/external/chromium_org/tools/idl_parser/ |
PRESUBMIT.py | 6 WHITELIST = [ r'^.+_test\.py$' ] 10 input_api, output_api, '.', whitelist=WHITELIST) 15 input_api, output_api, '.', whitelist=WHITELIST)
|
/external/chromium_org/tools/json_schema_compiler/ |
PRESUBMIT.py | 11 WHITELIST = [ r'.+_test.py$' ] 15 input_api, output_api, '.', whitelist=WHITELIST) 20 input_api, output_api, '.', whitelist=WHITELIST)
|
/external/chromium_org/tools/json_to_struct/ |
PRESUBMIT.py | 11 WHITELIST = [ r'.+_test.py$' ] 15 input_api, output_api, '.', whitelist=WHITELIST) 20 input_api, output_api, '.', whitelist=WHITELIST)
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
cros_settings_unittest.cc | 125 // Setting the whitelist should also switch the value of 127 base::ListValue whitelist; local 128 whitelist.Append(new base::StringValue("me@owner")); 131 AddExpectation(kAccountsPrefUsers, whitelist.DeepCopy()); 132 SetPref(kAccountsPrefUsers, &whitelist); 138 base::ListValue* whitelist = new base::ListValue(); local 140 whitelist->Append(hacky_user.DeepCopy()); 143 AddExpectation(kAccountsPrefUsers, whitelist); 144 // Add some user to the whitelist. 151 base::ListValue whitelist; local 174 base::ListValue whitelist; local 185 base::ListValue whitelist; local 199 base::ListValue whitelist; local [all...] |
/external/chromium_org/chrome/common/extensions/api/ |
_permission_features.json | 14 // Google employees: please update http://go/chrome-api-whitelist to map 26 "whitelist": [ 49 "whitelist": [ 71 "whitelist": [ 90 "whitelist": [ 109 "whitelist": [ 130 "whitelist": [ 152 "whitelist": [ 168 "whitelist": [ 177 "whitelist": [all...] |
_manifest_features.json | 22 "whitelist": [ 80 "whitelist": [ 115 // overriden (except for a whitelist of exceptions, see the 116 // app.content_security_policy whitelist). 155 "whitelist": [ 169 "whitelist": [ 178 "whitelist": [ 249 "whitelist": [ 285 "whitelist": [
|
/external/chromium_org/chrome/renderer/extensions/ |
renderer_permissions_policy_delegate.cc | 34 const ExtensionsClient::ScriptingWhitelist& whitelist = local 36 if (std::find(whitelist.begin(), whitelist.end(), extension->id()) != 37 whitelist.end()) {
|
/external/chromium_org/tools/json_schema_compiler/test/ |
test_features.json | 19 "whitelist": [
|
/external/chromium_org/tools/perf_expectations/ |
PRESUBMIT.py | 22 whitelist = [r'.+_unittest\.py$'] 24 input_api, output_api, 'tests', whitelist)) 36 whitelist = [r'.+_unittest\.py$'] 38 input_api, output_api, 'tests', whitelist))
|
/external/chromium_org/chrome/browser/safe_browsing/ |
safe_browsing_database.h | 52 // four databases: browse, download, download whitelist and 53 // client-side detection (csd) whitelist databases. The browse database contains 56 // these downloaded contents. The download whitelist contains whitelisted 58 // etc. The csd whitelist database contains URLs that will never be considered 69 // |enable_client_side_whitelist| is used to control the csd whitelist 71 // |enable_download_whitelist| is used to control the download whitelist 118 // whitelist. Otherwise, this function returns true. Note: the whitelist 123 // The download whitelist is used for two purposes: a white-domain list of 125 // whitelist of arbitrary strings such as hashed certificate authorities tha [all...] |
/external/chromium_org/extensions/browser/ |
admin_policy_unittest.cc | 96 // Tests UserMayLoad for an extension on the whitelist. 100 base::ListValue whitelist; local 101 whitelist.Append(new base::StringValue(extension_->id())); 102 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 107 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 110 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 138 // With a whitelist. There's no such thing as a whitelist wildcard. 139 base::ListValue whitelist; local 140 whitelist.Append [all...] |
admin_policy.h | 14 // Functions for providing information about the extension whitelist, 25 const base::ListValue* whitelist,
|
/sdk/build/ |
