument
71 return base64Encode(in.data(), in.size(), policy);
74 inline String base64Encode(const CString& in, Base64EncodePolicy policy) argument
76 return base64Encode(in.data(), in.length(), policy);
/external/libsepol/include/sepol/policydb/
H A Dmodule.h34 sepol_policydb_t *policy; member in struct:sepol_module_package
/external/owasp/sanitizer/src/main/org/owasp/html/
H A DHtmlSanitizer.java38 * Consumes an HTML stream, and dispatches events to a policy object which
44 * Receives events based on the HTML stream, and applies a policy to decide
85 * Sanitizes the given HTML by applying the given policy to it.
97 * @param policy The Policy that will receive events based on the tokens in
98 * HTML. Typically, this policy ends up routing the events to an
102 public static void sanitize(@Nullable String html, final Policy policy) { argument
106 = new TagBalancingHtmlStreamEventReceiver(policy);
/external/sepolicy/tools/sepolicy-analyze/
H A Dsepolicy-analyze.c30 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0);
31 fprintf(stderr, "%s <policy-file>:\n", arg0);
40 char *policy; local
48 policy = argv[1];
49 if(load_policy(policy, &policydb, &pf))
/external/chromium_org/chrome/browser/browsing_data/
H A Dbrowsing_data_helper_unittest.cc55 storage::SpecialStoragePolicy* policy) {
56 return BrowsingDataHelper::DoesOriginMatchMask(origin, mask, policy);
162 // If extensions are disabled, there is no policy.
53 Match(const GURL& origin, int mask, storage::SpecialStoragePolicy* policy) argument

Completed in 6037 milliseconds

<<11121314151617181920>>