HomeSort by relevance Sort by last modified time
    Searched defs:whitelist (Results 1 - 25 of 44) sorted by null

1 2

  /external/chromium_org/chrome/browser/extensions/activity_log/
activity_log_policy_unittest.cc 62 std::set<std::string> whitelist; local
63 whitelist.insert("tabs.executeScript");
65 // API is in whitelist; not stripped.
72 ActivityLogPolicy::Util::StripArguments(whitelist, action);
75 // Not in whitelist: stripped.
79 ActivityLogPolicy::Util::StripArguments(whitelist, action);
86 ActivityLogPolicy::Util::StripArguments(whitelist, action);
  /external/chromium_org/chrome/renderer/extensions/
renderer_permissions_policy_delegate.cc 33 const Extension::ScriptingWhitelist* whitelist = local
35 if (std::find(whitelist->begin(), whitelist->end(), extension->id()) !=
36 whitelist->end()) {
  /external/chromium/chrome/browser/extensions/
all_urls_apitest.cc 25 // Then add the two extensions to the whitelist.
26 Extension::ScriptingWhitelist whitelist; local
27 whitelist.push_back(Extension::GenerateIdForPath(extension_dir1));
28 whitelist.push_back(Extension::GenerateIdForPath(extension_dir2));
29 Extension::SetScriptingWhitelist(whitelist);
  /external/smack/src/org/jivesoftware/smackx/pubsub/
AccessModel.java 36 /** Only those on a whitelist may subscribe and retrieve items */
37 whitelist; enum constant in enum:AccessModel
ChildrenAssociationPolicy.java 30 /** Only those on a whitelist may associate leaf nodes with the collection. */
31 whitelist; enum constant in enum:ChildrenAssociationPolicy
  /external/chromium_org/chrome/browser/extensions/
admin_policy_unittest.cc 96 // Tests UserMayLoad for an extension on the whitelist.
100 base::ListValue whitelist; local
101 whitelist.Append(Value::CreateStringValue(extension_->id()));
102 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(),
107 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(),
110 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(),
138 // With a whitelist. There's no such thing as a whitelist wildcard.
139 base::ListValue whitelist; local
140 whitelist.Append
    [all...]
all_urls_apitest.cc 41 // Then add the two extensions to the whitelist.
42 extensions::Extension::ScriptingWhitelist whitelist; local
43 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir1));
44 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir2));
45 extensions::Extension::SetScriptingWhitelist(whitelist);
standard_management_policy_provider.cc 41 const base::ListValue* whitelist = local
50 blacklist, whitelist, forcelist, allowed_types, extension, error);
  /external/chromium_org/third_party/WebKit/Source/core/page/
UserStyleSheet.h 45 UserStyleSheet(const String& source, const KURL& url, const Vector<String>& whitelist, const Vector<String>& blacklist, UserContentInjectedFrames injectedFrames, UserStyleLevel level)
48 , m_whitelist(whitelist)
57 const Vector<String>& whitelist() const { return m_whitelist; } function in class:WebCore::UserStyleSheet
  /external/chromium_org/chrome/browser/chromeos/policy/
device_policy_decoder_chromeos.cc 97 ListValue* whitelist = new ListValue(); local
102 whitelist->Append(Value::CreateStringValue(*entry));
107 whitelist,
  /external/chromium_org/chrome/browser/chromeos/settings/
cros_settings_unittest.cc 121 // Setting the whitelist should also switch the value of
123 base::ListValue whitelist; local
124 whitelist.Append(new base::StringValue("me@owner"));
127 AddExpectation(kAccountsPrefUsers, whitelist.DeepCopy());
128 SetPref(kAccountsPrefUsers, &whitelist);
134 base::ListValue* whitelist = new base::ListValue(); local
136 whitelist->Append(hacky_user.DeepCopy());
139 AddExpectation(kAccountsPrefUsers, whitelist);
140 // Add some user to the whitelist.
147 base::ListValue whitelist; local
170 base::ListValue whitelist; local
181 base::ListValue whitelist; local
195 base::ListValue whitelist; local
    [all...]
  /external/chromium_org/chrome/common/extensions/features/
simple_feature.h 28 std::set<std::string>* whitelist() { return &whitelist_; } function in class:extensions::SimpleFeature
simple_feature_unittest.cc 78 TEST_F(ExtensionSimpleFeatureTest, Whitelist) {
83 feature.whitelist()->insert(kIdFoo);
84 feature.whitelist()->insert(kIdBar);
118 feature.whitelist()->insert(kIdFooHashed);
194 feature.whitelist()->insert("monkey");
198 feature.whitelist()->clear();
352 EXPECT_TRUE(feature->whitelist()->empty());
363 base::ListValue* whitelist = new base::ListValue(); local
364 whitelist->Append(new base::StringValue("foo"));
365 whitelist->Append(new base::StringValue("bar"))
