HomeSort by relevance Sort by last modified time
    Searched defs:Rule (Results 1 - 25 of 70) sorted by null

1 2 3

  /external/junit/src/org/junit/
Rule.java 15 * annotated {@link Rule}s on a class, they will be applied in an order
24 * @Rule
45 public @interface Rule {
  /external/chromium/net/proxy/
proxy_bypass_rules.h 21 // Interface for an individual proxy bypass rule.
22 class Rule {
24 Rule();
25 virtual ~Rule();
27 // Returns true if |url| matches the rule.
30 // Returns a string representation of this rule. This is used both for
34 // Creates a copy of this rule. (Caller is responsible for deleting it)
35 virtual Rule* Clone() const = 0;
37 bool Equals(const Rule& rule) const
    [all...]
proxy_bypass_rules.cc 17 class HostnamePatternRule : public ProxyBypassRules::Rule {
49 virtual Rule* Clone() const {
61 class BypassLocalRule : public ProxyBypassRules::Rule {
74 virtual Rule* Clone() const {
79 // Rule for matching a URL that is an IP address, if that IP address falls
80 // within a certain numeric range. For example, you could use this rule to
82 class BypassIPBlockRule : public ProxyBypassRules::Rule {
116 virtual Rule* Clone() const {
143 ProxyBypassRules::Rule::Rule() {
    [all...]
init_proxy_resolver_unittest.cc 29 struct Rule {
30 Rule(const GURL& url,
51 Rule AddSuccessRule(const char* url) {
52 Rule rule(GURL(url), OK /*fetch_error*/, OK /*set_pac_error*/);
53 rules_.push_back(rule);
54 return rule;
58 rules_.push_back(Rule(GURL(url), kFailedDownloading /*fetch_error*/,
63 rules_.push_back(Rule(GURL(url), OK /*fetch_error*/,
67 const Rule& GetRuleByUrl(const GURL& url) const
100 const Rules::Rule& rule = rules_->GetRuleByUrl(url); local
147 const Rules::Rule& rule = expects_pac_bytes() ? local
181 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local
283 Rules::Rule rule = rules.AddSuccessRule("http:\/\/wpad\/wpad.dat"); local
302 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local
322 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local
424 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local
    [all...]
  /external/chromium_org/net/proxy/
proxy_bypass_rules.h 21 // Interface for an individual proxy bypass rule.
22 class NET_EXPORT Rule {
24 Rule();
25 virtual ~Rule();
27 // Returns true if |url| matches the rule.
30 // Returns a string representation of this rule. This is used both for
34 // Creates a copy of this rule. (Caller is responsible for deleting it)
35 virtual Rule* Clone() const = 0;
37 bool Equals(const Rule& rule) const
    [all...]
proxy_bypass_rules.cc 19 class HostnamePatternRule : public ProxyBypassRules::Rule {
51 virtual Rule* Clone() const OVERRIDE {
63 class BypassLocalRule : public ProxyBypassRules::Rule {
76 virtual Rule* Clone() const OVERRIDE {
81 // Rule for matching a URL that is an IP address, if that IP address falls
82 // within a certain numeric range. For example, you could use this rule to
84 class BypassIPBlockRule : public ProxyBypassRules::Rule {
118 virtual Rule* Clone() const OVERRIDE {
145 ProxyBypassRules::Rule::Rule() {
    [all...]
proxy_script_decider_unittest.cc 34 struct Rule {
35 Rule(const GURL& url, int fetch_error, bool is_valid_script)
54 Rule AddSuccessRule(const char* url) {
55 Rule rule(GURL(url), OK /*fetch_error*/, true);
56 rules_.push_back(rule);
57 return rule;
61 rules_.push_back(Rule(GURL(url), kFailedDownloading /*fetch_error*/,
66 rules_.push_back(Rule(GURL(url), OK /*fetch_error*/, false));
69 const Rule& GetRuleByUrl(const GURL& url) const
102 const Rules::Rule& rule = rules_->GetRuleByUrl(url); variable
127 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local
234 Rules::Rule rule = rules.AddSuccessRule("http:\/\/wpad\/wpad.dat"); local
257 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local
282 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local
    [all...]
  /external/chromium_org/chrome/browser/content_settings/
content_settings_rule.cc 10 Rule::Rule() {}
12 Rule::Rule(
22 Rule::~Rule() {}
32 Rule EmptyRuleIterator::Next() {
34 return Rule();
58 Rule ConcatenationIterator::Next() {
63 const Rule& to_return = (*current_iterator)->Next()
    [all...]
content_settings_rule.h 20 struct Rule {
21 Rule();
22 // Rule takes ownership of |value|.
23 Rule(const ContentSettingsPattern& primary_pattern,
26 ~Rule();
37 virtual Rule Next() = 0;
44 virtual Rule Next() OVERRIDE;
55 virtual Rule Next() OVERRIDE;
  /external/antlr/antlr-3.4/gunit/src/main/java/org/antlr/gunit/swingui/model/
Rule.java 37 * ANTLR v3 Rule Information.
40 public class Rule extends DefaultListModel {
44 public Rule(String name) {
  /external/chromium/chrome/browser/content_settings/
content_settings_provider.h 52 struct Rule {
53 Rule() {}
54 Rule(const ContentSettingsPattern& requesting_pattern,
66 typedef std::vector<Rule> Rules;
76 // |embedding_url| pair or CONTENT_SETTING_DEFAULT, if no rule applies. For
