/external/chromium_org/tools/idl_parser/ |
PRESUBMIT.py | 6 WHITELIST = [ r'^.+_test\.py$' ] 10 input_api, output_api, '.', whitelist=WHITELIST) 15 input_api, output_api, '.', whitelist=WHITELIST)
|
/external/chromium_org/tools/json_schema_compiler/ |
PRESUBMIT.py | 11 WHITELIST = [ r'.+_test.py$' ] 15 input_api, output_api, '.', whitelist=WHITELIST) 20 input_api, output_api, '.', whitelist=WHITELIST)
|
/external/chromium_org/tools/json_to_struct/ |
PRESUBMIT.py | 11 WHITELIST = [ r'.+_test.py$' ] 15 input_api, output_api, '.', whitelist=WHITELIST) 20 input_api, output_api, '.', whitelist=WHITELIST)
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
cros_settings_unittest.cc | 121 // Setting the whitelist should also switch the value of 123 base::ListValue whitelist; local 124 whitelist.Append(new base::StringValue("me@owner")); 127 AddExpectation(kAccountsPrefUsers, whitelist.DeepCopy()); 128 SetPref(kAccountsPrefUsers, &whitelist); 134 base::ListValue* whitelist = new base::ListValue(); local 136 whitelist->Append(hacky_user.DeepCopy()); 139 AddExpectation(kAccountsPrefUsers, whitelist); 140 // Add some user to the whitelist. 147 base::ListValue whitelist; local 170 base::ListValue whitelist; local 181 base::ListValue whitelist; local 195 base::ListValue whitelist; local [all...] |
/external/chromium_org/components/autofill/content/browser/autocheckout/ |
whitelist_manager.h | 37 // Schedule a fetch of the Autocheckout whitelist file if it's not already 38 // loaded. This helps ensure that the whitelist will be available by the time 42 // Matches the url with whitelist and return the matched url prefix. 55 // Autocheckout whitelist file downloading. 58 // Timer callback indicating it's time to download whitelist from server. 72 // Parse whitelist data and build whitelist. 98 // When the whitelist download started. Used to track download latency.
|
/external/chromium_org/chrome/renderer/extensions/ |
renderer_permissions_policy_delegate.cc | 33 const Extension::ScriptingWhitelist* whitelist = local 35 if (std::find(whitelist->begin(), whitelist->end(), extension->id()) != 36 whitelist->end()) {
|
/external/chromium_org/tools/perf_expectations/ |
PRESUBMIT.py | 22 whitelist = [r'.+_unittest\.py$'] 24 input_api, output_api, 'tests', whitelist)) 36 whitelist = [r'.+_unittest\.py$'] 38 input_api, output_api, 'tests', whitelist))
|
/external/chromium_org/chrome/common/extensions/api/ |
_permission_features.json | 17 "whitelist": [ 47 "whitelist": [ 92 "whitelist": [ 101 "whitelist": [ 124 "whitelist": ["mfehgcgbbipciphmccgaenjidiccnmng"] 151 "whitelist": [ 165 "whitelist": [ 189 "whitelist": ["heildphpnddilhkemkielfhnkaagiabh"] 207 "whitelist": [ 218 "whitelist": [all...] |
_manifest_features.json | 22 "whitelist": [ 90 // overriden (except for a whitelist of exceptions, see the 91 // app.content_security_policy whitelist). 130 "whitelist": [ 144 "whitelist": [ 153 "whitelist": [ 218 "whitelist": [ 253 "whitelist": [
|
/external/chromium_org/chrome/browser/safe_browsing/ |
safe_browsing_database.h | 49 // four databases: browse, download, download whitelist and 50 // client-side detection (csd) whitelist databases. The browse database contains 53 // these downloaded contents. The download whitelist contains whitelisted 55 // etc. The csd whitelist database contains URLs that will never be considered 66 // |enable_client_side_whitelist| is used to control the csd whitelist 68 // |enable_download_whitelist| is used to control the download whitelist 112 // whitelist. Otherwise, this function returns true. Note: the whitelist 117 // The download whitelist is used for two purposes: a white-domain list of 119 // whitelist of arbitrary strings such as hashed certificate authorities tha [all...] |
/external/chromium_org/chrome/browser/extensions/ |
admin_policy_unittest.cc | 96 // Tests UserMayLoad for an extension on the whitelist. 100 base::ListValue whitelist; local 101 whitelist.Append(Value::CreateStringValue(extension_->id())); 102 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 107 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 110 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 138 // With a whitelist. There's no such thing as a whitelist wildcard. 139 base::ListValue whitelist; local 140 whitelist.Append [all...] |
