/external/webkit/LayoutTests/http/tests/appcache/ |
online-whitelist-expected.txt | 1 Test online whitelist functionality. Should say PASS:
|
whitelist-wildcard-expected.txt | 1 Test that online whitelist wildcard flag is implemented.
|
whitelist-wildcard.html | 1 <html manifest="resources/whitelist-wildcard.manifest"> 3 <p>Test that online whitelist wildcard flag is implemented.</p>
|
online-whitelist.html | 1 <html manifest="resources/online-whitelist.manifest"> 3 <p>Test online whitelist functionality. Should say PASS:</p> 47 log("FAIL: Explicit entry didn't override online whitelist."); 52 log("FAIL: Online whitelist resource wasn't reloaded from network."); 57 log("FAIL: Online whitelist resource wasn't reloaded from network (prefix matching).");
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/voice/ |
Whitelist.java | 26 public class Whitelist { 29 public Whitelist() { 33 public Whitelist(List<Bundle> conditions) { 44 * @return true if the field is a member of the whitelist.
|
VoiceInput.java | 71 private Whitelist mRecommendedList; 72 private Whitelist mBlacklist; 161 mRecommendedList = new Whitelist(); 166 mBlacklist = new Whitelist();
|
/external/webkit/LayoutTests/http/tests/appcache/resources/ |
online-whitelist.manifest | 10 # This should be ignored, because explicit entries are checked before online whitelist
|
/external/webkit/WebCore/page/ |
UserScript.h | 40 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 44 , m_whitelist(whitelist) 52 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserScript
|
UserStyleSheet.h | 40 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist) 43 , m_whitelist(whitelist) 50 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserStyleSheet
|
UserContentURLPattern.cpp | 33 bool UserContentURLPattern::matchesPatterns(const KURL& url, const Vector<String>* whitelist, const Vector<String>* blacklist) 35 // In order for a URL to be a match it has to be present in the whitelist and not present in the blacklist. 36 // If there is no whitelist at all, then all URLs are assumed to be in the whitelist. 37 bool matchesWhitelist = !whitelist || whitelist->isEmpty(); 39 for (unsigned i = 0; i < whitelist->size(); ++i) { 40 UserContentURLPattern contentPattern(whitelist->at(i));
|
PageGroup.h | 74 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 77 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist);
|
PageGroup.cpp | 204 void PageGroup::addUserScriptToWorld(DOMWrapperWorld* world, const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, 209 OwnPtr<UserScript> userScript(new UserScript(source, url, whitelist, blacklist, injectionTime)); 218 void PageGroup::addUserStyleSheetToWorld(DOMWrapperWorld* world, const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, 223 OwnPtr<UserStyleSheet> userStyleSheet(new UserStyleSheet(source, url, whitelist, blacklist));
|
UserContentURLPattern.h | 52 static bool matchesPatterns(const KURL&, const Vector<String>* whitelist, const Vector<String>* blacklist);
|
/external/webkit/WebKit/win/Interfaces/ |
IWebViewPrivate.idl | 188 [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist, 192 [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist, 209 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively.
|
/external/webkit/WebCore/loader/appcache/ |
ApplicationCacheStorage.cpp | 490 // When a cache is deleted, all its entries and its whitelist should be deleted. 574 // Store the online whitelist 590 // Store online whitelist wildcard flag. 866 // Load the online whitelist 872 Vector<KURL> whitelist; local 874 whitelist.append(KURL(ParsedURLString, whitelistStatement.getColumnText(0))); 877 LOG_ERROR("Could not load cache online whitelist, error \"%s\"", m_database.lastErrorMsg()); 879 cache->setOnlineWhitelist(whitelist); 881 // Load online whitelist wildcard flag. 889 LOG_ERROR("Could not load cache online whitelist wildcard flag, error \"%s\"", m_database.lastErrorMsg()) [all...] |
ApplicationCache.h | 72 bool isURLInOnlineWhitelist(const KURL&); // There is an entry in online whitelist that has the same origin as the resource's URL and that is a prefix match for the resource's URL.
|
ApplicationCacheHost.cpp | 291 // Resources that match fallback namespaces or online whitelist entries are fetched from the network,
|
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/ |
SettingsBackupAgent.java | 231 String[] whitelist = null; local 233 whitelist = Settings.Secure.SETTINGS_TO_BACKUP; 235 whitelist = Settings.System.SETTINGS_TO_BACKUP; 260 if (invalidSavedSetting(whitelist, settingName)) {
|
/external/webkit/WebKit/mac/WebView/ |
WebViewPrivate.h | 484 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively. 490 + (void)_addUserScriptToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist injectionTime:(WebUserScriptInjectionTime)injectionTime; 491 + (void)_addUserStyleSheetToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist;
|
/external/dbus/ |
cleanup-man-pages.sh | 64 ## whitelist
|
/external/webkit/WebKitTools/Scripts/ |
detect-mismatched-virtual-const | 44 # * It has lots of false positives (should add a whitelist for known-good signatures,
|
/development/cmds/monkey/src/com/android/commands/monkey/ |
Monkey.java | 136 /** Package whitelist file. */ 622 } else if (opt.equals("--pkg-whitelist-file")) { 709 * Load package blacklist or whitelist (if specified). 717 + "together with a whitelist or individual packages (via -p)."); [all...] |
/external/webkit/WebKitTools/DumpRenderTree/mac/ |
LayoutTestControllerMac.mm | 554 [WebView _addUserScriptToGroup:@"org.webkit.DumpRenderTree" world:[WebScriptWorld world] source:sourceNS url:nil whitelist:nil blacklist:nil injectionTime:(runAtStart ? WebInjectAtDocumentStart : WebInjectAtDocumentEnd)]; 561 [WebView _addUserStyleSheetToGroup:@"org.webkit.DumpRenderTree" world:[WebScriptWorld world] source:sourceNS url:nil whitelist:nil blacklist:nil];
|
/external/webkit/WebKit/win/ |
WebView.h | 747 unsigned whitelistCount, BSTR* whitelist, 751 unsigned whitelistCount, BSTR* whitelist, [all...] |
/external/webkit/WebCore/platform/graphics/gtk/ |
MediaPlayerPrivateGStreamer.cpp | 1033 // Build a whitelist of mime-types known to be supported by [all...] |