/external/chromium_org/native_client_sdk/src/libraries/third_party/pthreads-win32/ |
H A D | pthread_attr_getschedpolicy.c | 42 pthread_attr_getschedpolicy (const pthread_attr_t * attr, int *policy) argument 44 if (ptw32_is_attr (attr) != 0 || policy == NULL) 50 * Validate the policy arg. 51 * Check that a policy constant wasn't passed rather than &policy. 53 if (policy <= (int *) SCHED_MAX) 58 *policy = SCHED_OTHER;
|
H A D | pthread_attr_setschedpolicy.c | 42 pthread_attr_setschedpolicy (pthread_attr_t * attr, int policy) argument 49 if (policy != SCHED_OTHER)
|
H A D | sched_get_priority_max.c | 119 sched_get_priority_max (int policy) argument 121 if (policy < SCHED_MIN || policy > SCHED_MAX) 131 /* This is independent of scheduling policy in Win32. */
|
H A D | sched_get_priority_min.c | 120 sched_get_priority_min (int policy) argument 122 if (policy < SCHED_MIN || policy > SCHED_MAX) 132 /* This is independent of scheduling policy in Win32. */
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | server_backed_device_state.cc | 5 #include "chrome/browser/chromeos/policy/server_backed_device_state.h" 7 namespace policy { namespace 17 } // namespace policy
|
H A D | device_cloud_policy_validator.cc | 5 #include "chrome/browser/chromeos/policy/device_cloud_policy_validator.h" 7 #include "chrome/browser/chromeos/policy/proto/chrome_device_policy.pb.h" 8 #include "policy/proto/device_management_backend.pb.h" 12 namespace policy { namespace 16 } // namespace policy
|
H A D | device_policy_builder.h | 8 #include "chrome/browser/chromeos/policy/proto/chrome_device_policy.pb.h" 9 #include "components/policy/core/common/cloud/policy_builder.h" 11 namespace policy { namespace 16 } // namespace policy
|
H A D | server_backed_device_state.h | 8 namespace policy { namespace 18 } // namespace policy
|
/external/dnsmasq/dbus/ |
H A D | dnsmasq.conf | 5 <policy user="root"> 8 </policy> 9 <policy context="default"> 12 </policy>
|
/external/chromium_org/sandbox/mac/ |
H A D | policy_unittest.cc | 5 #include "sandbox/mac/policy.h" 16 BootstrapSandboxPolicy policy; local 17 policy.rules["allow"] = Rule(POLICY_ALLOW); 18 policy.rules["deny_error"] = Rule(POLICY_DENY_ERROR); 19 policy.rules["deny_dummy"] = Rule(POLICY_DENY_DUMMY_PORT); 20 policy.rules["substitue"] = Rule(mach_task_self()); 21 EXPECT_TRUE(IsPolicyValid(policy)); 26 BootstrapSandboxPolicy policy; local 27 policy.rules["test"] = rule; 28 EXPECT_FALSE(IsPolicyValid(policy)); 33 BootstrapSandboxPolicy policy; local 41 BootstrapSandboxPolicy policy; local 49 BootstrapSandboxPolicy policy; local 57 BootstrapSandboxPolicy policy; local 63 BootstrapSandboxPolicy policy; local 69 BootstrapSandboxPolicy policy; local 77 BootstrapSandboxPolicy policy; local 85 BootstrapSandboxPolicy policy; local 93 BootstrapSandboxPolicy policy; local [all...] |
/external/libunwind/src/mi/ |
H A D | Gset_caching_policy.c | 29 unw_set_caching_policy (unw_addr_space_t as, unw_caching_policy_t policy) argument 35 if (policy == UNW_CACHE_PER_THREAD) 36 policy = UNW_CACHE_GLOBAL; 39 if (policy == as->caching_policy) 42 as->caching_policy = policy;
|
/external/chromium_org/components/policy/core/common/cloud/ |
H A D | mock_cloud_external_data_manager.cc | 5 #include "components/policy/core/common/cloud/mock_cloud_external_data_manager.h" 9 #include "components/policy/core/common/external_data_fetcher.h" 12 namespace policy { namespace 22 const std::string& policy) { 24 policy)); 27 } // namespace policy 21 CreateExternalDataFetcher( const std::string& policy) argument