admin_policy.h | 15 // Functions for providing information about the extension whitelist, 27 const base::ListValue* whitelist,
|
standard_management_policy_provider.cc | 41 const base::ListValue* whitelist = local 50 blacklist, whitelist, forcelist, allowed_types, extension, error);
|
/external/chromium_org/components/autofill/core/common/ |
autofill_switches.cc | 10 // Flag used to tell Chrome the Autochecout whitelist url. 11 const char kAutocheckoutWhitelistUrl[] = "autocheckout-whitelist-url"; 16 // Bypass autocheckout whitelist check, so all sites are enabled. 17 const char kBypassAutocheckoutWhitelist[] = "bypass-autocheckout-whitelist";
|
/sdk/build/ |
windows_sdk_whitelist.mk | 0 # Whitelist of SDK projects that can be built for the SDK on Windows 8 # This file defines a whitelist of projects that can be built in the Windows 26 # Whitelist of SDK specific projects that do NOT need Java (e.g. C libraries) 40 # Whitelist of SDK specific projects that DO require Java
|
/external/chromium_org/chrome/browser/extensions/activity_log/ |
activity_log_policy_unittest.cc | 62 std::set<std::string> whitelist; local 63 whitelist.insert("tabs.executeScript"); 65 // API is in whitelist; not stripped. 72 ActivityLogPolicy::Util::StripArguments(whitelist, action); 75 // Not in whitelist: stripped. 79 ActivityLogPolicy::Util::StripArguments(whitelist, action); 86 ActivityLogPolicy::Util::StripArguments(whitelist, action);
|
/development/build/ |
windows_sdk_whitelist.mk | 0 # Whitelist of SDK projects that can be built for the SDK on Windows 8 # This file defines a whitelist of projects that can be built in the Windows 26 # Whitelist of platform specific projects that do NOT need Java (e.g. C libraries) 61 # Whitelist of platform specific projects that DO require Java
|
/packages/inputmethods/LatinIME/dictionaries/ |
sample.combined | 17 # into the dictionary is to add shortcut targets and maybe a whitelist 22 # value between 0 and 14, or the special value `whitelist' which becomes 23 # 15, which is then taken to be the whitelist target of this word. 37 shortcut=whitelisted,f=whitelist
|
/external/chromium_org/chrome/browser/ui/webui/ |
gesture_config_ui.h | 22 // TODO(mohsen): Add a whitelist of preferences that are allowed to be set or 23 // get here and check requested preferences against this whitelist.
|
/external/smack/src/org/jivesoftware/smackx/pubsub/ |
AccessModel.java | 36 /** Only those on a whitelist may subscribe and retrieve items */
37 whitelist;
enum constant in enum:AccessModel
|
ChildrenAssociationPolicy.java | 30 /** Only those on a whitelist may associate leaf nodes with the collection. */
31 whitelist;
enum constant in enum:ChildrenAssociationPolicy
|
/packages/apps/UnifiedEmail/src/com/android/mail/lib/html/parser/ |
HtmlWhitelist.java | 31 * or null if the given name is not in the whitelist. 41 * or null if the given name is not in the whitelist.
|
/packages/apps/UnifiedEmail/src/com/google/android/mail/common/html/parser/ |
HtmlWhitelist.java | 32 * or null if the given name is not in the whitelist. 42 * or null if the given name is not in the whitelist.
|
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_database.h | 48 // whitelist databases. The browse database contains information 51 // these downloaded contents. The csd whitelist database contains URLs 63 // |enable_client_side_whitelist| is used to control the csd whitelist 104 // whitelist. Otherwise, this function returns true. Note: the whitelist 153 // Filename for client-side phishing detection whitelist databsae. 243 // Loads the given full-length hashes to the csd whitelist. If the number 244 // of hashes is too large or if the kill switch URL is on the whitelist 245 // we will whitelist all URLs. 248 // Call this method if an error occured with the csd whitelist. This wil [all...] |
/external/chromium/chrome/browser/extensions/ |
all_urls_apitest.cc | 25 // Then add the two extensions to the whitelist. 26 Extension::ScriptingWhitelist whitelist; local 27 whitelist.push_back(Extension::GenerateIdForPath(extension_dir1)); 28 whitelist.push_back(Extension::GenerateIdForPath(extension_dir2)); 29 Extension::SetScriptingWhitelist(whitelist);
|