HomeSort by relevance Sort by last modified time
    Searched full:whitelist (Results 1 - 25 of 42) sorted by null

1 2

  /external/webkit/LayoutTests/http/tests/appcache/
online-whitelist-expected.txt 1 Test online whitelist functionality. Should say PASS:
whitelist-wildcard-expected.txt 1 Test that online whitelist wildcard flag is implemented.
whitelist-wildcard.html 1 <html manifest="resources/whitelist-wildcard.manifest">
3 <p>Test that online whitelist wildcard flag is implemented.</p>
online-whitelist.html 1 <html manifest="resources/online-whitelist.manifest">
3 <p>Test online whitelist functionality. Should say PASS:</p>
47 log("FAIL: Explicit entry didn't override online whitelist.");
52 log("FAIL: Online whitelist resource wasn't reloaded from network.");
57 log("FAIL: Online whitelist resource wasn't reloaded from network (prefix matching).");
  /packages/inputmethods/LatinIME/java/src/com/android/inputmethod/voice/
Whitelist.java 26 public class Whitelist {
29 public Whitelist() {
33 public Whitelist(List<Bundle> conditions) {
44 * @return true if the field is a member of the whitelist.
VoiceInput.java 76 private Whitelist mRecommendedList;
77 private Whitelist mBlacklist;
185 mRecommendedList = new Whitelist();
190 mBlacklist = new Whitelist();
  /external/webkit/LayoutTests/http/tests/appcache/resources/
online-whitelist.manifest 10 # This should be ignored, because explicit entries are checked before online whitelist
  /external/webkit/WebCore/page/
UserScript.h 40 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist,
44 , m_whitelist(whitelist)
52 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserScript
UserStyleSheet.h 40 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist)
43 , m_whitelist(whitelist)
50 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserStyleSheet
UserContentURLPattern.cpp 33 bool UserContentURLPattern::matchesPatterns(const KURL& url, const Vector<String>* whitelist, const Vector<String>* blacklist)
35 // In order for a URL to be a match it has to be present in the whitelist and not present in the blacklist.
36 // If there is no whitelist at all, then all URLs are assumed to be in the whitelist.
37 bool matchesWhitelist = !whitelist || whitelist->isEmpty();
39 for (unsigned i = 0; i < whitelist->size(); ++i) {
40 UserContentURLPattern contentPattern(whitelist->at(i));
PageGroup.h 78 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist,
81 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist);
UserContentURLPattern.h 52 static bool matchesPatterns(const KURL&, const Vector<String>* whitelist, const Vector<String>* blacklist);
PageGroup.cpp 294 void PageGroup::addUserScriptToWorld(DOMWrapperWorld* world, const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist,
299 OwnPtr<UserScript> userScript(new UserScript(source, url, whitelist, blacklist, injectionTime));
308 void PageGroup::addUserStyleSheetToWorld(DOMWrapperWorld* world, const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist,
313 OwnPtr<UserStyleSheet> userStyleSheet(new UserStyleSheet(source, url, whitelist, blacklist));
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/suid/
SuidFilesActivity.java 53 private static final Set<String> WHITELIST = new HashSet<String>(Arrays.asList(
157 view.setBackgroundResource(WHITELIST.contains(file.getName())
245 if (!WHITELIST.contains(result.getName())) {
  /external/webkit/WebKit/win/Interfaces/
IWebViewPrivate.idl 188 [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist,
192 [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist,
209 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively.
  /external/webkit/WebCore/loader/appcache/
ApplicationCacheStorage.cpp 490 // When a cache is deleted, all its entries and its whitelist should be deleted.
574 // Store the online whitelist
590 // Store online whitelist wildcard flag.
876 // Load the online whitelist
882 Vector<KURL> whitelist; local
884 whitelist.append(KURL(ParsedURLString, whitelistStatement.getColumnText(0)));
887 LOG_ERROR("Could not load cache online whitelist, error \"%s\"", m_database.lastErrorMsg());
889 cache->setOnlineWhitelist(whitelist);
891 // Load online whitelist wildcard flag.
899 LOG_ERROR("Could not load cache online whitelist wildcard flag, error \"%s\"", m_database.lastErrorMsg())
    [all...]
ApplicationCache.h 72 bool isURLInOnlineWhitelist(const KURL&); // There is an entry in online whitelist that has the same origin as the resource's URL and that is a prefix match for the resource's URL.
  /frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/
SettingsBackupAgent.java 231 String[] whitelist = null; local
233 whitelist = Settings.Secure.SETTINGS_TO_BACKUP;
235 whitelist = Settings.System.SETTINGS_TO_BACKUP;
260 if (invalidSavedSetting(whitelist, settingName)) {
  /external/libnfc-nxp/src/
phHciNfc_AdminMgmt.c 52 /* Max Whitelist Supported by the Device*/
100 uint8_t whitelist[WHITELIST_MAX_LEN]; member in struct:phHciNfc_AdminGate_Info
476 p_admin_info->whitelist[i] = i + 2;
480 (uint8_t *)p_admin_info->whitelist, i );
    [all...]
  /external/webkit/WebKit/mac/WebView/
WebViewPrivate.h 484 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively.
490 + (void)_addUserScriptToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist injectionTime:(WebUserScriptInjectionTime)injectionTime;
491 + (void)_addUserStyleSheetToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist;
  /external/dbus/
cleanup-man-pages.sh 64 ## whitelist
  /external/webkit/WebKitTools/Scripts/
detect-mismatched-virtual-const 44 # * It has lots of false positives (should add a whitelist for known-good signatures,
  /external/webkit/WebKitTools/DumpRenderTree/mac/
LayoutTestControllerMac.mm 554 [WebView _addUserScriptToGroup:@"org.webkit.DumpRenderTree" world:[WebScriptWorld world] source:sourceNS url:nil whitelist:nil blacklist:nil injectionTime:(runAtStart ? WebInjectAtDocumentStart : WebInjectAtDocumentEnd)];
561 [WebView _addUserStyleSheetToGroup:@"org.webkit.DumpRenderTree" world:[WebScriptWorld world] source:sourceNS url:nil whitelist:nil blacklist:nil];
  /development/cmds/monkey/src/com/android/commands/monkey/
Monkey.java 156 /** Package whitelist file. */
737 } else if (opt.equals("--pkg-whitelist-file")) {
836 * Load package blacklist or whitelist (if specified).
844 + "together with a whitelist or individual packages (via -p).");
    [all...]
  /external/chromium/net/data/proxy_resolver_perftest/
no-ads.pac 575 // Whitelist section from InvisiBill
580 // WHITELIST
581 // To add whitelist domains, simple add a line such as:
611 // alert("allowing (whitelist): return " + normal);
    [all...]

Completed in 852 milliseconds

1 2