/external/chromium_org/chrome/browser/policy/ |
policy_prefs_browsertest.cc | 370 // Splits all known policies into subsets of the given |chunk_size|. The 371 // policies are shuffled so that there is no correlation between their initial 373 // expected number of policies with long-running test cases is equal for each 381 std::vector<std::string> policies; local 384 policies.push_back(it.key()); 389 std::random_shuffle(policies.begin(), policies.end(), GetRandomNumber); 392 std::vector<std::string>::const_iterator it = policies.begin(); 393 const std::vector<std::string>::const_iterator end = policies.end(); 475 // Verifies that all known policies have a test case in the JSON file [all...] |
profile_policy_connector.cc | 40 return provider->policies().Get(chrome_ns).Get(name) != NULL; 70 // use the policies exposed by the PolicyService!
|
/external/chromium_org/components/policy/core/common/ |
configuration_policy_provider_test.h | 68 // |level| and |scope| are the level and scope of the policies returned by 101 virtual void Install3rdPartyPolicy(const base::DictionaryValue* policies);
|
config_dir_policy_loader_unittest.cc | 25 // Subdirectory of the config dir that contains mandatory policies. 53 const base::DictionaryValue* policies) OVERRIDE; 133 void TestHarness::Install3rdPartyPolicy(const base::DictionaryValue* policies) { 135 dict.Set("3rdparty", policies->DeepCopy());
|
policy_test_utils.cc | 51 LOG(WARNING) << "There are pre-existing policies in this machine: " << dict; 213 std::ostream& operator<<(std::ostream& os, const policy::PolicyMap& policies) { 215 for (policy::PolicyMap::const_iterator iter = policies.begin(); 216 iter != policies.end(); ++iter) {
|
config_dir_policy_loader.cc | 26 // Subdirectories that contain the mandatory and recommended policies. 175 const base::Value* policies, 178 // The first-level entries in |policies| are PolicyDomains. The second-level 179 // entries are component IDs, and the third-level entries are the policies 183 if (!policies->GetAsDictionary(&domains_dictionary)) {
|
policy_loader_mac_unittest.cc | 176 EXPECT_TRUE(provider_->policies().Equals(kEmptyBundle)); 197 EXPECT_TRUE(provider_->policies().Equals(expected_bundle));
|
policy_map.cc | 127 const base::DictionaryValue* policies, 130 for (base::DictionaryValue::Iterator it(*policies);
|
/external/chromium_org/tools/deep_memory_profiler/lib/ |
policy.py | 14 POLICIES_JSON_PATH = os.path.join(BASE_PATH, 'policies.json') 350 """Represents a set of policies.""" 357 """Loads a set of policies via the "default policy directory". 359 The "default policy directory" contains pairs of policies and their labels. 361 policy directory "policies.json". 363 All policies in the directory are loaded by default. Policies can be 402 policies = {} 407 policies[label] = loaded 408 return PolicySet(policies) [all...] |
/external/chromium_org/tools/grit/grit/format/policy_templates/writers/ |
plist_strings_writer_unittest.py | 56 'policies': [{ 98 'policies': [{ 140 'policies': [{ 194 'policies': [{ 249 'policies': [{
|
ios_plist_writer.py | 13 # This writer outputs a Property List with an example for each of the policies 20 All of the Chrome policies are configured with an example 26 which contains the same policies that can go in ChromePolicy. 61 # Output examples only for policies that are supported on iOS.
|
/external/chromium_org/chromeos/network/ |
policy_util.cc | 210 const GuidToPolicyMap& policies, 212 for (GuidToPolicyMap::const_iterator it = policies.begin(); 213 it != policies.end(); ++it) {
|
policy_applicator.cc | 38 const PolicyApplicator::GuidToPolicyMap& policies, 40 PolicyApplicator::GuidToPolicyMap::const_iterator it = policies.find(guid); 41 if (it == policies.end()) 146 // can't be matched to policies by properties (e.g. VPN). 303 // Notify the handler about all policies being applied, so that the network 329 // All profile entries were compared to policies. |remaining_policies_| 330 // contains all modified policies that didn't match any entry. For these 331 // remaining policies, new configurations have to be created.
