HomeSort by relevance Sort by last modified time
    Searched refs:policies (Results 101 - 125 of 180) sorted by null

1 2 3 45 6 7 8

  /external/chromium_org/chrome/browser/policy/
policy_prefs_browsertest.cc 370 // Splits all known policies into subsets of the given |chunk_size|. The
371 // policies are shuffled so that there is no correlation between their initial
373 // expected number of policies with long-running test cases is equal for each
381 std::vector<std::string> policies; local
384 policies.push_back(it.key());
389 std::random_shuffle(policies.begin(), policies.end(), GetRandomNumber);
392 std::vector<std::string>::const_iterator it = policies.begin();
393 const std::vector<std::string>::const_iterator end = policies.end();
475 // Verifies that all known policies have a test case in the JSON file
    [all...]
profile_policy_connector.cc 40 return provider->policies().Get(chrome_ns).Get(name) != NULL;
70 // use the policies exposed by the PolicyService!
  /external/chromium_org/components/policy/core/common/
configuration_policy_provider_test.h 68 // |level| and |scope| are the level and scope of the policies returned by
101 virtual void Install3rdPartyPolicy(const base::DictionaryValue* policies);
config_dir_policy_loader_unittest.cc 25 // Subdirectory of the config dir that contains mandatory policies.
53 const base::DictionaryValue* policies) OVERRIDE;
133 void TestHarness::Install3rdPartyPolicy(const base::DictionaryValue* policies) {
135 dict.Set("3rdparty", policies->DeepCopy());
policy_test_utils.cc 51 LOG(WARNING) << "There are pre-existing policies in this machine: " << dict;
213 std::ostream& operator<<(std::ostream& os, const policy::PolicyMap& policies) {
215 for (policy::PolicyMap::const_iterator iter = policies.begin();
216 iter != policies.end(); ++iter) {
config_dir_policy_loader.cc 26 // Subdirectories that contain the mandatory and recommended policies.
175 const base::Value* policies,
178 // The first-level entries in |policies| are PolicyDomains. The second-level
179 // entries are component IDs, and the third-level entries are the policies
183 if (!policies->GetAsDictionary(&domains_dictionary)) {
policy_loader_mac_unittest.cc 176 EXPECT_TRUE(provider_->policies().Equals(kEmptyBundle));
197 EXPECT_TRUE(provider_->policies().Equals(expected_bundle));
policy_map.cc 127 const base::DictionaryValue* policies,
130 for (base::DictionaryValue::Iterator it(*policies);
  /external/chromium_org/tools/deep_memory_profiler/lib/
policy.py 14 POLICIES_JSON_PATH = os.path.join(BASE_PATH, 'policies.json')
350 """Represents a set of policies."""
357 """Loads a set of policies via the "default policy directory".
359 The "default policy directory" contains pairs of policies and their labels.
361 policy directory "policies.json".
363 All policies in the directory are loaded by default. Policies can be
402 policies = {}
407 policies[label] = loaded
408 return PolicySet(policies)
    [all...]
  /external/chromium_org/tools/grit/grit/format/policy_templates/writers/
plist_strings_writer_unittest.py 56 'policies': [{
98 'policies': [{
140 'policies': [{
194 'policies': [{
249 'policies': [{
ios_plist_writer.py 13 # This writer outputs a Property List with an example for each of the policies
20 All of the Chrome policies are configured with an example
26 which contains the same policies that can go in ChromePolicy.
61 # Output examples only for policies that are supported on iOS.
  /external/chromium_org/chromeos/network/
policy_util.cc 210 const GuidToPolicyMap& policies,
212 for (GuidToPolicyMap::const_iterator it = policies.begin();
213 it != policies.end(); ++it) {
policy_applicator.cc 38 const PolicyApplicator::GuidToPolicyMap& policies,
40 PolicyApplicator::GuidToPolicyMap::const_iterator it = policies.find(guid);
41 if (it == policies.end())
146 // can't be matched to policies by properties (e.g. VPN).
303 // Notify the handler about all policies being applied, so that the network
329 // All profile entries were compared to policies. |remaining_policies_|
330 // contains all modified policies that didn't match any entry. For these
331 // remaining policies, new configurations have to be created.
  /external/chromium_org/components/policy/tools/
generate_policy_source.py 23 CHROME_POLICY_KEY = 'SOFTWARE\\\\Policies\\\\Google\\\\Chrome'
24 CHROMIUM_POLICY_KEY = 'SOFTWARE\\\\Policies\\\\Chromium'
191 # Returns an iterator over all the policies in |template_file_contents|.
195 for sub_policy in policy['policies']:
209 def _WritePolicyConstantHeader(policies, os, f):
240 for policy in policies:
241 # TODO(joaodasilva): Include only supported policies in
567 def _WritePolicyConstantSource(policies, os, f):