|
H A D | enterprise_metrics.cc | 5 #include "components/policy/core/common/cloud/enterprise_metrics.h" 7 namespace policy { namespace 17 } // namespace policy
|
/external/chromium_org/chrome/browser/download/ |
H A D | download_dir_policy_handler.h | 10 #include "components/policy/core/browser/configuration_policy_handler.h" 14 namespace policy { namespace 16 } // namespace policy 18 // ConfigurationPolicyHandler for the DownloadDirectory policy. 19 class DownloadDirPolicyHandler : public policy::TypeCheckingPolicyHandler { 25 virtual bool CheckPolicySettings(const policy::PolicyMap& policies, 26 policy::PolicyErrorMap* errors) OVERRIDE; 29 const policy::PolicyMap& policies, 30 const policy::PolicyHandlerParameters& parameters,
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
H A D | NavigationPolicy.cpp | 38 bool navigationPolicyFromMouseEvent(unsigned short button, bool ctrl, bool shift, bool alt, bool meta, NavigationPolicy* policy) argument 48 ASSERT(policy); 51 *policy = NavigationPolicyNewForegroundTab; 53 *policy = NavigationPolicyNewBackgroundTab; 56 *policy = NavigationPolicyNewWindow; 58 *policy = NavigationPolicyDownload;
|
/external/chromium_org/android_webview/browser/ |
H A D | aw_static_cookie_policy_unittest.cc | 21 void expectFirstPartyAccess(const AwStaticCookiePolicy& policy, argument 23 EXPECT_EQ(expectedResult, policy.AllowSet(kUrlFirstParty, kUrlFirstParty)); 24 EXPECT_EQ(expectedResult, policy.AllowGet(kUrlFirstParty, kUrlFirstParty)); 27 void expectThirdPartyAccess(const AwStaticCookiePolicy& policy, argument 29 EXPECT_EQ(expectedResult, policy.AllowSet(kUrlFirstParty, kUrlThirdParty)); 30 EXPECT_EQ(expectedResult, policy.AllowGet(kUrlFirstParty, kUrlThirdParty)); 40 AwStaticCookiePolicy policy(false /* allow_cookies */, 42 expectFirstPartyAccess(policy, false); 43 expectThirdPartyAccess(policy, false); 47 AwStaticCookiePolicy policy(fals [all...] |
/external/chromium_org/chrome/browser/sync/ |
H A D | sync_policy_handler_unittest.cc | 8 #include "components/policy/core/common/policy_map.h" 10 #include "policy/policy_constants.h" 15 // Test cases for the Sync policy setting. 19 policy::PolicyMap policy; local 22 handler.ApplyPolicySettings(policy, &prefs); 27 policy::PolicyMap policy; local 28 policy.Set(policy 42 policy::PolicyMap policy; local [all...] |
/external/chromium_org/net/data/ssl/scripts/ |
H A D | generate-policy-certs.sh | 9 # policies, and the leaf has a single policy. 11 # When validating, supplying no policy OID should not result in an error. 22 try /bin/sh -c "echo 01 > out/policy-root-serial" 23 try /bin/sh -c "echo 01 > out/policy-intermediate-serial" 26 touch out/policy-root-index.txt 27 touch out/policy-intermediate-index.txt 30 try openssl genrsa -out out/policy-root.key 2048 31 try openssl genrsa -out out/policy-intermediate.key 2048 32 try openssl genrsa -out out/policy-cert.key 2048 37 CA_NAME=policy [all...] |
/external/chromium_org/chrome/browser/extensions/ |
