/external/chromium_org/chrome/browser/extensions/activity_log/ |
activity_log_policy_unittest.cc | 62 std::set<std::string> whitelist; local 63 whitelist.insert("tabs.executeScript"); 65 // API is in whitelist; not stripped. 72 ActivityLogPolicy::Util::StripArguments(whitelist, action); 75 // Not in whitelist: stripped. 79 ActivityLogPolicy::Util::StripArguments(whitelist, action); 86 ActivityLogPolicy::Util::StripArguments(whitelist, action);
|
/external/chromium_org/chrome/renderer/extensions/ |
renderer_permissions_policy_delegate.cc | 33 const Extension::ScriptingWhitelist* whitelist = local 35 if (std::find(whitelist->begin(), whitelist->end(), extension->id()) != 36 whitelist->end()) {
|
/external/chromium/chrome/browser/extensions/ |
all_urls_apitest.cc | 25 // Then add the two extensions to the whitelist. 26 Extension::ScriptingWhitelist whitelist; local 27 whitelist.push_back(Extension::GenerateIdForPath(extension_dir1)); 28 whitelist.push_back(Extension::GenerateIdForPath(extension_dir2)); 29 Extension::SetScriptingWhitelist(whitelist);
|
/external/smack/src/org/jivesoftware/smackx/pubsub/ |
AccessModel.java | 36 /** Only those on a whitelist may subscribe and retrieve items */
37 whitelist;
enum constant in enum:AccessModel
|
ChildrenAssociationPolicy.java | 30 /** Only those on a whitelist may associate leaf nodes with the collection. */
31 whitelist;
enum constant in enum:ChildrenAssociationPolicy
|
/external/chromium_org/chrome/browser/extensions/ |
admin_policy_unittest.cc | 96 // Tests UserMayLoad for an extension on the whitelist. 100 base::ListValue whitelist; local 101 whitelist.Append(Value::CreateStringValue(extension_->id())); 102 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 107 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 110 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 138 // With a whitelist. There's no such thing as a whitelist wildcard. 139 base::ListValue whitelist; local 140 whitelist.Append [all...] |
all_urls_apitest.cc | 41 // Then add the two extensions to the whitelist. 42 extensions::Extension::ScriptingWhitelist whitelist; local 43 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir1)); 44 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir2)); 45 extensions::Extension::SetScriptingWhitelist(whitelist);
|
standard_management_policy_provider.cc | 41 const base::ListValue* whitelist = local 50 blacklist, whitelist, forcelist, allowed_types, extension, error);
|
/external/chromium_org/third_party/WebKit/Source/core/page/ |
UserStyleSheet.h | 45 UserStyleSheet(const String& source, const KURL& url, const Vector<String>& whitelist, const Vector<String>& blacklist, UserContentInjectedFrames injectedFrames, UserStyleLevel level) 48 , m_whitelist(whitelist) 57 const Vector<String>& whitelist() const { return m_whitelist; } function in class:WebCore::UserStyleSheet
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
device_policy_decoder_chromeos.cc | 97 ListValue* whitelist = new ListValue(); local 102 whitelist->Append(Value::CreateStringValue(*entry)); 107 whitelist,
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
cros_settings_unittest.cc | 121 // Setting the whitelist should also switch the value of 123 base::ListValue whitelist; local 124 whitelist.Append(new base::StringValue("me@owner")); 127 AddExpectation(kAccountsPrefUsers, whitelist.DeepCopy()); 128 SetPref(kAccountsPrefUsers, &whitelist); 134 base::ListValue* whitelist = new base::ListValue(); local 136 whitelist->Append(hacky_user.DeepCopy()); 139 AddExpectation(kAccountsPrefUsers, whitelist); 140 // Add some user to the whitelist. 147 base::ListValue whitelist; local 170 base::ListValue whitelist; local 181 base::ListValue whitelist; local 195 base::ListValue whitelist; local [all...] |
/external/chromium_org/chrome/common/extensions/features/ |
simple_feature.h | 28 std::set<std::string>* whitelist() { return &whitelist_; } function in class:extensions::SimpleFeature
|
simple_feature_unittest.cc | 78 TEST_F(ExtensionSimpleFeatureTest, Whitelist) { 83 feature.whitelist()->insert(kIdFoo); 84 feature.whitelist()->insert(kIdBar); 118 feature.whitelist()->insert(kIdFooHashed); 194 feature.whitelist()->insert("monkey"); 198 feature.whitelist()->clear(); 352 EXPECT_TRUE(feature->whitelist()->empty()); 363 base::ListValue* whitelist = new base::ListValue(); local 364 whitelist->Append(new base::StringValue("foo")); 365 whitelist->Append(new base::StringValue("bar")) 470 base::ListValue* whitelist = new base::ListValue(); local [all...] |