  /external/chromium-trace/trace-viewer/third_party/closure_linter/closure_linter/
error_check.py 27 class Rule(object):
39 # Rule to raise all known errors.
54 'This includes ' + (', '.join(Rule.CLOSURE_RULES)) + '.')
58 ' - ' + Rule.ALL + ': enables all following errors.\n'
59 ' - ' + Rule.BLANK_LINES_AT_TOP_LEVEL + ': validates'
61 ' - ' + Rule.INDENTATION + ': checks correct '
63 ' - ' + Rule.WELL_FORMED_AUTHOR + ': validates the '
65 ' - ' + Rule.NO_BRACES_AROUND_INHERIT_DOC + ': '
67 ' - ' + Rule.BRACES_AROUND_TYPE + ': enforces braces '
69 ' - ' + Rule.OPTIONAL_TYPE_MARKER + ': checks correct
    [all...]
javascriptlintrules.py 42 Rule = error_check.Rule
97 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS):
135 if (error_check.ShouldCheck(Rule.OPTIONAL_TYPE_MARKER) and
189 if (error_check.ShouldCheck(Rule.BLANK_LINES_AT_TOP_LEVEL) and
467 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS):
  /external/chromium_org/chrome/browser/extensions/api/declarative/
rules_registry.h 24 // Interface for rule registries.
30 typedef extensions::api::events::Rule Rule;
40 // |rules| is a list of Rule instances following the definition of the
41 // declarative extension APIs. It is guaranteed that each rule in |rules| has
53 const std::vector<linked_ptr<Rule> >& rules) = 0;
82 std::vector<linked_ptr<Rule> >* out) = 0;
86 std::vector<linked_ptr<Rule> >* out) = 0;
  /external/chromium_org/net/cert/
mock_cert_verifier.cc 16 struct MockCertVerifier::Rule {
17 Rule(X509Certificate* cert,
79 Rule rule(cert, host_pattern, verify_result, rv);
80 rules_.push_back(rule);
  /external/chromium_org/net/tools/tld_cleanup/
tld_cleanup_util.h 18 struct Rule {
24 typedef std::map<std::string, Rule> RuleMap;
  /external/chromium_org/third_party/closure_linter/closure_linter/
error_check.py 27 class Rule(object):
39 # Rule to raise all known errors.
54 'This includes ' + (', '.join(Rule.CLOSURE_RULES)) + '.')
58 ' - ' + Rule.ALL + ': enables all following errors.\n'
59 ' - ' + Rule.BLANK_LINES_AT_TOP_LEVEL + ': validates'
61 ' - ' + Rule.INDENTATION + ': checks correct '
63 ' - ' + Rule.WELL_FORMED_AUTHOR + ': validates the '
65 ' - ' + Rule.NO_BRACES_AROUND_INHERIT_DOC + ': '
67 ' - ' + Rule.BRACES_AROUND_TYPE + ': enforces braces '
69 ' - ' + Rule.OPTIONAL_TYPE_MARKER + ': checks correct
    [all...]
javascriptlintrules.py 42 Rule = error_check.Rule
97 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS):
135 if (error_check.ShouldCheck(Rule.OPTIONAL_TYPE_MARKER) and
189 if (error_check.ShouldCheck(Rule.BLANK_LINES_AT_TOP_LEVEL) and
467 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS):
  /external/chromium_org/tools/checkdeps/
cpp_checker.py 12 from rules import Rule, MessageRule
41 """Checks the given line with the given rule set.
46 results.DependencyViolation if the line violates a rule, or None
68 rule = rules.RuleApplyingTo(include_path, dependee_path)
69 if (rule.allow == Rule.DISALLOW or
70 (fail_on_temp_allow and rule.allow == Rule.TEMP_ALLOW)):
71 return True, results.DependencyViolation(include_path, rule, rules)
java_checker.py 12 from rules import Rule
99 rule = rules.RuleApplyingTo(include_path, filepath)
100 if rule.allow == Rule.DISALLOW:
102 results.DependencyViolation(include_path, rule, rules))
rules.py 12 class Rule(object):
13 """Specifies a single rule for an include, which can be one of
17 # These are the prefixes used to indicate each type of rule. These
19 # rule this is.
34 of the current rule. For example, the input "foo" would match "foo/bar"."""
38 """Returns true if the input string would be covered by this rule. For
39 example, the input "foo/bar" would match the rule "foo"."""
43 class MessageRule(Rule):
44 """A rule that has a simple message as the reason for failing,
49 super(MessageRule, self).__init__(Rule.DISALLOW, '', ''
    [all...]
  /external/chromium_org/third_party/WebKit/
PRESUBMIT.py 163 from rules import Rule
184 if rule_type == Rule.DISALLOW:
  /external/chromium_org/third_party/WebKit/Source/core/html/parser/
CSSPreloadScanner.h 57 Rule,
  /external/chromium/net/tools/tld_cleanup/
tld_cleanup.cc 18 // * Strips a single leading and/or trailing dot from each rule, if present.
19 // * Logs a warning if a rule contains '!' or '*.' other than at the beginning
20 // of the rule. (This also catches multiple ! or *. at the start of a rule.)
21 // * Logs a warning if GURL reports a rule as invalid, but keeps the rule.
22 // * Canonicalizes each rule's domain by converting it to a GURL and back.
23 // * Adds explicit rules for true TLDs found in any rule.
43 struct Rule {
48 typedef std::map<std::string, Rule> RuleMap
195 Rule rule; local
230 Rule rule; local
    [all...]
  /external/chromium/third_party/libjingle/source/talk/base/
firewallsocketserver.h 39 // This SocketServer shim simulates a rule-based firewall server.
97 struct Rule {
104 std::vector<Rule> rules_;

Completed in 915 milliseconds

1 2 3