/external/webkit/Source/WebCore/page/ |
UserScript.h | 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 46 , m_whitelist(whitelist) 55 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserScript
|
UserStyleSheet.h | 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 46 , m_whitelist(whitelist) 55 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserStyleSheet
|
UserContentURLPattern.h | 56 static bool matchesPatterns(const KURL&, const Vector<String>* whitelist, const Vector<String>* blacklist);
|
UserContentURLPattern.cpp | 33 bool UserContentURLPattern::matchesPatterns(const KURL& url, const Vector<String>* whitelist, const Vector<String>* blacklist) 35 // In order for a URL to be a match it has to be present in the whitelist and not present in the blacklist. 36 // If there is no whitelist at all, then all URLs are assumed to be in the whitelist. 37 bool matchesWhitelist = !whitelist || whitelist->isEmpty(); 39 for (unsigned i = 0; i < whitelist->size(); ++i) { 40 UserContentURLPattern contentPattern(whitelist->at(i));
|
PageGroup.h | 96 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 99 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist,
|
PageGroup.cpp | 369 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 374 OwnPtr<UserScript> userScript(new UserScript(source, url, whitelist, blacklist, injectionTime, injectedFrames)); 384 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 391 OwnPtr<UserStyleSheet> userStyleSheet(new UserStyleSheet(source, url, whitelist, blacklist, injectedFrames, level));
|
/external/chromium/chrome/browser/extensions/ |
all_urls_apitest.cc | 25 // Then add the two extensions to the whitelist. 26 Extension::ScriptingWhitelist whitelist; local 27 whitelist.push_back(Extension::GenerateIdForPath(extension_dir1)); 28 whitelist.push_back(Extension::GenerateIdForPath(extension_dir2)); 29 Extension::SetScriptingWhitelist(whitelist);
|
extension_prefs.cc | 469 // Check the whitelist first. 470 const ListValue* whitelist = local 472 if (whitelist) { 473 for (ListValue::const_iterator it = whitelist->begin(); 474 it != whitelist->end(); ++it) { 476 LOG(WARNING) << "Failed to read whitelist string."; [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
signed_settings_unittest.cc | 130 em::PolicyData BuildPolicyData(std::vector<std::string> whitelist) { 137 if (!whitelist.empty()) { 139 for (std::vector<std::string>::const_iterator it = whitelist.begin(); 140 it != whitelist.end(); 167 const RepeatedPtrField<std::string>& whitelist = local 169 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 170 it != whitelist.end(); 328 std::vector<std::string> whitelist(1, fake_email_); 329 whitelist.push_back(fake_email_ + "m"); 330 em::PolicyData fake_pol = BuildPolicyData(whitelist); [all...] |
signed_settings.cc | 92 const RepeatedPtrField<std::string>& whitelist = local 94 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 95 it != whitelist.end(); 344 VLOG(2) << "Whitelist check was successful for " << email_to_check; 355 VLOG(2) << "Whitelist check was successful for " << email_to_check; 391 VLOG(2) << "Whitelist check was successful."; 394 VLOG(2) << "Whitelist check failed."; 405 const RepeatedPtrField<std::string>& whitelist = local 407 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 408 it != whitelist.end() 498 const RepeatedPtrField<string>& whitelist = whitelist_proto->user_whitelist(); local [all...] |
/external/webkit/Source/WebKit2/WebProcess/InjectedBundle/API/c/ |
WKBundlePrivate.h | 58 WK_EXPORT void WKBundleAddUserScript(WKBundleRef bundle, WKBundlePageGroupRef pageGroup, WKBundleScriptWorldRef scriptWorld, WKStringRef source, WKURLRef url, WKArrayRef whitelist, WKArrayRef blacklist, WKUserScriptInjectionTime injectionTime, WKUserContentInjectedFrames injectedFrames); 59 WK_EXPORT void WKBundleAddUserStyleSheet(WKBundleRef bundle, WKBundlePageGroupRef pageGroup, WKBundleScriptWorldRef scriptWorld, WKStringRef source, WKURLRef url, WKArrayRef whitelist, WKArrayRef blacklist, WKUserContentInjectedFrames injectedFrames);
|
/external/webkit/Source/WebKit2/WebProcess/InjectedBundle/ |
InjectedBundle.h | 102 void addUserScript(WebPageGroupProxy*, InjectedBundleScriptWorld*, const String& source, const String& url, ImmutableArray* whitelist, ImmutableArray* blacklist, WebCore::UserScriptInjectionTime, WebCore::UserContentInjectedFrames); 103 void addUserStyleSheet(WebPageGroupProxy*, InjectedBundleScriptWorld*, const String& source, const String& url, ImmutableArray* whitelist, ImmutableArray* blacklist, WebCore::UserContentInjectedFrames);