|
/external/chromium_org/components/policy/tools/ |
generate_policy_source.py | 23 CHROME_POLICY_KEY = 'SOFTWARE\\\\Policies\\\\Google\\\\Chrome' 24 CHROMIUM_POLICY_KEY = 'SOFTWARE\\\\Policies\\\\Chromium' 191 # Returns an iterator over all the policies in |template_file_contents|. 195 for sub_policy in policy['policies']: 209 def _WritePolicyConstantHeader(policies, os, f): 240 for policy in policies: 241 # TODO(joaodasilva): Include only supported policies in 567 def _WritePolicyConstantSource(policies, os, f): 587 for policy in policies: 598 for policy in policies [all...] |
syntax_check_policy_template_json.py | 36 # List of boolean policies that have been introduced with negative polarity in 166 # Checks that boolean policies are not negated (which makes them harder to 172 'new boolean policies follow the XYZEnabled pattern. ' + 184 'supported_on', 'label', 'policies', 'items', 223 # Each policy group must have a list of policies. 224 policies = self._CheckContains(policy, 'policies', list) 226 # Check sub-policies. 227 if policies is not None: 228 for nested_policy in policies [all...] |
/packages/apps/Settings/src/com/android/settings/ |
DeviceAdminAdd.java | 224 // Nothing changed (or policies were removed) - return immediately 440 ArrayList<DeviceAdminInfo.PolicyInfo> policies = mDeviceAdmin.getUsedPolicies(); local 441 for (int i=0; i<policies.size(); i++) { 442 DeviceAdminInfo.PolicyInfo pi = policies.get(i); 458 ArrayList<DeviceAdminInfo.PolicyInfo> policies = mDeviceAdmin.getUsedPolicies(); local 459 for (int i=0; i<policies.size(); i++) { 460 DeviceAdminInfo.PolicyInfo pi = policies.get(i);
|
/external/chromium_org/remoting/host/it2me/ |
it2me_host.h | 108 // Called by Connect() to check for policies and start connection process. 111 // Called by ReadPolicyAndConnect once policies have been read. 127 // Called when initial policies are read, and when they change. 128 void OnPolicyUpdate(scoped_ptr<base::DictionaryValue> policies); 130 // Handlers for NAT traversal and host domain policies.
|
it2me_host.cc | 68 // Start monitoring configured policies. 312 void It2MeHost::OnPolicyUpdate(scoped_ptr<base::DictionaryValue> policies) { 316 if (policies->GetBoolean(policy_hack::PolicyWatcher::kNatPolicyName, 321 if (policies->GetString(policy_hack::PolicyWatcher::kHostDomainPolicyName,
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
X509CertSelectorTest.java | 105 protected String[] policies = null; field in class:X509CertSelectorTest.TestCert 124 public TestCert(String[] policies) { 125 setPolicies(policies); 165 public void setPolicies(String[] policies) { 166 this.policies = policies; 415 if ("2.5.29.32".equals(oid) && (policies != null) 416 && (policies.length > 0)) { 417 // Certificate Policies Extension (as specified in rfc 3280) 420 for (int i = 0; i < policies.length; i++) 2279 String[] policies = new String[] { local 2716 String[] policies = new String[] { local 2781 String[] policies = new String[] { local 2876 String[] policies = new String[] { local [all...] |
/external/chromium_org/chrome/browser/policy/test/ |
policy_testserver.py | 10 enforced and recommended policies for the device and user scope, and a list 587 def GatherDevicePolicySettings(self, settings, policies): 588 """Copies all the policies from a dictionary into a protobuf of type 593 policies: The source dictionary containing policies in JSON format. 604 if field.name in policies: 606 field_value = policies[field.name] 611 def GatherUserPolicySettings(self, settings, policies): 612 """Copies all the policies from a dictionary into a protobuf of type 617 policies: The source: a dictionary containing policies under key [all...] |
/external/chromium_org/net/cert/ |
cert_verify_proc_nss.cc | 342 // If policy_oids is not NULL and num_policy_oids is positive, policies 553 CERTCertificatePolicies* policies = 556 return policies; 563 ScopedCERTCertificatePolicies policies(DecodeCertPolicies(cert_handle)); 564 if (!policies.get()) 567 CERTPolicyInfo* policy_info = policies->policyInfos[0]; 636 ScopedCERTCertificatePolicies policies(DecodeCertPolicies(cert_handle)); 637 if (!policies.get()) 640 CERTPolicyInfo** policy_infos = policies->policyInfos; 661 // Otherwise, we pass just that EV policy (as opposed to all the EV policies) [all...] |
/frameworks/base/core/java/android/net/ |
NetworkPolicyManager.java | 152 public void setNetworkPolicies(NetworkPolicy[] policies) { 154 mService.setNetworkPolicies(policies);
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
user_cloud_policy_manager_chromeos_unittest.cc | 308 EXPECT_TRUE(manager_->policies().Equals(expected_bundle_)); 431 EXPECT_TRUE(PolicyBundle().Equals(manager_->policies())); 457 EXPECT_TRUE(PolicyBundle().Equals(manager_->policies())); 499 EXPECT_TRUE(PolicyBundle().Equals(manager_->policies())); 518 EXPECT_TRUE(PolicyBundle().Equals(manager_->policies()));
|
device_local_account_policy_provider.cc | 162 bundle->CopyFrom(policies());
|
/external/strace/ |
mem.c | 374 #include "xlat/policies.h" 427 printxval(policies, tcp->u_arg[2], "MPOL_???"); 439 printxval(policies, tcp->u_arg[0], "MPOL_???"); 455 printxval(policies, pol, "MPOL_???");
|