HomeSort by relevance Sort by last modified time
    Searched full:whitelist (Results 1 - 25 of 149) sorted by null

1 2 3 4 5 6

  /external/webkit/LayoutTests/http/tests/appcache/
online-whitelist-expected.txt 1 Test online whitelist functionality. Should say PASS:
whitelist-wildcard-expected.txt 1 Test that online whitelist wildcard flag is implemented.
whitelist-wildcard.html 1 <html manifest="resources/whitelist-wildcard.manifest">
3 <p>Test that online whitelist wildcard flag is implemented.</p>
online-whitelist.html 1 <html manifest="resources/online-whitelist.manifest">
3 <p>Test online whitelist functionality. Should say PASS:</p>
47 log("FAIL: Explicit entry didn't override online whitelist.");
52 log("FAIL: Online whitelist resource wasn't reloaded from network.");
57 log("FAIL: Online whitelist resource wasn't reloaded from network (prefix matching).");
  /external/webkit/LayoutTests/http/tests/appcache/resources/
online-whitelist.manifest 10 # This should be ignored, because explicit entries are checked before online whitelist
  /sdk/build/
sdk_only_whitelist.mk 0 # Whitelist of SDK projects that can be built for the SDK on Windows
8 # This file defines a whitelist of projects that can be built in the Windows
26 # Whitelist of SDK specific projects that do NOT need Java (e.g. C libraries)
39 # Whitelist of SDK specific projects that DO require Java
  /development/build/
sdk_only_whitelist.mk 0 # Whitelist of SDK projects that can be built for the SDK on Windows
8 # This file defines a whitelist of projects that can be built in the Windows
26 # Whitelist of platform specific projects that do NOT need Java (e.g. C libraries)
58 # Whitelist of platform specific projects that DO require Java
  /external/webkit/Source/WebCore/page/
UserContentURLPattern.cpp 33 bool UserContentURLPattern::matchesPatterns(const KURL& url, const Vector<String>* whitelist, const Vector<String>* blacklist)
35 // In order for a URL to be a match it has to be present in the whitelist and not present in the blacklist.
36 // If there is no whitelist at all, then all URLs are assumed to be in the whitelist.
37 bool matchesWhitelist = !whitelist || whitelist->isEmpty();
39 for (unsigned i = 0; i < whitelist->size(); ++i) {
40 UserContentURLPattern contentPattern(whitelist->at(i));
UserScript.h 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist,
46 , m_whitelist(whitelist)
55 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserScript
UserStyleSheet.h 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist,
46 , m_whitelist(whitelist)
55 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserStyleSheet
  /external/chromium/chrome/browser/safe_browsing/
safe_browsing_database.h 48 // whitelist databases. The browse database contains information
51 // these downloaded contents. The csd whitelist database contains URLs
63 // |enable_client_side_whitelist| is used to control the csd whitelist
104 // whitelist. Otherwise, this function returns true. Note: the whitelist
153 // Filename for client-side phishing detection whitelist databsae.
243 // Loads the given full-length hashes to the csd whitelist. If the number
244 // of hashes is too large or if the kill switch URL is on the whitelist
245 // we will whitelist all URLs.
248 // Call this method if an error occured with the csd whitelist. This wil
    [all...]
  /external/chromium/chrome/browser/extensions/
all_urls_apitest.cc 25 // Then add the two extensions to the whitelist.
26 Extension::ScriptingWhitelist whitelist; local
27 whitelist.push_back(Extension::GenerateIdForPath(extension_dir1));
28 whitelist.push_back(Extension::GenerateIdForPath(extension_dir2));
29 Extension::SetScriptingWhitelist(whitelist);
  /external/jsilver/src/com/google/clearsilver/jsilver/functions/escape/
StyleEscapeFunction.java 25 * characters that are not part of a whitelist of safe characters. This replicates the autoescaping
29 * characters to escape. The StyleAttrEscapeFunction instead applies a whitelist, and strips out any
30 * characters not in the whitelist.
  /external/chromium/chrome/browser/chromeos/
user_cros_settings_provider.cc 136 std::vector<std::string> whitelist; local
137 if (!SignedSettings::EnumerateWhitelist(&whitelist)) {
138 LOG(WARNING) << "Failed to retrieve user whitelist.";
148 for (size_t i = 0; i < whitelist.size(); ++i) {
149 const std::string& email = whitelist[i];
235 VLOG(1) << "Setting user whitelist is not implemented. Please use "
236 "whitelist/unwhitelist instead.";
388 VLOG(1) << "Add " << email << " to whitelist, code=" << code;
390 // Reload the whitelist on settings op failure.
398 VLOG(1) << "Remove " << email << " from whitelist, code=" << code
536 const ListValue* whitelist = cached_whitelist(); local
    [all...]
user_cros_settings_provider.h 54 // Returns true if given email is in user whitelist.
56 // CheckWhitelist op for the real whitelist check.
  /external/chromium/chrome/browser/ui/webui/options/chromeos/
accounts_options_handler.h 33 // Javascript callbacks to whitelist/unwhitelist user.
  /external/chromium/net/http/
http_auth_filter_win.h 29 // Override the whitelist key. Passing in NULL restores the default value.
http_auth_filter.h 30 // Whitelist HTTP authentication filter.
52 // Installs the whitelist.
url_security_manager.h 27 // |whitelist_default| is the whitelist of servers that default credentials
35 // |whitelist_delegate| is the whitelist of servers that are allowed
url_security_manager_unittest.cc 28 // In Posix systems (or on Windows if a whitelist is specified explicitly),
29 // everything depends on the whitelist.
  /packages/inputmethods/LatinIME/java/src/com/android/inputmethod/latin/
WhitelistDictionary.java 41 // TODO: Move whitelist dictionary into main dictionary.
57 Log.d(TAG, "The number of the whitelist is invalid.");
91 // See LatinIME#updateSuggestions. This breaks in the (queer) case that the whitelist
98 // There is no such combination in the whitelist at the time and there probably won't
  /external/chromium/chrome/browser/chromeos/login/
signed_settings_unittest.cc 130 em::PolicyData BuildPolicyData(std::vector<std::string> whitelist) {
137 if (!whitelist.empty()) {
139 for (std::vector<std::string>::const_iterator it = whitelist.begin();
140 it != whitelist.end();
167 const RepeatedPtrField<std::string>& whitelist = local
169 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin();
170 it != whitelist.end();
328 std::vector<std::string> whitelist(1, fake_email_);
329 whitelist.push_back(fake_email_ + "m");
330 em::PolicyData fake_pol = BuildPolicyData(whitelist);
    [all...]
signed_settings_helper.h 33 // Callback of WhitelistOp that adds |email| to the whitelist.
37 // Callback of WhitelistOp that removes |email| to the whitelist.
signed_settings.cc 92 const RepeatedPtrField<std::string>& whitelist = local
94 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin();
95 it != whitelist.end();
344 VLOG(2) << "Whitelist check was successful for " << email_to_check;
355 VLOG(2) << "Whitelist check was successful for " << email_to_check;
391 VLOG(2) << "Whitelist check was successful.";
394 VLOG(2) << "Whitelist check failed.";
405 const RepeatedPtrField<std::string>& whitelist = local
407 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin();
408 it != whitelist.end()
498 const RepeatedPtrField<string>& whitelist = whitelist_proto->user_whitelist(); local
    [all...]
  /packages/inputmethods/LatinIME/java/res/values/
whitelist.xml 22 An entry of the whitelist word should be:

Completed in 3688 milliseconds

1 2 3 4 5 6