windows_sdk_whitelist.mk | 0 # Whitelist of SDK projects that can be built for the SDK on Windows 8 # This file defines a whitelist of projects that can be built in the Windows 26 # Whitelist of SDK specific projects that do NOT need Java (e.g. C libraries) 40 # Whitelist of SDK specific projects that DO require Java
|
/external/chromium_org/chrome/browser/extensions/activity_log/ |
activity_log_policy_unittest.cc | 62 ActivityLogPolicy::Util::ApiSet whitelist; local 63 whitelist.insert( 66 // API is in whitelist; not stripped. 73 ActivityLogPolicy::Util::StripArguments(whitelist, action); 76 // Not in whitelist: stripped. 80 ActivityLogPolicy::Util::StripArguments(whitelist, action);
|
/external/chromium_org/third_party/WebKit/Source/core/page/ |
InjectedStyleSheet.h | 39 InjectedStyleSheet(const String& source, const Vector<String>& whitelist, StyleInjectionTarget injectedFrames) 41 , m_whitelist(whitelist) 47 const Vector<String>& whitelist() const { return m_whitelist; } function in class:WebCore::InjectedStyleSheet
|
/development/build/ |
windows_sdk_whitelist.mk | 0 # Whitelist of SDK projects that can be built for the SDK on Windows 8 # This file defines a whitelist of projects that can be built in the Windows 26 # Whitelist of platform specific projects that do NOT need Java (e.g. C libraries) 61 # Whitelist of platform specific projects that DO require Java
|
/external/chromium_org/extensions/common/ |
extensions_client.h | 56 // Replaces the scripting whitelist with |whitelist|. Used in the renderer; 58 virtual void SetScriptingWhitelist(const ScriptingWhitelist& whitelist) = 0; 60 // Return the whitelist of extensions that can run content scripts on
|
/packages/inputmethods/LatinIME/dictionaries/ |
sample.combined | 17 # into the dictionary is to add shortcut targets and maybe a whitelist 22 # value between 0 and 14, or the special value `whitelist' which becomes 23 # 15, which is then taken to be the whitelist target of this word. 37 shortcut=whitelisted,f=whitelist
|
/external/chromium_org/chrome/browser/ui/webui/ |
gesture_config_ui.h | 22 // TODO(mohsen): Add a whitelist of preferences that are allowed to be set or 23 // get here and check requested preferences against this whitelist.
|
/external/smack/src/org/jivesoftware/smackx/pubsub/ |
AccessModel.java | 36 /** Only those on a whitelist may subscribe and retrieve items */
37 whitelist;
enum constant in enum:AccessModel
|
ChildrenAssociationPolicy.java | 30 /** Only those on a whitelist may associate leaf nodes with the collection. */
31 whitelist;
enum constant in enum:ChildrenAssociationPolicy
|
/packages/apps/UnifiedEmail/src/com/android/mail/lib/html/parser/ |
HtmlWhitelist.java | 31 * or null if the given name is not in the whitelist. 41 * or null if the given name is not in the whitelist.
|
/packages/apps/UnifiedEmail/src/com/google/android/mail/common/html/parser/ |
HtmlWhitelist.java | 32 * or null if the given name is not in the whitelist. 42 * or null if the given name is not in the whitelist.
|
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_database.h | 48 // whitelist databases. The browse database contains information 51 // these downloaded contents. The csd whitelist database contains URLs 63 // |enable_client_side_whitelist| is used to control the csd whitelist 104 // whitelist. Otherwise, this function returns true. Note: the whitelist 153 // Filename for client-side phishing detection whitelist databsae. 243 // Loads the given full-length hashes to the csd whitelist. If the number 244 // of hashes is too large or if the kill switch URL is on the whitelist 245 // we will whitelist all URLs. 248 // Call this method if an error occured with the csd whitelist. This wil [all...] |
/external/chromium/chrome/browser/extensions/ |
all_urls_apitest.cc | 25 // Then add the two extensions to the whitelist. 26 Extension::ScriptingWhitelist whitelist; local 27 whitelist.push_back(Extension::GenerateIdForPath(extension_dir1)); 28 whitelist.push_back(Extension::GenerateIdForPath(extension_dir2)); 29 Extension::SetScriptingWhitelist(whitelist);
|