/external/webkit/LayoutTests/http/tests/appcache/ |
online-whitelist-expected.txt | 1 Test online whitelist functionality. Should say PASS:
|
whitelist-wildcard-expected.txt | 1 Test that online whitelist wildcard flag is implemented.
|
whitelist-wildcard.html | 1 <html manifest="resources/whitelist-wildcard.manifest"> 3 <p>Test that online whitelist wildcard flag is implemented.</p>
|
online-whitelist.html | 1 <html manifest="resources/online-whitelist.manifest"> 3 <p>Test online whitelist functionality. Should say PASS:</p> 47 log("FAIL: Explicit entry didn't override online whitelist."); 52 log("FAIL: Online whitelist resource wasn't reloaded from network."); 57 log("FAIL: Online whitelist resource wasn't reloaded from network (prefix matching).");
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/voice/ |
Whitelist.java | 26 public class Whitelist { 29 public Whitelist() { 33 public Whitelist(List<Bundle> conditions) { 44 * @return true if the field is a member of the whitelist.
|
VoiceInput.java | 76 private Whitelist mRecommendedList; 77 private Whitelist mBlacklist; 185 mRecommendedList = new Whitelist(); 190 mBlacklist = new Whitelist();
|
/external/webkit/LayoutTests/http/tests/appcache/resources/ |
online-whitelist.manifest | 10 # This should be ignored, because explicit entries are checked before online whitelist
|
/external/webkit/WebCore/page/ |
UserScript.h | 40 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 44 , m_whitelist(whitelist) 52 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserScript
|
UserStyleSheet.h | 40 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist) 43 , m_whitelist(whitelist) 50 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserStyleSheet
|
UserContentURLPattern.cpp | 33 bool UserContentURLPattern::matchesPatterns(const KURL& url, const Vector<String>* whitelist, const Vector<String>* blacklist) 35 // In order for a URL to be a match it has to be present in the whitelist and not present in the blacklist. 36 // If there is no whitelist at all, then all URLs are assumed to be in the whitelist. 37 bool matchesWhitelist = !whitelist || whitelist->isEmpty(); 39 for (unsigned i = 0; i < whitelist->size(); ++i) { 40 UserContentURLPattern contentPattern(whitelist->at(i));
|
PageGroup.h | 78 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 81 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist);
|
UserContentURLPattern.h | 52 static bool matchesPatterns(const KURL&, const Vector<String>* whitelist, const Vector<String>* blacklist);
|
PageGroup.cpp | 294 void PageGroup::addUserScriptToWorld(DOMWrapperWorld* world, const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, 299 OwnPtr<UserScript> userScript(new UserScript(source, url, whitelist, blacklist, injectionTime)); 308 void PageGroup::addUserStyleSheetToWorld(DOMWrapperWorld* world, const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, 313 OwnPtr<UserStyleSheet> userStyleSheet(new UserStyleSheet(source, url, whitelist, blacklist));
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/suid/ |
SuidFilesActivity.java | 53 private static final Set<String> WHITELIST = new HashSet<String>(Arrays.asList( 157 view.setBackgroundResource(WHITELIST.contains(file.getName()) 245 if (!WHITELIST.contains(result.getName())) {
|
/external/webkit/WebKit/win/Interfaces/ |
IWebViewPrivate.idl | 188 [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist, 192 [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist, 209 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively.
|
/external/webkit/WebCore/loader/appcache/ |
ApplicationCacheStorage.cpp | 490 // When a cache is deleted, all its entries and its whitelist should be deleted. 574 // Store the online whitelist 590 // Store online whitelist wildcard flag. 876 // Load the online whitelist 882 Vector<KURL> whitelist; local 884 whitelist.append(KURL(ParsedURLString, whitelistStatement.getColumnText(0))); 887 LOG_ERROR("Could not load cache online whitelist, error \"%s\"", m_database.lastErrorMsg()); 889 cache->setOnlineWhitelist(whitelist); 891 // Load online whitelist wildcard flag. 899 LOG_ERROR("Could not load cache online whitelist wildcard flag, error \"%s\"", m_database.lastErrorMsg()) [all...] |
ApplicationCache.h | 72 bool isURLInOnlineWhitelist(const KURL&); // There is an entry in online whitelist that has the same origin as the resource's URL and that is a prefix match for the resource's URL.
|
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/ |
SettingsBackupAgent.java | 231 String[] whitelist = null; local 233 whitelist = Settings.Secure.SETTINGS_TO_BACKUP; 235 whitelist = Settings.System.SETTINGS_TO_BACKUP; 260 if (invalidSavedSetting(whitelist, settingName)) {
|
/external/libnfc-nxp/src/ |
phHciNfc_AdminMgmt.c | 52 /* Max Whitelist Supported by the Device*/ 100 uint8_t whitelist[WHITELIST_MAX_LEN]; member in struct:phHciNfc_AdminGate_Info 476 p_admin_info->whitelist[i] = i + 2; 480 (uint8_t *)p_admin_info->whitelist, i ); [all...] |
/external/webkit/WebKit/mac/WebView/ |
WebViewPrivate.h | 484 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively. 490 + (void)_addUserScriptToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist injectionTime:(WebUserScriptInjectionTime)injectionTime; 491 + (void)_addUserStyleSheetToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist;
|
/external/dbus/ |
cleanup-man-pages.sh | 64 ## whitelist
|
/external/webkit/WebKitTools/Scripts/ |
detect-mismatched-virtual-const | 44 # * It has lots of false positives (should add a whitelist for known-good signatures,
|
/external/webkit/WebKitTools/DumpRenderTree/mac/ |
LayoutTestControllerMac.mm | 554 [WebView _addUserScriptToGroup:@"org.webkit.DumpRenderTree" world:[WebScriptWorld world] source:sourceNS url:nil whitelist:nil blacklist:nil injectionTime:(runAtStart ? WebInjectAtDocumentStart : WebInjectAtDocumentEnd)]; 561 [WebView _addUserStyleSheetToGroup:@"org.webkit.DumpRenderTree" world:[WebScriptWorld world] source:sourceNS url:nil whitelist:nil blacklist:nil];
|
/development/cmds/monkey/src/com/android/commands/monkey/ |
Monkey.java | 156 /** Package whitelist file. */ 737 } else if (opt.equals("--pkg-whitelist-file")) { 836 * Load package blacklist or whitelist (if specified). 844 + "together with a whitelist or individual packages (via -p)."); [all...] |
/external/chromium/net/data/proxy_resolver_perftest/ |
no-ads.pac | 575 // Whitelist section from InvisiBill 580 // WHITELIST 581 // To add whitelist domains, simple add a line such as: 611 // alert("allowing (whitelist): return " + normal); [all...] |