/external/chromium_org/components/policy/core/common/ |
H A D | preg_parser_win_unittest.cc | 5 #include "components/policy/core/common/preg_parser_win.h" 13 #include "components/policy/core/common/policy_load_status.h" 14 #include "components/policy/core/common/registry_dict_win.h" 17 namespace policy { namespace 93 test_data_dir.AppendASCII("chrome/test/data/policy/registry.pol")); 119 } // namespace policy
|
H A D | proxy_policy_provider_unittest.cc | 7 #include "components/policy/core/common/external_data_fetcher.h" 8 #include "components/policy/core/common/mock_configuration_policy_provider.h" 9 #include "components/policy/core/common/proxy_policy_provider.h" 10 #include "components/policy/core/common/schema_registry.h" 16 namespace policy { namespace 54 .Set("policy", 68 .Set("policy", 102 } // namespace policy
|
H A D | registry_dict_win.h | 16 #include "components/policy/policy_export.h" 22 namespace policy { namespace 75 // for each policy. 89 } // namespace policy
|
/external/chromium_org/content/public/android/java/src/org/chromium/content_public/common/ |
H A D | Referrer.java | 8 * Container that holds together a referrer URL along with the referrer policy set on the 15 public Referrer(String url, int policy) { argument 17 mPolicy = policy;
|
/external/chromium_org/content/public/common/ |
H A D | sandboxed_process_launcher_delegate.h | 28 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy, 45 // Called before the default sandbox is applied. If the default policy is too 47 // apply their policy in PreSpawnTarget. |exposed_dir| is used to allow a 53 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, argument 71 // SANDBOX_TYPE_INVALID for no sandbox policy.
|
/external/chromium_org/net/http/ |
H A D | url_security_manager_win.cc | 21 // On Windows, we honor the WinINet/IE settings and group policy related to 57 DWORD policy = 0; local 61 reinterpret_cast<BYTE*>(&policy), 62 sizeof(policy), NULL, 0, 72 switch (policy) { 76 // This policy means "prompt the user for permission if the resource is
|
/external/chromium_org/net/test/ |
H A D | cert_test_util.cc | 65 const char* policy) 68 EXPECT_TRUE(ev_root_ca_metadata->AddEVCA(fingerprint, policy)); 63 ScopedTestEVPolicy(EVRootCAMetadata* ev_root_ca_metadata, const SHA1HashValue& fingerprint, const char* policy) argument
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | sandbox_bpf_test_runner.cc | 30 scoped_ptr<SandboxBPFPolicy> policy = local 41 // Initialize and then start the sandbox with our custom policy 44 sandbox.SetSandboxPolicy(policy.release()); 58 // Call the compiler and verify the policy. That's the least we can do, 61 sandbox.SetSandboxPolicy(policy.release());
|
/external/chromium_org/sandbox/mac/ |
H A D | policy.cc | 5 #include "sandbox/mac/policy.h" 45 bool IsPolicyValid(const BootstrapSandboxPolicy& policy) { argument 46 if (!IsRuleValid(policy.default_rule)) 49 for (const auto& pair : policy.rules) {
|
/external/chromium_org/sandbox/win/src/ |
H A D | handle_policy.cc | 21 LowLevelPolicy* policy) { 48 if (!policy->AddRule(IPC_DUPLICATEHANDLEPROXY_TAG, &duplicate_rule)) { 78 // If the policy didn't block us and we have no valid target, then the broker 19 GenerateRules(const wchar_t* type_name, TargetPolicy::Semantics semantics, LowLevelPolicy* policy) argument
|
H A D | policy_engine_processor.h | 14 // This header contains the core policy evaluator. In its simplest form 39 // matching group. The action opcode from this group is the resulting policy 45 // from this group is the resulting policy action. 47 // As explained above, the policy evaluation of a group is a logical AND of 58 // Possible outcomes of policy evaluation. 75 // Discussed briefly at the policy design meeting. It will evaluate 79 // This class evaluates a policy-opcode stream given the memory where the 101 // // apply policy here... 105 // arguments, and represent all the 'interesting' policy inputs, and 107 // relevant policy fo 114 PolicyProcessor(PolicyBuffer* policy) argument [all...] |
H A D | unload_dll_test.cc | 64 sandbox::TargetPolicy* policy = runner.GetPolicy(); local 65 policy->AddDllToUnload(L"avicap32.dll"); 75 sandbox::TargetPolicy* policy = runner.GetPolicy(); local 76 policy->AddDllToUnload(L"avicap32.dll");
|
/external/chromium_org/storage/common/blob/ |