470 base::ListValue* whitelist = new base::ListValue(); local
    [all...]
  /external/chromium_org/chrome/common/extensions/
mime_types_handler.cc 51 std::vector<std::string> whitelist; local
53 whitelist.push_back(kMIMETypeHandlersWhitelist[i]);
54 return whitelist;
  /external/chromium_org/third_party/libjingle/source/talk/base/
natserver.h 96 AddressSet* whitelist; member in struct:talk_base::NATServer::TransEntry
  /external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/
enterprise_platform_keys_private_api_unittest.cc 160 base::ListValue whitelist; variable
161 whitelist.AppendString(extension_->id());
162 prefs_->Set(prefs::kAttestationExtensionWhitelist, whitelist);
  /external/chromium_org/chrome/browser/policy/
url_blacklist_manager_unittest.cc 185 ListValue* whitelist = new ListValue; local
186 whitelist->Append(new StringValue("mail.google.com"));
188 pref_service_.SetManagedPref(prefs::kUrlBlacklist, whitelist);
  /external/chromium_org/webkit/browser/appcache/
appcache_unittest.cc 130 const NamespaceVector& whitelist = cache->online_whitelist_namespaces_; local
132 EXPECT_EQ(expected, whitelist.size());
133 EXPECT_EQ(GURL("http://w1.com"), whitelist[0].namespace_url);
134 EXPECT_EQ(GURL("http://w2.com"), whitelist[1].namespace_url);
547 const GURL kWhitelistUrl("http://foo.com/whitelist*");
555 "/whitelist* isPattern\r"
  /external/chromium_org/chrome/browser/managed_mode/
managed_mode_site_list.cc 28 const char kWhitelistKey[] = "whitelist";
69 // Takes a DictionaryValue entry from the JSON file and fills the whitelist
77 const base::ListValue* whitelist = NULL; local
78 if (site_dict->GetList(kWhitelistKey, &whitelist)) {
80 for (base::ListValue::const_iterator whitelist_it = whitelist->begin();
81 whitelist_it != whitelist->end(); ++whitelist_it) {
84 LOG(ERROR) << "Invalid whitelist entry";
100 LOG(ERROR) << "Invalid whitelist entry";
111 // Fall back to using a whitelist based on the URL.
114 LOG(ERROR) << "Whitelist is invalid"
    [all...]
  /external/chromium_org/chrome/browser/renderer_host/
chrome_resource_dispatcher_host_delegate.cc 510 std::vector<std::string> whitelist = MimeTypesHandler::GetMIMETypeWhitelist(); local
513 for (size_t i = 0; i < whitelist.size(); ++i) {
514 const char* extension_id = whitelist[i].c_str();
  /external/chromium_org/chrome/common/extensions/permissions/
permissions_data.cc 67 // whitelist extensions to have access to experimental in just the store, and
544 const Extension::ScriptingWhitelist* whitelist = local
547 for (Extension::ScriptingWhitelist::const_iterator iter = whitelist->begin();
548 iter != whitelist->end(); ++iter) {
  /external/chromium_org/sandbox/linux/services/
broker_process_unittest.cc 328 std::vector<std::string> whitelist; local
329 whitelist.push_back(tempfile_name);
331 BrokerProcess open_broker(whitelist, whitelist);
383 std::vector<std::string> whitelist; local
384 whitelist.push_back(kCpuInfo);
386 BrokerProcess open_broker(whitelist,
387 whitelist,
  /external/libnfc-nxp/src/
phHciNfc_AdminMgmt.c 52 /* Max Whitelist Supported by the Device*/
100 uint8_t whitelist[WHITELIST_MAX_LEN]; member in struct:phHciNfc_AdminGate_Info
476 p_admin_info->whitelist[i] = i + 2;
480 (uint8_t *)p_admin_info->whitelist, i );
    [all...]
  /external/chromium/chrome/browser/chromeos/login/
signed_settings.cc 92 const RepeatedPtrField<std::string>& whitelist = local
94 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin();
95 it != whitelist.end();
344 VLOG(2) << "Whitelist check was successful for " << email_to_check;
355 VLOG(2) << "Whitelist check was successful for " << email_to_check;
391 VLOG(2) << "Whitelist check was successful.";
394 VLOG(2) << "Whitelist check failed.";
405 const RepeatedPtrField<std::string>& whitelist = local
407 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin();
408 it != whitelist.end()
498 const RepeatedPtrField<string>& whitelist = whitelist_proto->user_whitelist(); local
    [all...]
signed_settings_unittest.cc 130 em::PolicyData BuildPolicyData(std::vector<std::string> whitelist) {
137 if (!whitelist.empty()) {
139 for (std::vector<std::string>::const_iterator it = whitelist.begin();
140 it != whitelist.end();
167 const RepeatedPtrField<std::string>& whitelist = local
169 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin();
170 it != whitelist.end();
328 std::vector<std::string> whitelist(1, fake_email_);
329 whitelist.push_back(fake_email_ + "m");
330 em::PolicyData fake_pol = BuildPolicyData(whitelist);
    [all...]

Completed in 593 milliseconds

1 2