/external/chromium_org/chrome/common/extensions/ |
mime_types_handler.cc | 51 std::vector<std::string> whitelist; local 53 whitelist.push_back(kMIMETypeHandlersWhitelist[i]); 54 return whitelist;
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
natserver.h | 96 AddressSet* whitelist; member in struct:talk_base::NATServer::TransEntry
|
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/ |
enterprise_platform_keys_private_api_unittest.cc | 160 base::ListValue whitelist; variable 161 whitelist.AppendString(extension_->id()); 162 prefs_->Set(prefs::kAttestationExtensionWhitelist, whitelist);
|
/external/chromium_org/chrome/browser/policy/ |
url_blacklist_manager_unittest.cc | 185 ListValue* whitelist = new ListValue; local 186 whitelist->Append(new StringValue("mail.google.com")); 188 pref_service_.SetManagedPref(prefs::kUrlBlacklist, whitelist);
|
/external/chromium_org/webkit/browser/appcache/ |
appcache_unittest.cc | 130 const NamespaceVector& whitelist = cache->online_whitelist_namespaces_; local 132 EXPECT_EQ(expected, whitelist.size()); 133 EXPECT_EQ(GURL("http://w1.com"), whitelist[0].namespace_url); 134 EXPECT_EQ(GURL("http://w2.com"), whitelist[1].namespace_url); 547 const GURL kWhitelistUrl("http://foo.com/whitelist*"); 555 "/whitelist* isPattern\r"
|
/external/chromium_org/chrome/browser/managed_mode/ |
managed_mode_site_list.cc | 28 const char kWhitelistKey[] = "whitelist"; 69 // Takes a DictionaryValue entry from the JSON file and fills the whitelist 77 const base::ListValue* whitelist = NULL; local 78 if (site_dict->GetList(kWhitelistKey, &whitelist)) { 80 for (base::ListValue::const_iterator whitelist_it = whitelist->begin(); 81 whitelist_it != whitelist->end(); ++whitelist_it) { 84 LOG(ERROR) << "Invalid whitelist entry"; 100 LOG(ERROR) << "Invalid whitelist entry"; 111 // Fall back to using a whitelist based on the URL. 114 LOG(ERROR) << "Whitelist is invalid" [all...] |
/external/chromium_org/chrome/browser/renderer_host/ |
chrome_resource_dispatcher_host_delegate.cc | 510 std::vector<std::string> whitelist = MimeTypesHandler::GetMIMETypeWhitelist(); local 513 for (size_t i = 0; i < whitelist.size(); ++i) { 514 const char* extension_id = whitelist[i].c_str();
|
/external/chromium_org/chrome/common/extensions/permissions/ |
permissions_data.cc | 67 // whitelist extensions to have access to experimental in just the store, and 544 const Extension::ScriptingWhitelist* whitelist = local 547 for (Extension::ScriptingWhitelist::const_iterator iter = whitelist->begin(); 548 iter != whitelist->end(); ++iter) {
|
/external/chromium_org/sandbox/linux/services/ |
broker_process_unittest.cc | 328 std::vector<std::string> whitelist; local 329 whitelist.push_back(tempfile_name); 331 BrokerProcess open_broker(whitelist, whitelist); 383 std::vector<std::string> whitelist; local 384 whitelist.push_back(kCpuInfo); 386 BrokerProcess open_broker(whitelist, 387 whitelist,
|
/external/libnfc-nxp/src/ |
phHciNfc_AdminMgmt.c | 52 /* Max Whitelist Supported by the Device*/ 100 uint8_t whitelist[WHITELIST_MAX_LEN]; member in struct:phHciNfc_AdminGate_Info 476 p_admin_info->whitelist[i] = i + 2; 480 (uint8_t *)p_admin_info->whitelist, i ); [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
signed_settings.cc | 92 const RepeatedPtrField<std::string>& whitelist = local 94 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 95 it != whitelist.end(); 344 VLOG(2) << "Whitelist check was successful for " << email_to_check; 355 VLOG(2) << "Whitelist check was successful for " << email_to_check; 391 VLOG(2) << "Whitelist check was successful."; 394 VLOG(2) << "Whitelist check failed."; 405 const RepeatedPtrField<std::string>& whitelist = local 407 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 408 it != whitelist.end() 498 const RepeatedPtrField<string>& whitelist = whitelist_proto->user_whitelist(); local [all...] |
signed_settings_unittest.cc | 130 em::PolicyData BuildPolicyData(std::vector<std::string> whitelist) { 137 if (!whitelist.empty()) { 139 for (std::vector<std::string>::const_iterator it = whitelist.begin(); 140 it != whitelist.end(); 167 const RepeatedPtrField<std::string>& whitelist = local 169 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 170 it != whitelist.end(); 328 std::vector<std::string> whitelist(1, fake_email_); 329 whitelist.push_back(fake_email_ + "m"); 330 em::PolicyData fake_pol = BuildPolicyData(whitelist); [all...] |