/external/webkit/LayoutTests/http/tests/appcache/ |
online-whitelist-expected.txt | 1 Test online whitelist functionality. Should say PASS:
|
whitelist-wildcard-expected.txt | 1 Test that online whitelist wildcard flag is implemented.
|
whitelist-wildcard.html | 1 <html manifest="resources/whitelist-wildcard.manifest"> 3 <p>Test that online whitelist wildcard flag is implemented.</p>
|
online-whitelist.html | 1 <html manifest="resources/online-whitelist.manifest"> 3 <p>Test online whitelist functionality. Should say PASS:</p> 47 log("FAIL: Explicit entry didn't override online whitelist."); 52 log("FAIL: Online whitelist resource wasn't reloaded from network."); 57 log("FAIL: Online whitelist resource wasn't reloaded from network (prefix matching).");
|
/external/webkit/LayoutTests/http/tests/appcache/resources/ |
online-whitelist.manifest | 10 # This should be ignored, because explicit entries are checked before online whitelist
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/deprecated/voice/ |
Whitelist.java | 27 public class Whitelist { 30 public Whitelist() { 34 public Whitelist(List<Bundle> conditions) { 45 * @return true if the field is a member of the whitelist.
|
/external/webkit/Source/WebCore/page/ |
UserContentURLPattern.cpp | 33 bool UserContentURLPattern::matchesPatterns(const KURL& url, const Vector<String>* whitelist, const Vector<String>* blacklist) 35 // In order for a URL to be a match it has to be present in the whitelist and not present in the blacklist. 36 // If there is no whitelist at all, then all URLs are assumed to be in the whitelist. 37 bool matchesWhitelist = !whitelist || whitelist->isEmpty(); 39 for (unsigned i = 0; i < whitelist->size(); ++i) { 40 UserContentURLPattern contentPattern(whitelist->at(i));
|
UserScript.h | 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 46 , m_whitelist(whitelist) 55 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserScript
|
UserStyleSheet.h | 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 46 , m_whitelist(whitelist) 55 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserStyleSheet
|
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_database.h | 48 // whitelist databases. The browse database contains information 51 // these downloaded contents. The csd whitelist database contains URLs 63 // |enable_client_side_whitelist| is used to control the csd whitelist 104 // whitelist. Otherwise, this function returns true. Note: the whitelist 153 // Filename for client-side phishing detection whitelist databsae. 243 // Loads the given full-length hashes to the csd whitelist. If the number 244 // of hashes is too large or if the kill switch URL is on the whitelist 245 // we will whitelist all URLs. 248 // Call this method if an error occured with the csd whitelist. This wil [all...] |
/external/chromium/chrome/browser/extensions/ |
all_urls_apitest.cc | 25 // Then add the two extensions to the whitelist. 26 Extension::ScriptingWhitelist whitelist; local 27 whitelist.push_back(Extension::GenerateIdForPath(extension_dir1)); 28 whitelist.push_back(Extension::GenerateIdForPath(extension_dir2)); 29 Extension::SetScriptingWhitelist(whitelist);
|
/external/jsilver/src/com/google/clearsilver/jsilver/functions/escape/ |
StyleEscapeFunction.java | 25 * characters that are not part of a whitelist of safe characters. This replicates the autoescaping 29 * characters to escape. The StyleAttrEscapeFunction instead applies a whitelist, and strips out any 30 * characters not in the whitelist.
|
/external/chromium/chrome/browser/chromeos/ |
user_cros_settings_provider.cc | 136 std::vector<std::string> whitelist; local 137 if (!SignedSettings::EnumerateWhitelist(&whitelist)) { 138 LOG(WARNING) << "Failed to retrieve user whitelist."; 148 for (size_t i = 0; i < whitelist.size(); ++i) { 149 const std::string& email = whitelist[i]; 235 VLOG(1) << "Setting user whitelist is not implemented. Please use " 236 "whitelist/unwhitelist instead."; 388 VLOG(1) << "Add " << email << " to whitelist, code=" << code; 390 // Reload the whitelist on settings op failure. 398 VLOG(1) << "Remove " << email << " from whitelist, code=" << code 536 const ListValue* whitelist = cached_whitelist(); local [all...] |
user_cros_settings_provider.h | 54 // Returns true if given email is in user whitelist. 56 // CheckWhitelist op for the real whitelist check.
|
/external/chromium/chrome/browser/ui/webui/options/chromeos/ |
accounts_options_handler.h | 33 // Javascript callbacks to whitelist/unwhitelist user.
|
/external/chromium/net/http/ |
http_auth_filter_win.h | 29 // Override the whitelist key. Passing in NULL restores the default value.
|
http_auth_filter.h | 30 // Whitelist HTTP authentication filter. 52 // Installs the whitelist.
|
url_security_manager.h | 27 // |whitelist_default| is the whitelist of servers that default credentials 35 // |whitelist_delegate| is the whitelist of servers that are allowed
|
url_security_manager_unittest.cc | 28 // In Posix systems (or on Windows if a whitelist is specified explicitly), 29 // everything depends on the whitelist.
|
/external/chromium/chrome/browser/chromeos/login/ |
signed_settings_unittest.cc | 130 em::PolicyData BuildPolicyData(std::vector<std::string> whitelist) { 137 if (!whitelist.empty()) { 139 for (std::vector<std::string>::const_iterator it = whitelist.begin(); 140 it != whitelist.end(); 167 const RepeatedPtrField<std::string>& whitelist = local 169 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 170 it != whitelist.end(); 328 std::vector<std::string> whitelist(1, fake_email_); 329 whitelist.push_back(fake_email_ + "m"); 330 em::PolicyData fake_pol = BuildPolicyData(whitelist); [all...] |
signed_settings_helper.h | 33 // Callback of WhitelistOp that adds |email| to the whitelist. 37 // Callback of WhitelistOp that removes |email| to the whitelist.
|
signed_settings.cc | 92 const RepeatedPtrField<std::string>& whitelist = local 94 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 95 it != whitelist.end(); 344 VLOG(2) << "Whitelist check was successful for " << email_to_check; 355 VLOG(2) << "Whitelist check was successful for " << email_to_check; 391 VLOG(2) << "Whitelist check was successful."; 394 VLOG(2) << "Whitelist check failed."; 405 const RepeatedPtrField<std::string>& whitelist = local 407 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 408 it != whitelist.end() 498 const RepeatedPtrField<string>& whitelist = whitelist_proto->user_whitelist(); local [all...] |
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/latin/ |
WhitelistDictionary.java | 50 Log.d(TAG, "The number of the whitelist is invalid."); 84 // See LatinIME#updateSuggestions. This breaks in the (queer) case that the whitelist 91 // There is no such combination in the whitelist at the time and there probably won't
|
/packages/inputmethods/LatinIME/java/res/values/ |
whitelist.xml | 22 An entry of the whitelist word should be:
|
/external/chromium/chrome/browser/resources/options/chromeos/ |
accounts_options.js | 92 // Whitelist existing users when guest login is being disabled. 126 * Returns whether the whitelist is managed by policy or not.
|