OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/policy/configuration_policy_handler_list_factory.h" | 5 #include "chrome/browser/policy/configuration_policy_handler_list_factory.h" |
6 | 6 |
7 #include <limits.h> | 7 #include <limits.h> |
8 #include <stddef.h> | 8 #include <stddef.h> |
9 | 9 |
10 #include <utility> | 10 #include <utility> |
(...skipping 216 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
227 base::Value::TYPE_INTEGER }, | 227 base::Value::TYPE_INTEGER }, |
228 { key::kSigninAllowed, | 228 { key::kSigninAllowed, |
229 prefs::kSigninAllowed, | 229 prefs::kSigninAllowed, |
230 base::Value::TYPE_BOOLEAN }, | 230 base::Value::TYPE_BOOLEAN }, |
231 { key::kEnableOnlineRevocationChecks, | 231 { key::kEnableOnlineRevocationChecks, |
232 ssl_config::prefs::kCertRevocationCheckingEnabled, | 232 ssl_config::prefs::kCertRevocationCheckingEnabled, |
233 base::Value::TYPE_BOOLEAN }, | 233 base::Value::TYPE_BOOLEAN }, |
234 { key::kRequireOnlineRevocationChecksForLocalAnchors, | 234 { key::kRequireOnlineRevocationChecksForLocalAnchors, |
235 ssl_config::prefs::kCertRevocationCheckingRequiredLocalAnchors, | 235 ssl_config::prefs::kCertRevocationCheckingRequiredLocalAnchors, |
236 base::Value::TYPE_BOOLEAN }, | 236 base::Value::TYPE_BOOLEAN }, |
| 237 { key::kEnableSha1ForLocalAnchors, |
| 238 ssl_config::prefs::kCertEnableSha1LocalAnchors, |
| 239 base::Value::TYPE_BOOLEAN }, |
237 { key::kAuthSchemes, | 240 { key::kAuthSchemes, |
238 prefs::kAuthSchemes, | 241 prefs::kAuthSchemes, |
239 base::Value::TYPE_STRING }, | 242 base::Value::TYPE_STRING }, |
240 { key::kDisableAuthNegotiateCnameLookup, | 243 { key::kDisableAuthNegotiateCnameLookup, |
241 prefs::kDisableAuthNegotiateCnameLookup, | 244 prefs::kDisableAuthNegotiateCnameLookup, |
242 base::Value::TYPE_BOOLEAN }, | 245 base::Value::TYPE_BOOLEAN }, |
243 { key::kEnableAuthNegotiatePort, | 246 { key::kEnableAuthNegotiatePort, |
244 prefs::kEnableAuthNegotiatePort, | 247 prefs::kEnableAuthNegotiatePort, |
245 base::Value::TYPE_BOOLEAN }, | 248 base::Value::TYPE_BOOLEAN }, |
246 { key::kAuthServerWhitelist, | 249 { key::kAuthServerWhitelist, |
(...skipping 621 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
868 SimpleSchemaValidatingPolicyHandler::RECOMMENDED_ALLOWED, | 871 SimpleSchemaValidatingPolicyHandler::RECOMMENDED_ALLOWED, |
869 SimpleSchemaValidatingPolicyHandler::MANDATORY_PROHIBITED))); | 872 SimpleSchemaValidatingPolicyHandler::MANDATORY_PROHIBITED))); |
870 handlers->AddHandler(base::WrapUnique( | 873 handlers->AddHandler(base::WrapUnique( |
871 new chromeos::KeyPermissionsPolicyHandler(chrome_schema))); | 874 new chromeos::KeyPermissionsPolicyHandler(chrome_schema))); |
872 #endif // defined(OS_CHROMEOS) | 875 #endif // defined(OS_CHROMEOS) |
873 | 876 |
874 return handlers; | 877 return handlers; |
875 } | 878 } |
876 | 879 |
877 } // namespace policy | 880 } // namespace policy |
OLD | NEW |