|
InjectedBundle.cpp | 216 void InjectedBundle::addUserScript(WebPageGroupProxy* pageGroup, InjectedBundleScriptWorld* scriptWorld, const String& source, const String& url, ImmutableArray* whitelist, ImmutableArray* blacklist, WebCore::UserScriptInjectionTime injectionTime, WebCore::UserContentInjectedFrames injectedFrames) 219 PageGroup::pageGroup(pageGroup->identifier())->addUserScriptToWorld(scriptWorld->coreWorld(), source, KURL(KURL(), url), toStringVector(whitelist), toStringVector(blacklist), injectionTime, injectedFrames); 222 void InjectedBundle::addUserStyleSheet(WebPageGroupProxy* pageGroup, InjectedBundleScriptWorld* scriptWorld, const String& source, const String& url, ImmutableArray* whitelist, ImmutableArray* blacklist, WebCore::UserContentInjectedFrames injectedFrames) 225 PageGroup::pageGroup(pageGroup->identifier())->addUserStyleSheetToWorld(scriptWorld->coreWorld(), source, KURL(KURL(), url), toStringVector(whitelist), toStringVector(blacklist), injectedFrames);
|
/external/dhcpcd/ |
if-options.h | 112 in_addr_t *whitelist; member in struct:if_options
|
if-options.c | 100 {"whitelist", required_argument, NULL, 'W'}, 700 ifo->whitelist = xrealloc(ifo->whitelist, 702 ifo->whitelist[ifo->whitelist_len++] = addr.s_addr; 703 ifo->whitelist[ifo->whitelist_len++] = addr2.s_addr;
|
/external/chromium/chrome/browser/chromeos/ |
user_cros_settings_provider.cc | 136 std::vector<std::string> whitelist; local 137 if (!SignedSettings::EnumerateWhitelist(&whitelist)) { 138 LOG(WARNING) << "Failed to retrieve user whitelist."; 148 for (size_t i = 0; i < whitelist.size(); ++i) { 149 const std::string& email = whitelist[i]; 235 VLOG(1) << "Setting user whitelist is not implemented. Please use " 236 "whitelist/unwhitelist instead."; 388 VLOG(1) << "Add " << email << " to whitelist, code=" << code; 390 // Reload the whitelist on settings op failure. 398 VLOG(1) << "Remove " << email << " from whitelist, code=" << code 536 const ListValue* whitelist = cached_whitelist(); local [all...] |
/external/webkit/Source/WebKit/mac/WebView/ |
WebViewPrivate.h | 514 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively. 522 + (void)_addUserScriptToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist injectionTime:(WebUserScriptInjectionTime)injectionTime; 523 + (void)_addUserStyleSheetToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist; 525 + (void)_addUserScriptToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist injectionTime:(WebUserScriptInjectionTime)injectionTime injectedFrames:(WebUserContentInjectedFrames)injectedFrames; 526 + (void)_addUserStyleSheetToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist injectedFrames:(WebUserContentInjectedFrames)injectedFrames;
|
WebView.mm | [all...] |
/external/valgrind/tsan/ |
thread_sanitizer.h | 61 vector<string> whitelist; member in struct:FLAGS
|
/external/webkit/Source/WebKit/win/Interfaces/ |
IWebViewPrivate.idl | 188 [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist, 192 [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist, 209 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively.
|
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/ |
SettingsBackupAgent.java | 387 String[] whitelist = null; local 389 whitelist = Settings.Secure.SETTINGS_TO_BACKUP; 391 whitelist = Settings.System.SETTINGS_TO_BACKUP; 402 final int whiteListSize = whitelist.length; 404 String key = whitelist[i];
|
/external/libnfc-nxp/src/ |
phHciNfc_AdminMgmt.c | 52 /* Max Whitelist Supported by the Device*/ 100 uint8_t whitelist[WHITELIST_MAX_LEN]; member in struct:phHciNfc_AdminGate_Info 476 p_admin_info->whitelist[i] = i + 2; 480 (uint8_t *)p_admin_info->whitelist, i ); [all...] |
/external/chromium/chrome/common/extensions/ |
extension.cc | 153 Extension::ScriptingWhitelist* whitelist() { return &scripting_whitelist_; } function in class:__anon3431::ExtensionConfig 167 // A whitelist of extensions that can script anywhere. Do not add to this [all...] |
/external/webkit/Source/WebCore/loader/appcache/ |
ApplicationCacheStorage.cpp | 628 // When a cache is deleted, all its entries and its whitelist should be deleted. 727 // Store the online whitelist 743 // Store online whitelist wildcard flag. 1116 Vector<KURL> whitelist; local [all...] |
/external/webkit/Source/WebKit/win/ |
WebView.h | 781 unsigned whitelistCount, BSTR* whitelist, 785 unsigned whitelistCount, BSTR* whitelist, [all...] |