/external/chromium/chrome/browser/resources/shared/js/ |
parse_html_subset.js | 2 * Whitelist of tag names allowed in parseHtmlSubset.
|
/external/chromium_org/chrome/browser/extensions/api/dial/ |
dial_apitest.cc | 96 test_data_dir_.AppendASCII("dial/whitelist"),
|
/external/chromium_org/chrome/browser/prerender/ |
prerender_field_trial.h | 37 // Returns true iff the side-effect free whitelist is enabled.
|
/external/chromium_org/chrome/common/extensions/api/ |
PRESUBMIT.py | 44 input_api, output_api, '.', whitelist=[r'^PRESUBMIT_test\.py$'])
|
/external/chromium_org/chrome/common/extensions/api/identity/ |
oauth2_manifest_handler.cc | 57 // oauth2.auto_approve based on whitelist, and if it is present.
|
/external/chromium_org/third_party/WebKit/Source/core/page/ |
PageGroup.h | 62 void injectStyleSheet(const String& source, const Vector<String>& whitelist, StyleInjectionTarget);
|
/external/chromium_org/android_webview/buildbot/ |
deps_whitelist.py | 126 so that the only deps left are the one in the whitelist.""" 178 parser.add_argument('--method', help='Method to use to fetch from whitelist.',
|
/external/chromium_org/chrome/browser/chromeos/login/ |
login_performer.h | 126 // devices. Continues the login process or signals whitelist check failure 154 // Used to verify logins that matched wildcard on the login whitelist.
|
login_utils.h | 52 // true if the whitelist check was satisfied via a wildcard.
|
/external/chromium_org/chrome/browser/safe_browsing/ |
ui_manager.h | 156 // Adds the given entry to the whitelist. Called on the UI thread. 162 // Only access this whitelist from the UI thread.
|
/external/chromium_org/chrome/common/extensions/docs/server2/ |
features_bundle_test.py | 29 'whitelist': ['im not here'] 61 'whitelist': ['this isnt happening']
|
/external/chromium_org/webkit/browser/appcache/ |
manifest_parser_unittest.cc | 303 "http://combo.com/whitelist-1\r" 304 "HTTP://www.diff.com/whitelist-2#strip\r" 315 "relative/whitelist-3#strip\r" 316 "http://combo.com:99/whitelist-4\r"); 331 EXPECT_EQ(GURL("http://combo.com/whitelist-1"), 333 EXPECT_EQ(GURL("http://www.diff.com/whitelist-2"), 335 EXPECT_EQ(GURL("http://combo.com:42/relative/whitelist-3"), 337 EXPECT_EQ(GURL("http://combo.com:99/whitelist-4"),
|
/packages/inputmethods/LatinIME/tools/dicttool/src/com/android/inputmethod/latin/dicttool/ |
Info.java | 63 + " whitelist entries)"); 88 ? "whitelist" : shortcutTarget.mFrequency) + ")");
|
XmlDictInputOutput.java | 227 * SAX handler for a shortcut & whitelist XML file. 235 private final static String WHITELIST_MARKER = "whitelist"; 301 * @param shortcuts the file to read the shortcuts & whitelist from, or null. 339 * which has no support for bigrams or shortcuts/whitelist. 350 * The output format is the "second" format, which supports bigrams and shortcuts/whitelist.
|
/external/chromium_org/extensions/common/permissions/ |
permissions_data.cc | 54 // whitelist extensions to have access to experimental in just the store, and 531 const ExtensionsClient::ScriptingWhitelist& whitelist = local 534 return std::find(whitelist.begin(), whitelist.end(), extension->id()) != 535 whitelist.end();
|
/packages/apps/UnifiedEmail/src/com/android/mail/preferences/ |
MailPrefs.java | 308 * Returns whether or not an email address is in the whitelist of senders to show images for. 309 * This method reads the entire whitelist, so if you have multiple emails to check, you should 355 final Set<String> whitelist = getSenderWhitelist(); local 356 if (!whitelist.contains(sender)) { 361 final Set<String> updatedList = Sets.newHashSet(whitelist);
|
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_database.cc | 29 // Filename suffix for client-side phishing detection whitelist store. 31 FILE_PATH_LITERAL(" Csd Whitelist"); 40 // whitelist. If the whitelist on disk contains more entries then 44 // If the hash of this exact expression is on the csd whitelist then 68 // to match against the csd whitelist. E.g., if the path-prefix /foo is on the 69 // whitelist it should also match /foo/bar which is not the case for all the 97 // We may have /foo as path-prefix in the whitelist which should 538 DVLOG(1) << "Init csd whitelist store: " << csd_whitelist_filename_.value(); [all...] |
/external/chromium_org/chrome/common/safe_browsing/ |
csd.proto | 80 // on this whitelist. The client must not cache these whitelisted 81 // expressions. This whitelist will be empty for the vast majority 86 // can do whitelist matching.
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/latin/ |
BinaryDictionaryGetter.java | 227 // those do not include whitelist entries, the new code with an old version of the dictionary 228 // would lose whitelist functionality. 240 // Version 18 is the first one to include the whitelist
|
/external/chromium/chrome/browser/chromeos/login/ |
login_performer.cc | 202 // Whitelist check passed, continue with authentication. 241 // Whitelist check is always performed during initial login and 262 // Otherwise, do whitelist check first. 276 // trust whitelist returned by PrefService. So make separate check.
|
/external/chromium/net/http/ |
url_security_manager_win.cc | 130 // If we have a whitelist, just use that.
|
/external/chromium_org/chrome/browser/chromeos/extensions/ |
device_local_account_management_policy_provider.cc | 88 return "whitelist for device-local accounts";
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
user_cloud_policy_token_forwarder.cc | 77 // login whitelist is available, there is no reason to fetch the OAuth2 token
|
/external/chromium_org/chrome/browser/content_settings/ |
content_settings_internal_extension_provider.cc | 30 // Whitelist all extensions loaded so far.
|
/external/chromium_org/chrome/browser/extensions/ |
install_verifier.cc | 373 const base::ListValue* whitelist = local 376 if (whitelist && whitelist->Find(id_value) != whitelist->end())
|