/external/webkit/Source/WebCore/page/ |
UserScript.h | 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 47 , m_blacklist(blacklist) 56 const Vector<String>* blacklist() const { return m_blacklist.get(); } function in class:WebCore::UserScript
|
UserStyleSheet.h | 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 47 , m_blacklist(blacklist) 56 const Vector<String>* blacklist() const { return m_blacklist.get(); } function in class:WebCore::UserStyleSheet
|
/frameworks/base/services/java/com/android/server/ |
CertBlacklister.java | 80 String blacklist = getValue(); local 81 if (blacklist != null) { 82 Slog.i(TAG, "Certificate blacklist changed, updating..."); 91 out.write(blacklist.getBytes()); 96 Slog.i(TAG, "Certificate blacklist updated"); 98 Slog.e(TAG, "Failed to write blacklist", e); 128 // set up the public key blacklist observer 135 // set up the serial number blacklist observer
|
/external/chromium/chrome/browser/ |
enumerate_modules_model_unittest_win.cc | 104 ModuleEnumerator::BlacklistEntry blacklist; member in struct:MatchingEntryList 200 ModuleEnumerator::BlacklistEntry blacklist = local 201 kMatchineEntryList[i].blacklist; 206 ModuleEnumerator::Match(test, blacklist));
|
/external/chromium/chrome/browser/translate/ |
translate_prefs.cc | 224 const ListValue* blacklist = prefs_->GetList(pref_id); local 225 return (blacklist && !blacklist->empty() && IsValueInList(blacklist, value)); 232 ListValue* blacklist = update.Get(); local 233 if (!blacklist) { 234 NOTREACHED() << "Unregistered translate blacklist pref"; 237 blacklist->Append(new StringValue(value)); 247 ListValue* blacklist = update.Get(); local 248 if (!blacklist) { [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
CertBlacklisterTest.java | 53 // read the contents of the pubkey blacklist 54 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 56 assertEquals("", blacklist); 60 // build a new thing to blacklist 65 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 67 assertEquals(badPubkey, blacklist); 75 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 76 assertEquals(badPubkey, blacklist); 82 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 83 assertEquals(badPubkey, blacklist); 89 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 96 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 106 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 107 assertEquals(bl.toString(), blacklist); local 114 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 125 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 135 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 142 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 149 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 156 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 166 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 167 assertEquals(bl.toString(), blacklist); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathValidatorSpi.java | 40 private final static CertBlacklist blacklist = new CertBlacklist(); field in class:PKIXCertPathValidatorSpi 90 if (blacklist.isSerialNumberBlackListed(serial)) { 277 if (blacklist.isPublicKeyBlackListed(workingPublicKey)) {
|
/external/dhcpcd/ |
if-options.h | 112 in_addr_t *blacklist; member in struct:if_options
|
/external/chromium/chrome/browser/history/ |
top_sites.cc | 355 DictionaryValue* blacklist = update.Get(); local 356 blacklist->SetWithoutPathExpansion(GetURLHash(url), dummy); 367 DictionaryValue* blacklist = update.Get(); local 368 blacklist->RemoveWithoutPathExpansion(GetURLHash(url), NULL); 383 DictionaryValue* blacklist = update.Get(); local 384 blacklist->Clear(); 740 // We don't use canonical URLs here to be able to blacklist only one of [all...] |
/external/chromium/chrome/browser/extensions/ |
extension_updater.cc | 55 // Update AppID for extension blacklist. 56 const char* ExtensionUpdater::kBlacklistAppID = "com.google.crx.blacklist"; 796 NOTREACHED() << "Fetched blacklist checksum is not as expected. " 801 std::vector<std::string> blacklist; local 802 base::SplitString(data, '\n', &blacklist); 805 service_->UpdateExtensionBlacklist(blacklist); 807 // Update the pref value for blacklist version [all...] |
extension_prefs.cc | 41 const char kPrefBlacklist[] = "blacklist"; 61 // Path for settings specific to blacklist update. 464 const ListValue* blacklist = local 466 if (!blacklist || blacklist->empty()) 482 // Then check the blacklist (the admin blacklist, not the Google blacklist). 483 if (blacklist) { 484 for (ListValue::const_iterator it = blacklist->begin() [all...] |
extension_service_unittest.cc | 2308 std::vector<std::string> blacklist; local 2345 std::vector<std::string> blacklist; local 2367 std::vector<std::string> blacklist; local 2397 std::vector<std::string> blacklist; local 2428 ListValue* blacklist = update.Get(); local 2466 ListValue* blacklist = update.Get(); local [all...] |
/frameworks/wilhelm/src/android/ |
AudioPlayer_to_android.cpp | 1372 static const unsigned blacklist[] = { local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant_i.h | 342 struct wpa_blacklist *blacklist; member in struct:wpa_supplicant
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant_i.h | 388 struct wpa_blacklist *blacklist; member in struct:wpa_supplicant
|
/external/chromium/chrome/browser/automation/ |
testing_automation_provider.cc | 3351 bool blacklist = false; local [all...] |
/prebuilts/sdk/tools/lib/ |
signapk.jar | |