H A D | policy_handlers.h | 10 #include "components/policy/core/browser/configuration_policy_handler.h" 12 namespace policy { namespace 15 } // namespace policy 21 : public policy::TypeCheckingPolicyHandler { 29 virtual bool CheckPolicySettings(const policy::PolicyMap& policies, 30 policy::PolicyErrorMap* errors) OVERRIDE; 31 virtual void ApplyPolicySettings(const policy::PolicyMap& policies, 37 // Runs sanity checks on the policy value and returns it in |extension_ids|. 38 bool CheckAndGetList(const policy::PolicyMap& policies, 39 policy [all...] |
/external/chromium_org/components/policy/core/common/ |
H A D | policy_pref_names.cc | 5 #include "components/policy/core/common/policy_pref_names.h" 7 namespace policy { namespace 10 // 64-bit serialization of the time last policy usage statistics were collected 12 const char kLastPolicyStatisticsUpdate[] = "policy.last_statistics_update"; 15 const char kUrlBlacklist[] = "policy.url_blacklist"; 18 const char kUrlWhitelist[] = "policy.url_whitelist"; 20 // Integer that specifies the policy refresh rate for user-policy in 22 // by the cloud policy subsystem. 23 const char kUserPolicyRefreshRate[] = "policy [all...] |
H A D | policy_switches.cc | 5 #include "components/policy/core/common/policy_switches.h" 7 namespace policy { namespace 10 // Specifies the URL at which to fetch configuration policy from the device 14 // Disables fetching and storing cloud policy for components. 15 const char kDisableComponentCloudPolicy[] = "disable-component-cloud-policy"; 17 // Disables the verification of policy signing keys. 20 const char kDisablePolicyKeyVerification[] = "disable-policy-key-verification"; 23 // Registers for cloud policy using the BROWSER client type instead of the 27 const char kFakeCloudPolicyType[] = "fake-cloud-policy-type"; 31 } // namespace policy [all...] |
/external/chromium_org/sandbox/win/src/ |
H A D | process_mitigations_win32k_policy.cc | 12 LowLevelPolicy* policy) { 14 if (!policy->AddRule(IPC_GDI_GDIDLLINITIALIZE_TAG, &rule)) 16 if (!policy->AddRule(IPC_GDI_GETSTOCKOBJECT_TAG, &rule)) 18 if (!policy->AddRule(IPC_USER_REGISTERCLASSW_TAG, &rule)) 9 GenerateRules( const wchar_t* name, TargetPolicy::Semantics semantics, LowLevelPolicy* policy) argument
|
/external/ipsec-tools/src/libipsec/ |
H A D | ipsec_get_policylen.c | 50 ipsec_get_policylen(policy) 51 ipsec_policy_t policy; 53 return policy ? PFKEY_EXTLEN(policy) : -1;
|
/external/chromium_org/tools/grit/grit/format/policy_templates/writers/ |
H A D | template_writer.py | 8 '''Abstract base class for writing policy templates in various formats. 24 are also present in the policy data structures that are passed to 28 cannot be associated with any policy or group. 33 def IsDeprecatedPolicySupported(self, policy): 34 '''Checks if the given deprecated policy is supported by the writer. 37 policy: The dictionary of the policy. 40 True if the writer chooses to include the deprecated 'policy' in its 45 def IsFuturePolicySupported(self, policy): 46 '''Checks if the given future policy i [all...] |
/external/chromium_org/tools/grit/grit/format/policy_templates/ |
H A D | policy_template_generator.py | 16 this data to policy template files using TemplateWriter objects. 32 policy template. 36 messages that might appear in the policy template. 38 parsed from the policy metafile. Note that this list is passed by 40 See chrome/app/policy.policy_templates.json for description and 106 def _ProcessPolicy(self, policy): 107 '''Processes localized message strings in a policy or a group. 111 policy: The data structure of the policy or group, that will get message 114 policy['des [all...] |