H A D | scoped_file.cc | 21 ScopeOutPolicy policy, 24 scope_out_policy_(policy), 26 DCHECK(path.empty() || policy != DELETE_ON_SCOPE_OUT || 28 << "path:" << path.value() << " policy:" << policy 20 ScopedFile(const base::FilePath& path, ScopeOutPolicy policy, const scoped_refptr<base::TaskRunner>& file_task_runner) argument
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
H A D | ChildFrameDisconnector.cpp | 19 void ChildFrameDisconnector::disconnect(DisconnectPolicy policy) argument 28 if (policy == RootAndDescendants) {
|
H A D | SandboxFlags.cpp | 35 SandboxFlags parseSandboxPolicy(const String& policy, String& invalidTokensErrorMessage) argument 40 unsigned length = policy.length(); 45 while (start < length && isHTMLSpace<UChar>(policy[start])) 50 while (end < length && !isHTMLSpace<UChar>(policy[end])) 54 String sandboxToken = policy.substring(start, end - start);
|
/external/chromium_org/third_party/WebKit/Source/core/frame/csp/ |
H A D | CSPDirective.h | 17 CSPDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument 20 , m_policy(policy) 27 ContentSecurityPolicy* policy() const { return m_policy; } function in class:blink::CSPDirective
|
H A D | CSPSource.cpp | 16 CSPSource::CSPSource(ContentSecurityPolicy* policy, const String& scheme, const String& host, int port, const String& path, WildcardDisposition hostWildcard, WildcardDisposition portWildcard) argument 17 : m_policy(policy)
|
H A D | MediaListDirective.cpp | 16 MediaListDirective::MediaListDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument 17 : CSPDirective(name, value, policy) 35 policy()->reportInvalidPluginTypes(String()); 51 policy()->reportInvalidPluginTypes(String(begin, position - begin)); 60 policy()->reportInvalidPluginTypes(String(begin, position - begin)); 68 policy()->reportInvalidPluginTypes(String(begin, position - begin)); 77 policy()->reportInvalidPluginTypes(String(begin, position - begin));
|
H A D | SourceListDirective.cpp | 16 SourceListDirective::SourceListDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument 17 : CSPDirective(name, value, policy) 18 , m_sourceList(policy, name) 28 return m_sourceList.matches(url.isEmpty() ? policy()->url() : url);
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
H A D | NavigationAction.h | 51 NavigationPolicy policy() const { return m_policy; } function in class:blink::NavigationAction
|
/external/chromium_org/third_party/WebKit/Source/wtf/text/ |
H A D | Base64.h | 59 inline void base64Encode(const Vector<char>& in, Vector<char>& out, Base64EncodePolicy policy) argument 61 base64Encode(in.data(), in.size(), out, policy); 64 inline void base64Encode(const CString& in, Vector<char>& out, Base64EncodePolicy policy) argument 66 base64Encode(in.data(), in.length(), out, policy); 69 inline String base64Encode(const Vector<char>& in, Base64EncodePolicy policy) argument 71 return base64Encode(in.data(), in.size(), policy); 74 inline String base64Encode(const CString& in, Base64EncodePolicy policy) argument 76 return base64Encode(in.data(), in.length(), policy);
|
/external/libsepol/include/sepol/policydb/ |
H A D | module.h | 34 sepol_policydb_t *policy; member in struct:sepol_module_package
|
/external/owasp/sanitizer/src/main/org/owasp/html/ |
H A D | HtmlSanitizer.java | 38 * Consumes an HTML stream, and dispatches events to a policy object which 44 * Receives events based on the HTML stream, and applies a policy to decide 85 * Sanitizes the given HTML by applying the given policy to it. 97 * @param policy The Policy that will receive events based on the tokens in 98 * HTML. Typically, this policy ends up routing the events to an 102 public static void sanitize(@Nullable String html, final Policy policy) { argument 106 = new TagBalancingHtmlStreamEventReceiver(policy);
|
/external/sepolicy/tools/sepolicy-analyze/ |
H A D | sepolicy-analyze.c | 30 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0); 31 fprintf(stderr, "%s <policy-file>:\n", arg0); 40 char *policy; local 48 policy = argv[1]; 49 if(load_policy(policy, &policydb, &pf))
|
/external/chromium_org/chrome/browser/browsing_data/ |
H A D | browsing_data_helper_unittest.cc | 55 storage::SpecialStoragePolicy* policy) { 56 return BrowsingDataHelper::DoesOriginMatchMask(origin, mask, policy); 162 // If extensions are disabled, there is no policy. 53 Match(const GURL& origin, int mask, storage::SpecialStoragePolicy* policy) argument
|