587 for policy in policies:
598 for policy in policies
    [all...]
syntax_check_policy_template_json.py 36 # List of boolean policies that have been introduced with negative polarity in
166 # Checks that boolean policies are not negated (which makes them harder to
172 'new boolean policies follow the XYZEnabled pattern. ' +
184 'supported_on', 'label', 'policies', 'items',
223 # Each policy group must have a list of policies.
224 policies = self._CheckContains(policy, 'policies', list)
226 # Check sub-policies.
227 if policies is not None:
228 for nested_policy in policies
    [all...]
  /packages/apps/Settings/src/com/android/settings/
DeviceAdminAdd.java 224 // Nothing changed (or policies were removed) - return immediately
440 ArrayList<DeviceAdminInfo.PolicyInfo> policies = mDeviceAdmin.getUsedPolicies(); local
441 for (int i=0; i<policies.size(); i++) {
442 DeviceAdminInfo.PolicyInfo pi = policies.get(i);
458 ArrayList<DeviceAdminInfo.PolicyInfo> policies = mDeviceAdmin.getUsedPolicies(); local
459 for (int i=0; i<policies.size(); i++) {
460 DeviceAdminInfo.PolicyInfo pi = policies.get(i);
  /external/chromium_org/remoting/host/it2me/
it2me_host.h 108 // Called by Connect() to check for policies and start connection process.
111 // Called by ReadPolicyAndConnect once policies have been read.
127 // Called when initial policies are read, and when they change.
128 void OnPolicyUpdate(scoped_ptr<base::DictionaryValue> policies);
130 // Handlers for NAT traversal and host domain policies.
it2me_host.cc 68 // Start monitoring configured policies.
312 void It2MeHost::OnPolicyUpdate(scoped_ptr<base::DictionaryValue> policies) {
316 if (policies->GetBoolean(policy_hack::PolicyWatcher::kNatPolicyName,
321 if (policies->GetString(policy_hack::PolicyWatcher::kHostDomainPolicyName,
  /external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/
X509CertSelectorTest.java 105 protected String[] policies = null; field in class:X509CertSelectorTest.TestCert
124 public TestCert(String[] policies) {
125 setPolicies(policies);
165 public void setPolicies(String[] policies) {
166 this.policies = policies;
415 if ("2.5.29.32".equals(oid) && (policies != null)
416 && (policies.length > 0)) {
417 // Certificate Policies Extension (as specified in rfc 3280)
420 for (int i = 0; i < policies.length; i++)
2279 String[] policies = new String[] { local
2716 String[] policies = new String[] { local
2781 String[] policies = new String[] { local
2876 String[] policies = new String[] { local
    [all...]
  /external/chromium_org/chrome/browser/policy/test/
policy_testserver.py 10 enforced and recommended policies for the device and user scope, and a list
587 def GatherDevicePolicySettings(self, settings, policies):
588 """Copies all the policies from a dictionary into a protobuf of type
593 policies: The source dictionary containing policies in JSON format.
604 if field.name in policies:
606 field_value = policies[field.name]
611 def GatherUserPolicySettings(self, settings, policies):
612 """Copies all the policies from a dictionary into a protobuf of type
617 policies: The source: a dictionary containing policies under key
    [all...]
  /external/chromium_org/net/cert/
cert_verify_proc_nss.cc 342 // If policy_oids is not NULL and num_policy_oids is positive, policies
553 CERTCertificatePolicies* policies =
556 return policies;
563 ScopedCERTCertificatePolicies policies(DecodeCertPolicies(cert_handle));
564 if (!policies.get())
567 CERTPolicyInfo* policy_info = policies->policyInfos[0];
636 ScopedCERTCertificatePolicies policies(DecodeCertPolicies(cert_handle));
637 if (!policies.get())
640 CERTPolicyInfo** policy_infos = policies->policyInfos;
661 // Otherwise, we pass just that EV policy (as opposed to all the EV policies)
    [all...]
  /frameworks/base/core/java/android/net/
NetworkPolicyManager.java 152 public void setNetworkPolicies(NetworkPolicy[] policies) {
154 mService.setNetworkPolicies(policies);
  /external/chromium_org/chrome/browser/chromeos/policy/
user_cloud_policy_manager_chromeos_unittest.cc 308 EXPECT_TRUE(manager_->policies().Equals(expected_bundle_));
431 EXPECT_TRUE(PolicyBundle().Equals(manager_->policies()));
457 EXPECT_TRUE(PolicyBundle().Equals(manager_->policies()));
499 EXPECT_TRUE(PolicyBundle().Equals(manager_->policies()));
518 EXPECT_TRUE(PolicyBundle().Equals(manager_->policies()));
device_local_account_policy_provider.cc 162 bundle->CopyFrom(policies());
  /external/strace/
mem.c 374 #include "xlat/policies.h"
427 printxval(policies, tcp->u_arg[2], "MPOL_???");
439 printxval(policies, tcp->u_arg[0], "MPOL_???");
455 printxval(policies, pol, "MPOL_???");

Completed in 1351 milliseconds

1 2 3 45 6 7 8